Mathematical Formulas For Industrial and Mechanical Engineering serves the needs of students and teachers as well as professional workers in engineering who use mathematics. The contents and size make it especially convenient and portable. The widespread availability and low price of scientific calculators have greatly reduced the need for many numerical tables that make most handbooks bulky. However, most calculators do not give integrals, derivatives, series and other mathematical formulas and figures that are often needed. Accordingly, this book contains that information in an easy way to access in addition to illustrative examples that make formulas clearer. Students and professionals alike will find this book a valuable supplement to standard textbooks, a source for review, and a handy reference for many years. Covers mathematics formulas needed for Industrial and Mechanical Engineering Quick and easy to use reference and study Includes practical examples and figures to help quickly understand concepts.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Preface -- About the editors -- Introduction -- E-commerce infrastructure, barriers, and recommendations for international promotion / Abouzar Sadeghzadeh, Maryam Haghshenas, Mojtaba Nassiriyar, and Roghayeh Shahbazi -- Applications of e-commerce in manufacturing supply chains / Amir Manzoor -- Critical success factors for e-business in developing countries / Amir Manzoor -- Design of e-commerce software / Seifedine Kadry and Abdelkhalak El Hami -- Implementation of e-commerce software / Seifedine Kadry and Abdelkhalak El Hami -- Reality of e-commerce and social inclusion in developing Asian countries / Jyoti Batra Arora -- M-commerce / Fadi Safieddine -- Enhanced online service quality : the contribution of local search engines / Mohammed Zuhair Al-Taie and Nikos Manouselis -- Web-mining and prospective e-customer knowledge acquisition / Myriam Ertz -- Innovations in e-systems for e-commerce / Constantine J. Aivalis, Kleanthis Gatziolis, and -- Anthony c. boucouvalas -- Mass-customization of products through web-based feature modeling systems / Norman Gwangwava and Anenyasha A. Gumbie -- E-auto scheduling : driving innovation towards efficient decision making-a case study approach / S. R. K. Prasad, R. Prabhakar, and G. Kousalya -- Bio-inspired computing paradigms / S. Natarajan -- Index
Smart cities: redefining urban energy -- From smart energy to smart cities -- Energy management and planning in smart cities -- Energy technologies: Recommendations for future smart cities -- Green Technology for Smart Cities -- Optimal Renewable Energy Systems for Smart Cities -- Smart Parking: Green IoT for Smart City -- Green Internet of Things for Smart Cities -- Design of Cloud-Based Green IoT Architecture for Smart Cities -- Green-energy, water-autonomous greenhouse system -- Energy-Efficient Device-to-Device Communications for Green Smart Cities -- Greening the Smart Cities: Energy-Efficient Massive Content Delivery via D2D Communications -- Green Communications in Smart City -- Smart City Community Green Computing with Cyber Security -- Smart Cities: Environmental Challenges and Green Computing -- Ubiquitous Green Computing Techniques for High Demand Applications in Smart Environments -- Green Computing and Communications -- Toward Big Data in Green City -- How Green Building In Smart Cities Attaining Energy Efficiency?
This brief textbook explains the principles of social network analysis. The book goes beyond theoretical concepts and gives the reader complete knowledge about how to apply analytical techniques using Pajek to perform a large-scale network analysis. The book covers the topic in 2 sections - the first detailing fundamentals of research design and the next one about methods and applications
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Educational psychology : Jungian contribution (Workshop speaker) / T. Dutta -- Converging paradigms in behavioral and social engineering (Keynote speaker) / V.K. Arora and N. Arora -- Residents' perception towards social interaction among Malaysian ethnic groups in urban park / E.O. Hesham, S. Ismail and R.M. Hisyam -- Reduce reuse recycle practice in solid waste management for academic environment / D.J. Jibril, I.B. Sipan, M. Sapri, S.A. Shika and S. Abdullah -- Strategic alliances in new industrialized country : the case of Malaysia / A.B.A. Ghani and M. Subhan -- Reducing turnover intentions through procedural justice and organizational citizenship behavior : study of health sector of Pakistan / R. Imran, A.A. Khan and F. Sheikh -- Mergers and acquisitions : vital instrument of corporate strategy current and historical perspective / J. Sheikh, U. Noreen, F. Riaz and Q. Abbas -- Effect of perceived transformational leadership on organization citizenship behavior : moderating role of emotional intelligence / A. Fatima, M.M. Irfan, S. Salah-Ud-Din and S. Khan -- Development of islamic websites evaluation guidelines / M. Aliyu, M. Mahmud, A.O.M. Tap and I. Hussein -- Trauma among juvenile victims of armed conflict and tsunami in Aceh / F. Hutagalung, Z. Ishak and K. Hatta -- Facebook, online social capital, and the rise of nascent entrepreneurs / F.Wahid and N. Indarti -- Banking and technology in Indonesia : contribution to Indonesia economy / H. Medyawati and M. Yunanto -- Cross-cultural communication in multinational companies : problem and suggestions / E. Sakapurnama -- Towards developing building services standard method of measurement in Malaysia / G. Amuda-Yusuf, S.F. Mohamed, Z.M. Yusof and M.S. Misnan -- Reminiscing traditional Malay shadow theatre : knowledge retention of master puppeteers / R.A. Rahman, Z.A. Manaf and N.A.V. Abdullah -- Assesing market opportunity in software industry and identifying strategy for Lintasarta as a subsidiary of indosat (using stakeholder perspective analysis as a complementary of PESTEL) / S. Raharjo and A. Titus -- Review on the community centre design in Malaysia : problems of object centre discourse and failure to address cultural context in modern community in Malaysia / N. Utaberta, N. Spalie and N.S.N.Ab.Wahab --
Verfügbarkeit an Ihrem Standort wird überprüft
Dieses Buch ist auch in Ihrer Bibliothek verfügbar:
The human aspect plays an important role in the social sciences. The behaviour of people has become a vital area of focus in the social sciences as well. Recent Trends in Social and Behaviour Sciences contains papers that were originally presented at the International Congress on Interdisciplinary Behavior and Social Sciences, held 4-5 November 2013, in Jakarta, Indonesia.The contributions deal with various interdisciplinary research topics, particularly in the fi elds of social sciences, economics and arts. The papers focus especially on such topics as language, cultural studies, economics, b
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Nowadays, the images are transferred through open channels that are subject to potential attacks, so the exchange of image data requires additional security in many fields, such as medical, military, banking, etc. The security factors are essential in preventing the system from brute force and differential attacks. We propose an Enhanced Logistic Map (ELM) while using chaotic maps and simple encryption techniques, such as block scrambling, modified zigzag transformation for encryption phases, including permutation, diffusion, and key stream generation to withstand the attacks. The results of encryption are evaluated while using the histogram, correlation analysis, Number of Pixel Change Rate (NPCR), Unified Average Change Intensity (UACI), Peak-Signal-to-Noise Ratio (PSNR), and entropy. Our results demonstrate the security, reliability, efficiency, and flexibility of the proposed method.
Nowadays, the images are transferred through open channels that are subject to potential attacks, so the exchange of image data requires additional security in many fields, such as medical, military, banking, etc. The security factors are essential in preventing the system from brute force and differential attacks. We propose an Enhanced Logistic Map (ELM) while using chaotic maps and simple encryption techniques, such as block scrambling, modified zigzag transformation for encryption phases, including permutation, diffusion, and key stream generation to withstand the attacks. The results of encryption are evaluated while using the histogram, correlation analysis, Number of Pixel Change Rate (NPCR), Unified Average Change Intensity (UACI), Peak-Signal-to-Noise Ratio (PSNR), and entropy. Our results demonstrate the security, reliability, efficiency, and flexibility of the proposed method.
Nowadays, the images are transferred through open channels that are subject to potential attacks, so the exchange of image data requires additional security in many fields, such as medical, military, banking, etc. The security factors are essential in preventing the system from brute force and differential attacks. We propose an Enhanced Logistic Map (ELM) while using chaotic maps and simple encryption techniques, such as block scrambling, modified zigzag transformation for encryption phases, including permutation, diffusion, and key stream generation to withstand the attacks. The results of encryption are evaluated while using the histogram, correlation analysis, Number of Pixel Change Rate (NPCR), Unified Average Change Intensity (UACI), Peak-Signal-to-Noise Ratio (PSNR), and entropy. Our results demonstrate the security, reliability, efficiency, and flexibility of the proposed method.
Nowadays, the images are transferred through open channels that are subject to potential attacks, so the exchange of image data requires additional security in many fields, such as medical, military, banking, etc. The security factors are essential in preventing the system from brute force and differential attacks. We propose an Enhanced Logistic Map (ELM) while using chaotic maps and simple encryption techniques, such as block scrambling, modified zigzag transformation for encryption phases, including permutation, diffusion, and key stream generation to withstand the attacks. The results of encryption are evaluated while using the histogram, correlation analysis, Number of Pixel Change Rate (NPCR), Unified Average Change Intensity (UACI), Peak-Signal-to-Noise Ratio (PSNR), and entropy. Our results demonstrate the security, reliability, efficiency, and flexibility of the proposed method.
Nowadays, the images are transferred through open channels that are subject to potential attacks, so the exchange of image data requires additional security in many fields, such as medical, military, banking, etc. The security factors are essential in preventing the system from brute force and differential attacks. We propose an Enhanced Logistic Map (ELM) while using chaotic maps and simple encryption techniques, such as block scrambling, modified zigzag transformation for encryption phases, including permutation, diffusion, and key stream generation to withstand the attacks. The results of encryption are evaluated while using the histogram, correlation analysis, Number of Pixel Change Rate (NPCR), Unified Average Change Intensity (UACI), Peak-Signal-to-Noise Ratio (PSNR), and entropy. Our results demonstrate the security, reliability, efficiency, and flexibility of the proposed method.