S. Chand’s ICSE Mathematics Class -X


Book Description

S Chand’s ISC Mathematics is structured according to the latest syllabus as per the new CISCE(Council for the Indian School Certificate Examinations), New Delhi, for ISC students taking classes XI & XII examinations.




MATRIX OF THE UNIVERSE


Book Description

The theory of Matrix series of books offers the exiting developments in cosmological theory. ‘Matrix of the Universe’ is the 6th book of the series. In this book, we discuss the structure of the Universe, certain aspects of its evolution, energy, matter, space, and time. We combine elements of psychology, cosmology, and astrophysics to discover secrets hidden deep in the Universe. ‘Can we picture to ourselves a three-dimensional universe which is finite, yet unbounded? The usual answer to this question is “No,” but that is not the right answer.’ Albert Einstein ‘Geometry and Experience’ (1922) Stay well, and enjoy your reading. Yours sincerely, Audrey Elizabeth Randles DECEMBER 28, 2020




Linear Algebra


Book Description







Cyber Security and Digital Forensics


Book Description

CYBER SECURITY AND DIGITAL FORENSICS Cyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all of these changes. Current cyber threats are getting more complicated and advanced with the rapid evolution of adversarial techniques. Networked computing and portable electronic devices have broadened the role of digital forensics beyond traditional investigations into computer crime. The overall increase in the use of computers as a way of storing and retrieving high-security information requires appropriate security measures to protect the entire computing and communication scenario worldwide. Further, with the introduction of the internet and its underlying technology, facets of information security are becoming a primary concern to protect networks and cyber infrastructures from various threats. This groundbreaking new volume, written and edited by a wide range of professionals in this area, covers broad technical and socio-economic perspectives for the utilization of information and communication technologies and the development of practical solutions in cyber security and digital forensics. Not just for the professional working in the field, but also for the student or academic on the university level, this is a must-have for any library. Audience: Practitioners, consultants, engineers, academics, and other professionals working in the areas of cyber analysis, cyber security, homeland security, national defense, the protection of national critical infrastructures, cyber-crime, cyber vulnerabilities, cyber-attacks related to network systems, cyber threat reduction planning, and those who provide leadership in cyber security management both in public and private sectors




Handbook of Display Technology


Book Description

This book presents a comprehensive review of technical and commercial aspects of display technology. It provides design engineers with the information needed to select proper technology for new products. The book focuses on flat, thin displays such as light-emitting diodes, plasma display panels, and liquid crystal displays, but it also includes material on cathode ray tubes. Displays include a large number of products from televisions, auto dashboards, radios, and household appliances, to gasoline pumps, heart monitors, microwave ovens, and more.For more information on display technology, go to the experts: http://www.insightmedia.info/




Good Habits for Great Coding


Book Description

Improve your coding skills and learn how to write readable code. Rather than teach basic programming, this book presumes that readers understand the fundamentals, and offers time-honed best practices for style, design, documenting, testing, refactoring, and more. Taking an informal, conversational tone, author Michael Stueben offers programming stories, anecdotes, observations, advice, tricks, examples, and challenges based on his 38 years experience writing code and teaching programming classes. Trying to teach style to beginners is notoriously difficult and can easily appear pedantic. Instead, this book offers solutions and many examples to back up his ideas. Good Habits for Great Coding distills Stueben's three decades of analyzing his own mistakes, analyzing student mistakes, searching for problems that teach lessons, and searching for simple examples to illustrate complex ideas. Having found that most learn by trying out challenging problems, and reflecting on them, each chapter includes quizzes and problems. The final chapter introduces dynamic programming to reduce complex problems to subcases, and illustrates many concepts discussed in the book. Code samples are provided in Python and designed to be understandable by readers familiar with any modern programming language. At the end of this book, you will have acquired a lifetime of good coding advice, the lessons the author wishes he had learned when he was a novice. What You'll Learn Create readable code through examples of good and bad style Write difficult algorithms by comparing your code to the author's code Derive and code difficult algorithms using dynamic programming Understand the psychology of the coding process Who This Book Is For Students or novice programmers who have taken a beginning programming course and understand coding basics. Teachers will appreciate the author's road-tested ideas that they may apply to their own teaching.




The Key Codes of Fu Hsi & King Wen


Book Description

This book contains a series of research notes and graphical illustrations selected from the author’s amazing research work. It shows how: · The Sixty-Four hexagrams were derived by using combinatory trigrams selected from the Earlier Heaven and Later Heaven trigram cyclic sequences. · The legendary authors of the I Ching, known as Fu Hsi and King Wen, used Key Coded Matrices which enabled them to change the hexagrams of the ancient Ma-wang-tui into the Standard Modern edition. · The formulation of the Trigram Order of Completion was derived by using Knight’s Chess /binary codes and the manipulation of hexagram identification numbers. · The cyclic sequences and trigram line to line transitions were utilized to formulate the King Wen’s hexagram arrangement. · The natural numerical notation for each individual trigram was mathematically derived. · The author’s inter-face code was derived and used to determine the mathematical methodology of the Genetic Code. · Trigram lines are manipulated to form the Inner and Outer Nuclear trigrams/ hexagrams. · The Genetic Code was determined from Fu Hsi’s diagram of the derivation of the Sixty-Four hexagrams. It also includes the constructional details of an analytical model calculator which can be created from the actual design details shown within this book. This document provides the conclusive evidence that the originator(s) of the I Ching used a mathematical system which encompassed a formalistic natural philosophy that sought to embrace the entire world in a system of number symbolism. It shows the links to the ancient Indian Vedic mathematical system which reveals the relationship between the I Ching and the Binary / Genetic Codes.




Numerical Methods for Scientists and Engineers


Book Description

This book presents an exhaustive and in-depth exposition of the various numerical methods used in scientific and engineering computations. It emphasises the practical aspects of numerical computation and discusses various techniques in sufficient detail to enable their implementation in solving a wide range of problems.




Digital Communications


Book Description

There are eight chapters, useful appendix and solved question papers in the book. Basic digital communication, line codes and sampling methods are presented at the beginning. Digital pulse modulation techniques such as PCM, DPCM, DM, ADM are presented. Continuous wave digital modulation methods such as BPSK, DPSK, QPSK, QAM, BFSK and OOK are presented with mathematical analysis of modulators and receivers. Issues related to baseband transmission such as ISI, Nyquist pulse shaping criterian, optimum reception, matched filter and eye patterns are also discussed. Concepts of information theory such as discrete memoryless channels, mutual information, shannon's theorems on source coding are also presented. Coding using linear block codes, cyclic codes and convolutional coding is also discussed. Secured communication using spread spectrum modulation is also discussed in detail.