|
Showing 1 - 25 of
26 matches in All Departments
|
Bunnyland 4 (Hardcover)
Leann Cannon; Illustrated by Mahmudul Hasan Likhon
|
R647
R530
Discovery Miles 5 300
Save R117 (18%)
|
Ships in 10 - 15 working days
|
|
Bunnyland 4 (Paperback)
Leann Cannon; Illustrated by Mahmudul Hasan Likhon
|
R300
R242
Discovery Miles 2 420
Save R58 (19%)
|
Ships in 10 - 15 working days
|
|
Bunnyland 3 (Hardcover)
Leann Cannon; Illustrated by Mahmudul Hasan Likhon
|
R647
R530
Discovery Miles 5 300
Save R117 (18%)
|
Ships in 10 - 15 working days
|
|
Bunnyland 3 (Paperback)
Leann Cannon; Illustrated by Mahmudul Hasan Likhon
|
R300
R242
Discovery Miles 2 420
Save R58 (19%)
|
Ships in 10 - 15 working days
|
|
Bunnyland 2 (Paperback)
Leann Cannon; Illustrated by Mahmudul Hasan Likhon
|
R300
R242
Discovery Miles 2 420
Save R58 (19%)
|
Ships in 10 - 15 working days
|
|
Bunnyland 2 (Hardcover)
Leann Cannon; Illustrated by Mahmudul Hasan Likhon
|
R647
R530
Discovery Miles 5 300
Save R117 (18%)
|
Ships in 10 - 15 working days
|
|
Bunnyland (Paperback)
Leann Cannon; Illustrated by Mahmudul Hasan Likhon
|
R301
R243
Discovery Miles 2 430
Save R58 (19%)
|
Ships in 10 - 15 working days
|
|
Bunnyland (Hardcover)
Leann Cannon; Illustrated by Mahmudul Hasan Likhon
|
R647
R530
Discovery Miles 5 300
Save R117 (18%)
|
Ships in 10 - 15 working days
|
Solving real life problems are often very time demanding due to the
high sensitivity of the system such as Bio medical devices which
are actually used to get data which represent the critical state of
a human or animal body. There are some important indicators of
human health those include ECG, SPO2, Temperature and Blood
pressure. By monitoring those indicators the current state of any
human health is possible to determine and hence necessary steps can
be taken. This is why a Real Time monitoring of the health
indicators signals has massive importance in Bio medical
Engineering. In our approach we have experimentally proved and did
the signal processing of important health indicator using Windows
and Linux OS. For Linux we have used RT Linux which is a hard real
time operating system. The data acquisition system of the signals
has been done through a data acquisition card and interfacing of
the system to computer has been done both in a general operating
system as Windows and a Hard real time operating system RT Linux
which coexists with Linux OS to make a comparison between the time
dependency of signals in different operating system under
multitasking environment.
G Protein Coupled Receptors (GPCRs) are a large family of seven
transmembrane (TM) helical structural motif containing proteins
that regulate cellular communication. Based on sequence similarity
within the seven TM segment in human, the major five GPCR families
are rhodopsin, secretin, glutamate, adhesion and frizzled/taste.
GPCRs are principle signal transducer that activate senses of
sight, smell and test, and responsible for many signaling disorders
and diseases. Molecular mechanisms of GPCR activation are always
implicated as a therapeutic purpose to discover new drug targets.
Several molecular mechanisms and models of GPCR activation have
been proposed. Dimerization, protonation, conformations due to
intramolecular interaction and specific conformational changes are
thought to be responsible for receptor activation. In this review,
these mechanisms and proposed model systems are discussed in
detail.
Pattern Matching with variable length gaps: A Practitioner's
Approach which compares the theoretical and practical performance
between two most recent pattern matching algorithms with variable
length gaps as pattern matching problem is a basic primitive in
computational biology applications.It is a fundamental computer
science problem and is a basic need of many sophisticated forms of
searching applications, such as text retrieval, music retrieval,
data mining and network security.
Widespread global acceptance of electronic governance designates
that E-governance has revolutionized the governing systems in the
world to a degree. Many developing countries around the world has
initiated and implemented several ICT projects in different
ministries to build basic infrastructure, to impart IT literacy to
the employees and to make some of the government services IT
enabled. E-governance promises transparency, shortened service
delivery time, mitigation of poverty, corruption, and strengthening
of democratic practices through people's participation, and support
for good governance. Though the governments of the developing
countries are concerned about the issue 'E-governance', in many
developing countries E-governance is not in the best practice level
thus the advantages of electronic governance are not delivered in
full fledge. This paper aims to investigate the maturity level and
practices of E-governance currently being followed by the selected
developing countries. The authors followed qualititative research
approach to investigate the maturity level and current practices of
the selected countries' E-governance.
Timely action and prompt response are the crying need for emergency
services like health care in a hospital. Unavailability of it may
result to a massive disaster. For example, in a hospital, doctors
and nurses must respond promptly to take necessary action for a
critical patient to save his life. Prompt response and timely act
may save thousands of lives.But prompt response does not mean that
it can compromise with the security issues. In critical scenarios
massive flow of highly secure information is expected. Different
levels of employees are allowed to have different level of
privileges to the system for securing access and a smooth run of
the system. To provide the exact level of service according to
one's privileges to the system is only possible by a proper
authentication process.Repetitive authentication processes wastes
valuable time on a critical moment along with distracting people
from their main course of action. The system loses its invisibility
and efficiency. Here comes the need for having a fully automated
solution for this access control systems.Here we have presented an
efficient way of automated access control mechanism using Proximity
Based Access Control(PBAC
Today's globalized world is more liable on high-tech novelty as
well as business. Yet, setting up of business value with technology
is the biggest challenge for mid-sized organization. For the time
being, a new sector so-called "information technology (Networks,
desktop applications, data center, different service support such
as call centers etc.)" expanded intensely due to hasty speed of
technological revolution. Conversely, difficulties in resource
specification & rareness, political unrest, technological
ambiguity and economic instability etc. have made the business
environment more intricate and competitive. Considering those
barriers and supplement issues, IT outsourcing is now a common
practice in most organization. Again, IT outsourcing often goes
wrong due to lack of analysis about possible appropriateness of few
economic theories into IT outsourcing decision process. This paper
work strongly focuses on the key reasons behind IT outsourcing,
common goals and objectives as well.This also explores diverse
issues that trigger outsourcing decisions and critical success
factors of selecting vendors. As a whole, it may be an effective
handout for novice managers of SMEs.
|
You may like...
Catan
(16)
R1,150
R887
Discovery Miles 8 870
|