![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems
Today's healthcare organizations must focus on a lot more than just the health of their clients. The infrastructure it takes to support clinical-care delivery continues to expand, with information technology being one of the most significant contributors to that growth. As companies have become more dependent on technology for their clinical, administrative, and financial functions, their IT departments and expenditures have had to scale quickly to keep up. However, as technology demands have increased, so have the options for reliable infrastructure for IT applications and data storage. The one that has taken center stage over the past few years is cloud computing. Healthcare researchers are moving their efforts to the cloud because they need adequate resources to process, store, exchange, and use large quantities of medical data. Cloud Computing in Medical Imaging covers the state-of-the-art techniques for cloud computing in medical imaging, healthcare technologies, and services. The book focuses on Machine-learning algorithms for health data security Fog computing in IoT-based health care Medical imaging and healthcare applications using fog IoT networks Diagnostic imaging and associated services Image steganography for medical informatics This book aims to help advance scientific research within the broad field of cloud computing in medical imaging, healthcare technologies, and services. It focuses on major trends and challenges in this area and presents work aimed to identify new techniques and their use in biomedical analysis.
The high failure rate of enterprise resource planning (ERP) projects is a pressing concern for both academic researchers and industrial practitioners. The challenges of an ERP implementation are particularly high when the project involves designing and developing a system from scratch. Organizations often turn to vendors and consultants for handling such projects but, every aspect of an ERP project is opaque for both customers and vendors. Unlocking the mysteries of building a large-scale ERP system, The Adventurous and Practical Journey to a Large-Scale Enterprise Solution tells the story of implementing an applied enterprise solution. The book covers the field of enterprise resource planning by examining state-of-the-art concepts in software project management methodology, design and development integration policy, and deployment framework, including: A hybrid project management methodology using waterfall as well as a customized Scrum-based approach A novel multi-tiered software architecture featuring an enhanced flowable process engine A unique platform for coding business processes efficiently Integration to embed ERP modules in physical devices A heuristic-based framework to successfully step into the Go-live period Written to help ERP project professionals, the book charts the path that they should travel from project ideation to systems implementation. It presents a detailed, real-life case study of implementing a large-scale ERP and uses storytelling to demonstrate incorrect and correct decisions frequently made by vendors and customers. Filled with practical lessons learned, the book explains the ins and outs of adopting project methodologies. It weaves a tale that features both real-world and scholarly aspects of an ERP implementation.
1. The book will discuss most relevant real-life applications and case studies of Network Technologies. 2. The book will provide deeper knowledge regarding emerging research trends and future research directions in Network Technologies. 3. The book will provide theoretical, algorithmic, simulation, and implementation-based research developments in Network Technologies. 4. The book will follow theoretical approach to describe fundamentals of Network Technologies for the beginners as well as practical approach to depict simulation and implementation of real-life applications for intermediate and advanced readers.
This book describes a new design methodology that allows optimization-based synthesis of RF systems in a hierarchical multilevel approach, in which the system is designed in a bottom-up fashion, from the device level up to the (sub)system level. At each level of the design hierarchy, the authors discuss methods that increase the design robustness and increase the accuracy and efficiency of the simulations. The methodology described enables circuit sizing and layout in a complete and automated integrated manner, achieving optimized designs in significantly less time than with traditional approaches.
This volume is the first ever collection devoted to the field of proof-theoretic semantics. Contributions address topics including the systematics of introduction and elimination rules and proofs of normalization, the categorial characterization of deductions, the relation between Heyting's and Gentzen's approaches to meaning, knowability paradoxes, proof-theoretic foundations of set theory, Dummett's justification of logical laws, Kreisel's theory of constructions, paradoxical reasoning, and the defence of model theory. The field of proof-theoretic semantics has existed for almost 50 years, but the term itself was proposed by Schroeder-Heister in the 1980s. Proof-theoretic semantics explains the meaning of linguistic expressions in general and of logical constants in particular in terms of the notion of proof. This volume emerges from presentations at the Second International Conference on Proof-Theoretic Semantics in Tubingen in 2013, where contributing authors were asked to provide a self-contained description and analysis of a significant research question in this area. The contributions are representative of the field and should be of interest to logicians, philosophers, and mathematicians alike.
New Work and Industry 4.0 have matured and this book takes a practical, experience-based approach to project management in these areas. It introduces methods and covers the practical aspects. It critically examines existing approaches and practices and shows their limitations. The book covers appropriate methods as well as human and social aspects. It contributes to the ongoing discussion of business practices and methods. It also aims to stimulate dialogue in the professional community. Digital Project Practice for New Work and Industry 4.0 begins by introducing basic concepts in the context of Industry 4.0 and discussing how they might influence organizational communication and impact the work environment. After examining the possibilities and challenges of remote work and collaboration in distributed teams all over the world, the book looks at a company's fundamental changes related to New Work from a practical business perspective as well as legal and ethical perspectives. It reviews the case of the VW emission scandal and recommends ways to improve corporate culture. Legal issues include New Work and hybrid forms of collaboration as well as liability for automated decisions (i.e., the potential need for an 'electronic person'). Other implications for the workplace include how: Industry 4.0 might influence the potential demand for "Digital Unions" Industry 4.0, and lean production, and their applications can change industrial practices Open Banking presents new approaches and new business models Work structures and systems can empower employees' work self-management This book also looks at how New Work effects individual workers. It addresses digital stress, introduces strategies for coping with it, and discusses related topics. It also explores the benefits of meditation and the economics of mind, body, and spirit. In essence, this book cover appropriate methods along with human and social factors. It also covers practice, different perspectives, and various experiences from all around the globe. Contributing to the ongoing discussion on business practices and methods, this book will nourish and stimulate dialogue in the professional community.
New Work and Industry 4.0 have matured and this book takes a practical, experience-based approach to project management in these areas. It introduces methods and covers the practical aspects. It critically examines existing approaches and practices and shows their limitations. The book covers appropriate methods as well as human and social aspects. It contributes to the ongoing discussion of business practices and methods. It also aims to stimulate dialogue in the professional community. Digital Project Practice for New Work and Industry 4.0 begins by introducing basic concepts in the context of Industry 4.0 and discussing how they might influence organizational communication and impact the work environment. After examining the possibilities and challenges of remote work and collaboration in distributed teams all over the world, the book looks at a company's fundamental changes related to New Work from a practical business perspective as well as legal and ethical perspectives. It reviews the case of the VW emission scandal and recommends ways to improve corporate culture. Legal issues include New Work and hybrid forms of collaboration as well as liability for automated decisions (i.e., the potential need for an 'electronic person'). Other implications for the workplace include how: Industry 4.0 might influence the potential demand for "Digital Unions" Industry 4.0, and lean production, and their applications can change industrial practices Open Banking presents new approaches and new business models Work structures and systems can empower employees' work self-management This book also looks at how New Work effects individual workers. It addresses digital stress, introduces strategies for coping with it, and discusses related topics. It also explores the benefits of meditation and the economics of mind, body, and spirit. In essence, this book cover appropriate methods along with human and social factors. It also covers practice, different perspectives, and various experiences from all around the globe. Contributing to the ongoing discussion on business practices and methods, this book will nourish and stimulate dialogue in the professional community.
Since the invention of computers or machines, scientists and researchers are trying very hard to enhance their capabilities to perform various tasks. As a consequence, the capabilities of computers are growing exponentially day by day in terms of diverse working domains, versatile jobs, processing speed, and reduced size. Now, we are in the race to make the computers or machines as intelligent as human beings. Artificial Intelligence (AI) came up as a way of making a computer or computer software think in the similar manner the intelligent humans think. AI is inspired by the study of human brain like how humans think, learn, decide and act while trying to solve a problem. The outcomes of this study are the basis of developing intelligent software and systems or Intelligent Computing (IC). An IC system has the capability of reasoning, learning, problem solving, perception, and linguistic intelligence. The IC systems consist of AI techniques as well as other emerging techniques that make a system intelligent. The use of intelligent computing has been seen in almost every sub-domain of computer science such as networking, software engineering, gaming, natural language processing, computer vision, image processing, data science, robotics, expert systems, and security. Now a days, the use of IC can also be seen for solving various complex problems in diverse domains such as for predicting disease in medical science, predicting land fertility or crop productivity in agriculture science, predicting market growth in economics, weather forecasting and so on. For all these reasons, this book presents the advances in AI techniques, under the umbrella of IC. In this context, the book includes the recent research works have been done in the areas of machine learning, neural networks, deep learning, evolutionary algorithms, genetic algorithms, swarm intelligence, fuzzy systems and so on. This book provides theoretical, algorithmic, simulation, and implementation-based recent research advancements related to the Intelligent Computing.
This book discusses the digital design of integrated circuits under process variations, with a focus on design-time solutions. The authors describe a step-by-step methodology, going from logic gates to logic paths to the circuit level. Topics are presented in comprehensively, without overwhelming use of analytical formulations. Emphasis is placed on providing digital designers with understanding of the sources of process variations, their impact on circuit performance and tools for improving their designs to comply with product specifications. Various circuit-level "design hints" are highlighted, so that readers can use then to improve their designs. A special treatment is devoted to unique design issues and the impact of process variations on the performance of FinFET based circuits. This book enables readers to make optimal decisions at design time, toward more efficient circuits, with better yield and higher reliability.
Includes case studies illustrating the business processes that underlines the use of big data and health analytics to improve healthcare delivery Discusses AI based smart paradigms for reliable predictions of infectious disease dynamics which can help or prevent disease transmission Highlights the different aspects of using extended reality for diverse healthcare applications and aggregates the current state of research Offers intelligent models of the smart recommender system for personal well-being services and computer-aided drug discovery and design methods Presents novel innovative techniques for extracting user social behavior known as sentiment analysis for healthcare related purposes
Tackles a topic in a concise and accessible way that most believe too advanced to pick up easily. Author has over 40 years teaching and industry experience which they utilize in this book. Contains an appendix with extended code and examples of topics discussed in text.
Blockchain: A Hype or a Hoax? fills a gap in the book market to provide material that is not only technical but also caters to business readers. This book was written to keep in mind various stakeholders and the current gap in blockchain education as well as use case implementation. This book reviews blockchain technology, discusses why proof of concept fails, offers examples of use cases that have been successful and that have failed and articulates a framework that should be used before deciding whether blockchain is the right technology for transformation. It uses strategic models and frameworks to assist organisations to see a fit score for their specific use cases. This book provides guidance on how to create a blockchain strategy and a business case to pitch for the budget. It also includes a case study to apply the knowledge on practical use cases for blockchain and a technical overview of most of the blockchain use cases in the market including crypto, non-fungible tokens, decentralised finance, and decentralised autonomous organisations, as well as financial and non-financial industry use cases. This book also provides a detailed overview of most of the mainstream blockchain products currently available in the market. It also offers guidance on how readers can best educate themselves on blockchain technology that is available through commercial and free resources. It concludes with a clear direction on selecting blockchain to solve real-life use cases that are best fit. A financial and non-financial value-adding framework is discussed throughout this book to assist business leaders, programme managers, product managers and information technology leaders to make strategic choices, and business cases and develop strategies for digital transformation through the use of blockchain. The distinctive feature of this book is the critical analysis of blockchain from a technology and business perspective. This is the first book to focus on business, technology and blockchain selection framework. The most unique feature of this book would be to apply Michael Porter's competitive advantage strategy theory on blockchain use cases and their impact on companies. This book is aimed at technology students, technology professionals, blockchain and fintech consultant and business leaders. It will also be useful for readers who are building a business case to adopt blockchain into an organisation or are seeking to grow their knowledge of blockchain and improve their fintech strategy.
Blockchain Supply Chain Use Cases. Distributed Ledger Technology Supply Chain Use Cases. Blockchain-Enabled Digital Transformation Use Cases. Blockchain Supply Chain Diffusion/Innovation Use Cases.
This book provides readers with insight into an alternative approach for enhancing the reliability, security, and low power features of integrated circuit designs, related to transient faults, hardware Trojans, and power consumption. The authors explain how the addition of integrated sensors enables the detection of ionizing particles and how this information can be processed at a high layer. The discussion also includes a variety of applications, such as the detection of hardware Trojans and fault attacks, and how sensors can operate to provide different body bias levels and reduce power costs. Readers can benefit from these sensors-based approaches through designs with fast response time, non-intrusive integration on gate-level and reasonable design costs.
The fundamental principles of electronic device and circuit design are discussed in a clear and detailed manner along with explanatory diagrams. Various IoT-based smart applications in different fields along with challenges and issues along with prospects of IoT for future applications have also been discussed. The chapters delve into myriad aspects of circuit design, including MOSFET structures depending on their low power applications for IoT-enabled systems, advanced sensor design and fabrication using MEMS, indirect bootstrap techniques, efficient CMOS comparators, various encryption-decryption algorithms, IoT video forensics applications, microstrip patch antennas in embedded IoT applications, real-time object detection using sound, IOT and nanotechnologies based wireless sensors, and much more. It also introduces logic BIST using BS-CFSR for electronic devices that can be part of many applications in many industries, such as defense, automotive, banking, computer, healthcare, networking, and telecommunication.
This book covers the proceedings of ICISSI 2022 (International Conference on Intelligent Systems and Smart Infrastructure) held at Prayagraj, Uttar Pradesh during April 21-22, 2022. The conference was jointly organised by Shambhunath Institute of Engineering and Technology, Prayagraj UP India, Institute of Engineering and Technology (IET) Lucknow, U.P India, and Manipal University Jaipur, Rajasthan India with an aim to provide a platform for researchers, scientists, technocrats, academicians and engineers to exchange their innovative ideas and new challenges being faced in the field of emerging technologies. The papers presented in the conference have been compiled in form of chapters to focus on the core technological developments in the emerging fields like machine learning, intelligence systems, smart infrastructure, advanced power technology etc.
Modern Magnetooptics and Magnetooptical Materials provides a comprehensive account of the principles and applications of magnetooptics, bridging the gap between textbooks and specialist accounts in the research and review literature. The book is aimed at the graduate physicist and electrical engineer, but assumes no specialist knowledge of magnetooptics. Chapters have been designed to be reasonably independent, so that readers in search of information on a particular topic can go straight to the appropriate place in the book, with only occasional reference to material elsewhere. Divided into three main parts, the book begins with the principles of magnetooptics to provide the necessary theoretical background. This section's emphasis is on introducing practical considerations through examples taken from real-life situations. The next part surveys a wide range of magnetooptic materials, including metals, alloys, and granular structures. The final part explores applications of magnetooptics in practical devices, such as modulators, switches, memory devices, and waveguides. This book provides a thorough introduction for graduate students of physics and electrical engineering, and a useful reference for researchers.
Information professionals have been paying more attention and putting a greater focus on privacy over cybersecurity. However, the number of both cybersecurity and privacy breach incidents are soaring, which indicates that cybersecurity risks are high and growing. Utilizing cybersecurity awareness training in organizations has been an effective tool to promote a cybersecurity-conscious culture, making individuals more cybersecurity-conscious as well. However, it is unknown if employees' security behavior at work can be extended to their security behavior at home and personal life. On the one hand, information professionals need to inherit their role as data and information gatekeepers to safeguard data and information assets. On the other hand, information professionals can aid in enabling effective information access and dissemination of cybersecurity knowledge to make users conscious about the cybersecurity and privacy risks that are often hidden in the cyber universe. Cybersecurity for Information Professionals: Concepts and Applications introduces fundamental concepts in cybersecurity and addresses some of the challenges faced by information professionals, librarians, archivists, record managers, students, and professionals in related disciplines. This book is written especially for educators preparing courses in information security, cybersecurity, and the integration of privacy and cybersecurity. The chapters contained in this book present multiple and diverse perspectives from professionals in the field of cybersecurity. They cover such topics as: Information governance and cybersecurity User privacy and security online and the role of information professionals Cybersecurity and social media Healthcare regulations, threats, and their impact on cybersecurity A socio-technical perspective on mobile cybersecurity Cybersecurity in the software development life cycle Data security and privacy Above all, the book addresses the ongoing challenges of cybersecurity. In particular, it explains how information professionals can contribute to long-term workforce development by designing and leading cybersecurity awareness campaigns or cybersecurity hygiene programs to change people's security behavior.
Access US Census Bureau geographic and demographic data directly within R. Wrangle Census data with tidyverse tools and work with margins of error in the American Community Survey. Make maps and interactive web visualizations with US Census data. Explore Census data with spatial analysis using the sf package. Integrate Census data into spatial and machine learning models.
Access US Census Bureau geographic and demographic data directly within R. Wrangle Census data with tidyverse tools and work with margins of error in the American Community Survey. Make maps and interactive web visualizations with US Census data. Explore Census data with spatial analysis using the sf package. Integrate Census data into spatial and machine learning models.
- Totally unique, and incredibly damning, concerning information and overview of the world's first Cyberwar. - The first ever Cyberwar and the precursor to the first war in Europe since 1945, it will be discussed for decades to come and go down in history as a defining point. - Will be of interest to all citizens of the world, literally.
- Totally unique, and incredibly damning, concerning information and overview of the world's first Cyberwar. - The first ever Cyberwar and the precursor to the first war in Europe since 1945, it will be discussed for decades to come and go down in history as a defining point. - Will be of interest to all citizens of the world, literally.
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. It's not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Features The book presents the implementation of a unique socio-technical solution for real-time cybersecurity awareness. It provides comprehensible knowledge about security, risk, protection, estimation, knowledge and governance. Various emerging standards, models, metrics, continuous updates and tools are described to understand security principals and mitigation mechanism for higher security. The book also explores common vulnerabilities plaguing today's web applications. The book is aimed primarily at advanced undergraduates and graduates studying computer science, artificial intelligence and information technology. Researchers and professionals will also find this book useful.
This book provides the details of developing a digital pedestrian map construction system over the intermittently connected mobile network. Over the past couple of decades, countries across the world, both developing and developed, have witnessed a significant number of disasters. Thus, it has become mandatory for each of the disaster-prone countries to equip themselves with appropriate measures to cope with the challenges of providing post-disaster services. Some of the serious challenges are incapacitated communication infrastructure, unstable power supply and inaccessible road networks. Out of these challenges, the destruction of road networks, especially in developing countries, acts as a major hindrance to effective disaster management. To be more specific, the success of a disaster response operation generally depends on the speed of evacuation and transportation of adequate amount of relief materials at the right time to the disaster-affected areas. Hence, map-based navigation support is a primary requirement for post-disaster relief operations. This book also provides the solution of the two other important post-disaster management services such as situational awareness and resource allocation. Both of these services are invariably dependent on the existence of navigation support. Finally, in order to offer such services, the other challenge is to address the problem of incapacitated communication infrastructure. This book also deals with such challenges in post-disaster scenarios and develops automated post-disaster management services.
Energy Autonomy of Batteryless and Wireless Embedded Systems covers the numerous new applications of embedded systems that are envisioned in the context of aeronautics, such as sensor deployment for flight tests or for structural health monitoring. However, the increasing burden of on-board cabling requires wireless solutions. Moreover, concerns such as safety or system lifetime preclude the use of electrochemical energy storage. Ambient energy capture, storage and management are therefore key topics. This book presents these concepts and illustrates them through actual implementations in airliners. With five years of experience within this specialist field, the authors present results from actual flight tests via a partnership with Airbus. Basic concepts are summarized, together with practical implementations in airliners, enriching the book through the very specific aspects related to embedded systems deployed in aircraft. This book will appeal to both students and practising engineers in the field. |
You may like...
Wireless Communication Networks…
Hailong Huang, Andrey V. Savkin, …
Paperback
R2,763
Discovery Miles 27 630
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright
Paperback
R1,491
Discovery Miles 14 910
Inclusive Radio Communications for 5G…
Claude Oestges, Francois Quitin
Paperback
R2,896
Discovery Miles 28 960
Edsger Wybe Dijkstra - His Life, Work…
Krzysztof R. Apt, Tony Hoare
Hardcover
R2,920
Discovery Miles 29 200
The System Designer's Guide to VHDL-AMS…
Peter J Ashenden, Gregory D. Peterson, …
Paperback
R2,281
Discovery Miles 22 810
|