Best Selling Books by Vimal Kumar

Vimal Kumar is the author of Introduction to Atomic and Molecular Spectroscopy (2007), Leading and Motivating Global Teams (2017), Secure Sensor Cloud (2018), The Cricket Fanatic's Essential Guide (2015) and other 46 books.

For more book recommendations, please check out New York Times® Best Sellers, Children's Book Recommendations or the complete list of Featured Book Lists and Award Winners

1 - 40 of 50 results
>>

Introduction to Atomic and Molecular Spectroscopy

release date: Jan 01, 2007
Introduction to Atomic and Molecular Spectroscopy
Discusses one electron system, vector representation of momenta and vector coupling approximations, atomic spectra of hydrogen atom, alkali metal atoms, helium and two valence electron systems, X-ray spectroscopy, hyperfine structure and isotope shifts, linewidths, effect of external fields on atoms, and more.

Leading and Motivating Global Teams

release date: May 17, 2017
Leading and Motivating Global Teams
This book provides techniques for offshore center managers and head office managers to motivate and manage globally distributed teams, which are spread across the offshore center and the head office, and thereby achieve higher productivity. Readers learn how to integrate the offshore center with the head office to make the offshore team an extension of the head office. While integrating teams with the head office, offshore center managers can still retain independence and authority to meet team aspirations. The book provides insight into devising new organizational structures to balance the authority and responsibilities of offshore center and head office managers. Head office managers responsible for managing globally distributed projects learn how to achieve a higher success rate on their projects and be better rewarded for their efforts in offshoring. Head office managers also learn techniques to make more significant contributions in their expatriate assignments to the offshore center. This book guides both the offshore center managers and the head office managers to fully realize the potential of the offshore center, which can result in higher revenues and profitability.

Secure Sensor Cloud

release date: Dec 17, 2018
Secure Sensor Cloud
The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It enables a multi-user on-demand sensory system, where computing, sensing, and wireless network resources are shared among applications. Therefore, it has inherent challenges for providing security and privacy across the sensor cloud infrastructure. With the integration of WSNs with different ownerships, and users running a variety of applications including their own code, there is a need for a risk assessment mechanism to estimate the likelihood and impact of attacks on the life of the network. The data being generated by the wireless sensors in a sensor cloud need to be protected against adversaries, which may be outsiders as well as insiders. Similarly, the code disseminated to the sensors within the sensor cloud needs to be protected against inside and outside adversaries. Moreover, since the wireless sensors cannot support complex and energy-intensive measures, the lightweight schemes for integrity, security, and privacy of the data have to be redesigned. The book starts with the motivation and architecture discussion of a sensor cloud. Due to the integration of multiple WSNs running user-owned applications and code, the possibility of attacks is more likely. Thus, next, we discuss a risk assessment mechanism to estimate the likelihood and impact of attacks on these WSNs in a sensor cloud using a framework that allows the security administrator to better understand the threats present and take necessary actions. Then, we discuss integrity and privacy preserving data aggregation in a sensor cloud as it becomes harder to protect data in this environment. Integrity of data can be compromised as it becomes easier for an attacker to inject false data in a sensor cloud, and due to hop by hop nature, privacy of data could be leaked as well. Next, the book discusses a fine-grained access control scheme which works on the secure aggregated data in a sensor cloud. This scheme uses Attribute Based Encryption (ABE) to achieve the objective. Furthermore, to securely and efficiently disseminate application code in sensor cloud, we present a secure code dissemination algorithm which first reduces the amount of code to be transmitted from the base station to the sensor nodes. It then uses Symmetric Proxy Re-encryption along with Bloom filters and Hash-based Message Authentication Code (HMACs) to protect the code against eavesdropping and false code injection attacks.

The Cricket Fanatic's Essential Guide

release date: Jan 30, 2015
The Cricket Fanatic's Essential Guide
The one-stop guide to the 2015 World Cup Cricket is not just a game, it’s a religion. And every four years, new gods are created on the field. Each World Cup kicks off pitched battles and fan frenzy, with every match, every player and every run being analysed with fervour and recorded with vigour. This essential guide is a companion volume for every cricket-crazy follower who wants the facts, statistics and details about the World Cup right on hand. The Cricket Fanatic’s Essential Guide is jam-packed with important and fascinating, often overlooked and sometimes long-forgotten information on the 40 thrilling years of the World Cup, its matches, its players and its results. Put together by reputed sports journalist Vimal Kumar, this reader-friendly compendium is invaluable for every passionate enthusiast of the game and a perfect primer for the 2015 World Cup. PLUS Madan Lal, K. Srikkanth, M.S. Dhoni and Yuvraj Singh on India’s World Cup triumphs Top teams, coaches and players in all categories across the World Cups Tracking charts for the 2015 matches with all timings in IST.

Python Programming

release date: Sep 07, 2021
Python Programming
Maintaining a practical perspective, Python Programming: A Practical Approach acquaints you with the wonderful world of programming. The book is a starting point for those who want to learn Python programming. The backbone of any programming, which is the data structure and components such as strings, lists, etc., have been illustrated with many examples and enough practice problems to instill a level of self-confidence in the reader. Drawing on knowledge gained directly from teaching Computer Science as a subject and working on a wide range of projects related to ML, AI, deep learning, and blockchain, the authors have tried their best to present the necessary skills for a Python programmer. Once the foundation of Python programming is built and the readers are aware of the exact structure, dimensions, processing, building blocks, and representation of data, they can readily take up their specific problems from the area of interest and solve them with the help of Python. These include, but are not limited to, operators, control flow, strings, functions, module processing, object-oriented programming, exception and file handling, multithreading, synchronization, regular expressions, and Python database programming. This book on Python programming is specially designed to keep readers busy with learning fundamentals and generates a sense of confidence by attempting the assignment problems. We firmly believe that explaining any particular technology deviates from learning the fundamentals of a programming language. This book is focused on helping readers attempt implementation in their areas of interest through the skills imparted through this book. We have attempted to present the real essence of Python programming, which you can confidently apply in real life by using Python as a tool. Salient Features  Based on real-world requirements and solution.  Simple presentation without avoiding necessary details of the topic.  Executable programs on almost every topic.  Plenty of exercise questions, designed to test readers’ skills and understanding. Purposefully designed to be instantly applicable, Python Programming: A Practical Approach provides implementation examples so that the described subject matter can be immediately implemented due to the well-known versatility of Python in handling different data types with ease.

All for Love. Refuting the Homoerotic in Shakespeare's Merchant of Venice

release date: Jul 16, 2014
All for Love. Refuting the Homoerotic in Shakespeare's Merchant of Venice
Essay from the year 2011 in the subject English - Literature, Works, grade: B, , course: Eng 382, language: English, abstract: LOVE is the essence of human existence. However what happens when a person is torn between two lovers. Do we love them both or do we sacrifice one. The Merchant of Venice truly is a play about love. Love between two men and love between a man and a women. Love between Anotonio and Bassanio and love between Bassanio and Portia. However, when talking about love between the two male characters of this play, this paper has adopted the position that their love is not homoerotic in nature. This two types of love discussed in this paper is defined from two variants of the word love in the greek lanaguage "Love agape and love eros. This paper also seeks to establish the desires each type of love expresses to Bassanio and sees how they are in competition with each other to win the object of their affection.

Parshu - A MAN WITH AXE

release date: Nov 19, 2020
Parshu - A MAN WITH AXE
Have you heard about Lord Parshuram ? You might have, but have you ever thought about this avatar's past? How furious this man, who was born to sage, can be? What is the story of this man, whose name is named after a weapon. Parshu - A MAN WITH AXE: A tale of an avatar, which is not as popular as others are. This is a story about a man, who was born to sage but turns out to be a furious and ruthless warrior, who himself is unaware of being an avatar, Whose name is named after a weapon. Rejecting the Caste, clans, parents, and other social laws, he walks his journey to learn directly from his God. This difficult journey was almost impossible to be travelled by himself alone, He received aids, from his friends who gifts him some devasting weapons which is even unknown by an avatar himself. Regretting for his journey, he marches to find the place of his God for his weapon mastery. In journey, he gets some precious knowledge which cannot be dejected by him. The rising of problem made him doubt on his God. Asura: While an avatar was busy building his journey for being a weapon master, Other side, the tribe of an Asuras are preparing themself. They are well aware of this avatar and they know where the avatar will march after the completion of his mastery. Numbers of kings, chiefs and commanders changes, due to civil wars and at last a great invincible man stands to make himself act as a shield for his evil asura's tribe. The avatar which was born, is nominated to destroy them, Completely as a penance for his teachings. By this a secret weapon's location, which can make a man invincible, gets revealed. Can he complete his journey and the task ? Kshatriya, who is also well popular as thousand armed king, stands after the Asuras to get his guts as the conqueror of the whole world. Since, being to small evil, that was not noticeable, he gets his seats as a conqueror of world.

An Improved Method for Fracture Toughness Evaluation in the Linear Elastic Range, and a Comparison with Elastic-plastic Data Obtained with Smaller Specimens

CS-612 Software Application Skills

release date: Feb 25, 2010

Physics of Atoms, Molecules, Solids and Nuclei

release date: Jan 31, 2017

Sachin

release date: Mar 15, 2013
Sachin
Part of India’s World Cup–winning squad and the team that took India to its No. 1 Test ranking, Sachin Tendulkar has blazed his way through the cricketing world for more than two decades, tearing through matches and records alike. The highest run-getter in both Tests and ODIs in the history of the game, he has also reached what is a truly fabulous milestone—one hundred international centuries. Sachin: Cricketer of the Century takes the reader on a journey from stellar innings to stellar innings, surveying the batting genius,s brilliant career through the eyes of a pantheon of people who are legends in their own right—from Adam Gilchrist, Matthew Hayden, Nasser Hussain and Courtney Walsh to Waqar Younis, Sanath Jayasuriya, Kapil Dev, Sourav Ganguly and Rahul Dravid. This is the ultimate tribute to the greatest batsman the modern era has seen.

CS-60 Foundation Course In Maths For Computing

release date: Aug 07, 2010

Solid State Physics

release date: Sep 23, 2022
Solid State Physics
The book has been designed as a textbook for graduate and postgraduate students of physics, material science, and engineering. This is the third edition of the textbook, that is updated to reflect recent works in the field. In this edition, some new topics have been introduced while some of the existing topics like phonons, Drude –Lorentz model, Fermi levels, electrons, and holes, etc. are modified. Moreover, the book has complete information on semiconductor devices like tunnel diode, Gunn diode, photodiode, photoconductive diode, varactor diode, solar cell, LED, semiconductor lasers, and semiconductor detectors. All the chapters have been supplemented by solved and unsolved examples. Some of the chapters illustrate areas of current interest in solid-state physics to give the student practical working knowledge of the subject text in a simple and lucid manner. There is a fair amount of detail in the examples and derivations given in the text. Each section of the book has exercises to reinforce the concepts, and problems have been added at the end of each chapter. The detailed coverage and pedagogical tools make this an ideal textbook for students and researchers enrolled in graduate and postgraduate courses of physics, material science, and engineering.

Introduction to Quantum Mechanics

release date: Jan 01, 2010
Introduction to Quantum Mechanics
Introduction to Quantum Mechanics provides the foundation for much of one's future work in atomic, molecular and nuclear physics. The topics included in this book are various experiments that laid the foundation of quantum mechanics and discusses the Schrodinger wave equation, General formalism of Quantum mechanics, Particle in a box, The Step potential and Potential barriers, Angular momentum, Hydrogen atom, Harmonic oscillator, Approximation method for stationary state, Time dependent perturbation theory, Semiclassical theory of radiation, Atoms in external field, Scattering theory, Identical particles.

On the Dynamics of Property Rights

release date: Jan 01, 2008
On the Dynamics of Property Rights
This dissertation contains two stand-alone research projects within the context of dynamics of property rights.

Cognitive Effects of Physical Models in Engineering Idea Generation

release date: Jan 01, 2013
Cognitive Effects of Physical Models in Engineering Idea Generation
Designers use various representations to externalize their ideas, physical models being an important one. Physical models are widely used by designers and their use is promoted as an effective design tool by industry and government agencies. However, very little is known about the cognitive effects of physical models in the design process; the available guidelines are conflicting. Some researchers argue for the frequent implementation of physical models, while others observe that the use of physical models fixates designers. In light of these conflicts, the research discussed in this dissertation focuses on understanding the cognitive effects of physical models and developing guidelines for aiding designers in their implementation. A combination of controlled lab studies and qualitative studies is adopted to achieve said goal. The results from the controlled studies show that physical models supplement designers' erroneous mental models and help them to come up with more ideas satisfying the problem requirements. These studies also demonstrate that design fixation is not inherent in physical modeling, but it is caused by the Sunk Cost Effect. According to Sunk Cost Effect, as designers spend more time building physical models of their initial ideas, they tend to fixate more to the variations of those ideas. A qualitative study on industry-sponsored projects and development cases of award-winning products further supports these results in more realistic situations. Further, the studies reported in this dissertation show that physical models can be effective tools for the mitigation of fixation to undesirable design features in a flawed example; however, these results can also depend upon the experience level of a designer in solving open-ended design problems. With these insights from the series of studies, a set of guidelines and a Model Error Reeducation Method (MERM) are formulated and tested with novice designers. MERM helps designers in identifying critical loads and interface designs they miss in their original designs, before prototyping. The results from the testing of this method show that this method is very useful in avoiding said errors in physical modeling. The electronic version of this dissertation is accessible from http://hdl.handle.net/1969.1/148053

Effects of Representations in Engineering Idea Generation Process

release date: Jan 01, 2012
Effects of Representations in Engineering Idea Generation Process
In today̕ s competitive market, it is essential to be innovative and creative for an industry to sustain. Industry need to introduce new products to the market. Engineering idea generation plays a vital role in the development of new products. This research study is focused on the engineering idea generation. The representations of ideas have an important impact on the idea generation process. Design concepts may be represented in a variety of forms like sketches, physical models or computer based models. The goal of this research is to understand how these various representations affect design cognition. In this thesis, three studies showing the effects of two different representations in the idea generation process are presented. The first study focuses on the effects of physical models in engineers̕ design cognition. This preliminary study investigates two different hypotheses: (1) Physical models supplement and improve designer̕ s mental models and (2) Physical models induce design fixation. The results show that physical models supplement the designer̕ s mental models but fail to enhance them. No evidence of design fixation is observed. The second and third studies investigate the effects of computer-based idea generation software on design cognition. The research questions investigated in this study are: (1) How does the use of this software tool assist design cognition? (2) How can the software interface be improved so that designers can generate ideas more easily? To answer these questions, a between-subjects idea generation experiment is conducted. In the experiment, the participants are asked to generate ideas to solve a design problem with and without the software. The results show that participants who generated ideas with the help of the software tool have less quantity of ideas compared to the control group. This may be due to the design fixation induced by the concepts presented. In the third study, the opinions of the participants for the improvements of the software interface are collected. Results show that participants do not have any preference of one way of clustering the concepts over the other. The results of this study also provide creative input for the future improvement of the software.

Identifying and Dealing with Your "negative Boss" and "negative Peer Managers"

release date: Jan 01, 2012
Identifying and Dealing with Your "negative Boss" and "negative Peer Managers"
A "negative manager" is a manager who is incapable of handling his or her responsibilities, but hides his or her incapabilities from the organization. He or she covers up his or her shortcomings by resorting to undue means--unethical behavior, lies, cunningness, politics, ill-manners, and so forth. This paper discusses a special breed of managers termed "negative managers." These managers are not capable of handling their responsibilities and hence resort to undue means to hide their incapability, such as unethical behavior, lies, cunningness, politics, ill-manners, and so forth. Capable project managers generally expect the HR department to identify negative managers around them and take action. However, negative managers act in such a subtle fashion that it may take a very long time for HR to identify them; by that time, they would have caused significant harm to you. Instead, the authors suggest you stop living in a bubble and proactively accept the responsibility of identifying and dealing with negative managers, and reporting them to HR. The paper examines ways to identify and deal with your "negative boss" and "negative peer managers." It presents case studies from leading global software product and services organizations, such as Novell Inc., QLogic Inc., and Mindteck.

Optical Quantification of Hemolysis, Icterus, and Lipemia in Human Serum

release date: Jan 01, 2013

Project Identification and Evaluation Techniques for Transportation Infrastructure

Project Identification and Evaluation Techniques for Transportation Infrastructure
Project identification and evaluation of transportation infrastructure play a vital role in shaping and sustaining the forms of cities all over the world. These cities differ substantially in character and urban form and have different transport systems and transport related problems. Most large cities in the developing world face major problems as a result of rapid population growth, extensive urbanization, market uncertainties, scarcity of resources and inadequate planning capabilities. Transport policies and procedures that worked reasonably well when cities were smaller start failing as they expand, while environmental and social problems become more pressing. The traditional methodologies for evaluating urban transportation infrastructure projects are unable to address issues of most concern in developing countries. The thesis outlines a framework for assessing the role of various planning and evaluation methodologies for transportation infrastructure projects. The framework developed for project identification and evaluation serves as a useful tool to structure and assess the gaps identified from a literature review and case studies. The major gaps identified can be listed as: * Lack of integrated approach for transportation infrastructure and land-use planning; * Inadequate provision for maintenance and monitoring of transport facilities; * Unequal distribution of benefits of transport for women; * Limited rural transport infrastructure; and * Lack of suitable financing arrangements and no incorporation of sustainable development measures. The overall transportation planning and evaluation process can be improved by incorporating certain steps and requirements that address these gaps and make transportation infrastructure more accessible, safer, reliable, and efficient.

Toxicology at a Glance

release date: Jan 01, 2012

From Mental Illness to Mental Health

release date: Jan 01, 2007

Origin and Development of Earth Science

release date: Jan 01, 2008

Remote Accommodations

release date: Jan 01, 2018
Remote Accommodations
A new delivery model has emerged in today's global IT organizations. Software projects are executed by both the main office and a satellite office in another country, with the home office project manager assigning project components to teams in each location. In this situation, the offshore center team is expected to follow home office norms, including its project management processes, team hierarchies and documentation standards. However, since these norms are not tuned to the unique requirements and expectations of the offshore center teams, these teams often fail to deliver on the project objectives. To make the most of the offshore/home office model, the project manager needs to understand when unique characteristics make it necessary for the offshore center team to follow a different set of project management norms.

A Follow-up Study of the Depressed Elderly Living in the Community

release date: Jan 01, 1992

Evaluation of Thermodynamic and Kinetic Parameters for Electron Transfer and Following Chemical Reaction from a Global Analysis of Current-potential-time Data ; Electro-catalytic Detection in High Performance Liquid Chromatography of Vitamin B12 and Other Molecules of Biological and Environmental Interest

release date: Jan 01, 1992

Biomimetic Composite T-joints

release date: Jan 01, 2011
Biomimetic Composite T-joints
Composite structural joints, as observed throughout the natural world, have been systematically altered and proven via lengthy evolutionary processes. Biological fixed joints tend to exhibit unique attributes, including highly optimized fiber paths to minimize stress concentrations. In addition, since the joints consist of continuous, uncut fiber flow patterns, the joint does not inhibit the biological organism in the transportation of information, chemicals and food from one part of the body to the other. To the contrary, large sections of man-made composite material structures are often joined using bolted or bonded joints, which involve low strength and high stress concentrations. These methods are also expensive to achieve. Additional functions such as fluid transport, electrical signal delivery, and electrical and thermal conductivity across the joints typically require parasitic tubes, wires, and clips. By using the biomimetic methods, we seek to overcome the limitations which are present in the conventional methods. In the present work, biomimetic co-cured composite sandwich T-joints were constructed using unidirectional glass fiber, epoxy resin, and structural foam. The joints were fabricated using the wet lay-up vacuum bag resin infusion method. Foam sandwich T-joints with multiple continuous fiber architectures and sandwich foam thickness were prepared. The various joint designs were tested quasi-statically in bending of the T in a calibrated screw-driven load frame. Custom, purpose-designed fixtures were required to support the base of the joint during the bending load. The weight savings using the biomimetic approaches is discussed, as well as a comparison of failure modes versus fiber/core architectures is given. In addition to developing structurally optimized, weight-efficient joints, a tremendous ancillary benefit to the approach is the ability to easily embed wires and micro tubes contiguous across the joined elements. This approach is key to achieving true robust structural multi-functionality.

Classical Mechanics

release date: Jan 01, 2014

A Range-gated Ultrasonic Pulse Doppler Blood Flowmeter

Energy Efficient Security and Privacy Management in Sensor Clouds

release date: Jan 01, 2014
Energy Efficient Security and Privacy Management in Sensor Clouds
"Sensor Cloud is a new model of computing for Wireless Sensor Networks, which facilitates resource sharing and enables large scale sensor networks. A multi-user distributed system, however, where resources are shared, has inherent challenges in security and privacy. The data being generated by the wireless sensors in a sensor cloud need to be protected against adversaries, which may be outsiders as well as insiders. Similarly the code which is disseminated to the sensors by the sensor cloud needs to be protected against inside and outside adversaries. Moreover, since the wireless sensors cannot support complex, energy intensive measures, the security and privacy of the data and the code have to be attained by way of lightweight algorithms. In this work, we first present two data aggregation algorithms, one based on an Elliptic Curve Cryptosystem (ECC) and the other based on symmetric key system, which provide confidentiality and integrity of data against an outside adversary and privacy against an in network adversary. A fine grained access control scheme which works on the securely aggregated data is presented next. This scheme uses Attribute Based Encryption (ABE) to achieve this objective. Finally, to securely and efficiently disseminate code in the sensor cloud, we present a code dissemination algorithm which first reduces the amount of code to be transmitted from the base station. It then uses Symmetric Proxy Re-encryption along with Bloom filters and HMACs to protect the code against eavesdropping and false code injection attacks."--Abstract, page iv.

Managing Challenges of Leading, Motivating, and Grooming Talent in Small Teams

release date: Jan 01, 2014
Managing Challenges of Leading, Motivating, and Grooming Talent in Small Teams
Managing large projects and project teams is a complex problem, producing a significant amount of published work focused on addressing the associated challenges. However, a number of projects, both in large and small companies, involve managing small teams. Although managing small teams seems easy, actually it presents a number of unique challenges that are immensely different from challenges faced in managing large teams. A major issue not being sufficiently addressed is meeting the challenges in managing the "human dimension"--assigning managers/team members roles based on their strengths; building their skills through training/mentoring; motivating them; managing their growth aspirations; managing the significant impact of attrition on small teams, etc. This paper explores such challenges in managing small teams and suggests solutions. Cases in both large organizations and small companies/startups are considered and approaches to be adopted in both product development and services projects are explored. The work is based on experiences of managing small teams in global leading software companies such as Novell, Cabletron, QLogic, Atheros, and Mindteck.

Composting of Silt Trap from Patawolonga Catchment

release date: Jan 01, 2009

Extra Effort

release date: Jan 01, 2019
Extra Effort
Global companies looking to develop product components featuring advanced or new technology often outsource these projects. However, this outsourcing poses more challenges for clients than getting external help on run-of-the-mill projects, because selecting and fully collaborating with the right vendor are more important to achieving project success.

Origin and Development of Geology

release date: Jan 01, 2008
1 - 40 of 50 results
>>


  • Aboutread.com makes it one-click away to discover great books from local library by linking books/movies to your library catalog search.

  • Copyright © 2022 Aboutread.com