The sterically induced packing of bent-shape molecules forms unique smectic phases, which have no counterpart in conventional calamitic liquid crystals. The structural features of the new mesophases observed from these non-chiral molecules may lead to unusual physical properties such as spontaneous polar ordering, superstructural (layer) chirality, supramolecular chirality, and modulated/undulated layer structures. We study structures, polarizing optical microscopy, and electro-optical measurement studies.
The sterically induced packing of bent-shape molecules forms unique smectic phases, which have no counterpart in conventional calamitic liquid crystal...
Protecting Social Network Data, is much emerging topic amongst academicians as well as current industry. This book is designed to give a broad overview of certain strategies to protect social network data. The principles of preserving privacy of social network data is discussed in detail from various perspectives. The modern trends of social network data have been dealt from basic principles and terminologies in easily understandable English language so as to enable the reader to understand with minimal effort. This book would serve as an ideal guide for B.E., B.Tech., B.S., B.Sc.,...
Protecting Social Network Data, is much emerging topic amongst academicians as well as current industry. This book is designed to give a broad overvie...
Cloud Computing is a hot topic of the day among academicians, researchers and current industry. This book is designed to give a broad overview of certain strategies of workflow scheduling in cloud. The principles of workflow scheduling in cloud computing environment is discussed in detail from various perspectives. The modern trends of cloud computing have been dealt from basic principles and terminologies in easily understandable English language so as to enable the reader to understand with minimal effort. This book would serve as an ideal guide for B.E., B.Tech., B.S., B.Sc., undergraduate...
Cloud Computing is a hot topic of the day among academicians, researchers and current industry. This book is designed to give a broad overview of cert...
Database Security, is a current steering topic among academicians, researchers and industry. This book is designed to give a broad overview of strategies to secure data efficiently. The modern trends of database security have been dealt from basic principles and terminologies in easily understandable English language so as to enable the reader to understand with minimal effort. Several algorithms are discussed with experimental evaluation which makes the book a practical guide for students who wish to work in the area of database security.This book would serve as an ideal guide for B.E.,...
Database Security, is a current steering topic among academicians, researchers and industry. This book is designed to give a broad overview of strateg...
Cloud computing is an internet based computing which allows the users to share the resources, software, and the information provided in the cloud environment. This book is designed to give a broad overview of certain strategies of security data in cloud in easily understandable English language, so as the reader can understand with minimal effort. The principles of security in cloud computing environment is discussed in detail from various perspectives. This book would serve as an ideal guide for B.E.. B.Tech., B.S., B.Sc, and B.C.A., undergraduate students of Computer Science and...
Cloud computing is an internet based computing which allows the users to share the resources, software, and the information provided in the cloud envi...