|
Showing 1 - 25 of
31 matches in All Departments
In comparison to Industry 4.0, Industry 5.0 is seen as the next
industrial revolution, with the goal of leveraging the creativity
of human experts in combination with efficient, intelligent, and
accurate machines to provide resource-efficient and user-preferred
solutions. With the improvements in social networks, cloud, and the
internet of things (IoT)-based technologies, the requirement for a
strong cyber security system, particularly in the healthcare
sector, is increasing. Cyber Trafficking, Threat Behavior, and
Malicious Activity Monitoring for Healthcare Organizations provides
a comprehensive review of techniques and applications of Industry
5.0-enabled intelligent healthcare-centric cyber security. The goal
of this book is to close the gap between AI and cyber security.
Covering topics such as malicious activity, the dark web, and smart
healthcare systems, this premier reference source is an essential
resource for healthcare administrators, IT managers, system
developers, system architects, IT specialists, students and
educators of higher education, librarians, researchers, and
academicians.
This book looks at various syncretic traditions in India, such as
Bhakti, Nath Yogi, Sufi, Imam Shahi, Ismailis, Khojas, and others,
and presents an elaborate picture of a redefined cultural space
through them. It also investigates different
syncretisms—Hindu–Muslim, Hindu– Muslim–Christian and
Aboriginal-Ethnic—to understand diverse aspects of hybridity
within the Indian nation space. It discusses how Indian nationalism
was composed of different opinions from its inception, reflecting
its rich diversity and pluralistic traditions. The book traces the
emergence of multiple contours of Indian nationalism through the
historical trajectory of religious diversity, lingering effects of
colonialism, and experimentation with secularism. This volume
caters to scholars and students interested in cultural studies,
religion studies, pilgrimage studies, history, social anthropology,
historical sociology, historical geography, religion, and art
history. It will also be of interest to political theorists and
general readers.
1) This book presents a comprehensive narrative of North Indian
Folk theatre as a counter culture. 2) Rich in empirical material,
it shows how North Indian Folk theatres are challenging the
cultural hegemony. 3) This book will be of interest to departments
of South Asian studies and Cultural studies across UK and USA.
This new volume provides a collection of chapters on diverse topics
in machine learning algorithms and security analytics, AI and
machine learning, and network security applications. It presents a
variety of design algorithms that allow computers to employ machine
learning to display behavior learned from past experiences rather
than human interaction for solutions to security issues and other
challenges in data management. The book discusses a variety of
algorithms, including Convolutional Neural Network (CNN), Random
Forest Algorithm, K-Nearest Neighbor (KNN), Apriori algorithm,
MapReduce algorithm, Genetic Algorithm used in IoT applications,
and more. The volume presents a survey of speculative parallelism
techniques, overheads due to mis-speculation of parallel threads,
performance reviews, and finally efficient power consumption. It
discusses measuring perceived quality of software ecosystems based
on transactions in customer management tools and offers a study of
the background modeling and background subtraction along with
various other literature studies that justify the role of moving
object detection in computer vision. The book also discusses the
major challenging issues that occur in real-time environments,
outlines the key developments of UAV networks for disaster
management applications, and addresses open research issues and
challenges based on UAV for disaster management. It also covers the
concepts of learning with NASA datasets. Scientists, researchers,
faculty, and students involved in research in the area of AI,
machine learning, and network security will find valuable
information in this volume.
This book examines folk theatres of North India as a unique
performative structure, a counter stream to the postulations of
Sanskrit and Western realistic theatre. In focusing on their
historical, social and cultural imprints, it explores how these
theatres challenge the linearity of cultural history and subvert
cultural hegemony. The book looks at diverse forms of theatre such
as svangs, nautanki, tamasha, all with conventions like open
performative space, free mingling of spectators and actors,
flexibility in roles and genres, etc. It discusses the genesis,
history and the independent trajectory of folk theatres; folk
theatre and Sanskrit dramaturgy; cinematic legacy; and theatrical
space as performance besides investigating causes, inter-relations
within socio-cultural factors, and the performance principles
underlying them. It shows how these theatres effectively contest
delimitation of human creative impulses (as revealed in classical
Sanskrit theatre) from structuring as also of normative impulses of
religion and culture, while amalgamating influences from Western
theatre, newly-rising religious reform movements of 19th century
India, tantra and Bhakti. It further highlights their ability to
adapt and reinvent themselves in accordance with spatial and
temporal transformations to constitute an important anthropological
layer of Indian society. Comprehensive and empirically rich, this
book will be an essential read for scholars and researchers of
cultural studies, theatre, film and performance studies, sociology,
political studies, popular culture, and South Asian studies.
The International Conference on Communication and Computing Systems
(ICCCS 2018) provides a high-level international forum for
researchers and recent advances in the field of electronic devices,
computing, big data analytics, cyber security, quantum computing,
biocomputing, telecommunication, etc. The aim of the conference was
to bridge the gap between the technological advancements in the
industry and the academic research.
This book is a collection of accepted papers that were presented at
the International Conference on Communication and Computing Systems
(ICCCS-2016), Dronacharya College of Engineering, Gurgaon,
September 9-11, 2016. The purpose of the conference was to provide
a platform for interaction between scientists from industry,
academia and other areas of society to discuss the current
advancements in the field of communication and computing systems.
The papers submitted to the proceedings were peer-reviewed by 2-3
expert referees. This volume contains 5 main subject areas: 1.
Signal and Image Processing, 2. Communication & Computer
Networks, 3. Soft Computing, Intelligent System, Machine Vision and
Artificial Neural Network, 4. VLSI & Embedded System, 5.
Software Engineering and Emerging Technologies.
The International Conference on Communication and Computing Systems
(ICCCS 2018) provides a high-level international forum for
researchers and recent advances in the field of electronic devices,
computing, big data analytics, cyber security, quantum computing,
biocomputing, telecommunication, etc. The aim of the conference was
to bridge the gap between the technological advancements in the
industry and the academic research.
Create cryptocurrency and blockchain applications by examining the
key algorithms and concepts pertaining to blockchains, transaction
processing, mining, distributed consensus, and anonymous
currencies. In this book, you'll develop a fully functional
cryptocurrency from scratch in the Python language. Practical
Blockchains and Cryptocurrencies is a reference for development of
blockchain applications and provides you with rigorous information
on cryptography and the theory underlying blockchains. This book
consists of small chapters that focus on particular topics. You'll
start with a short history of money. Next, you will survey the
bitcoin and altcoin ecosystem before delving into cryptographic
hash functions, symmetric encryption, public key cryptography, and
digital signatures. All the mathematics required to develop
blockchain applications is covered. The emphasis is on providing a
lucid and rigorous exposition on the nature and working of these
constructs. The next major segment of the book discusses the key
concepts and algorithms required to develop blockchain and
cryptocurrency applications. There are expositions on blockchain
construction, Merkle trees, peer-to-peer networks, cryptocurrency
addresses, transactions, and mining. You'll take a deep dive into
the formation of consensus in distributed systems. In this book
you'll develop a fully functional cryptocurrency called Helium from
scratch in Python. The language requirements are modest since it is
presumed that most readers will not be acquainted with Python. The
entire source code and unit test code is included in this book.
Practical Blockchains and Cryptocurrencies interleaves theory and
Helium program code chapters in order to demonstrate the practical
application of theory in working Helium program code. What You Will
Learn Gain the mathematical foundations as well as the concepts and
algorithms of blockchains and cryptocurrencies Implement a
cryptocurrency from scratch in Python Master the design of
distributed blockchain applications Who This Book Is For Anyone
interested in creating cryptocurrency and blockchain applications
|
Quality, Reliability, Security and Robustness in Heterogeneous Networks - 9th International Confernce, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Karan Singh, Amit K. Awasthi
|
R3,004
Discovery Miles 30 040
|
Ships in 10 - 15 working days
|
This book constitutes the thoroughly refereed post-conference
proceedings of the 9th International Conference on Heterogeneous
Networking for Quality, Reliability, Security and Robustness,
QShine 2013, which was held in National Capital Region (NCR) of
India during January 2013. The 87 revised full papers were
carefully selected from 169 submissions and present the recent
technological developments in broadband high-speed networks,
peer-to-peer networks, and wireless and mobile networks.
This book is a collection of accepted papers that were presented at
the International Conference on Communication and Computing Systems
(ICCCS-2016), Dronacharya College of Engineering, Gurgaon,
September 9-11, 2016. The purpose of the conference was to provide
a platform for interaction between scientists from industry,
academia and other areas of society to discuss the current
advancements in the field of communication and computing systems.
The papers submitted to the proceedings were peer-reviewed by 2-3
expert referees. This volume contains 5 main subject areas: 1.
Signal and Image Processing, 2. Communication & Computer
Networks, 3. Soft Computing, Intelligent System, Machine Vision and
Artificial Neural Network, 4. VLSI & Embedded System, 5.
Software Engineering and Emerging Technologies.
Get to grips with the unified, highly scalable distributed storage
system and learn how to design and implement it. Key Features
Explore Ceph's architecture in detail Implement a Ceph cluster
successfully and gain deep insights into its best practices
Leverage the advanced features of Ceph, including erasure coding,
tiering, and BlueStore Book DescriptionThis Learning Path takes you
through the basics of Ceph all the way to gaining in-depth
understanding of its advanced features. You'll gather skills to
plan, deploy, and manage your Ceph cluster. After an introduction
to the Ceph architecture and its core projects, you'll be able to
set up a Ceph cluster and learn how to monitor its health, improve
its performance, and troubleshoot any issues. By following the
step-by-step approach of this Learning Path, you'll learn how Ceph
integrates with OpenStack, Glance, Manila, Swift, and Cinder. With
knowledge of federated architecture and CephFS, you'll use Calamari
and VSM to monitor the Ceph environment. In the upcoming chapters,
you'll study the key areas of Ceph, including BlueStore, erasure
coding, and cache tiering. More specifically, you'll discover what
they can do for your storage system. In the concluding chapters,
you will develop applications that use Librados and distributed
computations with shared object classes, and see how Ceph and its
supporting infrastructure can be optimized. By the end of this
Learning Path, you'll have the practical knowledge of operating
Ceph in a production environment. This Learning Path includes
content from the following Packt products: Ceph Cookbook by Michael
Hackett, Vikhyat Umrao and Karan Singh Mastering Ceph by Nick Fisk
Learning Ceph, Second Edition by Anthony D'Atri, Vaibhav Bhembre
and Karan Singh What you will learn Understand the benefits of
using Ceph as a storage solution Combine Ceph with OpenStack,
Cinder, Glance, and Nova components Set up a test cluster with
Ansible and virtual machine with VirtualBox Develop solutions with
Librados and shared object classes Configure BlueStore and see its
interaction with other configurations Tune, monitor, and recover
storage systems effectively Build an erasure-coded pool by
selecting intelligent parameters Who this book is forIf you are a
developer, system administrator, storage professional, or cloud
engineer who wants to understand how to deploy a Ceph cluster, this
Learning Path is ideal for you. It will help you discover ways in
which Ceph features can solve your data storage problems. Basic
knowledge of storage systems and GNU/Linux will be beneficial.
Implement and manage your software-defined, massively scalable
storage system About This Book * Explore Ceph's architecture in
order to achieve scalability and high availability * Learn to
utilize Ceph efficiently with the help of practical examples *
Successfully implement Ceph clusters to scale-out storage solutions
along with outstanding data protection Who This Book Is For A basic
knowledge of GNU/Linux, and storage systems, and server components
is assumed. If you have no experience of software-defined storage
solutions and Ceph, but are eager to learn about them, this is the
book for you. What You Will Learn * The limitations of existing
systems and why you should use Ceph as a storage solution *
Familiarity with Ceph's architecture, components, and services *
Instant deployment and testing of Ceph within a Vagrant and
VirtualBox environment * Ceph operations including maintenance,
monitoring, and troubleshooting * Storage provisioning of Ceph's
block, object, and filesystem services * Integrate Ceph with
OpenStack * Advanced topics including erasure coding, CRUSH maps,
and performance tuning * Best practices for your Ceph clusters In
Detail Learning Ceph, Second Edition will give you all the skills
you need to plan, deploy, and effectively manage your Ceph cluster.
You will begin with the first module, where you will be introduced
to Ceph use cases, its architecture, and core projects. In the next
module, you will learn to set up a test cluster, using Ceph
clusters and hardware selection. After you have learned to use Ceph
clusters, the next module will teach you how to monitor cluster
health, improve performance, and troubleshoot any issues that
arise. In the last module, you will learn to integrate Ceph with
other tools such as OpenStack, Glance, Manila, Swift, and Cinder.
By the end of the book you will have learned to use Ceph
effectively for your data storage requirements. Style and approach
This step-by-step guide, including use cases and examples, not only
helps you to easily use Ceph but also demonstrates how you can use
it to solve any of your server or drive storage issues.
Over 100 effective recipes to help you design, implement, and
troubleshoot manage the software-defined and massively scalable
Ceph storage system. About This Book * Implement a Ceph cluster
successfully and learn to manage it. * Recipe based approach in
learning the most efficient software defined storage system *
Implement best practices on improving efficiency and security of
your storage cluster * Learn to troubleshoot common issues
experienced in a Ceph cluster Who This Book Is For This book is
targeted at storage and cloud engineers, system administrators, or
anyone who is interested in building software defined storage, to
power your cloud or virtual infrastructure. If you have basic
knowledge of GNU/Linux and storage systems, with no experience of
software defined storage solutions and Ceph, but eager to learn
then this book is for you What You Will Learn * Understand,
install, configure, and manage the Ceph storage system * Get to
grips with performance tuning and benchmarking, and learn practical
tips to help run Ceph in production * Integrate Ceph with OpenStack
Cinder, Glance, and Nova components * Deep dive into Ceph object
storage, including S3, Swift, and Keystone integration * Configure
a disaster recovery solution with a Ceph Multi-Site V2 gateway
setup and RADOS Block Device mirroring * Gain hands-on experience
with Ceph Metrics and VSM for cluster monitoring * Familiarize
yourself with Ceph operations such as maintenance, monitoring, and
troubleshooting * Understand advanced topics including
erasure-coding, CRUSH map, cache pool, and general Ceph cluster
maintenance In Detail Ceph is a unified distributed storage system
designed for reliability and scalability. This technology has been
transforming the software-defined storage industry and is evolving
rapidly as a leader with its wide range of support for popular
cloud platforms such as OpenStack, and CloudStack, and also for
virtualized platforms. Ceph is backed by Red Hat and has been
developed by community of developers which has gained immense
traction in recent years. This book will guide you right from the
basics of Ceph , such as creating blocks, object storage, and
filesystem access, to advanced concepts such as cloud integration
solutions. The book will also cover practical and easy to implement
recipes on CephFS, RGW, and RBD with respect to the major stable
release of Ceph Jewel. Towards the end of the book, recipes based
on troubleshooting and best practices will help you get to grips
with managing Ceph storage in a production environment. By the end
of this book, you will have practical, hands-on experience of using
Ceph efficiently for your storage requirements. Style and approach
This step-by-step guide is filled with practical tutorials, making
complex scenarios easy to understand.
Over 100 effective recipes to help you design, implement, and
manage the software-defined and massively scalable Ceph storage
system About This Book * Implement a Ceph cluster successfully and
gain deep insights into its best practices * Harness the abilities
of experienced storage administrators and architects, and run your
own software-defined storage system * This comprehensive,
step-by-step guide will show you how to build and manage Ceph
storage in production environment Who This Book Is For This book is
aimed at storage and cloud system engineers, system administrators,
and technical architects who are interested in building
software-defined storage solutions to power their cloud and virtual
infrastructure. If you have basic knowledge of GNU/Linux and
storage systems, with no experience of software defined storage
solutions and Ceph, but eager to learn this book is for you. What
You Will Learn * Understand, install, configure, and manage the
Ceph storage system * Get to grips with performance tuning and
benchmarking, and gain practical tips to run Ceph in production *
Integrate Ceph with OpenStack Cinder, Glance, and nova components *
Deep dive into Ceph object storage, including s3, swift, and
keystone integration * Build a Dropbox-like file sync and share
service and Ceph federated gateway setup * Gain hands-on experience
with Calamari and VSM for cluster monitoring * Familiarize yourself
with Ceph operations such as maintenance, monitoring, and
troubleshooting * Understand advanced topics including erasure
coding, CRUSH map, cache pool, and system maintenance In Detail
Ceph is a unified, distributed storage system designed for
excellent performance, reliability, and scalability. This
cutting-edge technology has been transforming the storage industry,
and is evolving rapidly as a leader in software-defined storage
space, extending full support to cloud platforms such as Openstack
and Cloudstack, including virtualization platforms. It is the most
popular storage backend for Openstack, public, and private clouds,
so is the first choice for a storage solution. Ceph is backed by
RedHat and is developed by a thriving open source community of
individual developers as well as several companies across the
globe. This book takes you from a basic knowledge of Ceph to an
expert understanding of the most advanced features, walking you
through building up a production-grade Ceph storage cluster and
helping you develop all the skills you need to plan, deploy, and
effectively manage your Ceph cluster. Beginning with the basics,
you'll create a Ceph cluster, followed by block, object, and file
storage provisioning. Next, you'll get a step-by-step tutorial on
integrating it with OpenStack and building a Dropbox-like object
storage solution. We'll also take a look at federated architecture
and CephFS, and you'll dive into Calamari and VSM for monitoring
the Ceph environment. You'll develop expert knowledge on
troubleshooting and benchmarking your Ceph storage cluster.
Finally, you'll get to grips with the best practices to operate
Ceph in a production environment. Style and approach This
step-by-step guide is filled with practical tutorials, making
complex scenarios easy to understand.
If you already have basic knowledge of GNU/Linux and storage
systems, but have no experience of software-defined storage
solutions and Ceph, and are eager to learn about it, this is the
book for you. If you are looking for your next career jump as a
Ceph administrator, this book is also ideal for you.
China with her booming economy, wants to be recognized as a major
player in shaping future world events. To achieve this she is
diverting considerable attention to modernizing her armed forces.
Her recent acquisitions of state of the art aircraft have important
ramifications for India, particularly when there is an outstanding
border dispute between the two nations that resulted in the
Sino-Indian war of 1962. Though with an increasing level of
bilateral dialogue, relations between the two Asian neighbors have
improved, yet, one cannot discount the possibility of a settlement
being deadlocked. In such a situation, the geo-political outlook
and threat perceptions of both nations would dictate the outcome.
Any future conflict between the two nations would see extensive use
of air power over an area that imposes some unique limitations on
air power. This paper analyses the geo-political environment and
thereafter focuses on the employment of likely air strategies.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R383
R310
Discovery Miles 3 100
Fast X
Vin Diesel, Jason Momoa, …
DVD
R172
R132
Discovery Miles 1 320
|