|
Showing 1 - 25 of
265 matches in All Departments
Today, computation is an essential component of every technology.
However, there has not been much research on quantum computing,
even though it has the capability to solve complex problems in an
efficient way. Further study is required to fully understand the
uses and benefits of this technology. The Handbook of Research on
Quantum Computing for Smart Environments presents investigating
physical realizations of quantum computers, encoders, and decoders,
including photonic quantum realization, cavity quantum
electrodynamics, and many more topics on Bits to Qubits. Covering
key topics such as machine learning, software, quantum algorithms,
and neural networks, this major reference work is ideal for
engineers, computer scientists, physicists, mathematicians,
researchers, academicians, scholars, practitioners, instructors,
and students.
This contributed volume brings out a comprehensive collection of
changes from cellular to molecular levels in medicinal plants under
extreme environments. The focus of this book is to address the
molecular changes in medicinal plants under different abiotic
stresses. Medicinal plants are regarded as rich resources of
components that can be used for drug development in the
pharmaceutical industry. A few medicinal plants are considered
vital sources of nutrients and solicited for their therapeutic
properties. Therefore, it is essential to understand medicinal
plants' interaction under abiotic stresses as compounds obtained
from these plants play an important role in human health. This book
is of interest to students, teachers, researchers, scientists,
medicinal plant experts, and policymakers. Also, the book provides
study material for undergraduate and graduate students of botany,
environmental sciences, medicinal and aromatic plants,
biochemistry, and biotechnology. National and international
scientists working in the area of medicinal plants, drug
development, and policymakers will also find this a useful read
Blockchain was first conceptualized as a method of building trust
in machines and has grown into a vital aspect of many different
sectors of the economy. Recently, attention has shifted to the
field of autonomous vehicles, and the added value blockchain can
provide for the future of this sector by building next generation
secure decentralized, distributed, and trusted automated
environments and enhancing the productivity of several autonomous
applications. Opportunities and Challenges for Blockchain
Technology in Autonomous Vehicles is a critical reference source
that explores the applications of blockchain in automated
industries. Featuring coverage on a wide range of topics including
privacy, risk assessment, and performance optimization, this book
is ideally designed for design engineers, industry professionals,
cryptographers, service designers, entrepreneurs, government
officials, consultants, researchers, academicians, and students.
This book provides a holistic compilation on applications of carbon
nanostructures, especially in advanced healthcare
applications. It comprises chapters on utility of
diverse multifunctional nanocarriers in drug delivery and
biomedical applications, especially emphasizing on the synthesis
and characterizations of nanosystems along with surface engineering
approaches used for active targeting of the drugs. Moreover, the
chapters also include the recent updates on the applications of the
nanocarriers to fulfill the needs of various healthcare systems.
More individuals than ever are utilizing internet technologies to
work from home, teach and learn, shop, interact with peers, review
medical records, and more. While it is certainly convenient to
conduct such tasks via the internet, this increased internet
presence has also led to a rise in the search and availability of
personal information, which in turn is resulting in more
cyber-attacks, privacy breaches, and information leaks. Cyber
criminals are using such opportunities to attack governments,
organizations, and individuals, making it necessary to anticipate,
assess, and mitigate privacy and security threats during this
infodemic. The Handbook of Research on Technical, Privacy, and
Security Challenges in a Modern World discusses the design and
development of different machine learning systems, including next
generation applications, in order to mitigate cyber-attacks and
address security challenges in everyday technologies. It further
explores select methods and algorithms of learning for implementing
better security methods in fields such as business and healthcare.
It recognizes the future of privacy and the importance of
preserving data through recommended practice, feedback loops, and
smart agents. Covering topics such as face mask detection, gesture
recognition, and botnet attacks and detection, this major reference
work is a dynamic resource for medical professionals, healthcare
administrators, government officials, business executives and
managers, IT managers, students and faculty of higher education,
librarians, researchers, and academicians.
This book describes a set of methods for finding more-for-less
solutions of various kind of fuzzy transportation problems.
Inspired by more-for-less approaches to the basic transportation
problem initiated by Abraham Charnes and his collaborators during
1960s and 1970s, this book describes new methods developed by the
authors to solve different types of problems, including symmetric
balanced fuzzy transportation problems, symmetric intuitionistic
fuzzy transportation problems with mixed constraints, and
symmetric intuitionistic fuzzy linear fractional
transportation problems with mixed constraints. It offers extensive
details on their applications to some representative problems, and
discusses some future research directions
Dosage Forms, Formulation Developments and Regulations, Volume One
in the Recent and Future Trends in Pharmaceutics series, explores
aspects of pharmaceutics, with an original approach focused on
technology, novelties and future trends in the field. The book
discusses the most recent developments in pharmaceutical
preformulation and formulation studies, biopharmaceutics and novel
pharmaceutical formulations, regulatory affairs, and good
manufacturing practices. Exciting areas such as formulation
strategies, optimization techniques, the biopharmaceutical
classification system, and pharmaceutical aerosols are included.
The field of pharmaceutics is highly dynamic and rapidly expanding
day-by-day, so it demands a variety of amplified efforts for
designing and developing pharmaceutical processes and formulation
strategies. This is an essential reference for researchers in
academia and industry as well as advanced graduate students in
pharmaceutics.
This book provides recent developments and future perspectives of
pulp and paper processing based on biotechnology to replace
conventional environmental unfriendly chemical processes. The use
of microorganism and microbial enzymes in various processes such as
bleaching, deinking, refining, dissolving pulp, debarking &
pitch removal, slime control, wastewater treatment and waste
material valorisation are discussed.
This book includes the original, peer reviewed research articles
from the 2nd International Conference on Cybernetics, Cognition and
Machine Learning Applications (ICCCMLA 2020), held in August, 2020
at Goa, India. It covers the latest research trends or developments
in areas of data science, artificial intelligence, neural networks,
cognitive science and machine learning applications, cyber physical
systems and cybernetics.
This book presents applications of machine learning techniques in
processing multimedia large-scale data. Multimedia such as text,
image, audio, video, and graphics stands as one of the most
demanding and exciting aspects of the information era. The book
discusses new challenges faced by researchers in dealing with these
large-scale data and also presents innovative solutions to address
several potential research problems, e.g., enabling comprehensive
visual classification to fill the semantic gap by exploring
large-scale data, offering a promising frontier for detailed
multimedia understanding, as well as extract patterns and making
effective decisions by analyzing the large collection of data.
This book introduces readers to the fundamentals of transportation
problems under the fuzzy environment and its extensions. It also
discusses the limitations and drawbacks of (1) recently proposed
aggregation operators under the fuzzy environment and its various
extensions; (2) recently proposed methods for solving
transportation problems under the fuzzy environment; and (3)
recently proposed methods for solving transportation problems under
the intuitionistic fuzzy environment. In turn, the book proposes
simplified methods to overcome these limitations.
This book summarizes various tools and techniques used to provide
insights into the cellular and molecular pathophysiology of stroke.
It also presents rodent animal models to help shed light on the
pathophysiology of ischemic stroke. Presenting the latest
information on the different types of stroke, including embolic,
filament, photothrombotic, and bilateral common carotid artery, the
book also describes techniques that are used for confirmation of
stroke surgery, such as laser speckle imaging (LSI) and laser
Doppler flowmetry (LDF), and discusses the non-human primates that
are used in stroke surgery, cerebral venous sinuous thrombosis, and
neurobehavioral assessment. Lastly, it analyzes various
neuroprotective agents to treat and prevent ischemic stroke, and
examines the challenges and advances in treating and preventing
acute ischemic stroke.
This handbook is organized under three major parts. The first part
of this handbook deals with multimedia security for emerging
applications. The chapters include basic concepts of multimedia
tools and applications, biological and behavioral biometrics,
effective multimedia encryption and secure watermarking techniques
for emerging applications, an adaptive face identification approach
for android mobile devices, and multimedia using chaotic and
perceptual hashing function. The second part of this handbook
focuses on multimedia processing for various potential
applications. The chapter includes a detail survey of image
processing based automated glaucoma detection techniques and role
of de-noising, recent study of dictionary learning based image
reconstruction techniques for analyzing the big medical data, brief
introduction of quantum image processing and it applications, a
segmentation-less efficient Alzheimer detection approach, object
recognition, image enhancements and de-noising techniques for
emerging applications, improved performance of image compression
approach, and automated detection of eye related diseases using
digital image processing. The third part of this handbook
introduces multimedia applications. The chapter includes the
extensive survey on the role of multimedia in medicine and
multimedia forensics classification, a finger based authentication
system for e-health security, analysis of recently developed deep
learning techniques for emotion and activity recognition. Further,
the book introduce a case study on change of ECG according to time
for user identification, role of multimedia in big data, cloud
computing, the Internet of things (IoT) and blockchain environment
in detail for real life applications. This handbook targets
researchers, policy makers, programmers and industry professionals
in creating new knowledge for developing efficient
techniques/framework for multimedia applications. Advanced level
students studying computer science, specifically security and
multimedia will find this book useful as a reference.
Reliability is one of the fundamental criteria in engineering
systems. Design and maintenance serve to support it throughout the
systems life. As such, maintenance acts in parallel to production
and can have a great impact on the availability and capacity of
production and the quality of the products. The authors describe
current and innovative methods useful to industry and society.
This book contains high-quality research articles and reviews that
promote research and reflect the most recent advances in
intelligent wavelet based techniques for advanced multimedia
applications as well as other emerging areas. In recent time,
wavelet transforms have become useful in many signal, image and
video processing applications, especially for multimedia security
and surveillance. A few applications of wavelets in security and
surveillance are watermarking, fusion, steganography, object
detection, tracking, motion recognition and intention recognition,
etc. Wavelets are well capable of analyzing signal, image and video
at different resolution levels, popularly known as multiresolution
analysis. The multiresolution analysis is advantageous in
multimedia security and surveillance applications. It provides
flexibility in selection of different resolution levels that leads
to better accuracy. Furthermore, recently sparse representation has
become an advancement to analyze wavelet coefficients. It is
observed that wavelet transforms possess the invariance property
which makes them suitable for many vision applications. This book
provides a concise overview of the current state of the art and
disseminates some of the novel and exciting ideas and techniques.
In addition, it is also helpful for the senior undergraduate and
graduate students, researcher, academicians, IT professional and
providers, citizens, customers as well as policy makers working in
this area as well as other emerging applications demanding
state-of-the-art wavelet based multimedia applications.
This book presents a novel approach to the formulation and solution
of three classes of problems: the fully fuzzy transportation
problem, the fully fuzzy transshipment problem, and fully fuzzy
solid transportation problem. It points out some limitations of the
existing formulations and approaches, indicating some possible,
conceptually and algorithmically attractive solutions to alleviate
them. In particular, the book describes new conceptual and
algorithmic solutions for finding the fuzzy optimal solutions of
the single-objective fully fuzzy transportation problems, the fully
fuzzy transshipment problems and the fully fuzzy solid
transportation problems. Moreover, based on the novel concepts and
solutions proposed by combining the concept of a fully fuzzy solid
transportation problem and a fully fuzzy transshipment problem, it
describes a new class of problems, i.e. the fully fuzzy solid
trans-shipment problem, together with its fuzzy linear programming
formulation and some methods to find its fuzzy optimal solution.
The book offers the readers a timely piece of literature in the
field of fuzzy linear programming, and is expected to act as a
source of inspiration for future research and applications.
This book presents medical image watermarking techniques and
algorithms for telemedicine and other emerging applications. This
book emphasizes on medical image watermarking to ensure the
authenticity of transmitted medical information. It begins with an
introduction of digital watermarking, important characteristics,
novel applications, different watermarking attacks and standard
benchmark tools. This book also covers spatial and transform domain
medical image watermarking techniques and their merits and
limitations. The authors have developed improved/novel watermarking
techniques for telemedicine applications that offer higher
robustness, better perceptual quality and increased embedding
capacity and secure watermark. The suggested methods may find
potential applications in the prevention of patient identity theft
and health data management issues which is a growing concern in
telemedicine applications. This book provides a sound platform for
understanding the medical image watermarking paradigm for
researchers in the field and advanced-level students. Industry
professionals working in this field, as well as other emerging
applications demanding robust and secure watermarking will find
this book useful as a reference.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R383
R318
Discovery Miles 3 180
|