This book presents machine learning as a set of pre-requisites, co-requisites, and post-requisites, focusing on mathematical concepts and engineering applications in advanced welding and cutting processes. It describes a number of advanced welding and cutting processes and then assesses the parametrical interdependencies of two entities, namely the data analysis and data visualization techniques, which form the core of machine learning. Subsequently, it discusses supervised learning, highlighting Python libraries such as NumPy, Pandas and Scikit Learn programming. It also includes case studies that employ machine learning for manufacturing processes in the engineering domain. The book not only provides beginners with an introduction to machine learning for applied sciences, enabling them to address global competitiveness and work on real-time technical challenges, it is also a valuable resource for scholars with domain knowledge.
Article 43 of Constitution of India has been made plinth for Research by Author. Author has collected the grass root level of data from the Coal Sector as it involves the largest manpower in Energy Sector. The research has been accomplished in the turbulent phase of exposure of Coal Gate Scam. The real uncovered data are being discovered to identify the untapped modus-operandi in Coal Sector. The progressive outlook has been identified by help of real case studies. Book is strongly recommended for students of Economics, Management and Industrial Relations from undergraduate to higher Doctorate Level.
Swarm intelligence is one of the fastest growing subfields of artificial intelligence and soft computing. This field includes multiple optimization algorithms to solve NP-hard problems for which conventional methods are not effective. It inspires researchers in engineering sciences to learn theories from nature and incorporate them. Swarm Intelligence: Foundation, Principles, and Engineering Applications provides a comprehensive review of new swarm intelligence techniques and offers practical implementation of Particle Swarm Optimization (PSO) with MATLAB code. The book discusses the statistical analysis of swarm optimization techniques so that researchers can analyse their experiment design. It also includes algorithms in social sectors, oil and gas industries, and recent research findings of new optimization algorithms in the field of engineering describing the implementation in machine learning. This book is written for students of engineering, research scientists, and academicians involved in the engineering sciences.
This book is an introduction to right-wing populist movements outside the West, looking at four key case studies, their commonalities and differences. Populism has been on the rise worldwide since the global financial crisis of 2008, with few countries left entirely untouched by the phenomenon. At the same time, the specific circumstances of different countries vary considerably; and it is important that in seeking to understand these movements, we do not assume they are all the same – albeit that they have some characteristics in common. This book takes the case studies of India, Turkey, Russia and Brazil in turn, examining how they have each taken quite distinct journeys to similar destinations. It offers both a better understanding of each country’s slide towards ‘strongman’ authoritarianism and an analysis of the common elements shared between them. This book is an essential introduction to the rise of populism outside the West for students of international political economy and comparative politics.
This book analyses the layered and complex web of terror financing in Kashmir. It examines the role of multiple actors — including formal and informal, state and non-state, profit and non-profit, and local and international — to delineate the various strands of an intricate financial system. It shows how, over time, these sophisticated networks have largely remained elusive to Indian counter-terrorism agencies and the need for a specialised and focused effort to understand it. Drawing on interviews with confidential sources within terror networks, as well as inputs and intel from security agencies on the ground, the author lays the groundwork for a robust counter-terrorism strategy in Kashmir. This book will be a must read for professionals and researchers in security studies, military and strategic studies, politics and international relations, and South Asian studies.
The field continues to change fast, and new concepts emerge with amazing speed. This book contains and earlier and stronger focus on applications, which reflects the student and professional's increased familiarity with a wide range of networked applications. The book continues its tradition of giving you the facts you need to understand today's world. But it has not lost track of its larger goal, to tell you not only the facts but the why behind the facts.
“Crime doesn’t exist in black and white, but is born out of a grey area that needs to be analysed through a gendered, intersectional perspective.” However, these days a common belief is called – there’s a shift in penal philosophy from deterrence to reformation with the enactment of ‘The Probation of Offenders Act, 1958,’ and the various amendments in CrPC. Still, large numbers of young, first-time and petty offenders continue to form the main bulk of overcrowding figures in the prison population of the country. Just by turning the pages of the newspaper with a distracted mind, suddenly the eyes tickle on a news... When a pregnant 26-year-old woman walked into Byculla Women’s Jail in 2013, accused of being a Naxalite, the other inmates cautioned her to be extremely careful and not draw the ire of the prison officials. She wouldn’t be given nutritious food and had to be lucky if they took her to a hospital before her water broke. Are our prison world still the laboratories of torture?
I present to you, my life, my goals, my highs, and my lows. It is a journey of my truths in life so you learn from mistakes and grasp about life from my successes. Who am I? I am Abhinav, just another 18-year-old with dreams that exceed the horizons of the imagination. Why would you read this book? This book presents you with the absolute hard truths of my life, objective tips, and tricks that might help you with your journey. This book is just another step towards my goals, to reach the unreachable, and to make quality education more accessible. I received a 100% scholarship to attend Stanford University. I lived the IIT dream, and I am a part of multiple organizations that enable me to learn more, educate myself and others every single day. This book is meant to act as a source of motivation, driving force, and guidebook for Indian students having a dream of studying abroad or any high school student in general. This is my story: How I evolved from a clueless, 13-year-old boy who was driven and blinded by the IIT dream to take the road hardly taken. With ups, where I scraped the sky, and downs, where I plummeted into the dark unable to see anything in daylight and wanting to see sunshine in the middle of the night, pursuing and chasing my goals day and night, I present to you the story of my life. I present to you Mapping Horizons: Solving the College Conundrum.
Enacted for historical reasons on 26 January 1950, the Constitution of India provided that the Supreme Court of India, situated in New Delhi, was to have one Chief Justice of India, and not more than seven judges. Today, the Court has 33 judges in addition to the Chief Justice of India. But who are these judges, and where did they come from? Its central thesis is that despite all established formal constitutional requirements, there are three informal criteria which are used for appointing judges to the Supreme Court: age, seniority, and diversity. The author examines debates surrounding the Indian judicial system since the institution of the federal court during the British Raj. This leads to a study of the political developments that resulted in the present 'collegium system' of appointing judges to the Supreme Court of India. Based on more than two dozen interviews personally conducted by the author with former judges of the Supreme Court of India, this book uniquely brings to the fore the unwritten criteria that have determined the selection of judges to the highest court of law in this country for over six decades.
“Calcutta is like a work of modern art that neither makes sense nor has utility, but exists for some esoteric aesthetic reason.” ― Amit Chaudhuri, A Strange and Sublime Address
Delve into the world of mobile application reverse engineering, learn the fundamentals of how mobile apps are created and their internals, and analyze application binaries to find security issues Key Features • Learn the skills required to reverse engineer mobile applications • Understand the internals of iOS and Android application binaries • Explore modern reverse engineering tools such as Ghidra, Radare2, Hopper, and more Book Description Mobile App Reverse Engineering is a practical guide focused on helping cybersecurity professionals scale up their mobile security skills. With the IT world's evolution in mobile operating systems, cybercriminals are increasingly focusing their efforts on mobile devices. This book enables you to keep up by discovering security issues through reverse engineering of mobile apps. This book starts with the basics of reverse engineering and teaches you how to set up an isolated virtual machine environment to perform reverse engineering. You'll then learn about modern tools such as Ghidra and Radare2 to perform reverse engineering on mobile apps as well as understand how Android and iOS apps are developed. Next, you'll explore different ways to reverse engineer some sample mobile apps developed for this book. As you advance, you'll learn how reverse engineering can help in penetration testing of Android and iOS apps with the help of case studies. The concluding chapters will show you how to automate the process of reverse engineering and analyzing binaries to find low-hanging security issues. By the end of this reverse engineering book, you'll have developed the skills you need to be able to reverse engineer Android and iOS apps and streamline the reverse engineering process with confidence. What you will learn • Understand how to set up an environment to perform reverse engineering • Discover how Android and iOS application packages are built • Reverse engineer Android applications and understand their internals • Reverse engineer iOS applications built using Objective C and Swift programming • Understand real-world case studies of reverse engineering • Automate reverse engineering to discover low-hanging vulnerabilities • Understand reverse engineering and how its defense techniques are used in mobile applications Who this book is for This book is for cybersecurity professionals, security analysts, mobile application security enthusiasts, and penetration testers interested in understanding the internals of iOS and Android apps through reverse engineering. Basic knowledge of reverse engineering as well as an understanding of mobile operating systems like iOS and Android and how mobile applications work on them are required.
Essay from the year 2017 in the subject Energy Sciences, grade: 5/7, Damodaram Sanjivayya National Law University, language: English, abstract: The scope of this paper is to analyse the efficacy of non-conventional sources of energy. The object of this paper is to suggest credible alternatives to meet the energy demands of developing India. India is a developing country and it faces the problem of ever increasing energy demands. Fossil fuels are the primary source of energy but there aren’t enough reserves of fossil fuels to meet the energy demands. Fossil fuels will ultimately run out and the mankind will be left with no option but to switch to alternative fuels. Alternative sources of energy are non-conventional sources of energy, that is other than fossil fuels. They are clean and never-ending sources. However, they initially require high investment costs and the technology to harness renewable sources of energy has barely hit puberty. Nevertheless, they have potential to overtake fossil fuels as primary sources of energy when there will be none to cater the needs of the masses.
Delve into the world of mobile application reverse engineering, learn the fundamentals of how mobile apps are created and their internals, and analyze application binaries to find security issues Key Features • Learn the skills required to reverse engineer mobile applications • Understand the internals of iOS and Android application binaries • Explore modern reverse engineering tools such as Ghidra, Radare2, Hopper, and more Book Description Mobile App Reverse Engineering is a practical guide focused on helping cybersecurity professionals scale up their mobile security skills. With the IT world's evolution in mobile operating systems, cybercriminals are increasingly focusing their efforts on mobile devices. This book enables you to keep up by discovering security issues through reverse engineering of mobile apps. This book starts with the basics of reverse engineering and teaches you how to set up an isolated virtual machine environment to perform reverse engineering. You'll then learn about modern tools such as Ghidra and Radare2 to perform reverse engineering on mobile apps as well as understand how Android and iOS apps are developed. Next, you'll explore different ways to reverse engineer some sample mobile apps developed for this book. As you advance, you'll learn how reverse engineering can help in penetration testing of Android and iOS apps with the help of case studies. The concluding chapters will show you how to automate the process of reverse engineering and analyzing binaries to find low-hanging security issues. By the end of this reverse engineering book, you'll have developed the skills you need to be able to reverse engineer Android and iOS apps and streamline the reverse engineering process with confidence. What you will learn • Understand how to set up an environment to perform reverse engineering • Discover how Android and iOS application packages are built • Reverse engineer Android applications and understand their internals • Reverse engineer iOS applications built using Objective C and Swift programming • Understand real-world case studies of reverse engineering • Automate reverse engineering to discover low-hanging vulnerabilities • Understand reverse engineering and how its defense techniques are used in mobile applications Who this book is for This book is for cybersecurity professionals, security analysts, mobile application security enthusiasts, and penetration testers interested in understanding the internals of iOS and Android apps through reverse engineering. Basic knowledge of reverse engineering as well as an understanding of mobile operating systems like iOS and Android and how mobile applications work on them are required.
Essay from the year 2018 in the subject Business economics - Company formation, Business Plans, grade: 5.10/7, Damodaram Sanjivayya National Law University, language: English, abstract: The SEBI (Prohibition of Fraudulent and Unfair Trade Practices relating to Securities Market) Regulations, 2003 were enacted with a view to secure interests of investors and to prevent any kind of unfair and fraudulent trade practices which shall affect the integrity of the securities market. In SEBI vs. Kanaiyalal Baldevbhai Patel and Ors., Court observed that the object and purpose of this Regulation is to safeguard the investing public and honest businessmen. Its aim is to prevent exploitation of the public by fraudulent schemes and worthless securities through misrepresentation, to place adequate and true information before the investor, to protect honest enterprises seeking capital by accurate disclosure, to prevent exploitation against the competition afforded by dishonest securities offered to the public and to restore the confidence of the prospective investor in his ability to select sound securities.
Essay from the year 2017 in the subject Law - Comparative Legal Systems, Comparative Law, grade: 5/7, Damodaram Sanjivayya National Law University, language: English, abstract: An arbitration agreement is barred to the jurisdiction of civil courts under section 8 of the Indian Arbitration and Conciliation Act, 1996 (hereinafter, the Act) since the parties agree to settle disputes by a mechanism other than the ordinary court proceedings i.e. arbitration and such an agreement is not hit by sec 28 of Indian Contract Act, 1872. However, a legitimate question arises whether a civil court can try those cases where the agreement is itself tainted by the elements of fraud. This issue has been dealt with comprehensively by the courts and has been settled, to a certain extent, by the Supreme Court in the case of A. Ayyasamy vs A. Paramasivam. The essay shall briefly deal with the cases which spurred the debate over arbitrability of fraud along with suggestions for further improvement.
Essay from the year 2019 in the subject Law - Criminal process, Criminology, Law Enforcement, grade: 5.2/7, Damodaram Sanjivayya National Law University, language: English, abstract: The essay analyzes of the procedure for determination of age, approach of Indian courts in age determination and the lacunae in the procedure. Age determination is of paramount importance for ascertaining whether an accused comes within purview of Juvenile Justice Act, 2015 or not. The 2015 Act gives some special privileges to juveniles accused of committing a crime. Importance of age determination has further increased after the introduction of “judicial waiver” system which allows treatment of juvenile offenders as an adult if they are accused of committing a heinous crime (between 16-18 years of age). The provisions for age determination lean heavily in favour of juvenile offenders. The Child Welfare Committee (CWC) has been given wide powers in this aspect. If an accused, by his appearance, appears to be a child below 18 years, then the committee shall record the approximate age and proceed without any further inquiry. If there are reasonable grounds for doubting the age, then the committee relies upon matriculation certificate or birth certificate. Only in the absence of birth certificate or relevant school documents, the committee decides to go an ossification test or other medical tests for determination of age.
Essay from the year 2018 in the subject Business economics - Law, grade: 5.10/7, Damodaram Sanjivayya National Law University, course: BA LLB(Hons.), language: English, abstract: Seat of arbitration assists in determining the curial law that would govern the arbitration proceedings. Prior to the Balco judgement, the law was clear that mere choice of a foreign seat will not exclude the applicability of Part I of the 1996 Act. The Balco judgement rectified this error in the interpretation and held that the choice of the seat of arbitration is akin to the exclusive jurisdiction clause. However, the judgement was applicable only prospectively. Balco judgement also created much confusion which was settled by subsequent judgements and amendments in the Act. This essay attempts to examine the role of seat in international commercial arbitration in the light of Balco and other recent judgements delivered by the apex court.
Essay from the year 2018 in the subject Business economics - Company formation, Business Plans, grade: 5.10/7, Damodaram Sanjivayya National Law University, language: English, abstract: The SEBI (Prohibition of Fraudulent and Unfair Trade Practices relating to Securities Market) Regulations, 2003 were enacted with a view to secure interests of investors and to prevent any kind of unfair and fraudulent trade practices which shall affect the integrity of the securities market. In SEBI vs. Kanaiyalal Baldevbhai Patel and Ors., Court observed that the object and purpose of this Regulation is to safeguard the investing public and honest businessmen. Its aim is to prevent exploitation of the public by fraudulent schemes and worthless securities through misrepresentation, to place adequate and true information before the investor, to protect honest enterprises seeking capital by accurate disclosure, to prevent exploitation against the competition afforded by dishonest securities offered to the public and to restore the confidence of the prospective investor in his ability to select sound securities.
Essay from the year 2017 in the subject Energy Sciences, grade: 5/7, Damodaram Sanjivayya National Law University, language: English, abstract: The scope of this paper is to analyse the efficacy of non-conventional sources of energy. The object of this paper is to suggest credible alternatives to meet the energy demands of developing India. India is a developing country and it faces the problem of ever increasing energy demands. Fossil fuels are the primary source of energy but there aren’t enough reserves of fossil fuels to meet the energy demands. Fossil fuels will ultimately run out and the mankind will be left with no option but to switch to alternative fuels. Alternative sources of energy are non-conventional sources of energy, that is other than fossil fuels. They are clean and never-ending sources. However, they initially require high investment costs and the technology to harness renewable sources of energy has barely hit puberty. Nevertheless, they have potential to overtake fossil fuels as primary sources of energy when there will be none to cater the needs of the masses.
This revised and updated edition brings the shooter's life up to date and adds to the book his experience at the London Olympics in 2012. Abhinav Bindra's journey to becoming the first Indian to win an individual Olympic gold, and the first Indian to win a world championship gold. It is a triumph born of a tragedy. Having driven himself to become a great shooter, he was poised to win gold at the Athens Olympics in 2004. But defeated by a freak occurrence, he changed as a shooter: from a boy who loved shooting, he became an athlete bent on redemption, becoming a scientist who would try anything, including mapping his own brain, to win in Beijing. His victory was a triumph of hard work, of ingenuity, of stubborness and a quest for perfection. His story is about one man's search for excellence and his refusal to demand anything less than the best of himself. It is also the story of managing great success, about learning to lose and about trying to win again.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.