|
Showing 1 - 24 of
24 matches in All Departments
The second volume of the two volumes book is dedicated to various
extensions and generalizations of Dyadic (Walsh) analysis and
related applications. Considered are dyadic derivatives on Vilenkin
groups and various other Abelian and finite non-Abelian groups.
Since some important results were developed in former Soviet Union
and China, we provide overviews of former work in these countries.
Further, we present translations of three papers that were
initially published in Chinese. The presentation continues with
chapters written by experts in the area presenting discussions of
applications of these results in specific tasks in the area of
signal processing and system theory. Efficient computing of related
differential operators on contemporary hardware, including graphics
processing units, is also considered, which makes the methods and
techniques of dyadic analysis and generalizations computationally
feasible. The volume 2 of the book ends with a chapter presenting
open problems pointed out by several experts in the area.
Dyadic (Walsh) analysis emerged as a new research area in applied
mathematics and engineering in early seventies within attempts to
provide answers to demands from practice related to application of
spectral analysis of different classes of signals, including audio,
video, sonar, and radar signals. In the meantime, it evolved in a
mature mathematical discipline with fundamental results and
important features providing basis for various applications. The
book will provide fundamentals of the area through reprinting
carefully selected earlier publications followed by overview of
recent results concerning particular subjects in the area written
by experts, most of them being founders of the field, and some of
their followers. In this way, this first volume of the two volume
book offers a rather complete coverage of the development of dyadic
Walsh analysis, and provides a deep insight into its mathematical
foundations necessary for consideration of generalizations and
applications that are the subject of the second volume. The
presented theory is quite sufficient to be a basis for further
research in the subject area as well as to be applied in solving
certain new problems or improving existing solutions for tasks in
the areas which motivated development of the dyadic analysis.
This timely and insightful analysis of Conservative economic
policymaking over the past half century covers the period from Ted
Heath's assumption of the leadership through the Heath, Thatcher
and Major governments and up to the early years of the coalition.
As well as a offering a detailed commentary on the Conservative
Party's macroeconomic and microeconomic policymaking for the past
50 years it also establishes a context for the controversial
austerity measures implemented by the Conservative-led Coalition
that established in the wake of Britain's inconclusive general
election of 2010. This is a fascinating insight into policymaking
within the Conservative Party as well as an indicator of the extent
to which competing conservative philosophies have impacted on the
policies pursued. At a time when the Conservative Party and
economic policymaking loom large on the political landscape, this
book is an invaluable contribution to present debates.
The overall mission of this book is to provide a comprehensive
understanding and coverage of the various theories and models used
in IS research. Specifically, it aims to focus on the following key
objectives: To describe the various theories and models applicable
to studying IS/IT management issues. To outline and describe, for
each of the various theories and models, independent and dependent
constructs, reference discipline/originating area, originating
author(s), seminal articles, level of analysis (i.e. firm,
individual, industry) and links with other theories. To provide a
critical review/meta-analysis of IS/IT management articles that
have used a particular theory/model.To discuss how a theory can be
used to better understand how information systems can be
effectively deployed in today's digital world.
This book contributes to our understanding of a number of
theories and models. The theoretical contribution of this book is
that it analyzes and synthesizes the relevant literature in order
to enhance knowledge of IS theories and models from various
perspectives. To cater to the information needs of a diverse
spectrum of readers, this book is structured into two volumes, with
each volume further broken down into two sections.
The first section of Volume 1 presents detailed descriptions of
a set of theories centered around the IS lifecycle, including the
Success Model, Technology Acceptance Model, User Resistance
Theories, and four others. The second section of Volume 1 contains
strategic and economic theories, including a Resource-Based View,
Theory of Slack Resources, Portfolio Theory, Discrepancy Theory
Models, and eleven others.
The first section of Volume 2 concerns socio-psychological
theories. These include Personal Construct Theory, Psychological
Ownership, Transactive Memory, Language-Action Approach, and nine
others. The second section of Volume 2 deals with methodological
theories, including Critical Realism, Grounded Theory, Narrative
Inquiry, Work System Method, and four others.
Together, these theories provide a rich tapestry of knowledge
around the use of theory in IS research. Since most of these
theories are from contributing disciplines, they provide a window
into the world of external thought leadership."
The overall mission of this book is to provide a comprehensive
understanding and coverage of the various theories and models used
in IS research. Specifically, it aims to focus on the following key
objectives: To describe the various theories and models applicable
to studying IS/IT management issues. To outline and describe, for
each of the various theories and models, independent and dependent
constructs, reference discipline/originating area, originating
author(s), seminal articles, level of analysis (i.e. firm,
individual, industry) and links with other theories. To provide a
critical review/meta-analysis of IS/IT management articles that
have used a particular theory/model.To discuss how a theory can be
used to better understand how information systems can be
effectively deployed in today's digital world.
This book contributes to our understanding of a number of
theories and models. The theoretical contribution of this book is
that it analyzes and synthesizes the relevant literature in order
to enhance knowledge of IS theories and models from various
perspectives. To cater to the information needs of a diverse
spectrum of readers, this book is structured into two volumes, with
each volume further broken down into two sections.
The first section of Volume 1 presents detailed descriptions of
a set of theories centered around the IS lifecycle, including the
Success Model, Technology Acceptance Model, User Resistance
Theories, and four others. The second section of Volume 1 contains
strategic and economic theories, including a Resource-Based View,
Theory of Slack Resources, Portfolio Theory, Discrepancy Theory
Models, and eleven others.
The first section of Volume 2 concerns socio-psychological
theories. These include Personal Construct Theory, Psychological
Ownership, Transactive Memory, Language-Action Approach, and nine
others. The second section of Volume 2 deals with methodological
theories, including Critical Realism, Grounded Theory, Narrative
Inquiry, Work System Method, and four others.
Together, these theories provide a rich tapestry of knowledge
around the use of theory in IS research. Since most of these
theories are from contributing disciplines, they provide a window
into the world of external thought leadership."
The overall mission of this book is to provide a comprehensive
understanding and coverage of the various theories and models used
in IS research. Specifically, it aims to focus on the following key
objectives: To describe the various theories and models applicable
to studying IS/IT management issues. To outline and describe, for
each of the various theories and models, independent and dependent
constructs, reference discipline/originating area, originating
author(s), seminal articles, level of analysis (i.e. firm,
individual, industry) and links with other theories. To provide a
critical review/meta-analysis of IS/IT management articles that
have used a particular theory/model.To discuss how a theory can be
used to better understand how information systems can be
effectively deployed in today's digital world.
This book contributes to our understanding of a number of
theories and models. The theoretical contribution of this book is
that it analyzes and synthesizes the relevant literature in order
to enhance knowledge of IS theories and models from various
perspectives. To cater to the information needs of a diverse
spectrum of readers, this book is structured into two volumes, with
each volume further broken down into two sections.
The first section of Volume 1 presents detailed descriptions of
a set of theories centered around the IS lifecycle, including the
Success Model, Technology Acceptance Model, User Resistance
Theories, and four others. The second section of Volume 1 contains
strategic and economic theories, including a Resource-Based View,
Theory of Slack Resources, Portfolio Theory, Discrepancy Theory
Models, and eleven others.
The first section of Volume 2 concerns socio-psychological
theories. These include Personal Construct Theory, Psychological
Ownership, Transactive Memory, Language-Action Approach, and nine
others. The second section of Volume 2 deals with methodological
theories, including Critical Realism, Grounded Theory, Narrative
Inquiry, Work System Method, and four others.
Together, these theories provide a rich tapestry of knowledge
around the use of theory in IS research. Since most of these
theories are from contributing disciplines, they provide a window
into the world of external thought leadership."
Covering the period from Ted Heath's assumption of the leadership
of the Conservative Party through to the early years of the
Coalition, this volume provides a detailed analysis of the Tory
Party's Macroeconomic and Microeconomic Policy-Making over the past
50 years providing an historical context for the political and
economic events of today.
The People's Republic of China (PRC) continues to pursue a
long-term, comprehensive military modernisation program designed to
improve its armed forces' capacity to fight short-duration,
high-intensity regional conflicts. China's military modernisation
has the potential to reduce core U.S. military technological
advantages. China is investing in capabilities designed to defeat
adversary power projection and counter third-party -- including
U.S. -- intervention during a crisis or conflict. This book
examines the military and security developments involving the PRC.
Moreover, it provides and discusses the highlights from China's new
defense white paper, "China's Military Strategy".
John Carshalton, late of the British army, returns to the town of
Arabella in Kansas to take up a new job as town sheriff. He quickly
earns the respect of the townspeople and enjoys a peaceful life
until he gets word of outlaw gangs terrorizing towns along the
Kansas-Missouri border. US army intelligence suggests that these
are no ordinary gangs, but part of a larger more sinister force,
and when John is asked by an army officer to pose as a deserter
from the British Army in Canada and try to infiltrate whatever kind
of force is being raised he agrees, believing this to be a simple
fact-finding mission. However, John soon finds him caught up in a
web of violence and intrigue that threatens to destroy him and all
he holds dear.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R383
R318
Discovery Miles 3 180
Ab Wheel
R209
R149
Discovery Miles 1 490
Morbius
Jared Leto, Matt Smith, …
DVD
R172
Discovery Miles 1 720
|