Marknadens största urval
Snabb leverans

Böcker utgivna av MOHAMMED ABDUL SATTAR

Filter
Filter
Sortera efterSortera Populära
  • av Pradeep Kumar S
    496,-

    Road crashes are, unquestionably, the leading cause of death worldwide. According to the World Health Organisation (WHO), accident related deaths are known to be the 8th leading cause of death. Of the 56.9 million deaths worldwide in 2016, road injuries killed 1.4 million people about 74% of whom were men and boys. Road accidents kill drivers as well as pedestrians, cyclists and motorcyclists. Drunken driving, mobile phone use during driving, drowsiness, distractions, the weather, the state of the road, the condition of the vehicle and fatigue are major drivers of road accidents. Road crash injuries are projected to become the 5th foremost cause of death by 2030, unless action is taken. The 2018 WHO Global Status Report on road safety states that in 180 countries worldwide, the total number of annual road traffic deaths increased from 1.25 million to 1.35 million in one year, with vulnerable road users such as cyclists, pedestrians and motorcyclists accounting for more than 50% of the deaths. Drowsy driving was reportedly found to involve 2.3% of the total fatalities (35,092) that occurred in the U.S.A in 2015. The record from developing economies also indicates a higher rate of road traffic injuries, resulting in 93% fatalities in low- and middle- income countries. Both children and adults in between the ages of 5 and 29 died as a result of road accident injuries. The reasons for these accidents include over speeding, drunken driving, distraction, unsafe road infrastructure, non-use of safety devices such as helmets and seat belts, traffic rule violations, unsafe vehicles and inadequate post-crash care. Accidents stemming from human error can be rectified by monitoring driver behaviour appropriately while driving. Driver safety technology includes airbags as well as systems such as anti-lock braking system (ABS) and ultrasonic warning to check vehicle failure-related accidents. Road accidents are unlikely when driver behaviour can be predicted. Detecting driver states is critical, for it prevents accidents and saves lives, and is reflected in several ways, including eye blinking and closure patterns, frequent yawns, and the nature of vehicle movements.

  • av Satishkumar Mallappa
    480,-

    Text is one of the greatest inventions of humankind it has a vital role in human's lives starting from ancient times. The rich and meaningful information lies in the text, and it is the crucial element in the development of computer-vision applications. The text is a symbolic representation of any language known as script. It is necessary to identify the script from the document image to develop an Optical Character Recognition (OCR) system. For processing the document image, it is essential to locate the script in the document and identify the script to decide the appropriate OCR system to recognize. Once the computer successfully recognizes the underlying script of the document, then the task like editing, searching, indexing etc. can be performed on the document image. Traditionally, the documents are scanned by flat-bed scanners. The trend has gradually moved from the scanner to digital cameras with high-resolution lenses used to capture the document. The camera has advantages over the traditional scanner in a lightweight, small in size, ability to capture the seen text, boards displayed on the roads, vehicle numbers etc. and document can be captured without touching the hard copy, and capturing too fragile documents. The camera captured documents have some challenging problems like uneven illumination, blur, shadow, perspective distortion, out of focus, and many more. The script identification system is an important area in document image analysis. This has broadly categorized as printed or handwritten text from document images. Till date, many algorithms have been presented in the literature to perform this task for a specific language, and such OCRs will not work for a document containing more than one script. Hence script identification is crucial for the automatic processing of textual documents in multi-lingual information management. Identification of the script in document image is the primary steps towards processing the multi-lingual documents. It is necessary to identify the scripts of a multi-lingual document before submitting them to the appropriate OCR system.

  • av Tulsi Bora
    510,-

    Graphs. Most people identify this phrase with a statistical graph, such as a bar, line, circle or a graph of a function. But, the analysis of graphs is referred to as graph theory in mathematics. Graphs are a central topic in discrete mathematics. Graphs, which are comprised of vertices (nodes or actors) and edges (links), are used as models in graph theory. These mathematical models represent real-world problems and circumstances. The concept of graph theory is derived from a mathematical depiction of this type of situation. In mathematics, graph theory is an exciting and dynamic field. It is used to examine real-world challenges in various fields ranging from chemistry to linguistics, geography to sociology, transportation to infrastructure networks, social science to biological networks and so on. Graphs are mathematical constructions used to represent pair wise relationships between objects. They can be found on maps, in constellations and in the design and drafting process. Graphs highlight various computer applications that enable modem communication and technological processes. They serve to strengthen logical and abstract thinking. Graph theory emerged as an academic discipline in 1736, when Leonhard Euler solved the renowned Konigsberg bridge issue. Euler solved the Konigsberg bridge problem by expressing it as a graph theory problem, with the land areas represented as vertices and the bridges as edges. Euler introduced the concept of degree by stating that if a graph has no more than two odd vertices, then there exists some path that traverses each edge once. Complex network graphs differ greatly from ordinary graphs. Network science is the study of complex networks, which can represent any distinct system, from different interaction networks to social networks. Over the last two decades, network research has contributed to the identification of universal and surprising patterns in a wide range of domains, from ecological and social systems to technical and biological systems. From the research of last two decades in various domains, it will help to create innovative multidisciplinary tools for transforming many real world problems into models so that it can easily solvable.

  • - Serial and Parallel Solutions
    av Ashima Gupta
    470,-

    Transportation features a major contribution to the country's economy. It plays a significant role in connecting business to its supply chain partners, like suppliers and customers; by moving goods from source location to the demanded location. Transportation involves almost every stage in business, like export/import of raw material; transport products to the warehouses, to the seller and to the end customer. Also, transferring people from one location to another is the largely used transportation system worldwide. Apart from this, we all know how e-commerce market is growing day by day, because these days everyone wants the products to be delivered at their doorstep. Thanks to e-commerce and logistics-distribution, now people can order a variety of goods of national or international brands at their home without any hassle of delivery. It is the responsibility of the seller to deliver products to the customer, supporting the economic utilities of place (demand location) and time (delivery time). Such challenges give rise to applications of vehicle routing problem, where several variants are considered in order to fulfil seller and customer requirements. They include applications such as goods and food delivery, school bus services, pick-up and drop services, and many other applications that are strictly capacity and time-restricted.

  • av Simmi Garg
    496,-

    Wireless Communication technology is deeply rooted in history. This field has grown to a wide area in a very short interval of time. Over the past 100 years, wireless communication has been prominently developed from satellite transmission, radio and television broadcasting to common mobile phones. Wireless communication is a rapidly developing area in the communications scenario. In the present world, wireless communication has established itself as a crucial component. Practice of digital systems expands the performance and efficiency of wireless communication systems. During the 1990s, the concept of wireless communication suddenly acquired more flesh and blood due to the growth in technology. The omnipresence of computers and, particularly, the invention of the World Wide Web and the massive development of Internet use, have concretized the originally abstract idea. The mobile internet and multimedia are current favourite topics of the press, industry thinkers, management professionals and successful populists. The world is moving towards 5 G, LTE, high speed video and audio streaming. For all these data services, we need rapid and reliable data transmission. The essential prerequisite for reliable data transmission techniques, are the major issues associated with error control. Quality maintenance is one of the major issues in the current communication system. The immoderately presented ideas of wireless communication specify evidently, that this topic should be explored more. Researchers from many fields, namely mathematics, Physics, electrical engineering, Information theory shook their hands to resolve these issues. Error control schemes play an important role in sending reliable and efficient data in digital communication systems. The quality of transmitted data can be improved by using various coding schemes. Coding schemes help in detection and correction of errors in the received signal. Because of these reasons, many error control techniques have been developed.

  • av Gurjot Kaur Walia
    480,-

    Image processing is the process of applying various procedures to an image in order to improve it or extract some relevant information from it. It is a sort of processing where the input is an image and the output can either be another picture or features/characteristics related to that image and is one of the technologies that is rapidly developing. It is a primary subject of research in the fields of engineering and computer science as well. Image processing comprises importing the image using image capture tools, analysing it, and then altering it such that the output can be a changed image or report depending on the image analysis. Analog and digital image processing are the two categories of image processing techniques. Image analysis makes use of a variety of interpretational foundations while utilising these visual approaches. Digital image processing methods are useful for modifying digital pictures when utilising computers. When employing digital method, all sorts of data go through three main phases: pre-processing, improvement, and presentation, as well as information extraction. Red, green, and blue planes with high resolution make up a digital colour image. The red, blue, and green planes would ideally be collected by three distinct sensors, but this is too expensive for practical usage. The most common pattern employed is the Color Filter Array (CFA) Bayer pattern, which is made up of a mosaic of red, blue, and green sensors arranged to collect the image data. Demosaicing approaches were first based on traditional picture interpolation techniques as bilinear interpolation, cubic spline interpolation, and nearest neighbour replication. Better results were obtained using the technique that took use of the inter-channel correlation between colour components. After that, edge directed interpolation techniques were created. This served as the foundation for numerous algorithms that either used gradients or edge classifiers. To determine the interpolation direction, some algorithms used the absolute sums of first- and second-order directional derivatives at a pixel. A different algorithm worked with two sets of colour interpolated photos. The main reasons for reconstruction mistakes are incorrect edge direction estimate, the interpolation filter's low-pass characteristic, and a localised weak correlation in the mid-frequencies across the three colour bands.

  • av C Srinivas
    526,-

    Software reuse may be defined as the process of developing new software systems by making use of existing software components. Software reusability eliminates the need for developing a software system from the scratch. It also reduces the productivity cost. For example, the software component chosen for reuse may be a software requirement document or software test document or software code modules or programs. Retrieval of appropriate and right software component from the software component repository is an important task. This task has gained importance from the academia, researchers and also from industry perspective in order to reduce the costs. In principle, the retrieval of any software component from the software repository requires a search algorithm. This search algorithm is expected to retrieve the software component with the help of features specified by the user in his query. But, searching requires various parameters to be specified well ahead as part of user query. Therefore, searching task has its own limitations. An alternative approach could be the use of data mining and/or machine learning principles in retrieving appropriate software component with utmost similarity. Clustering of software components means it can group all software components with similar features into one group. From perspective of software engineering, all the components within the same cluster must have high cohesion and low coupling. Clustering reduces the time complexity for searching as all similar components are placed into one group. Clustering is not any one specific algorithm that we can stick firm to, but it must be viewed as the general task to be solved. For example, document clustering is one of the main themes in text mining. It refers to the process of grouping documents with similar contents or topics into clusters. This improves both availability and reliability of text mining applications such as information retrieval, classifying text, summarizing document sets. In similar lines, classification task can also facilitate identification of right and fitting component for reuse from among the existing components available in the repository.

  • av Niyati Kumari Behera
    466,-

    In last few years, the volume of experimental data and publications produced in biomedical domain have scaled up rapidly. This enormous amount of knowledge has been stored in text databases such as MEDLINE, PubMed Central, BioMed Central etc. For example, MEDLINE, one of the largest bibliographic text database of biomedical information science, has more than 27 million research articles ever since its establishment in 1946. While on the one hand biomedical literature provide complete description of novel research, on the other hand its unstructured format makes its management and knowledge discovery process tough for the end user. At this juncture, text mining emerged as a feasible solution for knowledge discovery by using artificial intelligence technology, natural language processing, information mining and machine learning to handle large volume of free text. Specifically, in biomedical field, the term "Biomedica1 Text mining" has gained momentum and actua11y it is an integral part of bioinformatics. In biomedical domain, semantic text mining can be more effective than traditional text mining due to complex semantic relation between domain entities and disparity among domain terminologies. Semantic text mining emphasizes on applying semantic knowledge stored in domain ontology to conventional text mining methods. Ontology has a hierarchically organized set of concepts with all possible relationships mentioned among them. This structure helps to precisely connect the new findings in biomedical literature to the existing knowledge base. Recently Medicinal Plant Domain (MPD) in the biomedical domain has emerged as a research sensation for many researchers owing to the psychological drift of common people from allopathy to naturopathy. The tribes and provincial individuals in India have immense information of therapeutic plants and their utilize in curing different health issues. Parts of the plants such as fruits, bark, leaves, roots and blooms are used for various medicinal preparations. Apart from having a wealthy source of supplements and bioactive properties, treatment using medicative plants hold a solid ground because they are treated to be secure and have hardly any adverse effects. Recent time has also seen a significant use of medicinal plants in allopathy as raw ingredient for some crucial drugs.

  • av Ginson George
    510,-

    The word obesity is derived from the Latin word Obesitas (Ob - over; Esus - Eating) means fat, stout, or plump. Obesity is associated with more than 200 disorders, that affects the entire human body. Currently, numerous reports are available wherein obesity and its associated conditions worsen the outcomes of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). Though obesity is a preventable condition, in 20I5, more than four million premature deaths were associated with overweightness and obesity. Over the last century, obesity has emerged as a leading global pandemic through sedentary lifestyle associated with recent physiological, psychological, environmental, socio- economic and genetic factors [5]. Other than these factors, physical inactivity also plays a prominent role in development of obesity. It is reported that 3.2 million mortalities have happened due to physical inactivity across the globe. In 2016, around 1.9 billion people were identified as overweight, wherein 650 million people fell under the category of obese. The prevalence of obesity has tripled during 1975 to 2016. More people are reported to be obese than underweight and malnourished across globe, excluding sub- Saharan Africa and Asia continents. Children's obesity is also increasing drastically, where the affected children mainly belong to the developing countries, posing an additional health burden for the futuristic world. Approximately 10-fold increment in childhood and adolescence obesity was reported during the last four decades. The diagnosis of obesity is currently based only on BMT, without an indication of the impact of excess adiposity on health. Sometimes, the BMT approach also lacks sensitivity towards individuals. To overcome these problems, numerous methods have been suggested. Waist-Hip Ratio (WHR) is another parameter used to determine obesity and is considered more accurate in comparison to BMT. The WHO STEPwise approach to Surveillance (STEPS) provides a simple standardized protocol for measuring waist and hip circumference,

  • av E Kowsalya
    540,-

    Water is the soul of all living things it is the most and top of any other needs, Apart from this requirement in this world industrialization going on rapidly such as Pharma, food, textiles, Chemicals, Motor, Vehicle etc when these industries are leaving their effluent untreated directly in to water bodies it is the main root cause of major water pollution Common contaminant of water has been classified into physical, chemical and biological sources. Physical sources are turbidity, color, odour and other floating matter. Chemical sources comprises of Biochemical oxygen demand (BOD), Chemical oxygen demand (COD), chlorides, alkalinity, pH, hardness etc. biological source of contaminants are the coliform bacteria and pathogens causing gastrointestinal disorders in all of these industries water is playing important role no Industries can run without source of water so water consumption from different sources are day by day increasing by the side water exploitation also increasing by so many activities. The main reason that can be mentioned here is water management is not right enough to accept. When the waste water is managed appropriately with the applications of recent technology it is possible to reduce waste water creation also to reuse the waste water produced. Water is the basic thing that must be available for the existence and evolution of all living organism but nowadays the quality as well as the quantity of drinking water is deteriorates to major level of polluting sources due to mismanagement of government in saving water during the rainy season and treating waste water by the industrial activities as well as domestic people activities.

  •  
    510,-

    Tuberculosis, commonly known as TB, is a communicable bacterial disease caused by the members of the Mycobacterium tuberculosis complex (MTBC). MTBC is a group of genetically related Mycobacterial species, including Mycobacterium tuberculosis (Mtb), Mycobacterium africanum, Mycobacterium caprae, Mycobacterium pinnipedii, Mycobacterium microti, Mycobacterium bovis and Mycobacterium canettii. These are slow-growing gram-positive bacteria that can infect humans as well as animals via aerosols transmission [1], [2]. Among all, Mtb is responsible for more than 90% of TB cases in humans, where it mainly infects the lungs but can spread to different body parts, including the nervous system. The other microbial species are rarely known to infect humans and are primarily associated with animals. Depending upon the site of infection, TB can be categorized into Pulmonary, Extrapulmonary, Miliary and Central Nervous System TB. Pulmonary TB is mainly the most common type, where Mtb is colonized in the lungs. The infected patients usually have a cough with mucus resulting in breathing difficulties, fever, weight loss and coughing up blood in severe cases. TB related to the central nervous system is referred to as tuberculous meningitis, where the Mtb infection reaches surrounding tissues of the brain and spine from other organs. The patients do not show any symptoms in the early stages of tuberculous meningitis but later may develop low fever, headache, tiredness, loss of appetite and stiff neck. Although this disease is rare, as 1-2% of the total TB cases can progress to tuberculous meningitis, the mortality rate is very high, with 15-30% deaths, despite care and treatment.

  • av Mirshad V P
    486,-

    Cardiovascular diseases (CVD) are conditions associated with the heart and circulatory system, which is considered as one of the leading causes of morbidities and mortalities across the world. Ischemic Heart diseases (IHD) are regarded as a most prevalent form of the CVD, Cerebro-vascular diseases, peripheral artery diseases, and Aortic atherosclerosis are the other types of CVD. Ischemic heart diseases are manifested by myocardial infarction (MI), angina pectoris, heart failure and coronary death. The overall risk for CVD reaches 50% for an individual at the age of 30 years without a known risk for CVD, Coronary heart disease (CHD) accounts for approximately one-third to one-half of the total cases of CVD. In spite of increases in long life and decreases in age-specific death rates from CVD, CHD, and other CVDs are highly prevalent. There are several risk factors which lead to CVD, some of them such as hypertension, hyperlipidemia, obesity, tobacco use, lack of physical activity and diabetes are modifiable. However, some risk factors such as age, genetic factors, and family history cannot be modified. Many people in the general population have one or more risk factors for coronary heart disease (CHD), and over 90 percent of CHD events occur in individuals with at least one risk factor. The five leading modifiable risk factors (hypercholesterolemia, diabetes, hypertension, obesity, and smoking) are identified to be accountable for more than half of CVD mortality. Alternatively, the absence of major risk factors calculates a much lower risk of CVD. Cardiovascular diseases and associated chronic ailments were once regarded to be illnesses of developed nations. However, in last decades progressively more strong epidemiological evidence has pointed the propagation of CVD risk factors across the world, including abdominal obesity, hypertension, and diabetes. The deterioration of cardiovascular health around the globe and most notably in developing nations reflects major global changes in attitude and lifestyle.

  • av Rajendra S Laddha
    486,-

    Today's vehicle uses the number of sensors and actuators to govern its functioning. The key role of sensors is to assure engine efficiency, comfortable driving experience, passenger and vehicle safety, and reduce fuel consumptions and harmful emissions. Sensors are an integral part of a vehicle, designed to detect, transmit, record, analyze and display vehicle performance information of the external and internal environment. Key factors for increased use of sensors in automobile are demand for performance, vehicle personalization and legislation. There are three categories of the sensors depending on the location in automobile viz. powertrain, body, and chassis. The important role of sensors in an automobile is to perform efficient engine management, Brake/traction control, Collision avoidance, Comfort/convenience, HVAC, Navigation, Safety, Smart cruise control, Suspension, Testing, and Vehicle security. The number of sensors developed with various technologies used in the automobile. Development of new applications using nano and micro technology is helping to grow the automotive sensor market. The invention of new sensors and sensing materials, existing sensors performance improvement due to continuous research, and technological advancements in the sensor industry opened up new avenues for sensor applications. Due to unique characteristics, fiber optics is an ideal choice for communication, sensing and lighting requirements. Communication and sensing are of utmost importance due to continual increase in onboard safety devices. Since its early beginnings in the 1970s, fiber-optic sensor (FOS) technology has experienced tremendous growth. Fiber-optic sensors (FOSs) are used to measure quantities like displacements, rotations, pressure, vibrations, temperature, or concentration of chemical species. FOSs offer a set of advantages over traditional electronic sensors such as increased sensitivity and design diversity. These sensors perform real-time measurement with negligible hysteresis because light propagation is highly sensitive to perturbations. Fiber-optic (FO) sensor technology offers the possibility of non-contact measurement. The quality improvement due to continuous research and reduction in component prices have made FO sensors possible to compete and replace conventional sensors.

  • av Aleena Mary Cherian
    500,-

    Coronary artery disease is a largely prevalent category of heart disease, which is responsible for maximum number of mortalities worldwide. Coronary heart diseases mainly atherosclerosis occur when the coronary arteries become hardened and constricted due to the build-up of cholesterol and fatty residues forming a plaque on the vessel wall hampering normal arterial blood flow. Percutaneous coronary angioplasty is usually performed to eliminate stenosis that obstruct blood flow in arteries. During angioplasty, endothelial lining is denuded and the underlying vascular smooth muscle layer gets exposed thereafter. The outcome of this is a highly thrombogenic surface that could lead to formation of clots and re-occlusion of the artery. Metallic coronary stents are implanted within an atherosclerotic artery to overcome the complications following percutaneous coronary intervention and to restore blood flow. The usage of bare metal coronary stents in angioplasty prevents elastic recoil but is complicated during angioplasty by the problem of restenosis. Restenosis occurs as a response to the endothelial injury, characterized by the recruitment of vascular SMCs to the injured area. These cells proliferate in the intimal space and generate an extracellular matrix that develops over a period of a few months, resulting in in-stent restenosis.

  • av Pradeep Singh
    470,-

    In the dawn of human cultural progress, dramatical advancement emerged with the Materia Medica published by Dioscorides and Dictionary of Economic Plants of India by Watt, which describes the properties of the various drugs of the plant origin. The kidney is a vital organ, which serves the purpose of purification and detoxification of the blood by filtration. Hence, this organ is always exposed to toxins, heavy metals, chemotherapeutic agents, and other metabolites which could progress into events of different types of renal disease events. Urolithiasis is a form of kidney stone also known as kidney disease (KSD). It is a progressive disease worldwide with incidence rates and is thought to be related to the enhanced risk of chronic kidney disease (CKD) and end-stage renal disease (ESRD). The cost of healthcare associated with KSD has increased day by day. Urolithiasis is a complex process of the formation of stones in the kidney, ureter, and urethra. Such processes produce inter-renal multi-crystalline aggregates / fixed structures located in different areas of the kidney system. The continued growth of the stone, at a dimension of 4-10 mm in size, which prevents the passage of the ureter or its presence in the kidneys may cause several symptoms such as blood micturition, painful urination, severe pain in the lower extremities.

  • av Atinderpal Kaur
    496,-

    Urinary tract infection (UTT) is the infection of urinary tract organs which involves kidneys, bladder and ureters. Tt occurs due to the entry and multiplication of bacteria inside the urinary tract. UTT's initiate with the advent of micro-organisms usually from urethra, causing infection in the bladder and if left untreated it may lead to chronic kidney infection. On the basis of location of infection, UTT is divided into two types: lower UTT and upper UTT. Lower UTT involves the infection of urinary bladder and urethra known as cystitis and urethritis, respectively. Upper UTT involves the infection of ureters and kidneys which is also known as pyelonephritis. Tn the world, UTT comes at the second number among the commonly occurred infections (for any organ). Every year more than I50 million patients of UTT are identified in the whole world and many of them die as a result of infection developed by bacteria which are resistant towards the antibiotics. Usually both types of bacteria, Gram positive as well as Gram negative are responsible for causing UTT, but around 95% of infection is occurred due to the attack of Gram negative bacteria. Among these pathogens, infection is majorly caused by Escherichia coli (85% cases) and Staphylococcus saprophyticus (10% cases), while Klebsiella pneumoniae and Pseudomonas spp. also cause infections. The infection is initiated due to adherence of adhesins, which are special proteins produced by E. coli bacteria. These adhesion proteins adhere to and attack the epithelial cells present on the inner lining of the urinary bladder

  • av Jahirul Hussain
    526,-

    Islamic ethics (akhlaq), defined as "good character". The foundational source in the gradual codification of Islamic ethics is the Muslim understanding and interpretations of the Quran and practices of Muhammad. Its meaning has always been in context of active submission to God. The motive force in Islamic ethics is the notion that every human being is called to "command the good and forbid the evil" in all spheres of life. The Quran defines and sets the standards of social and moral values for Muslims. S.A. Nigosian, professor of religious studies at the University of Toronto, states that a lengthy passage in the Quran "represents the fullest statement of the code of behaviour every Muslim must follow." The roots of Islam are considered as authoritative sources of Fiqh, on which legal practice is based. First of all these are the Quran and Sunnah. Sunnah is understood as the traditions (Hadith), which contain the expressions, descriptions of solutions, and deeds of Muhammad and his nearest associates, regarding various problems of religion, law, morals, etc. Sunnah as well as Quran, are considered to have a divine character and, theoretically, indisputable authority.

  • av Divya B.
    486,-

    Breast cancer is the most commonly diagnosed female cancer and is the major cause of morbidity and mortality among women worldwide. Cancer statistics in developed countries such as the United States of America report that about 12% of women in their general population will develop breast cancer sometime during their lives and it represents nearly 23% of all cancers in the American women. Tumors with the absence of distant metastasis and more than 4 cm in lateral dimension or tumors of any size with direct extension to the chest wall or skin are characterized as LABC. The 5-year survival rate of LABC patients is less than 30% and the median survival is about 2-2.5 years [14]. LABC patients have increased risk of loco regional recurrence, distant metastasis, reduced quality of life and overall survival than the patients diagnosed with early stage disease and require systemic therapy for improved outcome. The standard treatment care for LABC patients is as follows: neo-adjuvant chemotherapy (NACT) followed by surgery and postoperative whole breast radiotherapy. Neo-adjuvant therapy are the treatments administrated before the surgical removal of breast tumor. It shrinks the inoperable large tumors, so that it can be removed with less extensive surgery. NACT avoids mastectomy (removal of all breast tissues from the breast) in 25% of LABC patients and also improves the overall survival after breast conservative surgery. Combining NACT with the pre-operative radiation therapy (RT) results in even higher rate of pathological complete response (pCR) and breast conservation.

  • av Kusuma Midathana
    510,-

    The process industry has an uphill task of innovating new processes and technologies in order to meet the Sustainable Development Goals of United Nation's Envision 2030. Adopting green processes and technologies would obviously help in accomplishing these goals. Thus, the focus is mainly on conservation of energy and the environment. The propionates, that are formed from small chain aliphatic alcohols are suitable as additives to high-speed diesel and motor spirit. This in turn reduces the consumption of fossil fuels. Further, polyesters are the only biodegradable polymers, because of which the polyesters are useful in many domestic, industrial and commercial applications. Therefore, the use of esters as insecticides and polyesters in the production of plastics is highly encouraged because of their biodegradable nature. The esters are also found to have wide applications in organic synthesis as intermediates and as well as finished products. As intermediates, the esters are important constituents in the manufacture of pharmaceuticals and fine organic chemicals. Many end products such as aspirin are also used as medicines. The esters as end products are useful as essential oils, fuel additives, medicines, and feed materials for a large number of industrial products.

  • av Amol Shashikant Sankpal
    440,-

    Retention time is an important phenomenon in dynamic random access memory for data storage operation. The storage capacitor is solely responsible for charge storing mechanism. The overall action is control by word line and bit line. It is also responsible for sensing, monitoring and data storing operation. Normally the availability of inexpensive leakage reduction technique is the backbone of any dynamic random access memory wherein the valuable sense information is deposited in storage capacitance in electric charge form. Since there is no option available for replenishing the electric charge on storage capacitor to prevent loss of information or data. One of the most acclaimed and accepted schemes toward effecting high retention time is by incorporating the leakage reduction technique which has becomes a part of dynamic random access memory. Semiconductor memory finds its application in almost all the electronics fields comprises data sensing, monitoring and data storing operation. In computer, tablet, cell phones, real time data acquisition system, healthcare, military and many more. In most of these applications there are requirements of data sense, preserve and processing in real time operation. In other words, this selection of memories based on the types of data stored in semiconductor memory i.e. temporary or permanent in many demanding applications. But leakage current play vital role after data storage operation in semiconductor memories. Due to leakage current there may be chances of loss of information and it affects the system performance. Hence a leakage reduction technique proves to be an excellent alternative with memory circuit for minimized the leakage current.

  • av Anbarasu J
    470,-

    In this modern world, risk plays a major role in every human being and risk aversion leads to a better life. In the same way, every field has its difficulties as well as ways to overcome them. Moreover, vagueness, uncertainty, and subjectivity are the main causes that makes the risk mitigation more difficult. The cause of these risks, leads the country to suffer in an environmental, economic and social manner. These risks many a times leads the whole world into crisis in many ways. Therefore, Risk assessment is the process of discovering the dangers present in the working site. It analyzes and evaluates the risk connected with the hazard in three steps: Identification, Risk analysis, and risk evaluation. In many fields, risks are very common that lead people to danger. The Construction industry has been categorized as on the most hazardous industry globally due to its accidents and lack of safety measures & precautions. Every developing country has more urban space, increased infrastructure creates more job opportunities for the workers. Infrastructure development induces faster economic growth and mitigation of poverty. Excavating the site, construction of multi-storeyed buildings and steel erection are the most common high-risk activities. Many fatalities have been recorded during the past decades and there are no safety precautions found in the developing country. Automobile usage is growing rapidly namely autonomous surface marine, aerial drones, and automobiles. Energy consumption is the most important factor in the vehicular system that grows/affects the economy. The consumption of energy affects the environment and leads to energy crisis. The car emits carbon-based compounds and volatile gas after consuming energy. Thus, the electric vehicle came into existence and it is growing rapidly. But, the supply chain creates the risks due to huge links and systems.

  • av Mohammad Arshad
    540,-

    In the present era, emerging technologies need current-carrying electrical components that are universally good in functionality and durability with low power dissipation. The growing demand for non-volatile, faster, multifunctional memory and logic devices with small sizes inspired the scientific community worldwide. Recently, many have been inspired by spintronics, particularly the usage of micro- electromechanical systems that analyse the control of the magnetic (spin) state via electric fields and/or vice versa. Such a phenomenon utilizes the intrinsic spin of electrons instead of their electronic charge for data storage. In light of this, the next- generation electronics devices, including solid-state transformers, very sensitive dc and ac magnetic field sensors, electrically tunable microwave filters, and electromagnetic-optic actuators, need to be smaller in size with the coexistence of various order parameters, i.e., magnetization, polarization, and strain. A special class of materials that unite these ferroic orders is termed as multiferroics. Multiferroic materials are those that coexist and are connected with more than one ferroic order. The subset with ferroelectric and magnetic order is the most interesting magnetoelectrics. A single-phase multiferroic material is one that possesses two or all three of the so-called "ferroic" properties, i.e., ferromagnetism, ferroelectricity, and ferroelasticity. The term "multiferroic" was first used by Schmid. However, the coexistence of magnetism and ferroelectricity is primarily described as multiferroics in current study and literature. On the other hand, ME coupling is possible regardless of the magnetic and electric order characteristics; for instance, ME can happen in paramagnetic ferroelectrics. ME coupling may also develop between the two order factors directly or indirectly through strain. The magnetic and electric order parameters emerge in different but closely related phases in the strain-mediated indirect ME coupling. Due to its potential applications in industry, magneto-electric multiferroics have attracted increasing attention from the scientific community.

  • av Rafaut Noor
    510,-

    Education includes a wide spectrum of knowledge and info which is difficult to be defined. Whatever broadens our horizon, deepens our insight, enhances our understanding, refines our emotions, piques our curiosity, and stimulates our thought and feelings, always educates us in some way. Education draws out the innate potentialities of students as well as unfolding their natural abilities and interests before the society. The process of education starts from the birth of a person. Education includes all forms of influences, direct or indirect, formal or informal, deliberate or incidental, planned or unplanned. The academic achievement of students is correlated with the potentialities and capabilities developed as outcomes of education. Thus, educationists try to fully concentrate on the development of potentials of the students to recognize and channelize them for the benefit of the individual and society. Adolescence is the age of many twists and turns as there are multiple transitions involving education, vocation, social interactions, upcoming responsibilities and future life. A wide and deep understanding of adolescence is based on the information we receive from different perspectives including philosophy, psychology, biology, politics, sociology, sports, and multimedia industries. As this technetronic world is progressing by leaps and bounds, media has taken over the globe. Along with the various psychological factors, celebrity culture emerged as one of the most influential factors which seems to affect the self-identity and academic achievement of students especially at senior secondary level. As youngsters in this group tend to get influenced and fascinated very soon by the glamorous world, they develop their self-identity accordingly as they want to be the best among their peers. Humans have a natural tendency to recognize people, whom they admire and acquaint these people for inspiration, fantasies, romance or for gossip. These admired people are known as "Celebrities" who usually summon utmost human desires, i.e., love, romance, passion, courage, imitation, inspiration, life goals etc. Celebrities seem charming and fascinating to normal people because they look as if they are involved in a universe which is parallel to others. That is just like ours yet is light-years beyond reach and on comparison normal lives seem boring and dull. Academic achievement is the basis on which the entire educational outcome of students is determined. It is one of the major aims of education. Apart from, considering it as a criterion of moving to the next class, academic achievement is also an indicator of success and it in turn establishes the future pattern of one's living. All educators try to understand the strengths and weaknesses of students whom they teach. They even explore the factors affecting the educational outcomes of their students. These factors play an important role in understanding the relationship between students' self-identity and academic achievement.

  • av AV Satyanarayana Murty
    510,-

    In the vast blue ocean, ships of different navies operate far from each other and are generally not in visual range. However, a ship can be uniquely identified based on a number of emissions that are characteristic to each and are called signatures. These include acoustic signature from machinery and flow, heat or infrared signature from exhaust, radar cross section from hull surfaces, magnetic signature from hull material, electric signature from corrosion protection systems etc. These signatures are used by surveillance and tracking sensors for attacking ships in general and warships, in particular. Survivability at sea requires management of all platform signatures to produce a net effect of reduced vulnerability. Anti-ship missiles pose the greatest threat to ships at sea. Prior to the Second World War, studies were carried out in parallel on the use of radar and infrared seekers in missiles for detection, identification and homing. For the materials available in the 1940s, radar seekers gave better results and hence, have become the standard fit. Over the years, advances in material sciences have improved the capabilities of infrared seekers and today, missiles have several guidance/seeker options that include radar, electro- optical camera and infrared imaging. Infrared homing is preferred for terminal guidance because of its inherent immunity to jamming techniques. A stealthy naval platform remains undetected and therefore can be deployed closer to the target to fulfill its mission with lesser risk of damage and associated causalities. Signatures used for ship detection include both underwater and above water. Signatures used by underwater weapons like torpedoes and mines are acoustics, magnetics, wake homing and extremely low frequency emissions (ELFE). Anti-ship missiles use above water signatures that include laser cross section (LCS), radar cross section (RCS), air borne noise and infrared (IR).

  • av Shashikumar G S
    440,-

    Critical issues in human behaviour are emotions. In daily interactions with others and in the making of decisions, emotion is significant. According to physiological concepts, emotion is a short-lived event. There is a close relation between emotion recognition and human wellness. The environment presented the constant demands, so that phenomenon of emotion represents efficient modes of adaptation. Human interaction has been categorised into two interaction channels: one transmits very clear messages, which is about anything or nothing and other one transmits embedded messages about the speakers themselves. In order to understand the channel which does not transmit clear messages, huge efforts were made towards the linguistic analysis. But the second is not as well understood. Understanding the other person's emotion is one of the key challenging tasks associated with the embedded message. Emotion can express through actions, such as words, sounds, facial expression, and body language, However, emotion expressed in such actions are sometimes manipulated by people and real feelings cannot be conveyed clearly. The emotion is referred by researchers as a mental state that is influenced by strong or deep brain impulses. This neural impulse arises subjectively but not through conscious effort. To move an organism into action, emotion induces either positive or negative psychological response. A cutting-edge area of computing called affective computing has been working to enhance human-computer interaction (HCI). Due to a lack of emotional intelligence, today's HCI systems are defective and unable to distinguish different emotional states in people. By recognizing emotional cues that emerge during HCI and evoking emotional reactions, affective computing seeks to close this gap. If computers can identify emotions, this will improve the design and development of systems that can do the same. The healthcare industry would benefit greatly from wearable technology that can distinguish different human emotions in real time and respond accordingly.

  • av Akshay K
    456,-

    Devices for generation, distribution and regulation of electric power are important parts of appliances for healthcare, comfort, defence and transportation. Two classes of such devices discussed in this thesis are diodes and MOSFETs. These are used in rectification, amplification and switching applications, and are realized in semiconductor materials. The power level at which these devices operate is decided by the application. Depending on the voltage and current rating, this can vary from 1 Giga Watt at the power station to few Watts for mobile chargers. To cater to this wide range of power levels, power converter circuits are often employed. Depending on the application, these converters could be AC-DC, DC-AC, DC-DC or AC-AC. Although the functionality of these circuits is different, all of them invariably requires power switches. The performance of these switches decides the conversion efficiency of the converter. So far, power devices fabricated in Si (silicon) have been the workhorse. It is of interest to discuss the performance of a Si switch in terms of the five characteristics listed above. Silicon switches are mostly normally off and thereby avoid complex driving circuits. Apart from this, Si switches underperform in terms of the other four characteristics. Superjunction concept was originally introduced in the context of silicon devices. Later, it has been extended to other wide bandgap materials like SiC and GaN to combine the advantage of linear VBR-RONSP relation and the large value of EC. It is to be noted that although different materials offer different technological challenges to realize a superjunction, the theory of superjunction operation and the analytical design equations are valid across materials upon making changes to the material specific parameters (e.g. impact ionization coefficients, mobility etc.). Hence, a model developed to design the optimum superjunction parameters has potentially a large impact. It can help technologists working across materials to steer their efforts more effectively towards realizing the best device for a target application with minimum cost and effort.

  • av Apurva S. Kittur
    500,-

    Internet of Things (IoT) is coined in 1999 by Kevin Ashton. IoT can be de¿ned in many ways. 'Internet' refers to the interconnectivity of devices to create a network, and 'Things' refers to the embedded objects or devices that can connect to the Internet. One way of de¿ning is, 'it is a network of sensors and smart devices which sense the data which is further processed and analysed in an ubiquitous network.' IoT has seen rapid development in recent years because of its 'smartness.' The various applications of IoT include Smart City, Smart Home, Smart Health, Transport and Logistic applications, Weather monitoring and Forecast etc. These applications have millions of devices generating large volumes of data. The rapid development of IoT has increased the curiosity of the attackers. The devices (nodes) in the IoT network have weak security protocols because of their limited computation ability and energy. Hence the nodes of the network are vulnerable to various kinds of attacks. The IoT network has sensors, actuators, controllers, gateway heads, sink, etc. For our reference, we have broadly classi¿ed these devices into sensor nodes and gateway nodes. Sensor nodes includes low computation end devices such as sensors, actuators etc., and gateway node includes gateway, sink, cluster head etc. The gateway nodes have better computation power as compared to sensor nodes. But the overall network is not competent to handle complex cryptographic operations. Signature is a unique way to identify a signer. The authenticity of a person/ organization/ entity is veri¿ed through its signature. A signature can be a handwritten one, or it can be a digital one. Digital signatures are used to verify the content of the received message and the signer's identity in digital communication. The exponential growth of Internet technology has led to the growth in usage of digital signatures. Every signer generates a unique signature using his/her private key. The veri¿er possesses the public key of the signer and veri¿es the signature using the same. The signature generated by the signer can be veri¿ed by everyone who has access to the public key. The concept of batch veri¿cation is introduced to reduce the veri¿cation time and complexity. Batch veri¿cation schemes verify multiple signatures together with signatures either signed by single or multiple signers.

  • av M. Chiranjeevi
    470,-

    The gap between the world's future food demand and the growth rate of agricultural production is rising. Food production must increase by 1.75% annually to meet the estimated population of 10 billion by 2050 . But agricultural productivity is falling behind the future demand because of various biotic and abiotic factors. One of the major reasons behind this is volatile weather patterns in the com- ing decades due to climate change, especially in tropical environments. Exploring new arable crop lands, excessive application of fertilizers, chemical pesticides, fungicides, and herbicides may not be a sustainable way to enhance food production. Eco-friendly technological innovations are required to meet the future food demand. An insect is considered a pest if it threatens a resource valued by humans. Paddy crops are affected by hundreds of insect pests out of which twenty are more serious yield affecting pests. In the Indian scenario Yellow stem borer (YSB), Brown plant hopper (BPH), Gall midge, Leaf Folder (LF), Green Leaf Hopper (GLH), and White Backed Plant Hopper (WBPH) are causing around 86% of yield damage to paddy. Integrated pest management (IPM) is a process of resolving agricultural, urban, and wildland insect pest problems with the least possible risk to the environment. IPM focuses on deterrence of pests or reducing their damage through a combination of techniques such as biological and structural strategies.

  • av Amit Kumar Trivedi
    486,-

    The developments in electronic circuit manufacturing technology made it feasible to have very compact yet powerful mobile devices. Society is more connected using these mobile electronic devices with fast and advanced communication technologies. In this electronically advanced society, the card or token-based person identi¿cation or authentication is no more trusted. Information of card can be stolen and a duplicate card can be made very easily, which is exactly same as the original one. PIN or password can be easily guessed knowing some information about the person that he/she shares on social network. Even the secret password or card can be shared, so they cannot provide security against repudiation. The use of idiosyncratic anatomical or behavioural characteristics, called biometric identi¿ers or attributes or properties or traits for establishing the individuality of a person for either identi¿cation or veri¿cation is called Biometric recognition or simply Biometrics. Biometric traits cannot be shared or stolen or duplicated. They are intrinsic property of an individual's physical body or behaviour and inseparable from the individual. Establishing the identity of a person both positive and negative from his/her physical body or behaviour is a very powerful tool for identity management and have immense potential. All these make biometrics a very appealing pattern recognition research problem, but it should be used carefully for the bene¿t of the society and reduce the identity fraud. A person's identity needs to be veri¿ed or established at a number of places. Like, is he or she authorised to enter some privilege facility, or for accessing privilege information or to check if the person is wanted for some crime. Sometimes, it is required to check whether a person has already availed a social service or not, or whether is he or she is eligible to avail the services. Unreliable answers of these questions may lead to some ¿nancial or non-¿nancial loss. Biometric identi¿ers provide a reliable answer to such questions as it cannot be easily forged, shared or lost as compared to traditional to- ken or knowledge based identi¿ers. Biometric recognition is more convenient, secure, and e¿cient; hence has better accountability.

  • av V S Saranya
    470,-

    IoT security technologies ensure the protection of devices and networks associated with Internet of Things (IoT) ecosystem. IoT affords internet connectivity amid various inter related devices. It presents a unique identification and automates data transfer within the network. There are possibilities for severe vulnerabilities for the devices which are allowed with internet connection. Back to back COVID -19 pandemic periods are challenging for various industries related to healthcare, retail, automotive and manufacturing. However, IoT technology played a very important role in meeting the needs of business and customers. All the industries are evolved as smart because of the arrival of IoT. This integrated Artificial Intelligence technology and big data applied to tackle mass flooding of data in this 21st century. Various IoT devices and data centers are connected together to form IoT as an intelligent network. IoT devices are considered as connected devices which provide data analysis by making use of sensors. Number of sensors is massive and they rely on power consumption and connectivity. There are possibilities for security and privacy breaches in IoT ecosystem as more amount of confidential and sensitive information is shared. Most of the IoT devices are independent and works with less human intervention. Few IoT devices are built with exclusive authentication-based identification. Primary feature of IoT device is minimal energy consumption which affords data collection and sharing in remote areas. IoT utilization is increased in AI, cloud computing, big data and smart systems like smart cities, smart offices and smart homes. A typical IoT system is defined with three primary steps which are data collection, data transfer and data analysis. First step is referred as physical layer where sensors and microcontrollers are used for collecting and diffusing data. IoT network components like hub or gateway are utilized for data transfer in second step. In third step, data analysis is implemented by consisting user interface and cloud like back end system. Violation occurrences in any of these three steps will reveal sensitive information of connected IoT devices. Several vulnerable exploitations are implied towards IoT devices because of its poor encryption and authentication system.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.