Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 25 of 90 matches in All Departments
This volume comprises the proceedings of ICITCS 2020. It aims to provide a snapshot of the latest issues encountered in IT convergence and security. The book explores how IT convergence and security is core to most current research, industrial and commercial activities. Topics covered in this volume include machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics, software engineering and knowledge engineering, intelligent vehicular networking and applications, healthcare and wellness, web technology and applications, internet of things, and security & privacy. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies in IT convergence and security. The book will be of use to researchers in academia, industry and other research institutes focusing on IT convergence and security.
This book gathers the proceedings of the 4th International Conference on Mobile and Wireless Technology (ICMWT), held in Kuala Lumpur, Malaysia in June 2017, an event that provides researchers and practitioners from both academia and industry with a platform to keep them abreast of cutting-edge developments in the field. The peer-reviewed and accepted papers presented here address topics in a number of major areas: Mobile, Wireless Networks and Applications; Security in Mobile and Wireless; Mobile Data Management and Applications; Mobile Software; Multimedia Communications; Wireless Communications; and Services, Application and Business.
This volume provides a complete record of presentations made at Industrial Engineering, Management Science and Applications 2015 (ICIMSA 2015), and provides the reader with a snapshot of current knowledge and state-of-the-art results in industrial engineering, management science and applications. The goal of ICIMSA is to provide an excellent international forum for researchers and practitioners from both academia and industry to share cutting-edge developments in the field and to exchange and distribute the latest research and theories from the international community. The conference is held every year, making it an ideal platform for people to share their views and experiences in industrial engineering, management science and applications related fields.
This book contains selected papers from the 9th International Conference on Information Science and Applications (ICISA 2018) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies of convergence security. The intended readership includes researchers in academia, industry and other research institutes focusing on information science and technology.
This proceedings volume provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art in information strategies and technologies of convergence security. The intended readership are researchers in academia, industry, and other research institutes focusing on information science and technology.
This is the second volume of proceedings including selected papers from the International Conference on IT Convergence and Security (ICITCS) 2017, presenting a snapshot of the latest issues encountered in the field. It explores how IT convergence and security issues are core to most current research, industrial and commercial activities and consists of contributions covering topics including machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics. ICITCS 2017 is the latest in a series of highly successful Inter national Conferences on IT Convergence and Security, previously held in Prague, Czech Republic (2016), Kuala Lumpur, Malaysia (2015), Beijing, China (2014), Macau, China (2013), Pyeong Chang, Korea (2012), and Suwon, Korea (2011).
This book provides a snapshot of the current state-of-the-art in the fields of mobile and wireless technology, security and applications. The proceedings of the 2nd International Conference on Mobile and Wireless Technology (ICMWT2015), it represents the outcome of a unique platform for researchers and practitioners from academia and industry to share cutting-edge developments in the field of mobile and wireless science technology, including those working on data management and mobile security. The contributions presented here describe the latest academic and industrial research from the international mobile and wireless community. The scope covers four major topical areas: mobile and wireless networks and applications; security in mobile and wireless technology; mobile data management and applications; and mobile software. The book will be a valuable reference for current researchers in academia and industry, and a useful resource for graduate-level students working on mobile and wireless technology.
Two sigma receptor subtypes have been proposed, sigma1 and 2. Much of our understanding of this system is based on biochemical and pharmacological characterization of the cloned sigma1 receptor subtype (Sigma1). It has become clear that sigma receptors are not canonical receptors. Sigma1 is highly conserved among mammalian species, however, it does not share significant homology with any other mammalian protein. Although a range of structurally diverse small molecules bind Sigma1 with high affinity, and it has been associated with a broad range of signaling systems, Sigma1 itself has no known signaling or enzymatic activity. The evolution of this field over nearly four decades has more recently led to a fundamental shift in the concept of "sigma receptors" to what may more accurately and generally be called sigma proteins. Largely based on traditional pharmacologic approaches, the Sigma1 protein has been associated with a broad range of signaling systems, including G-protein coupled receptors, NMDA receptors, and ion channels. Sigma proteins have been linked to a range of physiological processes, including intracellular calcium signaling, neuroprotection, learning, memory, and cognition. Emerging genetic, clinical, and mechanism focused molecular pharmacology data demonstrate the involvement of proteins in a range of pathophysiologies and disorders including neurodegenerative disease, pain, addiction, psychomotor stimulant abuse, and cancer. However, an understanding of the physiological role of sigma proteins has remained elusive. Emerging data associate Sigma1 with chaperone-like activities or molecular scaffold functions. This book aims to provide an updated perspective on this rapidly evolving field undergoing changes in fundamental concepts of key importance to the discipline of pharmacology. It focusses on the reported roles of sigma proteins in pathophysiology and on emergent therapeutic initiatives.
This is the first volume of proceedings including selected papers from the International Conference on IT Convergence and Security (ICITCS) 2017, presenting a snapshot of the latest issues encountered in this field. It explores how IT convergence and security issues are core to most current research, and industrial and commercial activities. It consists of contributions covering topics such as machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics. ICITCS 2017 is the latest in a series of highly successful International Conferences on IT Convergence and Security, previously held in Prague, Czech Republic(2016), Kuala Lumpur, Malaysia (2015) Beijing, China (2014), Macau, China (2013), Pyeong Chang, Korea (2012), and Suwon, Korea (2011).
Drawing on ancient texts and modern interpretations, this work explores the foundations for war in China's strategic culture--"Shih," "Li," and "Tao." "Shih" theory bases strategy on enemy intent, in contrast to Euro-American "Li" strategies based on forces. The work uses "Shih" theory to explain the anomalies that continue to perplex Euro-American observers in modern China's uses of force.
This book comprises the proceedings of ICITCS 2021. It aims to provide a snapshot of the latest issues encountered in IT convergence and security. The book explores how IT convergence and security are core to most current research, industrial, and commercial activities. Topics covered in this book include machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics, software engineering and knowledge engineering, intelligent vehicular networking and applications, health care and wellness, web technology and applications, Internet of things, and security & privacy. Through this book, readers gain an understanding of the current state-of-the-art information strategies and technologies in IT convergence and security. The book is of use to researchers in academia, industry, and other research institutes focusing on IT convergence and security.
Jina Kim investigates how North Korea rationalized its pursuit of nuclear weapons programs for more than two decades, by exploring the dialectical development of the nuclear crisis and the obstacles generated by complex internal Korean dynamics and conflicting interests amongst the major players concerned.
Electroactive polymers (EAPs) respond to electrical stimulation with large deformations. They are dynamic actuators which have attracted attention from an interdisciplinary audience of engineers and scientists. An enabling EAP technology is emerging which attempts to imitate the properties of natural muscle and which, as a result, can perform a unique function in a variety of biologically-inspired robotics applications. Electroactive Polymers for Robotics Applications covers the fundamental properties, modelling and demonstration of EAPs in robotic applications, focusing particularly on artificial muscles and sensors. Ionic Polymera "Metal Composite Actuators and Dielectric Elastomers are discussed within the book with chapters on their properties and their uses in robotics applications. With its concentration on devices based on EAPs and their uses, Electroactive Polymers for Robotics Applications will be of interest to researchers working within this field as well as to postgraduate students studying robotics or smart materials and structures. Practitioners working in the mechanical, electrical and materials industries will also find this book of value.
Noted for its comprehensive coverage, this greatly expanded new edition now covers the use of univariate and multivariate effect sizes. Many measures and estimators are reviewed along with their application, interpretation, and limitations. Noted for its practical approach, the book features numerous examples using real data for a variety of variables and designs, to help readers apply the material to their own data. Tips on the use of SPSS, SAS, R, and S-Plus are provided. The book's broad disciplinary appeal results from its inclusion of a variety of examples from psychology, medicine, education, and other social sciences. Special attention is paid to confidence intervals, the statistical assumptions of the methods, and robust estimators of effect sizes. The extensive reference section is appreciated by all. With more than 40% new material, highlights of the new editon include:
Effect Sizes for Research covers standardized and unstandardized differences between means, correlational measures, strength of association, and parametric and nonparametric measures for between- and within-groups data. Intended as a resource for professionals, researchers, and advanced students in a variety of fields, this book is also an excellent supplement for advanced statistics courses in psychology, education, the social sciences, business, and medicine. A prerequisite of introductory statistics through factorial analysis of variance and chi-square is recommended.
This book presents the peer-reviewed contributions of ICMWT2016, an international conference devoted to mobile and wireless technology. Researchers and professionals from academia and industry met to discuss the cutting-edge developments in the field. The book includes papers on mobile and wireless networks, the increasingly important security issues, data management, as well as the latest developments in mobile software development.
As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information technology convergence. In the process of information technology convergence, the latest issues in the structure of data, system, network, and infrastructure have become the most challenging task. Proceedings of the International Conference on IT Convergence and Security 2011 approaches the subject matter with problems in technical convergence and convergences of security technology by looking at new issues that arise from techniques converging. The general scope is convergence security and the latest information technology with the following most important features and benefits: 1. Introduction of the most recent information technology and its related ideas 2. Applications and problems related to technology convergence, and its case studies 3. Introduction of converging existing security techniques through convergence security Overall, after reading Proceedings of the International Conference on IT Convergence and Security 2011, readers will understand the most state of the art information strategies and technologies of convergence security.
This book presents peer-reviewed contributions from the 5th International Conference on Mobile and Wireless Technology (ICMWT 2018), held June 25-27, 2018 in Hong Kong. This conference provided researchers and practitioners from both academia and industry with a platform to keep them abreast of cutting-edge developments in the field. The book includes papers on mobile and wireless networks and their applications, the increasingly important security issues relating to mobile and wireless systems, data management, as well as the latest developments in mobile software development, and multimedia and wireless communications.
The Korean Demilitarized Zone (DMZ) has been off-limits to human habitation for nearly seventy years, and in that time, biodiverse forms of life have flourished in and around the DMZ as beneficiaries of an unresolved war. In Making Peace with Nature Eleana J. Kim shows how a closer examination of the DMZ in South Korea reveals that the area's biodiversity is inseparable from scientific practices and geopolitical, capitalist, and ecological dynamics. Drawing on ethnographic fieldwork with ecologists, scientists, and local residents, Kim focuses on irrigation ponds, migratory bird flyways, and land mines in the South Korean DMZ area, demonstrating how human and nonhuman ecologies interact and transform in spaces defined by war and militarization. In so doing, Kim reframes peace away from a human-oriented political or economic peace and toward a more-than-human, biological peace. Such a peace recognizes the reality of war while pointing to potential forms of human and nonhuman relations.
Living Mindfully Across the Lifespan: An Intergenerational Guide provides user-friendly, empirically supported information about and answers to some of the most frequently encountered questions and dilemmas of human living, interactions, and emotions. With a mix of empirical data, humor, and personal insight, each chapter introduces the reader to a significant topic or question, including self-worth, anxiety, depression, relationships, personal development, loss, and death. Along with exercises that clients and therapists can use in daily practice, chapters feature personal stories and case studies, interwoven throughout with the authors' unique intergenerational perspectives. Compassionate, engaging writing is balanced with a straightforward presentation of research data and practical strategies to help address issues via psychological, behavioral, contemplative, and movement-oriented exercises. Readers will learn how to look deeply at themselves and society, and to apply what has been learned over decades of research and clinical experience to enrich their lives and the lives of others.
Living Mindfully Across the Lifespan: An Intergenerational Guide provides user-friendly, empirically supported information about and answers to some of the most frequently encountered questions and dilemmas of human living, interactions, and emotions. With a mix of empirical data, humor, and personal insight, each chapter introduces the reader to a significant topic or question, including self-worth, anxiety, depression, relationships, personal development, loss, and death. Along with exercises that clients and therapists can use in daily practice, chapters feature personal stories and case studies, interwoven throughout with the authors' unique intergenerational perspectives. Compassionate, engaging writing is balanced with a straightforward presentation of research data and practical strategies to help address issues via psychological, behavioral, contemplative, and movement-oriented exercises. Readers will learn how to look deeply at themselves and society, and to apply what has been learned over decades of research and clinical experience to enrich their lives and the lives of others.
Presenting the voices of a unique group within contemporary Japanese society-Zainichi women-this book provides a fresh insight into their experiences of oppression and marginalization that over time have led to liberation and empowerment. Often viewed as unimportant and inconsequential, these women's stories and activism are now proving to be an integral part of both the Zainichi Korean community and Japanese society. Featuring in-depth interviews from 1994 to the present, three generations of Zainichi Korean women-those who migrated from colonial Korea before or during WWII and the Asia-Pacific War and their Japan-born descendants-share their version of history, revealing their lives as members of an ethnic minority. Discovering voices within constricting patriarchal traditions, the women in this book are now able to tell their history. Ethnography, interviews, and the women's personal and creative writings offer an in-depth look into their intergenerational dynamics and provide a new way of exploring the hidden inner world of migrant women and the different ways displacement affects subsequent generations. This book goes beyond existing Anglophone and Japanese literatures, to explore the lives of the Zainichi Korean women. As such, it will be invaluable to students and scholars of Japanese and Korean history, culture and society, as well as ethnicity and Women's Studies. |
You may like...
|