|
Showing 1 - 16 of
16 matches in All Departments
This book presents a number of innovative uses of fly ash. Fly ash
is a fine powder that is a byproduct of burning pulverized coal in
thermal power plants. It is a pozzolan - a substance containing
aluminous and siliceous material that when mixed with lime and
water forms a compound similar to Portland cement. Though fly ash
was a problem in terms of its disposal, it now has a variety of
uses, such as a prime material in blocks, bricks, and PCC paving,
and further applications are being investigated. As such, the
recovery and reuse of fly ash wastes plays an important role in the
implementation of the circular economy concept. Featuring selected,
high-quality research papers presented at IconSWM 2018, the book
provides valuable insights for the recycling industries, power
plants, researchers, and governments.
Increased industrial capacity, manufacturing output, and
manufacturing technology all contribute significantly to a
country's GDP. Manufacturing is the foundation of industrial
production, so improving its methods and infrastructure is crucial
for progress. Recent years have seen the introduction of a wide
range of energy- and resource-efficient, environmentally friendly,
and occupationally safe manufacturing techniques, and this book
focuses on these latest techniques, as well as continuous
advancement, in order to meet current challenges. The book is
divided into three sections: (1) subtractive manufacturing, (2)
additive manufacturing, and (3) the use of artificial intelligence
in manufacturing. It discusses micromaching, metal-based additive
manufacturing, polymer-based additive manufacturing, hybrid
additive manufacturing, and finally artificial intelligence in
manufacturing. Futuristic Manufacturing: Perpetual Advancement and
Research Challenges connects modern manufacturing methods and
emerging trends in the industry. It adds a thorough examination of
modern manufacturing techniques and modifications that may be
implemented in the future, and is an excellent resource of
information for undergraduate and graduate students in
manufacturing.
This book provides techniques for offshore center managers and head
office managers to motivate and manage globally distributed teams,
which are spread across the offshore center and the head office,
and thereby achieve higher productivity. Readers learn how to
integrate the offshore center with the head office to make the
offshore team an extension of the head office. While integrating
teams with the head office, offshore center managers can still
retain independence and authority to meet team aspirations. The
book provides insight into devising new organizational structures
to balance the authority and responsibilities of offshore center
and head office managers. Head office managers responsible for
managing globally distributed projects learn how to achieve a
higher success rate on their projects and be better rewarded for
their efforts in offshoring. Head office managers also learn
techniques to make more significant contributions in their
expatriate assignments to the offshore center. This book guides
both the offshore center managers and the head office managers to
fully realize the potential of the offshore center, which can
result in higher revenues and profitability.
Cloud Computing has already been embraced by many organizations and
individuals due to its benefits of economy, reliability,
scalability and guaranteed quality of service among others. But
since the data is not stored, analysed or computed on site, this
can open security, privacy, trust and compliance issues. This
one-stop reference covers a wide range of issues on data security
in Cloud Computing ranging from accountability, to data provenance,
identity and risk management. Data Security in Cloud Computing
covers major aspects of securing data in Cloud Computing. Topics
covered include NOMAD: a framework for ensuring data
confidentiality in mission-critical cloud based applications;
3DCrypt: privacy-preserving pre-classification volume ray-casting
of 3D images in the cloud; multiprocessor system-on-chip for
processing data in Cloud Computing; distributing encoded data for
private processing in the cloud; data protection and mobility
management for cloud; understanding software defined perimeter;
security, trust and privacy for Cloud Computing in transportation
cyber-physical systems; review of data leakage attack techniques in
cloud systems; Cloud Computing and personal data processing:
sorting out legal requirements; the Waikato data privacy matrix;
provenance reconstruction in clouds; and security visualization for
Cloud Computing.
This book provides techniques for offshore center managers and head
office managers to motivate and manage globally distributed teams,
which are spread across the offshore center and the head office,
and thereby achieve higher productivity. Readers learn how to
integrate the offshore center with the head office to make the
offshore team an extension of the head office. While integrating
teams with the head office, offshore center managers can still
retain independence and authority to meet team aspirations. The
book provides insight into devising new organizational structures
to balance the authority and responsibilities of offshore center
and head office managers. Head office managers responsible for
managing globally distributed projects learn how to achieve a
higher success rate on their projects and be better rewarded for
their efforts in offshoring. Head office managers also learn
techniques to make more significant contributions in their
expatriate assignments to the offshore center. This book guides
both the offshore center managers and the head office managers to
fully realize the potential of the offshore center, which can
result in higher revenues and profitability.
Maintaining a practical perspective, Python Programming: A
Practical Approach acquaints you with the wonderful world of
programming. The book is a starting point for those who want to
learn Python programming. The backbone of any programming, which is
the data structure and components such as strings, lists, etc.,
have been illustrated with many examples and enough practice
problems to instill a level of self-confidence in the reader.
Drawing on knowledge gained directly from teaching Computer Science
as a subject and working on a wide range of projects related to ML,
AI, deep learning, and blockchain, the authors have tried their
best to present the necessary skills for a Python programmer. Once
the foundation of Python programming is built and the readers are
aware of the exact structure, dimensions, processing, building
blocks, and representation of data, they can readily take up their
specific problems from the area of interest and solve them with the
help of Python. These include, but are not limited to, operators,
control flow, strings, functions, module processing,
object-oriented programming, exception and file handling,
multithreading, synchronization, regular expressions, and Python
database programming. This book on Python programming is specially
designed to keep readers busy with learning fundamentals and
generates a sense of confidence by attempting the assignment
problems. We firmly believe that explaining any particular
technology deviates from learning the fundamentals of a programming
language. This book is focused on helping readers attempt
implementation in their areas of interest through the skills
imparted through this book. We have attempted to present the real
essence of Python programming, which you can confidently apply in
real life by using Python as a tool. Salient Features Based on
real-world requirements and solution. Simple presentation without
avoiding necessary details of the topic. Executable programs on
almost every topic. Plenty of exercise questions, designed to test
readers' skills and understanding. Purposefully designed to be
instantly applicable, Python Programming: A Practical Approach
provides implementation examples so that the described subject
matter can be immediately implemented due to the well-known
versatility of Python in handling different data types with ease.
|
Work and Health in India (Hardcover)
Vimal Kumar, Mangadv Paramasivan Ganesh, Sarlaksha Ganesh, Subrata Roy, T.J. Kamalanabhan, …
|
R2,299
R2,169
Discovery Miles 21 690
Save R130 (6%)
|
Ships in 12 - 17 working days
|
The rapid economic growth of the past few decades has radically
transformed India's labour market, bringing millions of former
agricultural workers into manufacturing industries, and, more
recently, the expanding service industries, such as call centres
and IT companies. Alongside this employment shift has come a change
in health and health problems, as communicable diseases have become
less common, while non-communicable diseases, like cardiovascular
problems, and mental health issues such as stress, have increased.
This interdisciplinary work connects those two trends to offer an
analysis of the impact of working conditions on the health of
Indian workers that is unprecedented in scope and depth.
This book presents a number of innovative uses of fly ash. Fly ash
is a fine powder that is a byproduct of burning pulverized coal in
thermal power plants. It is a pozzolan - a substance containing
aluminous and siliceous material that when mixed with lime and
water forms a compound similar to Portland cement. Though fly ash
was a problem in terms of its disposal, it now has a variety of
uses, such as a prime material in blocks, bricks, and PCC paving,
and further applications are being investigated. As such, the
recovery and reuse of fly ash wastes plays an important role in the
implementation of the circular economy concept. Featuring selected,
high-quality research papers presented at IconSWM 2018, the book
provides valuable insights for the recycling industries, power
plants, researchers, and governments.
The sensor cloud is a new model of computing paradigm for Wireless
Sensor Networks (WSNs), which facilitates resource sharing and
provides a platform to integrate different sensor networks where
multiple users can build their own sensing applications at the same
time. It enables a multi-user on-demand sensory system, where
computing, sensing, and wireless network resources are shared among
applications. Therefore, it has inherent challenges for providing
security and privacy across the sensor cloud infrastructure. With
the integration of WSNs with different ownerships, and users
running a variety of applications including their own code, there
is a need for a risk assessment mechanism to estimate the
likelihood and impact of attacks on the life of the network. The
data being generated by the wireless sensors in a sensor cloud need
to be protected against adversaries, which may be outsiders as well
as insiders. Similarly, the code disseminated to the sensors within
the sensor cloud needs to be protected against inside and outside
adversaries. Moreover, since the wireless sensors cannot support
complex and energy-intensive measures, the lightweight schemes for
integrity, security, and privacy of the data have to be redesigned.
The book starts with the motivation and architecture discussion of
a sensor cloud. Due to the integration of multiple WSNs running
user-owned applications and code, the possibility of attacks is
more likely. Thus, next, we discuss a risk assessment mechanism to
estimate the likelihood and impact of attacks on these WSNs in a
sensor cloud using a framework that allows the security
administrator to better understand the threats present and take
necessary actions. Then, we discuss integrity and privacy
preserving data aggregation in a sensor cloud as it becomes harder
to protect data in this environment. Integrity of data can be
compromised as it becomes easier for an attacker to inject false
data in a sensor cloud, and due to hop by hop nature, privacy of
data could be leaked as well. Next, the book discusses a
fine-grained access control scheme which works on the secure
aggregated data in a sensor cloud. This scheme uses Attribute Based
Encryption (ABE) to achieve the objective. Furthermore, to securely
and efficiently disseminate application code in sensor cloud, we
present a secure code dissemination algorithm which first reduces
the amount of code to be transmitted from the base station to the
sensor nodes. It then uses Symmetric Proxy Re-encryption along with
Bloom filters and Hash-based Message Authentication Code (HMACs) to
protect the code against eavesdropping and false code injection
attacks.
The book has been designed as a textbook for graduate and
postgraduate students of physics, material science, and
engineering. This is the third edition of the textbook, that is
updated to reflect recent works in the field. In this edition, some
new topics have been introduced while some of the existing topics
like phonons, Drude -Lorentz model, Fermi levels, electrons, and
holes, etc. are modified. Moreover, the book has complete
information on semiconductor devices like tunnel diode, Gunn diode,
photodiode, photoconductive diode, varactor diode, solar cell, LED,
semiconductor lasers, and semiconductor detectors. All the chapters
have been supplemented by solved and unsolved examples. Some of the
chapters illustrate areas of current interest in solid-state
physics to give the student practical working knowledge of the
subject text in a simple and lucid manner. There is a fair amount
of detail in the examples and derivations given in the text. Each
section of the book has exercises to reinforce the concepts, and
problems have been added at the end of each chapter. The detailed
coverage and pedagogical tools make this an ideal textbook for
students and researchers enrolled in graduate and postgraduate
courses of physics, material science, and engineering.
|
|