![]() |
![]() |
Your cart is empty |
||
Showing 1 - 25 of 183 matches in All Departments
The popular spiritual teacher and author of the internationally bestselling Peace Is Possible shows us how to quiet the noise of our busy lives to hear our own unique authentic voice—the source of inner peace. The cacophony of modern life can be deafening, leaving us feeling frazzled and uneasy. In this warm, wise book, Prem Rawat teaches us how to turn down the noise to “hear ourselves”—to listen to the subtle song of peace that sings inside each of us. Once we learn to truly “hear ourselves” and the voice of peace within, then we can hold that within us as we face all the noise of the world. The culmination of a lifetime of study, Hear Yourself lays out the crucial steps we can use to focus on the voice within. Take a walk in nature and listen for the sounds of harmony, Prem Rawat suggests, or set aside a few minutes each day to feel gratitude, which comes from the core of our being. He challenges us to embrace our thirst for inner peace and let go of expectations for how it should feel. With one straightforward yet deeply profound question, he helps us to focus—to be present: Am I conscious of where I am today and what I want to experience in this world?” If we allow ourselves to listen, what we hear is the extraordinary miracle of existence—an experience that transforms our relationship to life and everything in it. Packed with powerful insights and compelling stories, Hear Yourself introduces readers to an ancient line of practical wisdom that enlightens us to a simple way to listen. By doing so, Prem Rawat reveals, we can “profoundly change our understanding of ourselves, those around us, and our lives.”
Approx.344 pages
Phytopharmaceuticals and Herbal Drugs: Prospects and Safety Issues in the Delivery of Natural Products explores the delivery aspects of plant-based drugs, providing insights into formulation constraints associated with plant-based drugs, the development of novel delivery systems based on polymers or lipids, and how combining natural products with technological advancements in drug delivery is making large strides. Some of the best-selling drugs for the treatment of diseases like cancer, ulcers and malaria are either natural products or their derivatives, all of which are covered in this comprehensive resource. This book will be useful to researchers working in plant-derived medicines and the development of their delivery systems, including sections on their derivatives and analogs that represent over 50% of all drugs in clinical use. Active ingredients originated from plant resources generally exhibit compromised desired effects limited by issues such as stability, solubility, molecular size, bioavailability and toxicity.
Smart Cities Cybersecurity and Privacy examines the latest research developments and their outcomes for safe, secure, and trusting smart cities residents. Smart cities improve the quality of life of citizens in their energy and water usage, healthcare, environmental impact, transportation needs, and many other critical city services. Recent advances in hardware and software, have fueled the rapid growth and deployment of ubiquitous connectivity between a city's physical and cyber components. This connectivity however also opens up many security vulnerabilities that must be mitigated. Smart Cities Cybersecurity and Privacy helps researchers, engineers, and city planners develop adaptive, robust, scalable, and reliable security and privacy smart city applications that can mitigate the negative implications associated with cyber-attacks and potential privacy invasion. It provides insights into networking and security architectures, designs, and models for the secure operation of smart city applications.
The Dark Web is a known hub that hosts myriad illegal activities behind the veil of anonymity for its users. For years now, law enforcement has been struggling to track these illicit activities and put them to an end. However, the depth and anonymity of the Dark Web has made these efforts difficult, and as cyber criminals have more advanced technologies available to them, the struggle appears to only have the potential to worsen. Law enforcement and government organizations also have emerging technologies on their side, however. It is essential for these organizations to stay up to date on these emerging technologies, such as computational intelligence, in order to put a stop to the illicit activities and behaviors presented in the Dark Web. Using Computational Intelligence for the Dark Web and Illicit Behavior Detection presents the emerging technologies and applications of computational intelligence for the law enforcement of the Dark Web. It features analysis into cybercrime data, examples of the application of computational intelligence in the Dark Web, and provides future opportunities for growth in this field. Covering topics such as cyber threat detection, crime prediction, and keyword extraction, this premier reference source is an essential resource for government organizations, law enforcement agencies, non-profit organizations, politicians, computer scientists, researchers, students, and academicians.
Cyber-Physical Systems: Foundations, Principles and Applications explores the core system science perspective needed to design and build complex cyber-physical systems. Using Systems Science's underlying theories, such as probability theory, decision theory, game theory, organizational sociology, behavioral economics, and cognitive psychology, the book addresses foundational issues central across CPS applications, including System Design -- How to design CPS to be safe, secure, and resilient in rapidly evolving environments, System Verification -- How to develop effective metrics and methods to verify and certify large and complex CPS, Real-time Control and Adaptation -- How to achieve real-time dynamic control and behavior adaptation in a diverse environments, such as clouds and in network-challenged spaces, Manufacturing -- How to harness communication, computation, and control for developing new products, reducing product concepts to realizable designs, and producing integrated software-hardware systems at a pace far exceeding today's timeline. The book is part of the Intelligent Data-Centric Systems: Sensor-Collected Intelligence series edited by Fatos Xhafa, Technical University of Catalonia. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS
Data stealing is a major concern on the internet as hackers and criminals have begun using simple tricks to hack social networks and violate privacy. Cyber-attack methods are progressively modern, and obstructing the attack is increasingly troublesome, regardless of whether countermeasures are taken. The Dark Web especially presents challenges to information privacy and security due to anonymous behaviors and the unavailability of data. To better understand and prevent cyberattacks, it is vital to have a forecast of cyberattacks, proper safety measures, and viable use of cyber-intelligence that empowers these activities. Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence discusses cyberattacks, security, and safety measures to protect data and presents the shortcomings faced by researchers and practitioners due to the unavailability of information about the Dark Web. Attacker techniques in these Dark Web environments are highlighted, along with intrusion detection practices and crawling of hidden content. Covering a range of topics such as malware and fog computing, this reference work is ideal for researchers, academicians, practitioners, industry professionals, computer scientists, scholars, instructors, and students.
While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services. Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications examines the current scope of theoretical and practical applications on the security of mobile and wireless communications. This book covers fundamental concepts of current issues, challenges, and solutions in wireless and mobile networks and will serve as a reference for graduate students, professors, and researchers in this emerging field.
This book gathers selected research papers presented at the International Conference on Power, Control and Communication Infrastructure 2019 (ICPCCI 2019), organized by the Institute of Infrastructure, Technology, Research and Management (IITRAM), Ahmedabad, Gujarat, India, on July 4-5, 2019. It presents technological developments in the fields of communications infrastructure which comprise of architecture, products, and network connections that allow for communications over the long distances. The book includes some innovative ideas in the field of communication infrastructure, specially satellite communication, navigation systems, artificial neural network, encryption techniques, and some other infrastructure-related developments. The solution approaches provided in this book encourage and inspire researchers, industry professionals, and policymakers to put these methods into practice.
This book provides probabilistic, deterministic and geolocation-aware approaches for adaptive connectivity, robust security and privacy-aware communications for vehicular cyber physical systems (CPS). It presents mathematical models and numerical results obtained from experiments and simulations, and a trade-off between connectivity, security and privacy for vehicular communications. Connectivity between vehicles is crucial for vehicular CPS. Intelligent vehicular CPS provides not only road safety and traffic efficiency by exchanging information among vehicles, but also offers infotainment services to passengers using a variety of wireless technologies to forward the traffic/trajectory information with Vehicle-to-Vehicle (V2V), vehicular ad hoc network (VANET), and Vehicle-to-Roadside-to-Vehicle (V2R2V) communications. The book covers how to ensure that the message received from other vehicles is secure and trustworthy, rather than malicious. Further, it reveals how to make sure that the privacy of participants is not revealed while validating the received message. Researchers and professionals working with vehicular networks, smart systems, cyber physical systems, and mobile privacy will find this book valuable.
This book is a collection of selected peer-reviewed papers presented at the International Conference on Signal Processing and Communication (ICSC 2018). It covers current research and developments in the fields of communications, signal processing, VLSI circuits and systems, and embedded systems. The book offers in-depth discussions and analyses of latest problems across different sub-fields of signal processing and communications. The contents of this book will prove to be useful for students, researchers, and professionals working in electronics and electrical engineering, as well as other allied fields.
This book brings together the latest information on the rapid advances and developments in the field of aquatic ecology. India is very rich in terms of biological diversity due to its wide range of habitats and climatic conditions. It is home to as much as 7 per cent of the world's animal species, although it only accounts for about 2 per cent of the total landmass. The present work on biodiversity, ecology and conservation of aquatic resources represents original research in the field of aquatic biodiversity, wetland ecology and its applications with reference to the country's aquatic resources. There are 19 chapters, each contributed by an expert in his/her particular field and offering novel approaches to various topics in the area of aquatic ecosystems.
This book develops the core system science needed to enable the development of a complex industrial internet of things/manufacturing cyber-physical systems (IIoT/M-CPS). Gathering contributions from leading experts in the field with years of experience in advancing manufacturing, it fosters a research community committed to advancing research and education in IIoT/M-CPS and to translating applicable science and technology into engineering practice. Presenting the current state of IIoT and the concept of cybermanufacturing, this book is at the nexus of research advances from the engineering and computer and information science domains. Readers will acquire the core system science needed to transform to cybermanufacturing that spans the full spectrum from ideation to physical realization.
This book discusses the revolution of cycles and rhythms that is expected to take place in different branches of science and engineering in the 21st century, with a focus on communication and information processing. It presents high-quality papers in vibration sciences, rhythms and oscillations, neurosciences, mathematical sciences, and communication. It includes major topics in engineering and structural mechanics, computer sciences, biophysics and biomathematics, as well as other related fields. Offering valuable insights, it also inspires researchers to work in these fields. The papers included in this book were presented at the 1st International Conference on Engineering Vibration, Communication and Information Processing (ICoEVCI-2018), India.
This book gathers selected research papers presented at the International Conference on Power, Control and Communication Infrastructure 2019 (ICPCCI 2019), organized by the Institute of Infrastructure, Technology, Research and Management (IITRAM), Ahmedabad, Gujarat, India, on July 4-5, 2019. It presents the latest advances, trends and challenges in control system technologies and infrastructures. The book addresses a range of solutions to the problems faced by engineers and researchers to design and develop controllers for emerging areas like smart grid, integration of renewable energy, automated highway systems, haptics, unmanned aerial vehicles, sensor networks, robotics, formation control and many more. The solutions discussed in this book encourage and inspire researchers, industry professionals and policymakers to put these methods into practice.
This book introduces systematic design methods for passive and active RF circuits and techniques, including state-of-the-art digital enhancement techniques. As the very first book dedicated to multiband RF circuits and techniques, this work provides an overview of the evolution of transmitter architecture and discusses current digital predistortion techniques. Readers will find a collection of novel research ideas and new architectures in concurrent multiband power dividers, power amplifiers and related digital enhancement techniques. This book will be of great interest to academic researchers, R&D engineers, wireless transmitter and protocol designers, as well as graduate students who wish to learn the core architectures, principles and methods of multiband RF circuits and techniques.
The book is a collection of high-quality peer-reviewed research papers presented at the Fourth International Conference on Innovations in Computer Science and Engineering (ICICSE 2016) held at Guru Nanak Institutions, Hyderabad, India during 22 - 23 July 2016. The book discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. Researchers from academic and industry present their original work and exchange ideas, information, techniques and applications in the field of data science and analytics, artificial intelligence and expert systems, mobility, cloud computing, network security, and emerging technologies.
This book highlights plasma science and technology-related research and development work at institutes and universities networked through Asian African Association for Plasma Training (AAAPT) which was established in 1988. The AAAPT, with 52 member institutes in 24 countries, promotes the initiation and intensification of plasma research and development through cooperation and technology sharing. With 13 chapters on fusion-relevant, laboratory and industrial plasmas for wide range of applications and basic research and a chapter on AAAPT network, it demonstrates how, with collaborations, high-quality, industrially relevant academic and scientific research on fusion, industrial and laboratory plasmas and plasma diagnostics can be successfully pursued in small research labs. These plasma sciences and technologies include pioneering breakthroughs and applications in (i) fusion relevant research in the quest for long-term, clean energy source development using high-temperature, high- density plasmas and (ii) multibillion-dollar, low-temperature, non-equilibrium and thermal industrial plasmas used in processing, synthesis and electronics.
As the broad challenges around energy and the environment have become the focus of much research, scientists and experts have dedicated their efforts to developing more active and selective catalytic systems for key chemical transformations. For many decades environmentally viable protocols for the synthesis of fine chemicals have been the crux of academic and industrial research. Heterogeneous Catalysis in Organic Transformations serves as an overview of this work, providing a complete description of role of heterogeneous catalysis in organic transformations and offering a review of the current and near future technologies and applications. Discusses the fundamentals of catalysis and compares the advantages and disadvantages of different types of catalyst systems Examines oxide nanoparticles and noble metal nanoparticles Consider organometallic compounds, solid-supported catalysts, and mesoporous materials Describes recent advances in metal-based heterogeneous catalysts and new reactions with possible mechanistic pathways Providing a comprehensive review of heterogeneous catalysis from the basics through recent advances, this book will be of keen interest to undergraduates, graduates, and researchers in chemistry, chemical engineering, and associated fields.
This book covers selected topics and methods for peripheral security, which are gaining attention nowadays. The book discusses the security arrangement and methods for monitoring the inside/outside entry of peripheral areas that need to be secured. It relates to a periphery, often portable device (as well as the methods employed, and systems including such a peripheral device and a host central command device with which the local geographical command device communicates), enabling one or more security operations performed by the peripheral device. It also covers the security scenario of snow-prone areas in a remote location. It also elaborates how we can secure the person and devices in extremely cold conditions and rescue them. This book helps the researchers, academicians, and industry persons working in security areas to protect unauthentic entry in large scale areas that may be defense camps or civilian applications like large-sized bungalows, institutes, and organizations of national importance. The experimental results are in close conformance to the proposed methodologies.
This book provides an overview of Data Monitoring Committees(DMC) - what was done in the past, what is currently being done, and thoughts on improvements for the future. Previous works focused primarily on large cardiovascular studies (where DMCs originated more than 30 years ago) but updated references are needed that discuss smaller, more flexible studies in areas such as oncology. The authors have attended ~800 DMC meetings from ~200 distinct studies across all areas of clinical studies (oncology, rheumatology, rare diseases, cardiology, immunology, etc.) This wide range of expertise will be used, as well as the expertise that comes from working with virtually every large biotechnology and pharmaceutical company and CRO for DMC work. The reader of the book will know when DMCs are needed or helpful, how to form the DMC, how to work with external CROs and with sponsor teams and the DMC to create needed DMC outputs, how the DMC meetings are conducted, and - especially for DMC members - what are considerations within the Closed Session to review safety/efficacy outputs to assess risk/benefit to make appropriate recommendations that protect the patient safety and trial integrity. This is a practical hands-on book on how to decide if a DMC is necessary, how to form the DMC, how to expertly create the necessary materials for the DMC and have smooth running DMC meetings. There is no specialized training in school about how DMCs work - frequently people may have been in industry for many years without ever needing to work with a DMC. This book is the helpful reference for those new to these DMCs. The DMC work is critical to be correctly implemented as the impact of DMC activity on safeguarding the trial is so important.This book provides the following: Provides thorough instructions on the steps needed to form and implement a Data Monitoring Committee for clinical trial evaluation; Includes practical and hands-on information on DMC implementation; Discusses a wide range of clinical trial – by phase and therapeutic area. |
![]() ![]() You may like...
Revealing Revelation - How God's Plans…
Amir Tsarfati, Rick Yohn
Paperback
![]()
|