Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 25 of 33 matches in All Departments
Designed for use in the interdisciplinary courses on product development as well as by practicing professionals, Product Design and Development 7e strikes a balanced approach between theory and practice through the authors' emphasis on methods.
Drawing upon his experience in building the first major CDMA network in North America, Samuel Yang explains the essentials of CDMA wireless technology, helping the reader acquire the knowledge needed to engineer and implement an IS-95 based CDMA system. Examining both the theoretical and practical side of CDMA engineering, this guide is designed for practicing RF and system engineers who should find the modular-oriented chapters on spread-spectrum multiple access technique, design and performance engineering, CDMA traffic engineering, and regulatory implications especially useful.
Many risks face the global insurance industry today, including the aging populations of developed countries, competition from other financial institutions, and both disparate and quickly changing regulatory demands, to name a few. The book's contributors offer their unique perspectives on challenges confronting the insurance industry and how attendant risks can be most effectively managed.
A biosensor is a device in which a bioactive layer lies in direct contact with a transducer whose responses to change in the bioactive layer generate eloctronic signals for interpretation. The bioactive layer may consist of membrane-bound enzymes, anti-bodies, or receptors. The potential of this blend of electronics and biotechnology includes the direct assay of clinically important substrates (e.g. blood glucose) and of substances too unstable for storage or whose concentrations fluctuate rapidly. Written by the leading researchers in the field, this book reflects the most current developments in successfully constructing a biosensor. Major applications are in the fields of pharmacology, molecular biology, virology and electronics.
Polymers continue to show almost amazing versatility. We have always known that polymers could be used for trinkets, toys and dishes. Now, however, we are no longer surprised to encounter these adaptable mate rials in almost every place we look. We find them in our cars, tools, electronic devices, building materials, etc. The use of polymeric mate rials in medicine is also well documented in previous books by one of the Editors (Gebelein) and by others. Likewise, the use of polymeric mate rials in pharmaceutical applications, especially in controlled release systems, is also well established. Nevertheless, the use of these ubiquitous chemicals is far less ob vious in the field of cosmetics, although modern cosmetic preparations rely heavily on polymers and this trend is certain to increase. This book brings together much of the basic information on polymers in cosmetics and compares this usage with similar applications in pharmaceutical and medical applications. Cosmetics, like medicine and pharmacy, dates back to antiquity. We can find uses of perfumes, balms and ointments in various old books, such as the Bible. For example, the use of ointments and balms is noted more than thirty eight times, and perfumes and related materials are cited at least twenty nine times in the Bible."
First published in 1998. Routledge is an imprint of Taylor & Francis, an informa company.
The Epstein-Barr virus (EBV), isolated in 1966, continues to draw worldwide attention as an important human pathogen. Its impor tance is largely related to the continuing accumulation of evidence that implicates EBV as an etiological factor for certain types of human cancer. More recent investigations on this virus have focused on the identity of the viral genes responsible for the different disease mani festations observed following viral infection. It is hoped that by thorough investigation of this virus, clues to how cancer develops from a normal cell will surface. In addition, many of the gene products are now being exploited for the development of new and more sensitive tests for the diagnosis and clinical management of individu als with EBV -associated diseases. Thus, studies on this virus continue to provide new information of importance to our understanding of the malignant process. In an effort to attract both basic and clinical scientists to the same meeting for purposes of scientific exchange and fostering a closer interaction between these individuals, a series of international symposia was initiated in 1984. The first meeting was held in Loutraki, Greece, and was attended by approximately 100 participants. The second international symposium was held in St. Petersburg, Florida, in 1986, and was attended by approximately twice as many partici pants as attended the Loutraki meeting."
The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) conference series (http: //www. isiconference. org) have drawn significant attention in the recent years. Intelligence and Security Informatics is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The ISI conference series have brought together academic researchers, law enforcement and intelligence experts, - formation technology consultant and practitioners to discuss their research and pr- tice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, - ber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, information assurance, among others. In this book, we collect the work of the most active researchers in the area. Topics include data and text mining in terr- ism, information sharing, social network analysis, Web-based intelligence monitoring and analysis, crime data analysis, infrastructure protection, deception and intent det- tion and more. Scope and Organization The book is organized in four major areas. The first unit focuses on the terrorism - formatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The forth unit presents surveillance and emergency response
Investigation techniques and analytical methodologies for addressing microbial contamination indoors Microbial contamination indoors is a significant environmental and occupational health and safety problem. This book provides fundamental background information on fungal and bacterial growth indoors as well as in-depth, practical approaches to analyzing and remedying problems. The information helps investigators, laboratory managers, and environmental health professionals properly use state-of-the-science methods and correctly interpret the results. With chapters by expert microbiologists, mycologists, environmental professionals, and industrial hygienists, Sampling and Analysis of Indoor Microorganisms is a multidisciplinary, comprehensive reference on advanced approaches, covering: Microbiological problems in a water-damaged environment Indoor construction techniques and materials that impact environmental microbiology Microbial ecology indoors, airborne bacteria, genetic-based analytical methods, and statistical tools for microorganism analysis Microbiological sampling approaches Mold removal principles and methods, including specialized microbial remediation techniques for HVAC systems, legionellas and biofilms, and sewage contamination A forensic approach toward the assessment of fungal growth in the indoor environment A must-have guide for practicing professionals, including environmental health and safety personnel, public health officials, and building and construction engineers and architects, this is also a valuable reference for attorneys, home inspectors, water restoration personnel, mold remediation contractors, insurance adjusters, and others.
In ancient China, a revered Taoist sage named Zhuangzi told many parables. In Existential Psychology and the Way of the Tao, a selection of these parables will be featured. Following each parable, an eminent existential psychologist will share a personal and scholarly reflection on the meaning and relevance of the parable for psychotherapy and contemporary life. The major tenets of Zhuangzi's philosophy are featured. Taoist concepts of emptiness, stillness, Wu Wei (i.e. intentional non-intentionality), epistemology, dreams and the nature of reality, character building in the midst of pain, meaning and the centrality of relationships, authenticity, self-care, the freedom that can come from one's willingness to confront death, spiritual freedom, and gradations of therapeutic care are topics highlighted in this book.
First published in 1998. Routledge is an imprint of Taylor & Francis, an informa company.
First published in 1998, this book provides an updated introduction to accounting and auditing in China, incorporating the most recent developments up to June 1997. It covers all major aspects of Chinese accounting and auditing, including accounting administrative systems, qualifications and responsibility of Chinese accountants, accounting regulations or standards setting, cost and managerial accounting, financial reporting, statutory audit and public accounting, accounting for governments and non-profit organizations, business financing and taxation systems, EDP application in accounting, accounting education and research etc. Some of the main accounting and auditing legislation and standards are complied in the Appendix. The book will be an informative reference to readers, both business executives and professionals, outside of China. It can also be used as a textbook or teaching supplement for Universities and Colleges.
In ancient China, a revered Taoist sage named Zhuangzi told many parables. In Existential Psychology and the Way of the Tao, a selection of these parables will be featured. Following each parable, an eminent existential psychologist will share a personal and scholarly reflection on the meaning and relevance of the parable for psychotherapy and contemporary life. The major tenets of Zhuangzi's philosophy are featured. Taoist concepts of emptiness, stillness, Wu Wei (i.e. intentional non-intentionality), epistemology, dreams and the nature of reality, character building in the midst of pain, meaning and the centrality of relationships, authenticity, self-care, the freedom that can come from one's willingness to confront death, spiritual freedom, and gradations of therapeutic care are topics highlighted in this book.
Many risks face the global insurance industry today, including the aging populations of developed countries, competition from other financial institutions, and both disparate and quickly changing regulatory demands, to name a few. The book s contributors offer their unique perspectives on challenges confronting the insurance industry and how attendant risks can be most effectively managed.
The Epstein-Barr virus (EBV), isolated in 1966, continues to draw worldwide attention as an important human pathogen. Its impor tance is largely related to the continuing accumulation of evidence that implicates EBV as an etiological factor for certain types of human cancer. More recent investigations on this virus have focused on the identity of the viral genes responsible for the different disease mani festations observed following viral infection. It is hoped that by thorough investigation of this virus, clues to how cancer develops from a normal cell will surface. In addition, many of the gene products are now being exploited for the development of new and more sensitive tests for the diagnosis and clinical management of individu als with EBV -associated diseases. Thus, studies on this virus continue to provide new information of importance to our understanding of the malignant process. In an effort to attract both basic and clinical scientists to the same meeting for purposes of scientific exchange and fostering a closer interaction between these individuals, a series of international symposia was initiated in 1984. The first meeting was held in Loutraki, Greece, and was attended by approximately 100 participants. The second international symposium was held in St. Petersburg, Florida, in 1986, and was attended by approximately twice as many partici pants as attended the Loutraki meeting.
A biosensor is a device in which a bioactive layer lies in direct contact with a transducer whose responses to change in the bioactive layer generate eloctronic signals for interpretation. The bioactive layer may consist of membrane-bound enzymes, anti-bodies, or receptors. The potential of this blend of electronics and biotechnology includes the direct assay of clinically important substrates (e.g. blood glucose) and of substances too unstable for storage or whose concentrations fluctuate rapidly. Written by the leading researchers in the field, this book reflects the most current developments in successfully constructing a biosensor. Major applications are in the fields of pharmacology, molecular biology, virology and electronics.
Polymers continue to show almost amazing versatility. We have always known that polymers could be used for trinkets, toys and dishes. Now, however, we are no longer surprised to encounter these adaptable mate rials in almost every place we look. We find them in our cars, tools, electronic devices, building materials, etc. The use of polymeric mate rials in medicine is also well documented in previous books by one of the Editors (Gebelein) and by others. Likewise, the use of polymeric mate rials in pharmaceutical applications, especially in controlled release systems, is also well established. Nevertheless, the use of these ubiquitous chemicals is far less ob vious in the field of cosmetics, although modern cosmetic preparations rely heavily on polymers and this trend is certain to increase. This book brings together much of the basic information on polymers in cosmetics and compares this usage with similar applications in pharmaceutical and medical applications. Cosmetics, like medicine and pharmacy, dates back to antiquity. We can find uses of perfumes, balms and ointments in various old books, such as the Bible. For example, the use of ointments and balms is noted more than thirty eight times, and perfumes and related materials are cited at least twenty nine times in the Bible."
The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) conference series (http: //www. isiconference. org) have drawn significant attention in the recent years. Intelligence and Security Informatics is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The ISI conference series have brought together academic researchers, law enforcement and intelligence experts, - formation technology consultant and practitioners to discuss their research and pr- tice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, - ber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, information assurance, among others. In this book, we collect the work of the most active researchers in the area. Topics include data and text mining in terr- ism, information sharing, social network analysis, Web-based intelligence monitoring and analysis, crime data analysis, infrastructure protection, deception and intent det- tion and more. Scope and Organization The book is organized in four major areas. The first unit focuses on the terrorism - formatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The forth unit presents surveillance and emergency response
Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. ISI topics include ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, information assurance, and other related topics. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners. SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field; the volume will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics. The volume features high-quality contributions from worldwide leading experts across a variety of discipline domains. Each contribution follows a uniform structure and has undergone a thorough peer-review process.
This volume contains the notes of the lectures delivered at the CIME course GeometricAnalysis andPDEsduringtheweekofJune11-162007inCetraro (Cosenza). The school consisted in six courses held by M. Gursky (PDEs in Conformal Geometry), E. Lanconelli (Heat kernels in sub-Riemannian s- tings), A. Malchiodi(Concentration of solutions for some singularly perturbed Neumann problems), G. Tarantello (On some elliptic problems in the study of selfdual Chern-Simons vortices), X. J. Wang (Thek-Hessian Equation)and P. Yang (Minimal Surfaces in CR Geometry). Geometric PDEs are a ?eld of research which is currently very active, as it makes it possible to treat classical problems in geometry and has had a dramatic impact on the comprehension of three- and four-dimensional ma- folds in the last several years. On one hand the geometric structure of these PDEs might cause general di?culties due to the presence of some invariance (translations, dilations, choice of gauge, etc. ), which results in a lack of c- pactness of the functional embeddings for the spaces of functions associated with the problems. On the other hand, a geometric intuition or result might contribute enormously to the search for natural quantities to keep track of, andtoproveregularityoraprioriestimatesonsolutions. Thistwo-foldaspect of the study makes it both challenging and complex, and requires the use of severalre?nedtechniquestoovercomethemajordi?cultiesencountered
Intelligence and Security Informatics (ISI) is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The annual IEEE International Conference series on ISI was started in 2003 and the first four meetings were held in the United States. In 2006, the Workshop on ISI (http: //isi. se. cuhk. edu. hk/2006/) was held in Singapore in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining, with over 100 contributors and participants from all over the world. PAISI 2007 (http: //isi. se. cuhk. edu. hk/2007/) was then held in Chengdu, China and PAISI 2008 (http: //isi. se. cuhk. edu. hk/2008/) was held in Taiwan. These ISI conferences have brought together academic researchers, law enforcement and intel- gence experts, information technology consultants and practitioners to discuss their research and practice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. We continued the stream of ISI conferences by organizing the 2009 Pacific Asia Workshop on ISI (PAISI 2009) in conjunction with the Pacific Asia Conference on Knowledge Disc- ery and Data Mining (PAKDD 200
This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, held as satellite events of the IEEE International Conference on Intelligence and Security Informatics, ISI 2008, in Taipei, Taiwan, in June 2008. The 55 revised full papers presented were carefully reviewed and
selected from the presentations at the workshops. The 21 papers of
the Pacific Asia Workshop on Intelligence and Security Informatics
(PAISI 2008) cover topics such as information retrieval and event
detection, internet security and cybercrime, currency and data
protection, cryptography, image and video analysis, privacy issues,
social networks, modeling and visualization, and network intrusion
detection. The Pacific Asia Workshop on Cybercrime and Computer
Forensics (PACCF 2008) furnishes 10 papers about forensic
information management, forensic technologies, and forensic
principles and tools. The 24 papers of the Workshop on Social
Computing (SOCO 2008) are organized in topical sections on social
web and social information management, social networks and
agent-based modeling, as well as social opinions, e-commerce,
security and privacy considerations.
This book constitutes the refereed proceedings of the International Workshop on Intelligence and Security Informatics, WISI 2006, held in Singapore in conjunction with the 10th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 32 papers presented together with the abstract of the keynote talk were carefully reviewed. The papers are organized in sections on Web and text mining for terrorism informatics, cybercrime analysis, network security, and crime data mining.
First published in 1998, this book provides an updated introduction to accounting and auditing in China, incorporating the most recent developments up to June 1997. It covers all major aspects of Chinese accounting and auditing, including accounting administrative systems, qualifications and responsibility of Chinese accountants, accounting regulations or standards setting, cost and managerial accounting, financial reporting, statutory audit and public accounting, accounting for governments and non-profit organizations, business financing and taxation systems, EDP application in accounting, accounting education and research etc. Some of the main accounting and auditing legislation and standards are complied in the Appendix. The book will be an informative reference to readers, both business executives and professionals, outside of China. It can also be used as a textbook or teaching supplement for Universities and Colleges.
This book covers recent advances in several important areas of geometric analysis including extremal eigenvalue problems, mini-max methods in minimal surfaces, CR geometry in dimension three, and the Ricci flow and Ricci limit spaces. An output of the CIME Summer School "Geometric Analysis" held in Cetraro in 2018, it offers a collection of lecture notes prepared by Ailana Fraser (UBC), Andre Neves (Chicago), Peter M. Topping (Warwick), and Paul C. Yang (Princeton). These notes will be a valuable asset for researchers and advanced graduate students in geometric analysis. |
You may like...
Java How to Program, Late Objects…
Paul Deitel, Harvey Deitel
Paperback
|