|
Showing 1 - 17 of
17 matches in All Departments
Blockchain has potential to revolutionize how manufacturers design,
engineer, make and scale their products. Blockchain is gradually
proving to be an effective "middleware" solution for enabling
seamless interoperability within complex supply chains. Due to its
technological nature, blockchain enables secure, transparent and
fast data exchanges as well as allowing for the creation of
immutable records databases The main advantage of Blockchain in
Manufacturing Industries is product traceability, supply chain
transparency, compliance monitoring, and auditability. Moreover,
leveraging blockchain technology into a manufacturing enterprise
can enhance its security and reduce the rates of systematic
failures. So, blockchain is now used in various sectors of the
manufacturing industry, such as automotive, aerospace, defense,
pharmaceutical, consumer electronics, textile, food and beverages,
and more. Hence, Blockchain should be seen as an investment in
future-readiness and customer-centricity, not as an experimental
technology - because, the evidence is overwhelming. This book will
explore the strengths of Blockchain adaptation in Manufacturing
Industries and Logistics Management, cover different use cases of
Blockchain Technology for Manufacturing Industries and Logistics
Management, and will discuss the role, impact and challenges of
adopting Blockchain in Manufacturing industries and Logistics
Management. The chapters will also provide the current open issues
and future research trends of Blockchain, especially for
Manufacturing Industries and Logistics, and will encapsulate
quantitative and qualitative research for a wide spectrum of
readers of the book.
Steganography is the art of secret writing. The purpose of
steganography is to hide the presence of a message from the
intruder by using state-of-the-art methods, algorithms,
architectures, models, and methodologies in the domains of cloud,
internet of things (IoT), and the Android platform. Though security
controls in cloud computing, IoT, and Android platforms are not
much different than security controls in an IT environment, they
might still present different types of risks to an organization
than the classic IT solutions. Therefore, a detailed discussion is
needed in case there is a breach in security. It is important to
review the security aspects of cloud, IoT, and Android platforms
related to steganography to determine how this new technology is
being utilized and improved continuously to protect information
digitally. The benefits and challenges, along with the current and
potential developments for the future, are important keystones in
this critical area of security research. Multidisciplinary Approach
to Modern Digital Steganography reviews the security aspects of
cloud, IoT, and Android platforms related to steganography and
addresses emerging security concerns, new algorithms, and case
studies in the field. Furthermore, the book presents a new approach
to secure data storage on cloud infrastructure and IoT along with
including discussions on optimization models and security controls
that could be implemented. Other important topics include data
transmission, deep learning techniques, machine learning, and both
image and text stenography. This book is essential for forensic
engineers, forensic analysts, cybersecurity analysts, cyber
forensic examiners, security engineers, cybersecurity network
analysts, cyber network defense analysts, and digital forensic
examiners along with practitioners, researchers, academicians, and
students interested in the latest techniques and state-of-the-art
methods in digital steganography.
Smart grids with distributed clean energy generation, storage and
prosumers are the future of energy systems. They need two-way
digital communication between multiple customers and suppliers of
energy, to produce, buy and sell electricity to the grid at small
scales. These arrangements need a system that maintains, checks,
and registers information about transactions. Blockchain technology
is able to handle these requirements with smart contracts,
peer-to-peer energy trading and immutable transactions. A
blockchain is a digital ledger of transactions that can be accessed
across the entire network of computer systems. Combined with
sensors to track energy flows, blockchain can enable the smart
grid. After an introduction to blockchain, chapters cover
integration with IoT, IoT- and blockchain-enabled smart grids, use
of sensors, security and privacy, use of machine and deep learning,
energy storage and transaction, as well as use of cryptocurrencies
for transactions. Written by an international team with the
necessary multi-disciplinarity, this work for researchers in power
systems as well as economists with related interests covers the use
of blockchain technology for smart grids.
This new book discusses the concepts while also highlighting the
challenges in the field of quantum cryptography and also covering
cryptographic techniques and cyber security techniques, in a single
volume. It comprehensively covers important topics in the field of
quantum cryptography with applications, including quantum key
distribution, position-based quantum cryptography, quantum
teleportation, quantum e-commerce, quantum cloning, cyber security
techniques' architectures and design, cyber security techniques
management, software-defined networks, and cyber security
techniques for 5G communication. The text also discusses the
security of practical quantum key distribution systems,
applications and algorithms developed for quantum cryptography, as
well as cyber security through quantum computing and quantum
cryptography. The text will be beneficial for graduate students,
academic researchers, and professionals working in the fields of
electrical engineering, electronics and communications engineering,
computer science, and information technology.
This book presents chapters from diverse range of authors on
different aspects of how Blockchain and IoT are converging and the
impacts of these developments. The book provides an extensive
cross-sectional and multi-disciplinary look into this trend and how
it affects artificial intelligence, cyber-physical systems, and
robotics with a look at applications in aerospace, agriculture,
automotive, critical infrastructures, healthcare, manufacturing,
retail, smart transport systems, smart cities, and smart
healthcare. Cases include the impact of Blockchain for IoT
Security; decentralized access control systems in IoT; Blockchain
architecture for scalable access management in IoT; smart and
sustainable IoT applications incorporating Blockchain, and more.
The book presents contributions from international academics,
researchers, and practitioners from diverse perspectives. Presents
how Blockchain and IoT are converging and the impacts of these
developments on technology and its application; Discusses IoT and
Blockchain from cross-sectional and multi-disciplinary
perspectives; Includes contributions from researchers, academics,
and professionals from around the world.
This proceedings bring together contributions from researchers from
academia and industry to report the latest cutting edge research
made in the areas of Fuzzy Computing, Neuro Computing and hybrid
Neuro-Fuzzy Computing in the paradigm of Soft Computing. The FANCCO
2015 conference explored new application areas, design novel hybrid
algorithms for solving different real world application problems.
After a rigorous review of the 68 submissions from all over the
world, the referees panel selected 27 papers to be presented at the
Conference. The accepted papers have a good, balanced mix of theory
and applications. The techniques ranged from fuzzy neural networks,
decision trees, spiking neural networks, self organizing feature
map, support vector regression, adaptive neuro fuzzy inference
system, extreme learning machine, fuzzy multi criteria decision
making, machine learning, web usage mining, Takagi-Sugeno Inference
system, extended Kalman filter, Goedel type logic, fuzzy formal
concept analysis, biclustering etc. The applications ranged from
social network analysis, twitter sentiment analysis, cross domain
sentiment analysis, information security, education sector,
e-learning, information management, climate studies, rainfall
prediction, brain studies, bioinformatics, structural engineering,
sewage water quality, movement of aerial vehicles, etc.
This book presents chapters from diverse range of authors on
different aspects of how Blockchain and IoT are converging and the
impacts of these developments. The book provides an extensive
cross-sectional and multi-disciplinary look into this trend and how
it affects artificial intelligence, cyber-physical systems, and
robotics with a look at applications in aerospace, agriculture,
automotive, critical infrastructures, healthcare, manufacturing,
retail, smart transport systems, smart cities, and smart
healthcare. Cases include the impact of Blockchain for IoT
Security; decentralized access control systems in IoT; Blockchain
architecture for scalable access management in IoT; smart and
sustainable IoT applications incorporating Blockchain, and more.
The book presents contributions from international academics,
researchers, and practitioners from diverse perspectives. Presents
how Blockchain and IoT are converging and the impacts of these
developments on technology and its application; Discusses IoT and
Blockchain from cross-sectional and multi-disciplinary
perspectives; Includes contributions from researchers, academics,
and professionals from around the world.
Blockchain technology has the potential to utterly transform supply
chains, streamline processes, and improve the whole of security.
Manufacturers across the globe face challenges with forecasting
demand, controlling inventory, and accelerating digital
transformation to cater to the challenges of changing market
dynamics and evolving customer expectations. Hence, blockchain
should be seen as an investment in future-readiness and
customer-centricity, not as an experimental technology. Utilizing
Blockchain Technologies in Manufacturing and Logistics Management
explores the strengths of blockchain adaptation in manufacturing
industries and logistics management, which include product
traceability, supply chain transparency, compliance monitoring, and
auditability, and also examines the current open issues and future
research trends of blockchain. Leveraging blockchain technology
into a manufacturing enterprise can enhance its security and reduce
the rates of systematic failures. Covering topics such as fraud
detection, Industry 4.0, and security threats, this book is a ready
premier reference for graduate and post-graduate students,
academicians, researchers, industrialists, consultants, and
entrepreneurs, as well as micro, small, and medium enterprises.
Steganography is the art of secret writing. The purpose of
steganography is to hide the presence of a message from the
intruder by using state-of-the-art methods, algorithms,
architectures, models, and methodologies in the domains of cloud,
internet of things (IoT), and the Android platform. Though security
controls in cloud computing, IoT, and Android platforms are not
much different than security controls in an IT environment, they
might still present different types of risks to an organization
than the classic IT solutions. Therefore, a detailed discussion is
needed in case there is a breach in security. It is important to
review the security aspects of cloud, IoT, and Android platforms
related to steganography to determine how this new technology is
being utilized and improved continuously to protect information
digitally. The benefits and challenges, along with the current and
potential developments for the future, are important keystones in
this critical area of security research. Multidisciplinary Approach
to Modern Digital Steganography reviews the security aspects of
cloud, IoT, and Android platforms related to steganography and
addresses emerging security concerns, new algorithms, and case
studies in the field. Furthermore, the book presents a new approach
to secure data storage on cloud infrastructure and IoT along with
including discussions on optimization models and security controls
that could be implemented. Other important topics include data
transmission, deep learning techniques, machine learning, and both
image and text stenography. This book is essential for forensic
engineers, forensic analysts, cybersecurity analysts, cyber
forensic examiners, security engineers, cybersecurity network
analysts, cyber network defense analysts, and digital forensic
examiners along with practitioners, researchers, academicians, and
students interested in the latest techniques and state-of-the-art
methods in digital steganography.
This book about Kundalini discusses about both theoretical and
practical aspects of kundalini meditation, which is generally
considered as a complex subject. There are many serious problems
associated with kundalini meditation, known as kundalini syndrome.
These syndromes manifest only due to lack of proper understanding
and practice. This book dwells at length both theoretical and
practical aspects of kundalini meditation. This book also explains
the importance of proper postures, breath control, meditative
techniques, etc. A few explanatory images are also provided. Apart
from dwelling in detail on preliminaries and practices, this book
also explains step by step procedure to attain perfection in
kundalini meditation. Throughout this book, IAST font is used and a
few characters of these fonts may not appear properly in some of
the kindle devices.
Divine Mother abides in Sri Chakra. This is also known as Sri
Yantra and Chakra-raja. This is the most supreme amongst all the
yantra-s. Uttara bhag (the chapter containing the benefits of
recitation, also known as phalashruti) of Lalita Trishati
elucidates Sri Chakra in a comprehensive manner. Sri Chakra is the
body of Shiva and Shakti. Sri Chakra is compared to a human body
and Shiva and Shakti are compared to the soul within. Sri Chakra is
full of life and energy and should be worshipped with great
reverence. Any god or goddess can be worshipped in Sri Chakra, as
all of them have a place in it. The book has three sections. First
section is titled "Journey to Sri Chakra." This part elaborately
deals with Sri Nagara the outer portion of Sri Chakra. We can enter
Sri Chakra only after crossing Sri Nagara, which has several forts
guarded by different gods and goddesses. Our journey to Sri Chakra
begins from Sri Nagara. During this journey, we worship various
gods, goddesses, sages and saints. We also come across various
rivers, ponds, forests and gardens. When we have traversed through
Sri Nagara, we are able to see Sri Chakra and we continue our
journey towards the innermost triangle after passing through
various devi-s guarding Lalitambika by remaining in various
triangles of Sri Chakra. We worship them and finally proceed to the
innermost triangle where we are completely purified. Inside the
triangle, we are blessed to have darshan of Lalitambika. After
spending sometime at Her feet She takes us to Shiva in the Bindu to
get us liberated. The second section of the book deals with
Navavarana Puja. Every aspect of mantras is explained in detail by
quoting references form Lalita Sahasranama and other sacred
Scriptures. This part of the book is a complete guide to perform
navavarana puja and all the mantras with explanations and images
are given. This section of the book is elaborate, as it contains
mantras, images and explanations and detailed procedure for
performing the Navavarana puja. Third and final section of the book
is Bhavanopanishad. Bhavana means imagination or formation of a
concept in the mind. Like any other Upanishad, this Upanishad also
does not deal with practices. It helps us to contemplate our body
with Sri Chakra. There are totally thirty seven verses (some texts
call these as sutra-s). Detailed interpretations are given for all
the sutras. At the end of this portion, we will be able to
contemplate our body as Sri Chakra. Entire book consists of both
Sanskrit and English texts. English texts are given in IAST format
so that, those who are not conversant with Sanskrit can pronounce
the mantras properly. Pronunciation guide is also provided. This
book can be acclaimed as an encyclopedia of Sri Chakra.
This textbook is a comprehensive volume on sprinklers and drip
irrigation and covers all the basic and fundamentals concepts
related to these topics. It is the first book to consider
relative-flow-ratio as an evaluation criterion for both sprinkler
and drip irrigation designs. It also discusses various types of
sprinklers (used for irrigation), their complex layouts, design
methodologies, selection criteria explained with practical
examples, and their operations and maintenance under different
conditions. In addition to operation and maintenance of drip
irrigation components, the book also explains the drip irrigation
hydraulics and various design aspects and the effect of the same on
their performance. It also has one important chapter on Rhizosphere
modelling which introduces the state-of-the-art technologies in
optimal irrigation and fertigation scheduling. Worked out examples
and solved problems in the chapters would aid to learning and
understanding of the topic among the students. Given the contents,
the book will be extremely useful for the undergraduate and
postgraduate students of agriculture engineering, irrigation
engineering and civil engineering. This textbook will also be
useful for researchers, engineers and professionals working in
these areas.
This edition of Sahasranama contains detailed interpretation for
each name with appropriate quotations from Veda-s, Saundarya
Lahari, Bhagavad Gita, Upanisads, etc in order to make the
understanding better. The citations from Veda-s and other
scriptures go to prove the magnificence of Lalita Sahasranama.
Every attempt has been made to make the interpretations as easy as
possible and no effort was spared to go into the depth of each
nama. Each nama is not only transliterated (International Alphabet
of Sanskrit Transliteration - IAST), but also the original Sanskrit
version of the nama is also used, so that the original beauty of
the nama is not lost. A guide to read transliterations is also
provided with examples. A lot of additional informations have been
provided, captioned as 'further reading'. Such informations are not
only needed for better understanding of nama-s, but they, in
general, provide additional knowledge for those who pursue the path
of spirituality.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R383
R310
Discovery Miles 3 100
|