This book highlights progress in terms of Virus Biology and Infection Detection, Prevention, and Control, along with Screening, Testing, and Detection Techniques, that will provide learners and researchers (from basic to advanced) with the most innovative computer-driven methodologies for the fight against COVID-19. In addition, this book also covers the Pre- and Post-Impact of the COVID-19 Pandemic Crisis that will definitely provide useful content for researchers to think broadly about the analytical areas affected by COVID-19. This ultimately shows different paths to the same destination to help understand the nature of the COVID-19 pandemic and how to avoid it in the future.
Wireless sensor networks (WSNs) have attracted high interest over the last few decades in the wireless and mobile computing research community. Applications of WSNs are numerous and growing, including indoor deployment scenarios in the home and office to outdoor deployment in an adversary’s territory in a tactical background. However, due to their distributed nature and deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their performance. This problem is more critical if the network is deployed for some mission-critical applications, such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, a traditional security mechanism with high overhead of computation and communication is not feasible in WSNs. Design and implementation of secure WSNs is, therefore, a particularly challenging task. This book covers a comprehensive discussion on state-of-the-art security technologies for WSNs. It identifies various possible attacks at different layers of the communication protocol stack in a typical WSN and presents their possible countermeasures. A brief discussion on the future direction of research in WSN security is also included.
This book highlights progress in terms of Virus Biology and Infection Detection, Prevention, and Control, along with Screening, Testing, and Detection Techniques, that will provide learners and researchers (from basic to advanced) with the most innovative computer-driven methodologies for the fight against COVID-19. In addition, this book also covers the Pre- and Post-Impact of the COVID-19 Pandemic Crisis that will definitely provide useful content for researchers to think broadly about the analytical areas affected by COVID-19. This ultimately shows different paths to the same destination to help understand the nature of the COVID-19 pandemic and how to avoid it in the future.
Wireless sensor networks (WSNs) have attracted high interest over the last few decades in the wireless and mobile computing research community. Applications of WSNs are numerous and growing, including indoor deployment scenarios in the home and office to outdoor deployment in an adversary’s territory in a tactical background. However, due to their distributed nature and deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their performance. This problem is more critical if the network is deployed for some mission-critical applications, such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, a traditional security mechanism with high overhead of computation and communication is not feasible in WSNs. Design and implementation of secure WSNs is, therefore, a particularly challenging task. This book covers a comprehensive discussion on state-of-the-art security technologies for WSNs. It identifies various possible attacks at different layers of the communication protocol stack in a typical WSN and presents their possible countermeasures. A brief discussion on the future direction of research in WSN security is also included.
Plasmonics stems from the surface charge density oscillations at metal–dielectric interface, leading to extremely strong light–matter interactions. In the past few decades, plasmonics has become one of the most favorite fields/techniques in realizing high-performance photonic devices. For this purpose, different new concepts, such as exploration of different radiation frequency regions, two-dimensional materials/heterostructures, and different types of substrates for the excitation of plasmons have been investigated for plasmonics-based sensors and detectors. This book focuses on the recent and advanced works on optical sensors and detectors utilizing plasmonic techniques for opto-electronic applications. The book is unique as it describes both sensors and detectors based on plasmonics and their practical applications in a single book, a feature not found in any book so far.
Survival is a motivational book that will help its readers tackle difficult issues in life. It deals with the aspects of spirituality, our role in the universe and how we can build a happy and successful life while dealing with the challenges that we face. The articles in the book touch on issues like Inner Engineering and how to go deep within and harness our limitless potential. The book also opens up on the answers of consciousness, the role of religion in our lives and the nature of the soul itself. In short words, how one can deal with the traumatic events that unfold and move forward in the journey of life is what Survival is all about.
The Trial of Palande is part of the "Yes Sir, I Killed My Dad" Trilogy. Now, the story moves to the trial stage of the Arun Tikku Murder case as Anuj Tikku reaches Mumbai to give his testimony as the key witness in the case and finally stands in the witness box. Armed with his truth, he is facilitated by Inspector Srikant Tawde, Gitesh Kadam, and Public Prosecutor Ujjwal Nigam. But the game of chess has just begun as he has to face his nemesis and the murderer of his father in court. The accused, Vijay Palande, Dharanjay Shinde, Manoj Gajkosh, and Simran Sood, await him along with their respective lawyers. Twenty-five witnesses have already given their testimony in the case, and now it is Anuj Tikku's turn to give his version of the events that led to the slaughter of his beloved father. Hang on to your seat belts, folks; this is the beginning of a rip-roaring courtroom drama.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.