![]() |
![]() |
Your cart is empty |
||
Showing 1 - 25 of 182 matches in All Departments
The popular spiritual teacher and author of the internationally bestselling Peace Is Possible shows us how to quiet the noise of our busy lives to hear our own unique authentic voice—the source of inner peace. The cacophony of modern life can be deafening, leaving us feeling frazzled and uneasy. In this warm, wise book, Prem Rawat teaches us how to turn down the noise to “hear ourselves”—to listen to the subtle song of peace that sings inside each of us. Once we learn to truly “hear ourselves” and the voice of peace within, then we can hold that within us as we face all the noise of the world. The culmination of a lifetime of study, Hear Yourself lays out the crucial steps we can use to focus on the voice within. Take a walk in nature and listen for the sounds of harmony, Prem Rawat suggests, or set aside a few minutes each day to feel gratitude, which comes from the core of our being. He challenges us to embrace our thirst for inner peace and let go of expectations for how it should feel. With one straightforward yet deeply profound question, he helps us to focus—to be present: Am I conscious of where I am today and what I want to experience in this world?” If we allow ourselves to listen, what we hear is the extraordinary miracle of existence—an experience that transforms our relationship to life and everything in it. Packed with powerful insights and compelling stories, Hear Yourself introduces readers to an ancient line of practical wisdom that enlightens us to a simple way to listen. By doing so, Prem Rawat reveals, we can “profoundly change our understanding of ourselves, those around us, and our lives.”
Approx.344 pages
Phytopharmaceuticals and Herbal Drugs: Prospects and Safety Issues in the Delivery of Natural Products explores the delivery aspects of plant-based drugs, providing insights into formulation constraints associated with plant-based drugs, the development of novel delivery systems based on polymers or lipids, and how combining natural products with technological advancements in drug delivery is making large strides. Some of the best-selling drugs for the treatment of diseases like cancer, ulcers and malaria are either natural products or their derivatives, all of which are covered in this comprehensive resource. This book will be useful to researchers working in plant-derived medicines and the development of their delivery systems, including sections on their derivatives and analogs that represent over 50% of all drugs in clinical use. Active ingredients originated from plant resources generally exhibit compromised desired effects limited by issues such as stability, solubility, molecular size, bioavailability and toxicity.
Smart Cities Cybersecurity and Privacy examines the latest research developments and their outcomes for safe, secure, and trusting smart cities residents. Smart cities improve the quality of life of citizens in their energy and water usage, healthcare, environmental impact, transportation needs, and many other critical city services. Recent advances in hardware and software, have fueled the rapid growth and deployment of ubiquitous connectivity between a city's physical and cyber components. This connectivity however also opens up many security vulnerabilities that must be mitigated. Smart Cities Cybersecurity and Privacy helps researchers, engineers, and city planners develop adaptive, robust, scalable, and reliable security and privacy smart city applications that can mitigate the negative implications associated with cyber-attacks and potential privacy invasion. It provides insights into networking and security architectures, designs, and models for the secure operation of smart city applications.
The Dark Web is a known hub that hosts myriad illegal activities behind the veil of anonymity for its users. For years now, law enforcement has been struggling to track these illicit activities and put them to an end. However, the depth and anonymity of the Dark Web has made these efforts difficult, and as cyber criminals have more advanced technologies available to them, the struggle appears to only have the potential to worsen. Law enforcement and government organizations also have emerging technologies on their side, however. It is essential for these organizations to stay up to date on these emerging technologies, such as computational intelligence, in order to put a stop to the illicit activities and behaviors presented in the Dark Web. Using Computational Intelligence for the Dark Web and Illicit Behavior Detection presents the emerging technologies and applications of computational intelligence for the law enforcement of the Dark Web. It features analysis into cybercrime data, examples of the application of computational intelligence in the Dark Web, and provides future opportunities for growth in this field. Covering topics such as cyber threat detection, crime prediction, and keyword extraction, this premier reference source is an essential resource for government organizations, law enforcement agencies, non-profit organizations, politicians, computer scientists, researchers, students, and academicians.
Data stealing is a major concern on the internet as hackers and criminals have begun using simple tricks to hack social networks and violate privacy. Cyber-attack methods are progressively modern, and obstructing the attack is increasingly troublesome, regardless of whether countermeasures are taken. The Dark Web especially presents challenges to information privacy and security due to anonymous behaviors and the unavailability of data. To better understand and prevent cyberattacks, it is vital to have a forecast of cyberattacks, proper safety measures, and viable use of cyber-intelligence that empowers these activities. Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence discusses cyberattacks, security, and safety measures to protect data and presents the shortcomings faced by researchers and practitioners due to the unavailability of information about the Dark Web. Attacker techniques in these Dark Web environments are highlighted, along with intrusion detection practices and crawling of hidden content. Covering a range of topics such as malware and fog computing, this reference work is ideal for researchers, academicians, practitioners, industry professionals, computer scientists, scholars, instructors, and students.
Cyber-Physical Systems: Foundations, Principles and Applications explores the core system science perspective needed to design and build complex cyber-physical systems. Using Systems Science's underlying theories, such as probability theory, decision theory, game theory, organizational sociology, behavioral economics, and cognitive psychology, the book addresses foundational issues central across CPS applications, including System Design -- How to design CPS to be safe, secure, and resilient in rapidly evolving environments, System Verification -- How to develop effective metrics and methods to verify and certify large and complex CPS, Real-time Control and Adaptation -- How to achieve real-time dynamic control and behavior adaptation in a diverse environments, such as clouds and in network-challenged spaces, Manufacturing -- How to harness communication, computation, and control for developing new products, reducing product concepts to realizable designs, and producing integrated software-hardware systems at a pace far exceeding today's timeline. The book is part of the Intelligent Data-Centric Systems: Sensor-Collected Intelligence series edited by Fatos Xhafa, Technical University of Catalonia. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS
While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services. Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications examines the current scope of theoretical and practical applications on the security of mobile and wireless communications. This book covers fundamental concepts of current issues, challenges, and solutions in wireless and mobile networks and will serve as a reference for graduate students, professors, and researchers in this emerging field.
This book provides probabilistic, deterministic and geolocation-aware approaches for adaptive connectivity, robust security and privacy-aware communications for vehicular cyber physical systems (CPS). It presents mathematical models and numerical results obtained from experiments and simulations, and a trade-off between connectivity, security and privacy for vehicular communications. Connectivity between vehicles is crucial for vehicular CPS. Intelligent vehicular CPS provides not only road safety and traffic efficiency by exchanging information among vehicles, but also offers infotainment services to passengers using a variety of wireless technologies to forward the traffic/trajectory information with Vehicle-to-Vehicle (V2V), vehicular ad hoc network (VANET), and Vehicle-to-Roadside-to-Vehicle (V2R2V) communications. The book covers how to ensure that the message received from other vehicles is secure and trustworthy, rather than malicious. Further, it reveals how to make sure that the privacy of participants is not revealed while validating the received message. Researchers and professionals working with vehicular networks, smart systems, cyber physical systems, and mobile privacy will find this book valuable.
This book is a collection of selected peer-reviewed papers presented at the International Conference on Signal Processing and Communication (ICSC 2018). It covers current research and developments in the fields of communications, signal processing, VLSI circuits and systems, and embedded systems. The book offers in-depth discussions and analyses of latest problems across different sub-fields of signal processing and communications. The contents of this book will prove to be useful for students, researchers, and professionals working in electronics and electrical engineering, as well as other allied fields.
This book brings together the latest information on the rapid advances and developments in the field of aquatic ecology. India is very rich in terms of biological diversity due to its wide range of habitats and climatic conditions. It is home to as much as 7 per cent of the world's animal species, although it only accounts for about 2 per cent of the total landmass. The present work on biodiversity, ecology and conservation of aquatic resources represents original research in the field of aquatic biodiversity, wetland ecology and its applications with reference to the country's aquatic resources. There are 19 chapters, each contributed by an expert in his/her particular field and offering novel approaches to various topics in the area of aquatic ecosystems.
This book develops the core system science needed to enable the development of a complex industrial internet of things/manufacturing cyber-physical systems (IIoT/M-CPS). Gathering contributions from leading experts in the field with years of experience in advancing manufacturing, it fosters a research community committed to advancing research and education in IIoT/M-CPS and to translating applicable science and technology into engineering practice. Presenting the current state of IIoT and the concept of cybermanufacturing, this book is at the nexus of research advances from the engineering and computer and information science domains. Readers will acquire the core system science needed to transform to cybermanufacturing that spans the full spectrum from ideation to physical realization.
This book discusses the revolution of cycles and rhythms that is expected to take place in different branches of science and engineering in the 21st century, with a focus on communication and information processing. It presents high-quality papers in vibration sciences, rhythms and oscillations, neurosciences, mathematical sciences, and communication. It includes major topics in engineering and structural mechanics, computer sciences, biophysics and biomathematics, as well as other related fields. Offering valuable insights, it also inspires researchers to work in these fields. The papers included in this book were presented at the 1st International Conference on Engineering Vibration, Communication and Information Processing (ICoEVCI-2018), India.
Are you ready for adventure? The first book in a new action-packed series from bestselling author Raj Haldar follows two best friends as they race to different parts of the world to solve mysteries and uncover lost treasures! It's a Super Saturday sleepover! That means best friends Eddie and Molly-Jean (who prefers to be called MJ) are going to play outside, create obstacle courses for MJ's newts, and watch their favorite movies-and then they'll travel to India to solve a mystery and help save a school-all before bedtime! This action-packed mystery story is perfect for anyone looking for: A wild adventure around the world that middle school kids will love! A story of two best friends solving mysteries with a little magic! Cool, new knowledge tucked inside an epic chapter book! A journey to India to learn the Hindi roots of the English language Magically travel around the world along with two best friends who decipher clues and uncover mysterious secrets. Can you help them find the golden key? "Reminiscent of Mary Pope Osborne's "Magic Tree House" series...contains the same mix of fantasy, adventure, and cultural discovery. Etymology is the distinctive feature here, and its importance is reflected in every part of the text."-School Library Journal, starred review
This book introduces systematic design methods for passive and active RF circuits and techniques, including state-of-the-art digital enhancement techniques. As the very first book dedicated to multiband RF circuits and techniques, this work provides an overview of the evolution of transmitter architecture and discusses current digital predistortion techniques. Readers will find a collection of novel research ideas and new architectures in concurrent multiband power dividers, power amplifiers and related digital enhancement techniques. This book will be of great interest to academic researchers, R&D engineers, wireless transmitter and protocol designers, as well as graduate students who wish to learn the core architectures, principles and methods of multiband RF circuits and techniques.
The book is a collection of high-quality peer-reviewed research papers presented at the Fourth International Conference on Innovations in Computer Science and Engineering (ICICSE 2016) held at Guru Nanak Institutions, Hyderabad, India during 22 - 23 July 2016. The book discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. Researchers from academic and industry present their original work and exchange ideas, information, techniques and applications in the field of data science and analytics, artificial intelligence and expert systems, mobility, cloud computing, network security, and emerging technologies.
This book highlights plasma science and technology-related research and development work at institutes and universities networked through Asian African Association for Plasma Training (AAAPT) which was established in 1988. The AAAPT, with 52 member institutes in 24 countries, promotes the initiation and intensification of plasma research and development through cooperation and technology sharing. With 13 chapters on fusion-relevant, laboratory and industrial plasmas for wide range of applications and basic research and a chapter on AAAPT network, it demonstrates how, with collaborations, high-quality, industrially relevant academic and scientific research on fusion, industrial and laboratory plasmas and plasma diagnostics can be successfully pursued in small research labs. These plasma sciences and technologies include pioneering breakthroughs and applications in (i) fusion relevant research in the quest for long-term, clean energy source development using high-temperature, high- density plasmas and (ii) multibillion-dollar, low-temperature, non-equilibrium and thermal industrial plasmas used in processing, synthesis and electronics.
This book covers selected topics and methods for peripheral security, which are gaining attention nowadays. The book discusses the security arrangement and methods for monitoring the inside/outside entry of peripheral areas that need to be secured. It relates to a periphery, often portable device (as well as the methods employed, and systems including such a peripheral device and a host central command device with which the local geographical command device communicates), enabling one or more security operations performed by the peripheral device. It also covers the security scenario of snow-prone areas in a remote location. It also elaborates how we can secure the person and devices in extremely cold conditions and rescue them. This book helps the researchers, academicians, and industry persons working in security areas to protect unauthentic entry in large scale areas that may be defense camps or civilian applications like large-sized bungalows, institutes, and organizations of national importance. The experimental results are in close conformance to the proposed methodologies.
This book provides an overview of Data Monitoring Committees(DMC) - what was done in the past, what is currently being done, and thoughts on improvements for the future. Previous works focused primarily on large cardiovascular studies (where DMCs originated more than 30 years ago) but updated references are needed that discuss smaller, more flexible studies in areas such as oncology. The authors have attended ~800 DMC meetings from ~200 distinct studies across all areas of clinical studies (oncology, rheumatology, rare diseases, cardiology, immunology, etc.) This wide range of expertise will be used, as well as the expertise that comes from working with virtually every large biotechnology and pharmaceutical company and CRO for DMC work. The reader of the book will know when DMCs are needed or helpful, how to form the DMC, how to work with external CROs and with sponsor teams and the DMC to create needed DMC outputs, how the DMC meetings are conducted, and - especially for DMC members - what are considerations within the Closed Session to review safety/efficacy outputs to assess risk/benefit to make appropriate recommendations that protect the patient safety and trial integrity. This is a practical hands-on book on how to decide if a DMC is necessary, how to form the DMC, how to expertly create the necessary materials for the DMC and have smooth running DMC meetings. There is no specialized training in school about how DMCs work - frequently people may have been in industry for many years without ever needing to work with a DMC. This book is the helpful reference for those new to these DMCs. The DMC work is critical to be correctly implemented as the impact of DMC activity on safeguarding the trial is so important.This book provides the following: Provides thorough instructions on the steps needed to form and implement a Data Monitoring Committee for clinical trial evaluation; Includes practical and hands-on information on DMC implementation; Discusses a wide range of clinical trial – by phase and therapeutic area.
This book gathers selected research papers presented at the International Conference on Power, Control and Communication Infrastructure 2019 (ICPCCI 2019), organized by the Institute of Infrastructure, Technology, Research and Management (IITRAM), Ahmedabad, Gujarat, India, on July 4-5, 2019. It highlights the latest advances, trends and challenges in electrical power generation-integration-transmission-distribution-conversion-storage-control, electrical machines, power quality, energy management, electrical infrastructure of future grids-buildings-cities-transportation, energy conversion, plasma technology, renewable energy & grid integration, energy storage systems, power electronic converters, power system protection & security, FACTS and HVDC, power quality, power system operation & control, computer applications in power systems, energy management, energy policies & regulation, power & energy education, restructured power system, future grids, buildings, cities & resiliency, microgrids, electrical machines & drives, transportation electrification, optimal operation, electricity-gas-water coordination, condition monitoring & predictive maintenance of electric equipment, and asset management. The solutions discussed here will encourage and inspire researchers, industry professionals and policymakers to put these methods into practice. |
![]() ![]() You may like...
What Happened To You? - Conversations On…
Bruce D. Perry, Oprah Winfrey
Hardcover
|