Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 16 of 16 matches in All Departments
This book presents a number of innovative uses of fly ash. Fly ash is a fine powder that is a byproduct of burning pulverized coal in thermal power plants. It is a pozzolan - a substance containing aluminous and siliceous material that when mixed with lime and water forms a compound similar to Portland cement. Though fly ash was a problem in terms of its disposal, it now has a variety of uses, such as a prime material in blocks, bricks, and PCC paving, and further applications are being investigated. As such, the recovery and reuse of fly ash wastes plays an important role in the implementation of the circular economy concept. Featuring selected, high-quality research papers presented at IconSWM 2018, the book provides valuable insights for the recycling industries, power plants, researchers, and governments.
Increased industrial capacity, manufacturing output, and manufacturing technology all contribute significantly to a country's GDP. Manufacturing is the foundation of industrial production, so improving its methods and infrastructure is crucial for progress. Recent years have seen the introduction of a wide range of energy- and resource-efficient, environmentally friendly, and occupationally safe manufacturing techniques, and this book focuses on these latest techniques, as well as continuous advancement, in order to meet current challenges. The book is divided into three sections: (1) subtractive manufacturing, (2) additive manufacturing, and (3) the use of artificial intelligence in manufacturing. It discusses micromaching, metal-based additive manufacturing, polymer-based additive manufacturing, hybrid additive manufacturing, and finally artificial intelligence in manufacturing. Futuristic Manufacturing: Perpetual Advancement and Research Challenges connects modern manufacturing methods and emerging trends in the industry. It adds a thorough examination of modern manufacturing techniques and modifications that may be implemented in the future, and is an excellent resource of information for undergraduate and graduate students in manufacturing.
This book provides techniques for offshore center managers and head office managers to motivate and manage globally distributed teams, which are spread across the offshore center and the head office, and thereby achieve higher productivity. Readers learn how to integrate the offshore center with the head office to make the offshore team an extension of the head office. While integrating teams with the head office, offshore center managers can still retain independence and authority to meet team aspirations. The book provides insight into devising new organizational structures to balance the authority and responsibilities of offshore center and head office managers. Head office managers responsible for managing globally distributed projects learn how to achieve a higher success rate on their projects and be better rewarded for their efforts in offshoring. Head office managers also learn techniques to make more significant contributions in their expatriate assignments to the offshore center. This book guides both the offshore center managers and the head office managers to fully realize the potential of the offshore center, which can result in higher revenues and profitability.
Cloud Computing has already been embraced by many organizations and individuals due to its benefits of economy, reliability, scalability and guaranteed quality of service among others. But since the data is not stored, analysed or computed on site, this can open security, privacy, trust and compliance issues. This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management. Data Security in Cloud Computing covers major aspects of securing data in Cloud Computing. Topics covered include NOMAD: a framework for ensuring data confidentiality in mission-critical cloud based applications; 3DCrypt: privacy-preserving pre-classification volume ray-casting of 3D images in the cloud; multiprocessor system-on-chip for processing data in Cloud Computing; distributing encoded data for private processing in the cloud; data protection and mobility management for cloud; understanding software defined perimeter; security, trust and privacy for Cloud Computing in transportation cyber-physical systems; review of data leakage attack techniques in cloud systems; Cloud Computing and personal data processing: sorting out legal requirements; the Waikato data privacy matrix; provenance reconstruction in clouds; and security visualization for Cloud Computing.
This book provides techniques for offshore center managers and head office managers to motivate and manage globally distributed teams, which are spread across the offshore center and the head office, and thereby achieve higher productivity. Readers learn how to integrate the offshore center with the head office to make the offshore team an extension of the head office. While integrating teams with the head office, offshore center managers can still retain independence and authority to meet team aspirations. The book provides insight into devising new organizational structures to balance the authority and responsibilities of offshore center and head office managers. Head office managers responsible for managing globally distributed projects learn how to achieve a higher success rate on their projects and be better rewarded for their efforts in offshoring. Head office managers also learn techniques to make more significant contributions in their expatriate assignments to the offshore center. This book guides both the offshore center managers and the head office managers to fully realize the potential of the offshore center, which can result in higher revenues and profitability.
Maintaining a practical perspective, Python Programming: A Practical Approach acquaints you with the wonderful world of programming. The book is a starting point for those who want to learn Python programming. The backbone of any programming, which is the data structure and components such as strings, lists, etc., have been illustrated with many examples and enough practice problems to instill a level of self-confidence in the reader. Drawing on knowledge gained directly from teaching Computer Science as a subject and working on a wide range of projects related to ML, AI, deep learning, and blockchain, the authors have tried their best to present the necessary skills for a Python programmer. Once the foundation of Python programming is built and the readers are aware of the exact structure, dimensions, processing, building blocks, and representation of data, they can readily take up their specific problems from the area of interest and solve them with the help of Python. These include, but are not limited to, operators, control flow, strings, functions, module processing, object-oriented programming, exception and file handling, multithreading, synchronization, regular expressions, and Python database programming. This book on Python programming is specially designed to keep readers busy with learning fundamentals and generates a sense of confidence by attempting the assignment problems. We firmly believe that explaining any particular technology deviates from learning the fundamentals of a programming language. This book is focused on helping readers attempt implementation in their areas of interest through the skills imparted through this book. We have attempted to present the real essence of Python programming, which you can confidently apply in real life by using Python as a tool. Salient Features Based on real-world requirements and solution. Simple presentation without avoiding necessary details of the topic. Executable programs on almost every topic. Plenty of exercise questions, designed to test readers' skills and understanding. Purposefully designed to be instantly applicable, Python Programming: A Practical Approach provides implementation examples so that the described subject matter can be immediately implemented due to the well-known versatility of Python in handling different data types with ease.
The rapid economic growth of the past few decades has radically transformed India's labour market, bringing millions of former agricultural workers into manufacturing industries, and, more recently, the expanding service industries, such as call centres and IT companies. Alongside this employment shift has come a change in health and health problems, as communicable diseases have become less common, while non-communicable diseases, like cardiovascular problems, and mental health issues such as stress, have increased. This interdisciplinary work connects those two trends to offer an analysis of the impact of working conditions on the health of Indian workers that is unprecedented in scope and depth.
This book presents a number of innovative uses of fly ash. Fly ash is a fine powder that is a byproduct of burning pulverized coal in thermal power plants. It is a pozzolan - a substance containing aluminous and siliceous material that when mixed with lime and water forms a compound similar to Portland cement. Though fly ash was a problem in terms of its disposal, it now has a variety of uses, such as a prime material in blocks, bricks, and PCC paving, and further applications are being investigated. As such, the recovery and reuse of fly ash wastes plays an important role in the implementation of the circular economy concept. Featuring selected, high-quality research papers presented at IconSWM 2018, the book provides valuable insights for the recycling industries, power plants, researchers, and governments.
The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It enables a multi-user on-demand sensory system, where computing, sensing, and wireless network resources are shared among applications. Therefore, it has inherent challenges for providing security and privacy across the sensor cloud infrastructure. With the integration of WSNs with different ownerships, and users running a variety of applications including their own code, there is a need for a risk assessment mechanism to estimate the likelihood and impact of attacks on the life of the network. The data being generated by the wireless sensors in a sensor cloud need to be protected against adversaries, which may be outsiders as well as insiders. Similarly, the code disseminated to the sensors within the sensor cloud needs to be protected against inside and outside adversaries. Moreover, since the wireless sensors cannot support complex and energy-intensive measures, the lightweight schemes for integrity, security, and privacy of the data have to be redesigned. The book starts with the motivation and architecture discussion of a sensor cloud. Due to the integration of multiple WSNs running user-owned applications and code, the possibility of attacks is more likely. Thus, next, we discuss a risk assessment mechanism to estimate the likelihood and impact of attacks on these WSNs in a sensor cloud using a framework that allows the security administrator to better understand the threats present and take necessary actions. Then, we discuss integrity and privacy preserving data aggregation in a sensor cloud as it becomes harder to protect data in this environment. Integrity of data can be compromised as it becomes easier for an attacker to inject false data in a sensor cloud, and due to hop by hop nature, privacy of data could be leaked as well. Next, the book discusses a fine-grained access control scheme which works on the secure aggregated data in a sensor cloud. This scheme uses Attribute Based Encryption (ABE) to achieve the objective. Furthermore, to securely and efficiently disseminate application code in sensor cloud, we present a secure code dissemination algorithm which first reduces the amount of code to be transmitted from the base station to the sensor nodes. It then uses Symmetric Proxy Re-encryption along with Bloom filters and Hash-based Message Authentication Code (HMACs) to protect the code against eavesdropping and false code injection attacks.
The book has been designed as a textbook for graduate and postgraduate students of physics, material science, and engineering. This is the third edition of the textbook, that is updated to reflect recent works in the field. In this edition, some new topics have been introduced while some of the existing topics like phonons, Drude -Lorentz model, Fermi levels, electrons, and holes, etc. are modified. Moreover, the book has complete information on semiconductor devices like tunnel diode, Gunn diode, photodiode, photoconductive diode, varactor diode, solar cell, LED, semiconductor lasers, and semiconductor detectors. All the chapters have been supplemented by solved and unsolved examples. Some of the chapters illustrate areas of current interest in solid-state physics to give the student practical working knowledge of the subject text in a simple and lucid manner. There is a fair amount of detail in the examples and derivations given in the text. Each section of the book has exercises to reinforce the concepts, and problems have been added at the end of each chapter. The detailed coverage and pedagogical tools make this an ideal textbook for students and researchers enrolled in graduate and postgraduate courses of physics, material science, and engineering.
|
You may like...
New Perspectives and Applications of…
Julio B. Clempner, Wen Yu
Hardcover
Communications and Cryptography - Two…
Richard E Blahut, Daniel J. Costello Jr, …
Hardcover
R5,846
Discovery Miles 58 460
Spaces, Spatiality and Technology
Phil Turner, Elisabeth Davenport
Hardcover
R4,263
Discovery Miles 42 630
Turbulence and Interactions…
Michel O. Deville, Vincent Couaillier, …
Hardcover
Turbulence and Interactions…
Michel Deville, Thien-Hiep Le, …
Hardcover
R5,514
Discovery Miles 55 140
Towards a Post-Bertalanffy Systemics
Gianfranco Minati, Mario Abram, …
Hardcover
Foundations Of Complex Systems…
Gregoire Nicolis, Catherine Nicolis
Hardcover
R3,475
Discovery Miles 34 750
Geometric Algebra Applications Vol. I…
Eduardo Bayro Corrochano
Hardcover
R5,924
Discovery Miles 59 240
Nonlinear Dynamical Systems with…
Viet-Thanh Pham, Sundarapandian Vaidyanathan, …
Hardcover
R6,493
Discovery Miles 64 930
|