Experience reading like never before
Sign in to continue reading.
Discover and read thousands of books from independent authors across India
Visit the bookstore"It was a wonderful experience interacting with you and appreciate the way you have planned and executed the whole publication process within the agreed timelines.”
Subrat SaurabhAuthor of Kuch Woh PalProf.Dr.G. Selvavinayagam received his Bachelor’s Degree in Computer Science and Engineering in 2003 under Bharathiyar University and Master’s degree in Computer and Communication in 2009 under Anna University. He has also completed two Master’s degrees for his interest which includes Master of Business Application (Human Resource Management) from Bharathiyar University in 2012 and Master of Science in Psychology from University of Madras in 2009. He has obtained Doctorate in Information and Communication Engineering from PSG College of TecRead More...
Prof.Dr.G. Selvavinayagam received his Bachelor’s Degree in Computer Science and Engineering in 2003 under Bharathiyar University and Master’s degree in Computer and Communication in 2009 under Anna University. He has also completed two Master’s degrees for his interest which includes Master of Business Application (Human Resource Management) from Bharathiyar University in 2012 and Master of Science in Psychology from University of Madras in 2009. He has obtained Doctorate in Information and Communication Engineering from PSG College of Technology under Anna University in the year 2018. He started his career as Lecturer in 2004. He is having 16 years of teaching experience in various cadres. His areas of specialization are Automata Theory, Information Security ,Cryptography and Image Processing. He has published more than 30 papers in International Journals and presented more than 40 papers in International and National Conferences. He is a life member of six professional bodies like Indian Society for Technical Education (ISTE), Institution of Engineers(IEI).He has published eight books. He has received funds from various govt. funding agencies.
Read Less...
Achievements
Dear Parents,
Give your kids their first taste of crafting with My First Craft Book, a brilliant introduction to a world of endless creative possibilities.
With Harini’s easy ideas aimed at children aged from 7 to 11, there are hours of fun to be had. Every project comes with title and cute artworks that guide your child through every step. You’ll find you can make lots of things with just paper and glue in the crafts section
Dear Parents,
Give your kids their first taste of crafting with My First Craft Book, a brilliant introduction to a world of endless creative possibilities.
With Harini’s easy ideas aimed at children aged from 7 to 11, there are hours of fun to be had. Every project comes with title and cute artworks that guide your child through every step. You’ll find you can make lots of things with just paper and glue in the crafts section, while tiny tailors can learn about basic crafting. Kids can move onto bigger projects in the painting section, where there are lots of ideas for creative drawing.
There’s a chance for transforming natural and recycled materials into presents and toys; plus, the holidays will never be boring, with ideas for pumpkin animals, Easter egg cards, and Christmas cookies. Every activity expands your child’s knowledge and once they have mastered the basics they can let their imagination run wild and start work on their own craft projects.
I also included few of my accolades for your kind perusal in separate chapter.
Happy Learning!!!
Dear Readers,
Compiler Design, this book provides basic and advanced concepts of Compiler. It’s a quick reference guide to compiler principles.
My Compiler Design is designed for beginners and professionals both.
Compiler is a translator that converts the high-level language into the machine language.
This book includes all topics of Compiler such as introduction, grammar, parsing, syntax directed translation, symbol table
Dear Readers,
Compiler Design, this book provides basic and advanced concepts of Compiler. It’s a quick reference guide to compiler principles.
My Compiler Design is designed for beginners and professionals both.
Compiler is a translator that converts the high-level language into the machine language.
This book includes all topics of Compiler such as introduction, grammar, parsing, syntax directed translation, symbol table, code optimization, code generation etc.
In today's world, computers have become an integral part of our lives; they are being used in every sphere of human activity whether it is at home, at office, or at play. Fields like education, entertainment, medicine, banking, and telecommunications have been greatly influenced by the use of computers. This pervading presence of computers has made it necessary for everyone to have a fundamental knowledge of the subject. Keeping pace with this trend, most of t
In today's world, computers have become an integral part of our lives; they are being used in every sphere of human activity whether it is at home, at office, or at play. Fields like education, entertainment, medicine, banking, and telecommunications have been greatly influenced by the use of computers. This pervading presence of computers has made it necessary for everyone to have a fundamental knowledge of the subject. Keeping pace with this trend, most of the universities and institutes have integrated the study of computers in their curriculum. The book has been written to meet the requirement of the modern curricula, and it presents the fundamentals of computers in a format that is easy to understand.
This book is also devoted to practical C programming. C is currently the premier language for software developers. That’s because it’s widely distributed and standard. Newer languages are available, such as C++, but these are still evolving. C is still the language of choice for robust, portable programming.
This book emphasizes the skills you will need to do real-world programming. It teaches you the mechanics of the C language. This handbook is written for people with no previous programming experience or programmers who already know C and want to improve their style and reliability. You should have access to a computer and know how to use the basic functions such as a text editor and the filesystem.
IoT (Internet of Things) is an advanced automation and analytics system which exploits networking, sensing, big data, and artificial intelligence technology to deliver complete systems for a product or service. These systems allow greater transparency, control, and performance when applied to any industry or system.IoT systems have applications across industries through their unique flexibility and ability to be suitable in any environment. They enhance data c
IoT (Internet of Things) is an advanced automation and analytics system which exploits networking, sensing, big data, and artificial intelligence technology to deliver complete systems for a product or service. These systems allow greater transparency, control, and performance when applied to any industry or system.IoT systems have applications across industries through their unique flexibility and ability to be suitable in any environment. They enhance data collection, automation, operations, and much more through smart devices and powerful enabling technology.This book aims to provide you with a thorough introduction to IoT. It introduces the key concepts of IoT, necessary in using and deploying IoT systems, Applications of IoT, Sample IoT Projects and IoT Security.This book targets IT professionals, students, and management professionals who want a solid grasp of essential IoT concepts. After completing this book, you will achieve intermediate expertise in IoT and a high level of comfort with IoT concepts and systems.This book assumes general knowledge of networking, sensing, databases, programming, and related technology. It also assumes familiarity with business concepts and marketing.
Speech recognition is an interdisciplinary subfield of Computer Science and Computational Linguistics that develops methodologies and technologies that enable the recognition and translation of spoken language into text by computers. It is also known as Automatic Speech Recognition (ASR), computer speech recognition or Speech To Text (STT). It incorporates knowledge and research in the computer science, linguistics and computer engineering fields.
Some
Speech recognition is an interdisciplinary subfield of Computer Science and Computational Linguistics that develops methodologies and technologies that enable the recognition and translation of spoken language into text by computers. It is also known as Automatic Speech Recognition (ASR), computer speech recognition or Speech To Text (STT). It incorporates knowledge and research in the computer science, linguistics and computer engineering fields.
Some speech recognition systems require "training" (also called "enrollment") where an individual speaker reads text or isolated vocabulary into the system. The system analyzes the person's specific voice and uses it to fine-tune the recognition of that person's speech, resulting in increased accuracy. Systems that do not use training are called "speaker independent" systems. Systems that use training are called "speaker dependent".
This book gives you the knowledge of widely used methods, procedures, concepts and techniques involved in Speech Recognition System such as, Artificial Intelligence, Machine Learning, Deep Learning and Data Mining. It also covers the topics pertaining to Speech Signal Processing and Cyber Security Issues related to Speech Processing.
Data communications refers to the transmission of the digital data between two or more computers and a computer network is a telecommunications network that allows computers to exchange data. The physical connection between networked computing devices is established using either cable media or wireless media. The best-known computer network is the Internet.
This Book should teach you basics of Computer Network (CN) and will also take you through variou
Data communications refers to the transmission of the digital data between two or more computers and a computer network is a telecommunications network that allows computers to exchange data. The physical connection between networked computing devices is established using either cable media or wireless media. The best-known computer network is the Internet.
This Book should teach you basics of Computer Network (CN) and will also take you through various advance concepts related to Data Communication and Computer Network.
IoT (Internet of Things) is an advanced automation and analytics system which exploits networking, sensing, big data, and artificial intelligence technology to deliver complete systems for a product or service. These systems allow greater transparency, control, and performance when applied to any industry or system.
IoT systems have applications across industries through their unique flexibility and ability to be suitable in any environment. They enhan
IoT (Internet of Things) is an advanced automation and analytics system which exploits networking, sensing, big data, and artificial intelligence technology to deliver complete systems for a product or service. These systems allow greater transparency, control, and performance when applied to any industry or system.
IoT systems have applications across industries through their unique flexibility and ability to be suitable in any environment. They enhance data collection, automation, operations, and much more through smart devices and powerful enabling technology.
This book aims to provide you with a thorough introduction to IoT. It introduces the key concepts of IoT, necessary in using and deploying IoT systems, Applications of IoT, Sample IoT Projects and IoT Security.
This book targets IT professionals, students, and management professionals who want a solid grasp of essential IoT concepts. After completing this book, you will achieve intermediate expertise in IoT and a high level of comfort with IoT concepts and systems.This book assumes general knowledge of networking, sensing, databases, programming, and related technology. It also assumes familiarity with business concepts and marketing.
Digital image processing deals with manipulation of digital images through a digital computer. It is a subfield of signals and systems but focus particularly on images. DIP focuses on developing a computer system that is able to perform processing on an image. The input of that system is a digital image and the system process that image using efficient algorithms, and gives an image as an output. The most common example is Adobe Photoshop. It is one of the wid
Digital image processing deals with manipulation of digital images through a digital computer. It is a subfield of signals and systems but focus particularly on images. DIP focuses on developing a computer system that is able to perform processing on an image. The input of that system is a digital image and the system process that image using efficient algorithms, and gives an image as an output. The most common example is Adobe Photoshop. It is one of the widely used applications for processing digital images.
The volume of data that one has to deal has exploded to unimaginable levels in the past decade, and at the same time, the price of data storage has systematically reduced. Private companies and research institutions capture terabytes of data about their users’ interactions, business, social media, and also sensors from devices such as mobile phones and automobiles. The challenge of this era is to make sense of this sea of data. This is where big data ana
The volume of data that one has to deal has exploded to unimaginable levels in the past decade, and at the same time, the price of data storage has systematically reduced. Private companies and research institutions capture terabytes of data about their users’ interactions, business, social media, and also sensors from devices such as mobile phones and automobiles. The challenge of this era is to make sense of this sea of data. This is where big data analytics comes into picture.
Big Data Analytics largely involves collecting data from different sources, munge it in a way that it becomes available to be consumed by analysts and finally deliver data products useful to the organization business.
The process of converting large amounts of unstructured raw data, retrieved from different sources to a data product useful for organizations forms the core of Big Data Analytics.
In this book, we will discuss the most fundamental concepts and methods of Big Data Analytics.
This book has been prepared for software professionals aspiring to learn the basics of Big Data Analytics. Professionals who are into analytics in general may as well use this book to good effect.
Before you start proceeding with this book, we assume that you have prior exposure to handling huge volumes of unprocessed data at an organizational level.
Through this book, we will develop a mini project to provide exposure to a real-world problem and how to solve it using Big Data Analytics.
This book provides introductory knowledge on Artificial Intelligence. It would come to a great help if you are about to select Artificial Intelligence as a course subject. You can briefly know about the areas of AI in which research is prospering.This book is prepared for the students at beginner level who aspire to learn Artificial Intelligence. The basic knowledge of Computer Science is mandatory. The knowledge of Mathematics, Languages, Science, Mechan
This book provides introductory knowledge on Artificial Intelligence. It would come to a great help if you are about to select Artificial Intelligence as a course subject. You can briefly know about the areas of AI in which research is prospering.This book is prepared for the students at beginner level who aspire to learn Artificial Intelligence. The basic knowledge of Computer Science is mandatory. The knowledge of Mathematics, Languages, Science, Mechanical or Electrical engineering is a plus.
Cyber Security in OSI Layers provides basic and advanced concepts Layered Computer network Architecture and Cyber Security technology. Our book is designed for beginners and Students.
Our book includes all topics of fundamentals of Computer Networks and Cyber Security such as what is Computer Network, Network Types , Components, Layered Architecture, Cyber Security, cyber security goals, types of cyber attacks, types of cyber attackers, etc.
Be
Cyber Security in OSI Layers provides basic and advanced concepts Layered Computer network Architecture and Cyber Security technology. Our book is designed for beginners and Students.
Our book includes all topics of fundamentals of Computer Networks and Cyber Security such as what is Computer Network, Network Types , Components, Layered Architecture, Cyber Security, cyber security goals, types of cyber attacks, types of cyber attackers, etc.
Before Learning Cyber Security in OSI Layers , you must have the basic knowledge of Computer Networks, Web applications, system administration, Networking and Hardware /Software.
EIGHT Chapters will be discussing about Cyber Security in OSI Layers in this book.
Cryptanalysis is the investigation of systems, ciphertext, and ciphers in order to reveal the hidden meaning or details of the system itself. The goal of this type of study is to discover the hidden aspects even if the key or main algorithm is unable to be deciphered. This book
The only way to learn cryptanalysis is through practice. A person simply has to break algorithm after algorithm, inventing new techniques and modifying existing ones. Reading ot
Cryptanalysis is the investigation of systems, ciphertext, and ciphers in order to reveal the hidden meaning or details of the system itself. The goal of this type of study is to discover the hidden aspects even if the key or main algorithm is unable to be deciphered. This book
The only way to learn cryptanalysis is through practice. A person simply has to break algorithm after algorithm, inventing new techniques and modifying existing ones. Reading others’ cryptanalysis results helps, but there is no substitute for experience. This books gives the fundamental ideas and categories of cryptanalysis.
Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.
Cyber security is important because government, military, corporate, financial, and medical organizations collect, process, and store unprecedented amounts of data on computers and other devices. A sign
Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.
Cyber security is important because government, military, corporate, financial, and medical organizations collect, process, and store unprecedented amounts of data on computers and other devices. A significant portion of that data can be sensitive information, whether that be intellectual property, financial data, personal information, or other types of data for which unauthorized access or exposure could have negative consequences.This book covers the various types of cyberthreats. It explains what can be done to mitigate these risks and keep the organisation or even personal data secure. It has real-world examples and consequences of them and the possible actions to be taken to avoid them.
This book helps one to make his or her better as a person. It helps to change your thoughts and attitude towards various aspects of your life. This book is suited for both students as well as employees.
This book helps one to make his or her better as a person. It helps to change your thoughts and attitude towards various aspects of your life. This book is suited for both students as well as employees.
Cryptography is an indispensable tool for protecting information in computer systems. In this book you will learn the fundamental principles of cryptographic algorithms and know how the cryptographic systems are involved in real-world applications to provide the security to the information.
Cryptography is an indispensable tool for protecting information in computer systems. In this book you will learn the fundamental principles of cryptographic algorithms and know how the cryptographic systems are involved in real-world applications to provide the security to the information.
21st century has been defined by application of and advancement in information technology. Information technology has become an integral part of our daily life.Information technology has served as a big change agent in different aspect of business and society. It has proven game changer in resolving economic and social issues. Advancement and application of information technology are ever changing. Some of the latest trends in the information techno
21st century has been defined by application of and advancement in information technology. Information technology has become an integral part of our daily life.Information technology has served as a big change agent in different aspect of business and society. It has proven game changer in resolving economic and social issues. Advancement and application of information technology are ever changing. Some of the latest trends in the information technology are discussed in this book in an easily understanaable way.
The book tells about the impact of one dimensional cellular automata rules in image cryption in research point of view.
The book tells about the impact of one dimensional cellular automata rules in image cryption in research point of view.
The main aim of the book is to present the matter in a simple and student friendly manner. It will serve as a comprehensive text book on computer security for UG and PG Courses. The book has been organized in a such a manner that the concepts of explained with suitable illustrations.
The main aim of the book is to present the matter in a simple and student friendly manner. It will serve as a comprehensive text book on computer security for UG and PG Courses. The book has been organized in a such a manner that the concepts of explained with suitable illustrations.
The main aim of the book is to present the matter in a simple and student friendly manner. It will serve as a comprehensive text book on automata theory for UG and PG Courses. The book has been organized in a such a manner that the concepts of explained with suitable illustrations and graded exercises.
The main aim of the book is to present the matter in a simple and student friendly manner. It will serve as a comprehensive text book on automata theory for UG and PG Courses. The book has been organized in a such a manner that the concepts of explained with suitable illustrations and graded exercises.
Are you sure you want to close this?
You might lose all unsaved changes.
The items in your Cart will be deleted, click ok to proceed.