Купить science based authentication of botanicals цены акции стоимость скидки продажа


Science Based Authentication of Botanicals Science Based Authentication of Botanicals Новинка

Science Based Authentication of Botanicals

7466 руб.
Recent years have seen resurgence in the popularity and use of herbal supplements as aid in healthy lifestyle. With the growing demand there have also been a lot of debates about efficacy, quality and safety of these products. While a significant compendium of information has been compiled to resolve questions related to these issues, it is clear that more work needs to be done. Unfortunately, there is no “universal” method that can authenticate every plant sample or botanical supplement. For each sample, there needs to be a full understanding of the constituents being considered and what method(s) are specifically applicable to that material. However use of common approaches and research techniques should direct the developments in the field of pharmacognosy and natural products chemistry. This book presents applicability of such research methodologies using two specific botanicals as examples, namely Hoodia gordonii and Caralluma fimbriata. These two succulent plants are used as weight-loss supplements. Studies presented in this book have generated fundamental information about these plants and should answer some of the questions about H. gordonii and C. fimbriata.
Implementation Of Authentication In E-Governance–an Uml Based Approach Implementation Of Authentication In E-Governance–an Uml Based Approach Новинка

Implementation Of Authentication In E-Governance–an Uml Based Approach

4550 руб.
In this scholarly monograph the authors have discussed the various vulnerabilities, which a E-Governance mechanism suffers in a hostile environment and the necessity of implementation of security services using digital signature algorithm for the authentication of the users in a realistic manner. Hence, a E-Governance model using a multivariate electronic smart card have been proposed through Unified Modeling Language (UML) based approach using object orientation of RSA and ECDSA digital signature algorithms.
Fingerprint Authentication Based on Statistical Features Fingerprint Authentication Based on Statistical Features Новинка

Fingerprint Authentication Based on Statistical Features

5380 руб.
Fingerprint is one of the first and most popular forms of biometric to be used for personal identification. Matching fingerprint images is an extremely difficult problem, mainly due to the large variability in different impressions of the same finger, also refereed as intra-class variations. The main factors responsible for intra-class variations are displacement, orientation, partial overlap, non-linear distortion, and various noises. At present, fingerprint authentication entails three distinct classes of techniques: minutiae based, correlation based and hybrid based. However, these methods suffer mainly from feature selection and extraction error as a result of inaccurate detection of minutiae due to missed alignment, either by minutiae or reference point. In this book, new techniques are proposed for fingerprint authentication based on statistical analysis of co-occurrence matrices to overcome the drawbacks of previous methods.
Secure Mobile Authentication for Linux Workstation log on Secure Mobile Authentication for Linux Workstation log on Новинка

Secure Mobile Authentication for Linux Workstation log on

4468 руб.
Password based logon schemes have many security weaknesses. For secure environments smart card and biometric based authentication solutions are available as replacement for standard password based systems. Nevertheless, the cost of deployment and maintenance of these systems is quite high. On the other hand, mobile network operators have a huge base of deployed smart cards that can be reused to provide authentication in other spheres significantly reducing costs. In this project we present a study of how mobile phones can be used to provide a secure low-cost two-factor workstation logon solution.To find and study the available mobile phone based authentication architectures and come up with workstation logon architecture the study of relevant technologies utilized in these solutions, authentication and authorization in Windows, Linux, and MAC OS X. The analysis of available mobile phone based authentication schemes like SIM Strong schemes based on EAP-SIM, Session-ID based schemes, and OTP based schemes are also added.A solution for Linux workstation logon process has been proposed in the thesis using the PAM. The Solution uses 2 factors for authentication.
Road Map on Password Based Authentication Schemes Using Smart Card Road Map on Password Based Authentication Schemes Using Smart Card Новинка

Road Map on Password Based Authentication Schemes Using Smart Card

4468 руб.
This text is a comprehensive study on password based authentication schemes in smart card applications. This study will provide an overview of authentication schemes and provide an new directions for the young researcher in authentication protocol design. This text covers following areas: RSA based password authentication schemes, ECC based password authentication schemes, ElGamal based password authentication schemes and Hash based password authentication schemes
Smartphone based Authentication & Authorization Protocol for SPACS Smartphone based Authentication & Authorization Protocol for SPACS Новинка

Smartphone based Authentication & Authorization Protocol for SPACS

3274 руб.
Nowadays smartphone is becoming multi-purpose device because it has more processing power at affordable cost. The trend of using smartphone for business, banking and everyday tasks has attracted research community to address security issues in smartphone applications and their communication with external systems. Due to their wide acceptability in community public, it is becoming trivial to use smartphone as an authenticating device for banking applications and access control management systems. Current legacy solutions used for Physical Access Control System (PACS) are combination of software and hardware to control the access of users to physical resources (rooms, offices, buildings etc). Most of them are using biometric or smart card as an identity token. The associated cost and limited freedom to customize these solutions to organizational needs open research areas for smartphone researchers to use them in PACS. In our research, architecture for PACS along with security protocol for smartphone is designed that is used for identity verification, authentication and authorization in PACS. The designed authentication protocol is an extension of two-factor authentication protocol.
Biometrics for User Authentication Using Artificial Neural Networks Biometrics for User Authentication Using Artificial Neural Networks Новинка

Biometrics for User Authentication Using Artificial Neural Networks

4550 руб.
Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This book considers static keystroke dynamics as a transparent layer of the user for user authentication. Back Propagation Neural Network (BPNN) and the Probabilistic Neural Network (PNN) are used as a classifier to discriminate between the authentic and impostor users. This book is useful for students and staff of computer science department.
Biometric Authentication: An Hybrid Face Recognition System Model Biometric Authentication: An Hybrid Face Recognition System Model Новинка

Biometric Authentication: An Hybrid Face Recognition System Model

4468 руб.
A biometric authentication system based on face recognition is implemented and described in this work. The proposed algorithm is a combination of Principal Component Analysis (PCA) and a Feature based technique which is based on the two modalities used in face recognition i.e. The Holistic approach and Feature-based approach. PCA which was used as our mainstay algorithm, based on information theory concepts, seeks a computational model that best describes a face, by extracting the most relevant information contained in that face. With the feature based, we localized and measured some key features of the face such as the width and height of the face and the head midpoint. Based on this measurement, we generated a weight also for each image which we then combine with the weights computed from the eigenface approach. Recognition and authentication is performed by projecting a probe to the proposed system. Olivetti Research Lab (ORL) face database along with the face database we constructed (Colface face database) from images taken of fifty subjects of pure black population at varying pose and light intensities were used to test the system. A good and considerable result was achieved
Crypto Authentication System Using Hilbert Matrices Crypto Authentication System Using Hilbert Matrices Новинка

Crypto Authentication System Using Hilbert Matrices

5918 руб.
While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication. Classical cryptanalysis involves an interesting combination of analytical reasoning, application of mathematical tools and pattern finding. New cryptographic algorithms need to be designed considering the probable future developments while working on their designs, as continuous improvements in computer processing power have increased the scope of brute-force attacks. Thus we may have to think about increasing the key lengths and block lengths. There are mainly two types of crypto-systems, namely, symmetric crypto-systems and public crypto-systems.
Simulation & Analysis Image Authentication using XSG with MATLAB Simulation & Analysis Image Authentication using XSG with MATLAB Новинка

Simulation & Analysis Image Authentication using XSG with MATLAB

4631 руб.
The Xilinx system generator, which provides a novel model based approach of carrying out various image processing applications. The model is prepared using Xilinx blockset that has a potential to be implemented on FPGA Devices. Multimedia authentication techniques are required in order to ensure trustworthiness of multimedia data. They are usually designed, based on two kinds of tools, Digital signature or Watermarking. Frequency domain based approach of watermarking is introduced in authentication system in order to get more feasibility in terms of better concealing and robustness of integrated information. This authentication system may be based on different transforms like DCT, DWT and LSB etc. and that can be implemented in the MATLAB SIMULINK tool, integration of Xilinx will allow the access of Xilinx block set, and by incorporating this block sets in model based design can help us to generate VHDL code for modelling by Xilinx System Generator. This code can be optimized manually to get fast execution time and high performance. Once the code is generated then it can be synthesized in Xilinx ISE and implemented on Hardware.
Multilevel Password Authentication Method using Graphics and Text Multilevel Password Authentication Method using Graphics and Text Новинка

Multilevel Password Authentication Method using Graphics and Text

4631 руб.
The report “Multi-Level Password Authentication Method using Graphics & Text” was submitted by Md.Asraful Haque, in Partial fulfillment of requirements for the award of the degree of Master of Technology in Computer Science & Engineering (Software Engineering) during the session 2011-2012 in the department of Computer Engineering of A.M.U., Aligarh. In this work, a hybrid authentication system combining text and graphical passwords have been suggested and implemented. User authentication has been verified in two steps to improve the security. The scheme can be useful for highly secure systems.
Exploring the Art & Science of Stopping Time – (CD–ROM) Based on the Life & Work of Harold E Edgerton Exploring the Art & Science of Stopping Time – (CD–ROM) Based on the Life & Work of Harold E Edgerton Новинка

Exploring the Art & Science of Stopping Time – (CD–ROM) Based on the Life & Work of Harold E Edgerton

3966 руб.
Exploring the Art & Science of Stopping Time – (CD–ROM) Based on the Life & Work of Harold E Edgerton
AUTHENTICATION  PROTOCOLS AUTHENTICATION  PROTOCOLS Новинка

AUTHENTICATION PROTOCOLS

7466 руб.
In single password based anti-phishing protocol, client can use single password for different online accounts and that password can not be detected by any of the malicious servers or the attacker. Proposed cookies based and an inverse cookie based virtual password authentication protocols are very effective to thwart online dictionary attacks because the computation cost of login on to the web server increases exponentially with each login failure for an attacker. We proposed an efficient SSO password based two-server architecture in which the user has to login once to get a valid ticket. Improvements to several static and dynamic identity based authentication protocols have also been suggested. The proposed dynamic identity based authentication protocols aim to provide the privacy to the user''s identity so that users are anonymous in communication channel. Also the concept of two- tier authentication for the client makes it difficult for an attacker to guess out the information pertaining to password and ticket. The work presented in this book is a step toward making e-commerce transactions more reliable and secure.
The Science of Decision Making: A Problem-based Approach Using Excel The Science of Decision Making: A Problem-based Approach Using Excel Новинка

The Science of Decision Making: A Problem-based Approach Using Excel

7994 руб.
Provides the reader with a perspective on the efficient operation of complicated systems. * Spreadsheets are used to employ and teach techniques. * Includes the facets of probability that relate to decision making.
Biometric authentication using the retinal vessel tree Biometric authentication using the retinal vessel tree Новинка

Biometric authentication using the retinal vessel tree

6426 руб.
Reliable authentication of persons is a growing demanding service in many fields, not only in police or military environments, but also in civilian applications, such as access control or financial transactions. Traditional authentication systems are based on knowledge (a password, a pin) or possession (a card, a key). But these systems are not reliable enough for many environments, due to their common inability to differentiate between a true authorized user and an user who fraudulently acquired the privilege of the authorized user. A solution to these problems has been found in the biometric based authentication technologies. A novel fully-automatic authentication system is proposed using the retinal vessel tree pattern as biometric characteristic. The goal is to develop a robust biometric template extraction and matching methodology capable of dealing with a more heterogeneous scenario than before. The experimental results show that the authentication method is capable of achieving a confidence band between scores of authorized and unauthorized individuals in a complex database while using a small but reliable template in a very short computation time.
Enhancing Biometric Authentication Using Visual Challenge Response Enhancing Biometric Authentication Using Visual Challenge Response Новинка

Enhancing Biometric Authentication Using Visual Challenge Response

4468 руб.
A reliable identity management system is urgently needed in order to combat the epidemic growth in identity theft and to meet the increased security requirements in a variety of applications. Biometric authentication establishes the identity of a person based on “who he is", rather than “what he knows" or “what he possess”. There are usually two very serious criticisms against biometric technology that have not been addressed satisfactorily, biometrics are not secrets and enrolled biometric templates are not revocable. The first fact implies that the attacker has a ready access to the legitimate biometric trait (e.g., facial image finger print of an enrolled user of the biometric system) and, therefore, could fraudulently inject it into the biometric system to gain access. The second fact implies that when a biometric trait has been “compromised”, the legitimate user has no recourse to revoking the trait. In this work, we devise a technique that complements the weakness of a biometric system by Combining both biometrics and a Visual–based challenge response for access control, thus Enhancing Biometric System Using Visual-Based Challenge Response, having considered human factor.
Feasibility of Inquiry Based Teaching in Science Feasibility of Inquiry Based Teaching in Science Новинка

Feasibility of Inquiry Based Teaching in Science

4631 руб.
Science is mostly taught by lecture method and teacher centered method, where students' role is confined to listener. Consequently students memorize scientific concept but don't follow the scientific approach in their daily life. In order to develop scientific approach and attitude among students,It is necessary that science should be taught by employing modern experiment oriented or student centered method. There are many experiment oriented and student centered teaching approaches. Inquiry Based Teaching (IBT) is one of them. This approach discourage rote learning and cramming and ensure students' involvement in learning. Teacher only plays the role of facilitator.
Authentication of absorbed dose measurement in Radiotherapy Authentication of absorbed dose measurement in Radiotherapy Новинка

Authentication of absorbed dose measurement in Radiotherapy

5283 руб.
The sophistication and complexity of absorbed dose and treatment planning systems has increased significantly, particularly including three-dimensional (3D) treatment planning systems, and the use of conformal treatment planning and delivery techniques. This book led to the need for a comprehensive set of authentication in external radiotherapy, Brachytherapy and Proton therapy. The purpose of this thesis is to developing and implementing a comprehensive authentication but viable methods for modern radiotherapy treatment planning. The scope of the authentication needs for treatment planning is quite broad, encompassing image-based definition of patient anatomy, 3D beam descriptions for complex beams including multileaf collimator apertures, 3D dose calculation algorithms, and complex plan evaluation tools including dose volume histograms.
Authentication Scheme for Dynamic Group Using Threshold Cryptography Authentication Scheme for Dynamic Group Using Threshold Cryptography Новинка

Authentication Scheme for Dynamic Group Using Threshold Cryptography

4468 руб.
Secret sharing is a technique for protecting sensitive data like cryptographic keys. This mechanism is used to distribute a secret value to a number of parties or users called shares. The shares are given to the parities or users involved in the group. These values have to be combined together to access the original values. Secret sharing is used in modern cryptography algorithms to reduce the risk in information leakage. Sharing a secret reduce the risk of compromising the value across several parties. Threshold or group oriented cryptography allows a group of users perform cryptographic operations such as encryption, decryption, signature etc. A trivial implementation of group–oriented cryptography can be achieved by concatenating secret sharing schemes and a single user cryptosystem. This book illustrate the basic RSA based Threshold Cryptography with numerical examples. This book is very useful for new research schollers working towards Threshold Cryptography. In this book, basic RSA based Threshold Cryptography is illustrated and stpes are explained with small numbers.
Competency Based Primary Teacher Education Competency Based Primary Teacher Education Новинка

Competency Based Primary Teacher Education

7286 руб.
Teacher plays a pivotal role in the process of education. Science teaching at primary level in developing countries is of very poor quality. This book is based on research on science teaching at primary level. Research evidences showed that teachers lack at competencies required in teaching science. This research was undertaken to study the competencies of primary science teachers and a model for developing these competencies were developed and tested.
Instrumental methods in the authentication of cultural heritage Instrumental methods in the authentication of cultural heritage Новинка

Instrumental methods in the authentication of cultural heritage

3393 руб.
The paper contains the author's research findings in the field of authentication and preservation of cultural heritage (paintings, historical and religious monuments, textiles and old books). The theme is approached from an interdisciplinary perspective, involving knowledge of conservation and restoration, materials science, history and art theory, biology, chemistry. This paper presents case studies in which modern methods used in the characterization and authentication materials are X-ray fluorescence, Raman spectroscopy, scanning electron microscopy SEM, optical microscopy, FTIR, etc. The presentation this information took into account the difficulty encountered by conservators, art historians, restorers or other responsible people in decision making of the dating, conservation and restoration the cultural heritage. The work is of interest to researchers, specialists, teachers, students and for all those passionate about the richness and diversity of cultural heritage.
Exploring Middle School Science Students’ Computer-based Modeling Practices and Their Changes over time Exploring Middle School Science Students’ Computer-based Modeling Practices and Their Changes over time Новинка

Exploring Middle School Science Students’ Computer-based Modeling Practices and Their Changes over time

7466 руб.
Young children have difficulties to make connections between objects and events around them. They are not able to think systematically and articulate how things are related; lack of reflection makes this worse. We introduced software called Model-It to address the challenges. A model is a simplified representation of a system that concentrates attention on specific aspects of the system such as more complicated ideas, objects, events, or processes. Constructing, testing, and evaluating models is central to scientists’ daily practices. This study, followed a “design-based research” approach, found seventh graders using Model-It were able to create meaningful models of water quality and decomposition after their investigations over three seasons. They performed a variety of valuable modeling practices such as planning, analyzing, synthesizing, evaluating, and publicizing and became more purposeful. This book was written for science education researchers, school science teachers and anybody who are interested in using modelling for facilitating student-centered science learning.
Internet Authentication for Remote Access Internet Authentication for Remote Access Новинка

Internet Authentication for Remote Access

6830 руб.
Nowadays, IP mobile devices need to employ a variety of different network access technologies to gain ubiquitous connectivity. This book reviews the authentication infrastructure challenges for Internet remote access supporting ubiquitous client mobility, and proposes a series of solutions obtained by adapting and reinforcing security techniques arising from different sources. The focus is on entity authentication protocols that can be carried both by the IETF PANA authentication carrier and by the EAP mechanisms, and possibly making use of an AAA infrastructure. The core idea is to adapt authentication protocols arising from the mobile telecommunications sphere to Internet remote access. A proposal is also given for Internet access using a public key based authentication protocol. The subsequent security analysis of the proposed protocols covers a variety of aspects, including: key freshness, DoS-resistance, and false-entity-in-the-middle attacks, in addition to identity privacy of users accessing the Internet via mobile devices. This book is destined to researchers or anyone else who is interested on authentication mechanisms for Internet remote access aiming ubiquitous mobility.
Research-based Resources to Teach Chemistry Research-based Resources to Teach Chemistry Новинка

Research-based Resources to Teach Chemistry

6426 руб.
The national science education standards in many countries require teachers to teach science using inquiry. But, many science teachers do not get the opportunity to learn science through inquiry and other research-based strategies. The monograph describes some research –based strategies to improve chemistry teaching based on the research and development work of the author. The topics include: field-tested chemical demonstrations , guided inquiry labs, a new research –based model of professional development using guided inquiry labs, an experimental study on effect of inquiry teaching on student learning, an action research on guided inquiry, a professional development model for chemistry teachers based on graduate level content and pedagogy, a new peer-tutoring model to improve student success in introductory college chemistry, and a dream futuristic curriculum project in chemistry. The monograph with plenty of teaching and learning resources is a journey to the wonderful world of chemistry. Science teachers, college chemistry instructors, science educators, or anyone else interested in chemistry should find the monograph useful and exciting.
Modern Security Methods in Applied Computer Science Modern Security Methods in Applied Computer Science Новинка

Modern Security Methods in Applied Computer Science

5462 руб.
Secret writing was apparently more advanced and the administrators are used secret codes to communicate with a network of spies spread out through the country. This book focuses on the authentication, confidentiality and the limitations existing in the present methods. Information security refers to protecting information and information systems from unauthorized access. The main objective of this book is to develop a more secured and authenticated system using a Modified Message Digest Algorithm (MMD). In this process a concept called cheating text is introduced for providing confidentiality and authentication. The concept of cheating text together with MMD is used in applications of Zero knowledge protocol, a schnorr’s scheme of digital signature scheme. A methodology for using the MMD along with cheating text is used for authentication in mobile devices and the performance of the results are compared with the existing ones. This system will be tested with different kinds of attacks that are possible with steganographic messages and can easily overcome with stego only, known cover, chosen stego, known stego attacks.
Proximity Based Access Control (PBAC) Proximity Based Access Control (PBAC) Новинка

Proximity Based Access Control (PBAC)

5380 руб.
Timely action and prompt response are the crying need for emergency services like health care in a hospital. Unavailability of it may result to a massive disaster. For example,in a hospital, doctors and nurses must respond promptly to take necessary action for a critical patient to save his life. Prompt response and timely act may save thousands of lives.But prompt response does not mean that it can compromise with the security issues. In critical scenarios massive flow of highly secure information is expected. Different levels of employees are allowed to have different level of privileges to the system for securing access and a smooth run of the system. To provide the exact level of service according to one’s privileges to the system is only possible by a proper authentication process.Repetitive authentication processes wastes valuable time on a critical moment along with distracting people from their main course of action. The system loses its invisibility and efficiency. Here comes the need for having a fully automated solution for this access control systems.Here we have presented an efficient way of automated access control mechanism using Proximity Based Access Control(PBAC)
Evaluation of botanicals and entomopathogenic fungi Evaluation of botanicals and entomopathogenic fungi Новинка

Evaluation of botanicals and entomopathogenic fungi

4631 руб.
Protecting onion crop from onion thrips by using botanicals and entomopathogenic fungi are a strong option for increasing onion yield. Compared to synthetic pesticides are however, conspicuous particularly with regard to environmentally sound. The main focus of this publication however is to promote the practical use of botanicals and entomopathogenic fungi to control onion thrips in field condition and to create awareness for the potential of promising materials.
Knowledge Leadership : The Art and Science of the Knowledge-based Organization (KMCI Press) Knowledge Leadership : The Art and Science of the Knowledge-based Organization (KMCI Press) Новинка

Knowledge Leadership : The Art and Science of the Knowledge-based Organization (KMCI Press)

5987 руб.
Book DescriptionIn Knowledge Leadership, Cavaleri and Seivert describe the dawning of a new era in which individuals are leading rather than managing knowledge. In the past, many knowledge-based initiatives have failed because leaders underestimated the powerful link between knowledge and performance improvement and also because they mistakenly thought that information was the same as knowledge. Cavaleri and Seivert claim that, while information is a necessary precursor to knowledge, it is not sufficient in itself for improving business performance. The authors describe notable organizations that use the pragmatic knowledge strategies they describe to gain competitive advantage. Pragmatic knowledge is the result of individuals developing a deeper understanding of how (and why) things work best in practice. The process of creating pragmatic knowledge transforms key lessons from systems thinking, total quality management, and organization learning into a powerful new business strategy.To help readers apply the concepts and tools in this book, Cavaleri and Seivert draw on case examples and a decade of original cross-cultural research about knowledge leadership. They also invite readers to use The Knowledge Bias Profile to discover their knowledge leadership style. The book systematically outlines a user-friendly strategy for becoming a knowledge leader and for building high-performing, knowledge-based organizations.* Applies well-respected theories of the learning organization and the knowledge-creating company to improving corporate leadership in the knowledge economy* Based on research with hundreds of managers in the US and Asia* Provides a simple framework for improving leaders knowledge gained from experience
Science, Research and Higher Education in the Knowledge-Based World Science, Research and Higher Education in the Knowledge-Based World Новинка

Science, Research and Higher Education in the Knowledge-Based World

7645 руб.
Civilized countries stand in the background: their leaders decided to stake the future on science and technology, in which their countries have generally excelled. Knowledge would thus secure the future of developed world through the creation of a knowledge-based society rooted in higher education, innovation and research (Knowledge Triangle). The 2020s inevitably will see an intensified interest in these areas on the part of national and regional governments, higher education institutions and economic life across the world, in response to the pressing global challenges. This book is the creation of a monograph integrating state-of-the-art and trend of Knowledge Triangle the world over. It also serves as a detailed scholarly study, a contributor for the provision of the skills necessary for political, economic and social progress, then a reference book, where often a major aim is to professionalise the teacher training units. As a new teaching material meets lifelong learning aspect, placing the emphasis on self-study and serving as a knowledge source by reader-friendly information, helps familiarise decision-makers, administrators of the Knowledge Triangle and the laymen alike.
Enhance Science Learning with Virtual Labs. Enhance Science Learning with Virtual Labs. Новинка

Enhance Science Learning with Virtual Labs.

7204 руб.
Over the last few years, the use of the web and virtual technologies in school education has become widespread. Virtual Labs create and use a complete environment within which students can interact to apply theory and practice science process skills to real-world issues. Virtual Labs represent a powerful tool for learning. This book focuses specially on Theoretical Foundation of Virtual Lab and Science Education, in addition to, Design of a Web-Based Virtual Lab as a Research Environment and comparing the impact of a web-based Virtual Lab (WVL) environment with that of traditional educational experience in relation to conceptual understanding and science process skills in natural science for fourth grade primary school students. The results go beyond previous research results, which did not focus on very young learners. The use of WVL contributed considerably in enriching learning outcomes; the results provided an empirical evidence of the advantages of web-based learning (WBL) for education policy makers. This book will claim to everyone, close to any field of study, looking for effective means to link the gap between academic learning and practice.
Utilizing Science Projects that are Problem Based Utilizing Science Projects that are Problem Based Новинка

Utilizing Science Projects that are Problem Based

3639 руб.
The purpose of this research was to determine how Project-based Learning (PBL) influenced students’ behavioural, cognitive, and emotional engagement in a secondary Chemistry class. Most previous research studies refer to behavioural engagement when speaking of student engagement. This research was an attempt to distinguish between the various types of engagement and the use of different teaching pedagogies. The research compared twenty-five students’ behavioural, cognitive, and emotional engagement during two different chemistry units: one using PBL and the other without PBL. Levels of engagement were determined using checklists, surveys, attendance records, and test results from both units. Two of three instruments indicated a slight decrease in behavioural engagement during the PBL unit as compared with the non-PBL unit. Results were inconclusive in displaying an effect of PBL on cognitive engagement. Three instruments all showed different cognitive effects produced by using PBL. Emotional engagement remained high during both units. There was no indication that the use of PBL affected students’ emotional engagement.
Use of Botanicals in Palm Wine Preservation Use of Botanicals in Palm Wine Preservation Новинка

Use of Botanicals in Palm Wine Preservation

4550 руб.
Rapid deterioration in organoleptic quality of palm exudate by the natural flora of the fermenting sap constitutes the major problem facing palm wine production and distribution. Although some preservation techniques including the use of chemical preservatives and other methods such as refrigeration, centrifugation and pasteurization have been developed, our attention is focused on the use of botanicals. This book presents the effect of two botanicals; Sacoglottis gabonensis and Alstonia boonei, on the fermentation of Raphia palm sap by Saccharomyces cerevisae. The optimal levels of S. gabonensis and A. boonei for preserving fermenting palm sap are 0.625 and 0.50 %(w/v) respectively. Both botanicals enhance growth rate, ethanol production, ethanol tolerance and osmotolerance ability, while reducing the fermentation rate, sedimentation rate, flocculation ability as well as invertase activity of S. cerevisiae isolated from palm wine. Sacoglottis gabonensis is superior to A. boonei in these respects. The potential utilization of these botanicals for industrial fermentation involving yeast is promising.
Emerging Frontiers in Materials Science Emerging Frontiers in Materials Science Новинка

Emerging Frontiers in Materials Science

3393 руб.
Materials science is an applied science concerned with the relationship between the structure and properties of materials. Chemists who work in the field study how different combinations of molecules and materials result in different properties. They use this knowledge to synthesize new materials with special properties. This Book contains three chapters. The first chapter is based on Microwave chemistry. The second chapter is based on the development of Scanning tunneling microscope(STM) as a new imaging tool. The third and final chapter is based on the interesting physics and chemistry of foams.
Exploring Preservice Science Teachers’ Views on Nature of Science Exploring Preservice Science Teachers’ Views on Nature of Science Новинка

Exploring Preservice Science Teachers’ Views on Nature of Science

7466 руб.
The purposes of this study were to explore understanding of preservice science teachers’ (PSTs) nature of science (NOS) views during the explicit-reflective and inquiry-based laboratory instruction and investigate PSTs’ perspectives and experiences related to learning NOS aspects in the science laboratory course. The design of the study was qualitative and exploratory in nature. In the initial phase of the study, the researcher collected qualitative data with open-ended questionnaire to explore PSTs’ NOS views. Then,during the semester, reflection papers were collected to understand PSTs’ experiences with the intervention and to detect development about each NOS aspect. At the end of the semester, qualitative questionnaire and semi-structured interviews were conducted to determine the impact of the explicit-reflective and inquiry-based laboratory instruction.The results showed that all of the PSTs were able to make appropriate connections among the laboratory activities and the targeted NOS aspects at the end of the instruction.In addition, many PSTs developed their understanding levels of each aspect of NOS.
Effect of botanicals on insect pests of cowpea Effect of botanicals on insect pests of cowpea Новинка

Effect of botanicals on insect pests of cowpea

6426 руб.
The cowpea insect pests in the West and Central Africa, and various approaches to control them are reviewed with special emphasis on their advantages and disadvantages. The book discusses how far synthetic pesticides have created problems and how far these may be solved by alternatives from plants. This book will be an important tool of justifying the popular use of some savannah plants to combat insects, microbes or vertebrates in these parts of Africa.
Architecture for Cloud-Based Rapid Application Development Framework Architecture for Cloud-Based Rapid Application Development Framework Новинка

Architecture for Cloud-Based Rapid Application Development Framework

4468 руб.
In a world where most innovative ideas have come from campus rooms, it is critical to have development environments that are easily accessible and whose cost is minimal or at least dependent on the usage. Other than start up cost, developers are also faced with the nightmare of managing development platform migration every time they switch development computers or re-install the operating system. Cloud platform transforms the way computing resources are utilized avoiding the need for upfront purchase of fundamental hardware and software. Having a development environment that runs off the cloud and accessible through the browser helps address the challenges faced under the current development environments. Accessibility of such platforms as well as data security become the immediate problems that a developer is likely to be faced with. These have however been mitigated by use of rich client and asynchronous server access that reduces traffic requirements when developing on the platform. By using single sign-on for user authentication based on known and reliable authentication services, the environment addresses the security issue.
Biometric Authentication Systems Biometric Authentication Systems Новинка

Biometric Authentication Systems

7204 руб.
Biometric Authentication Systems have become inevitable components of modern day security. In this book we have discussed fingerprint, palmprint, finger-knuckle print, face, iris, dynamic signature, keystroke dynamics and their multimodal implementations. In physiological category fingerprints, palmprints & finger-knuckle prints, face & iris are discussed. Their unimodal as well as multimodal implementations are presented. In case of behavioral biometrics dynamic signature & keystroke dynamics for biometric authentication have been investigated. Digital signal & image processing based techniques such as Kekre Wavelets, Kekre's Codebook Generation Algorithms and their variants are used for feature vector generation and recognition purpose. Multimodal systems consisting of the combinations of above mentioned biometric traits are presented. Multi-algorithmic, Multi-instance implementations are presented in this book. A new architecture called as hybrid multimodal system is also presented in this book. This book will be very much helpful for the people who are working in the biometric authentication domain.
Dr. Imber Amantha The Innovation Formula. The 14 Science-Based Keys for Creating a Culture Where Innovation Thrives Dr. Imber Amantha The Innovation Formula. The 14 Science-Based Keys for Creating a Culture Where Innovation Thrives Новинка

Dr. Imber Amantha The Innovation Formula. The 14 Science-Based Keys for Creating a Culture Where Innovation Thrives

1183.46 руб.
A practical guide to innovation strategies based on fact, not feeling The Innovation Formula delivers strategies for building a culture where innovation can thrive, based on actual scientific research. Author Amantha Imber holds a PhD in organisational psychology, and has been called upon by a multinational roster of forward-thinking companies—such as Google, Disney, LEGO and Virgin—to improve innovation at all levels. In this book, she shares her strategies and helps you tap into a substantial body of scientific research to help further innovative practice within your own company. For example, rewarding failed innovations can actually be a critical aspect of building an innovation culture. It's rarely done, but it fosters creative thought by signaling to people that failure is tolerated and is a necessary ingredient in the pursuit of innovation. This kind of practical, easily implemented strategy is the lynchpin of cultural change. This guide shares fourteen separate, yet interconnected strategies for improving your company's innovation culture, and provides illustrative examples of real-world companies who are putting these plans into action. Business innovation guides tend to focus on how one company does it. But it's not your company, and just because it worked for Google or Apple doesn't mean that it's right for you. This book is different; these techniques are based on science, not gut feeling, and can apply to any organisation, at any level. Delve into the science behind successful culture shift For best results, reward innovation, whether or not it succeeds Learn the critical elements that foster organisation-wide creativity Implement practical strategies based on evidence, not anecdotes Fostering a culture of innovation means making your company a safe space for new ideas. Over 95% of business leaders surveyed get it wrong, because intuition cannot compete with data. The Innovation Formula gives you a science-based framework for turning your organisation into one where innovation survives and thrives.
Implementation of Authentication and Transaction  Security Implementation of Authentication and Transaction  Security Новинка

Implementation of Authentication and Transaction Security

3274 руб.
Kerberos is a network authentication protocol & is designed to provide strong authentication for client/server applications by using secret-key cryptography. Our research was aimed at enhancing the security of transactions over a network. In this study, we used Kerberos Encryption Technique for authentication and transaction security in the network. Further, we created an Authentication Server that used to derive a 64 bit key from user’s password. This password was of arbitrary length. The generated key then was used by authentication server, to encrypt ticket granting ticket + session key. The key generated by authentication server was then used by the client at the time of transaction through the transaction server to validate an authentic transaction. However, there was an issue of cross-validation of the ticket by the transaction server for which we included a database and encryption of all the text sent by any client to the transaction server. In this work we tried to implement authentication and transaction security in a Network using Kerberos. This project is embedded with Authentication Server application and used to derive a 64 bit key from user’s password.
Nature of Science Construct: One Dimension or Five? Nature of Science Construct: One Dimension or Five? Новинка

Nature of Science Construct: One Dimension or Five?

7466 руб.
This book guides readers on how to assess the dimensionality of a construct that has been developed within a Rasch-based measurement system. The Rasch model is a prescriptive model. If the data ‘fit the model’, items and respondents are placed on a common, interval-level linear scale that enables items and respondents to be analyzed qualitatively and statistically. A major assumption of the Rasch model is that the construct is unidimensional. The theoretical framework for the ‘Nature of Science’ (NOS) construct suggests it is composed of several dimensions that are separate but inter-related. Using data from an instrument designed to measure elementary students’ understanding of NOS; this book walks you through (step-by-step) on how to assess a construct’s dimensionality and build a validity argument to justify the use of scores from a Rasch-based instrument. This book will interest instrument developers who want to apply the Rasch model for survey design, development and measurement. Graduate students and practitioners in educational assessment will find it useful. Science practitioners can use the NOSI-E instrument to measure student NOS understanding on a large scale.
Biometric Authentication Using Spread Spectrum Audio Watermarking Biometric Authentication Using Spread Spectrum Audio Watermarking Новинка

Biometric Authentication Using Spread Spectrum Audio Watermarking

2636 руб.
Watermarking has become important in the last decade because of the copyright protection applications. This book presents a biometric authentication scheme based on spread spectrum watermarking technique. We add a biometric authentication system to the Sipdroid open source VoIP program. Firstly, senders must register to the system with their unique biometric features. T.C Identity number, keystroke dynamics and voice are used as biometric features. After registration, these biometric features are used as watermarked material. Before embedding, the watermark is spread with the Direct Sequence Spread Spectrum (DSSS) technique. While talking, this watermark material is embedded to speech and sent to receiver using Frequency Hopping Spread Spectrum(FHSS) technique. The watermarked biometric data is constructed in the receiver's phone after conversation is finished. The experimental results demonstrate that the emembedding technique is not only less audible but also more robust against the common signal processing attacks. In order for receiver to be able to login to the system, biometric features of the user should match with the watermarked biometric data.
An overview of Botanicals for Hair Care: 1(Dandruff and lice) An overview of Botanicals for Hair Care: 1(Dandruff and lice) Новинка

An overview of Botanicals for Hair Care: 1(Dandruff and lice)

6133 руб.
Beautiful hair has been trendy in every age. The face of person is a unique own individuality in which hair play a noteworthy role in both sexes. It is eminent that hair care is the most essential part of good grooming.Dandruff, graying of hair and head lice is common problem of hair. Dandruff is problem which is over-exploited by hair care market industry. In this day and age people spend more money about 20 times in comparison to last decade to buy products like shampoos, lotion, conditioner, hair oil etc. But complete cure is lacking even today. Manufacturers firms are not only advertising magic herbs but also dreams. The fact about herbal products quality and safety over synthetic is globally accepted. Is every cosmetic product as calming wonderful effect is to be true? Keep this is in view, the present book “An overview of Botanicals for hair care: 1 (dandruff and Lice)” is written and designed to communicating the appropriate knowledge with critical study by 15 tables and 14 figures .This book will be serving as hand book for new researchers, teachers, students, cosmetic industry working on hair care. This book is intended for everyone with an interest in herbal hair care.
Utilization of Indigenous Botanicals in Storage Pest Management Utilization of Indigenous Botanicals in Storage Pest Management Новинка

Utilization of Indigenous Botanicals in Storage Pest Management

5097 руб.
Food grains play an important role in Indian economy, as nearly 26 per cent of gross domestic product (GDP) is obtained from agriculture. Farmers retain about 60-70 per cent of their produces for seed purpose, home consumption and for sale,nearly 15 per cent of grains stored after each harvest was lost due to ravages by rats, insects, mites, other microbial agents and spillage.The most common method of store pest control followed at present is the application of Malathion, fumigation with EDB, EDCT or other volatile substances. Though, these chemicals after efficient protection against pests cause certain undesirable side effects like residual toxicity, application hazards, environmental pollution, etc. Consumers are afraid to use such food grains of this kind with toxic effects and residual chemicals. In this context use of indigenous botanicals, having efficient insecticidal properties is followed by age old Indian farmers, most of which exist today as indigenous practices are being realized as safe tool in the store pest management.
Support of Mobile Phones for Science Teachers: A Focus on Pedagogy Support of Mobile Phones for Science Teachers: A Focus on Pedagogy Новинка

Support of Mobile Phones for Science Teachers: A Focus on Pedagogy

6556 руб.
Research suggests that mobile phones can support science teaching and learning by providing authentic learning opportunities that connect the classroom with the outside world. Furthermore, both the functions and the attributes of mobile phones offer a variety of opportunities to enhance the effectiveness of science teaching and learning. Recognizing the potential offered by mobile phones, the focus of this book is on issues of pedagogy related to the use of mobile phones in science education in Sri Lanka, throughout the teaching cycle, from planning a lesson, implementation in the classroom to evaluation and reflection. The functions and attributes of mobile phones that are useful during the teaching cycle of science lessons and how they can be complemented by integrating mobile phones with ICT based tools are discussed. Three conceptual frameworks that describe teacher’s pedagogical practices involving mobile phones during planning, implementation and evaluation and reflection stages of a science lesson based on two well-known theories in pedagogy, ‘Shulman’s pedagogical reasoning model’ and ‘Alexander’s conceptual framework for educational practice’ are also presented.
Chitosan Based Adsorbent for Removal of Oil from Industrial Wastewater Chitosan Based Adsorbent for Removal of Oil from Industrial Wastewater Новинка

Chitosan Based Adsorbent for Removal of Oil from Industrial Wastewater

5380 руб.
Application of chitosan products in wastewater treatment has received considerable attention in recent years in the literature. In particular, the development of chitosan-based materials as useful adsorbent polymeric matrices is an expanding field in the area of adsorption science. This book, investigates the development of chitosan-based adsorbent for removal of oil from industrial wastwater treatment.
Efficacy of botanicals against Rice leaf folders Efficacy of botanicals against Rice leaf folders Новинка

Efficacy of botanicals against Rice leaf folders

3274 руб.
Present Studies were carried out on seasonal incidence, varietal screening and botanical control of rice leaf folders, Cnaphalocrocis medinalis Guenee and Pelopidas mathias Fabricious in South Gujarat. In the study of seasonal incidence larval population (0.50 larva/plant) and per cent damaged leaves (0.55) of rice leaf roller, C. medinalis initiated from 36th standard week and reached it’s peak level (3.12 larvae/plant and 3.20 per cent damaged leaves) during 43rd standard week in kharif-2005 while the larval population (0.53 larva/plant) and per cent damaged leaves (0.72) of rice leaf roller initiated from 13th standard week and reached to it’s peak level (1.51 larvae/plant and 1.75 per cent damaged leaves) during 15th standard week in summer-2006.Out of twenty one varieties screened, minimum per cent damaged leaves by rice leaf roller was recorded in variety GR-103 (0.27) with scale-1.The treatment chlorpyriphos 0.05 per cent found significantly superior and most effective treatment than rest of treatments with lowest per cent damaged leaves (0.52 for rice leaf roller).
Evidence Based Dentistry Evidence Based Dentistry Новинка

Evidence Based Dentistry

4631 руб.
Dentistry is both an art and a science. It is a science because our fundamental understandings - or building blocks of knowledge, are based on the scientific process of research. This includes basic, applied, and clinical research. It is an art where it is based on experience and personal observation. The synthesis of scientific understanding (evidence) and clinical observation (evidence) provides the basis for meaningful dental care. Evidence based approach is ideal in today's situation and we doctors should be well versed with this approach and use evidence wisely in clinical decision making.
The Science of Time The Science of Time Новинка

The Science of Time

4631 руб.
Horology, the science of timekeeping, allowed early man to harmonize agricultural activity with seasonal fluctuations. Today?s man is equipped with a resolution of timekeeping that is synchronized throughout the entire world to a potential accuracy of approximately 30 billionths of seconds per year. The developments are significant yet largely undocumented and ambiguous due to the nature in which horology has governed such historical accuracy. Horological Machine designs are influenced from everything from science fiction through to 20th-century aviation, but at all times with a firm foundation based on the very best of traditional horology. Every Horological Machine bears its own exceptional history and design.
Computer Science Literature Computer Science Literature Новинка

Computer Science Literature

10858 руб.
Citation represents the full bibliographical description for paper which the author has used, while writing his paper. Citation analysis "is a method based on the principle that article citing the same references also have much of their content in common" stated M. Osinga in "Some fundamental aspects of Information Science". The present study analyzes the data of citations found in the Journals in the field of Computer Science. The objective of the present study is to find out the major forms of citations, dominant country and language of citation in the field of Computer Science and to draw up a ranking list of periodicals and to ascertain the subject dispersion in the discipline and also to find out the highly selected journals and highly self cited authors in the discipline.
Multimodal Fusion of Iris and Fingerprint Multimodal Fusion of Iris and Fingerprint Новинка

Multimodal Fusion of Iris and Fingerprint

4550 руб.
Biometrics systems perform authentication based on human body features, systems based on only one kind of biometric trait are generally called as unimodal biometric systems. The performance and scalability of a biometric system can be increased by combining more than one biometric trait. Such systems are called as multimodal biometric systems. Being less intrusive and universal fingerprint based systems serve as good option for access control and surveillance. Iris recognition enjoys universality, high degree of uniqueness and moderate user co-operation. This makes Fingerprint & Iris recognition systems unavoidable in emerging security & authentication mechanisms. This book is focusing on a multimodal implementation of Fingerprint & Iris. Fingerprint and Iris features are extracted using multilevel decomposition of captured image data using a new family of wavelet called Hybrid Wavelet type-I and type-II. Feature vector of iris and fingerprint are combined using decision fusion technique and their performance is studied here.

кешбака
Страницы:


A practical guide to innovation strategies based on fact, not feeling The Innovation Formula delivers strategies for building a culture where innovation can thrive, based on actual scientific research. Author Amantha Imber holds a PhD in organisational psychology, and has been called upon by a multinational roster of forward-thinking companies—such as Google, Disney, LEGO and Virgin—to improve innovation at all levels. In this book, she shares her strategies and helps you tap into a substantial body of scientific research to help further innovative practice within your own company. For example, rewarding failed innovations can actually be a critical aspect of building an innovation culture. It's rarely done, but it fosters creative thought by signaling to people that failure is tolerated and is a necessary ingredient in the pursuit of innovation. This kind of practical, easily implemented strategy is the lynchpin of cultural change. This guide shares fourteen separate, yet interconnected strategies for improving your company's innovation culture, and provides illustrative examples of real-world companies who are putting these plans into action. Business innovation guides tend to focus on how one company does it. But it's not your company, and just because it worked for Google or Apple doesn't mean that it's right for you. This book is different; these techniques are based on science, not gut feeling, and can apply to any organisation, at any level. Delve into the science behind successful culture shift For best results, reward innovation, whether or not it succeeds Learn the critical elements that foster organisation-wide creativity Implement practical strategies based on evidence, not anecdotes Fostering a culture of innovation means making your company a safe space for new ideas. Over 95% of business leaders surveyed get it wrong, because intuition cannot compete with data. The Innovation Formula gives you a science-based framework for turning your organisation into one where innovation survives and thrives.
цена science based authentication of botanicals
стоимость science based authentication of botanicals
купить science based authentication of botanicals
продажа science based authentication of botanicals
заказать science based authentication of botanicals
покупкаscience based authentication of botanicals