You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
Developed from the author's popular graduate-level course, Computational Number Theory presents a complete treatment of number-theoretic algorithms. Avoiding advanced algebra, this self-contained text is designed for advanced undergraduate and beginning graduate students in engineering. It is also suitable for researchers new to the field and pract
Public-key Cryptography provides a comprehensive coverage of the mathematical tools required for understanding the techniques of public-key cryptography and cryptanalysis. Key topics covered in the book include common cryptographic primitives and symmetric techniques, quantum cryptography, complexity theory, and practical cryptanalytic techniques such as side-channel attacks and backdoor attacks.Organized into eight chapters and supplemented with four appendices, this book is designed to be a self-sufficient resource for all students, teachers and researchers interested in the field of cryptography.
This open access book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes, Face Morphing, or Reenactment. It combines the research fields of biometrics and media forensics including contributions from academia and industry. Appealing to a broad readership, introductory chapters provide a comprehensive overview of the topic, which address readers wishing to gain a brief overview of the state-of-the-art. Subsequent chapters, which delve deeper into various research challenges, are oriented towards advanced readers. Moreover, the book provides a good starting point for young researchers as well as a reference guide pointing at further literature. Hence, the primary readership is academic institutions and industry currently involved in digital face manipulation and detection. The book could easily be used as a recommended text for courses in image processing, machine learning, media forensics, biometrics, and the general security area.
Economic Reform in Asia compares and analyzes the reform and development patterns of China, India, and Japan from both historical and developmental perspectives. Sara Hsu specifically focuses on China’s reform and opening-up in 1979, India’s accelerated liberalization in 1991, and the outset of the Meiji Restoration in Japan in 1878. This detailed overview of growth patterns in Asia’s largest economies is invaluable, especially in its determination to understand which development policies work, what role institutions play in development, and what issues may arise during said development. The book first provides an overview of the countries’ development trajectories and introduces the...
Printed Edition of Lions District 322C5 Directory for the year 2018-19, was released by District Governor, Second Century Ambassador Lion C S Pattnaik. This digital edition is a replica of the Directory, to enable portability of information through Smart Mobile Phones, the Lion Members Carry
description not available right now.
This open access textbook introduces the emerging field of Development Engineering and its constituent theories, methods, and applications. It is both a teaching text for students and a resource for researchers and practitioners engaged in the design and scaling of technologies for low-resource communities. The scope is broad, ranging from the development of mobile applications for low-literacy users to hardware and software solutions for providing electricity and water in remote settings. It is also highly interdisciplinary, drawing on methods and theory from the social sciences as well as engineering and the natural sciences. The opening section reviews the history of “technology-for-dev...
This book presents the outcomes of the 2017 national workshop and international conference organized by CEENR of ISEC, Bengaluru and Assam University Silchar. Addressing the threats to biodiversity and sustainable development resulting from the impacts of human induced pressures on ecosystems and global-warming-driven climate change is a major challenge. It requires increased knowledge and an enhanced information base in order to devise local policies to improve the adaptive capacity of vulnerable socio-ecological systems in developing countries. In this context, the book presents research that has the potential to benefit the environment and empower communities. It appeals to researchers investigating diverse aspects of socio-ecological-biological systems to create strategies for resource use, conservation and management to ensure sustainability.
This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2018) held at the University of Engineering & Management, Kolkata, India, on February 23–25, 2018. It comprises high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data mining, machine learning, Internet of Things (IoT) and information security.
Cyber-Physical Systems: AI and COVID-19 highlights original research which addresses current data challenges in terms of the development of mathematical models, cyber-physical systems-based tools and techniques, and the design and development of algorithmic solutions, etc. It reviews the technical concepts of gathering, processing and analyzing data from cyber-physical systems (CPS) and reviews tools and techniques that can be used. This book will act as a resource to guide COVID researchers as they move forward with clinical and epidemiological studies on this outbreak, including the technical concepts of gathering, processing and analyzing data from cyber-physical systems (CPS). The major ...