Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 22 of 22 matches in All Departments
The second volume of the two volumes book is dedicated to various extensions and generalizations of Dyadic (Walsh) analysis and related applications. Considered are dyadic derivatives on Vilenkin groups and various other Abelian and finite non-Abelian groups. Since some important results were developed in former Soviet Union and China, we provide overviews of former work in these countries. Further, we present translations of three papers that were initially published in Chinese. The presentation continues with chapters written by experts in the area presenting discussions of applications of these results in specific tasks in the area of signal processing and system theory. Efficient computing of related differential operators on contemporary hardware, including graphics processing units, is also considered, which makes the methods and techniques of dyadic analysis and generalizations computationally feasible. The volume 2 of the book ends with a chapter presenting open problems pointed out by several experts in the area.
Dyadic (Walsh) analysis emerged as a new research area in applied mathematics and engineering in early seventies within attempts to provide answers to demands from practice related to application of spectral analysis of different classes of signals, including audio, video, sonar, and radar signals. In the meantime, it evolved in a mature mathematical discipline with fundamental results and important features providing basis for various applications. The book will provide fundamentals of the area through reprinting carefully selected earlier publications followed by overview of recent results concerning particular subjects in the area written by experts, most of them being founders of the field, and some of their followers. In this way, this first volume of the two volume book offers a rather complete coverage of the development of dyadic Walsh analysis, and provides a deep insight into its mathematical foundations necessary for consideration of generalizations and applications that are the subject of the second volume. The presented theory is quite sufficient to be a basis for further research in the subject area as well as to be applied in solving certain new problems or improving existing solutions for tasks in the areas which motivated development of the dyadic analysis.
This timely and insightful analysis of Conservative economic policymaking over the past half century covers the period from Ted Heath's assumption of the leadership through the Heath, Thatcher and Major governments and up to the early years of the coalition. As well as a offering a detailed commentary on the Conservative Party's macroeconomic and microeconomic policymaking for the past 50 years it also establishes a context for the controversial austerity measures implemented by the Conservative-led Coalition that established in the wake of Britain's inconclusive general election of 2010. This is a fascinating insight into policymaking within the Conservative Party as well as an indicator of the extent to which competing conservative philosophies have impacted on the policies pursued. At a time when the Conservative Party and economic policymaking loom large on the political landscape, this book is an invaluable contribution to present debates.
The overall mission of this book is to provide a comprehensive understanding and coverage of the various theories and models used in IS research. Specifically, it aims to focus on the following key objectives: To describe the various theories and models applicable to studying IS/IT management issues. To outline and describe, for each of the various theories and models, independent and dependent constructs, reference discipline/originating area, originating author(s), seminal articles, level of analysis (i.e. firm, individual, industry) and links with other theories. To provide a critical review/meta-analysis of IS/IT management articles that have used a particular theory/model.To discuss how a theory can be used to better understand how information systems can be effectively deployed in today's digital world. This book contributes to our understanding of a number of theories and models. The theoretical contribution of this book is that it analyzes and synthesizes the relevant literature in order to enhance knowledge of IS theories and models from various perspectives. To cater to the information needs of a diverse spectrum of readers, this book is structured into two volumes, with each volume further broken down into two sections. The first section of Volume 1 presents detailed descriptions of a set of theories centered around the IS lifecycle, including the Success Model, Technology Acceptance Model, User Resistance Theories, and four others. The second section of Volume 1 contains strategic and economic theories, including a Resource-Based View, Theory of Slack Resources, Portfolio Theory, Discrepancy Theory Models, and eleven others. The first section of Volume 2 concerns socio-psychological theories. These include Personal Construct Theory, Psychological Ownership, Transactive Memory, Language-Action Approach, and nine others. The second section of Volume 2 deals with methodological theories, including Critical Realism, Grounded Theory, Narrative Inquiry, Work System Method, and four others. Together, these theories provide a rich tapestry of knowledge around the use of theory in IS research. Since most of these theories are from contributing disciplines, they provide a window into the world of external thought leadership."
The overall mission of this book is to provide a comprehensive understanding and coverage of the various theories and models used in IS research. Specifically, it aims to focus on the following key objectives: To describe the various theories and models applicable to studying IS/IT management issues. To outline and describe, for each of the various theories and models, independent and dependent constructs, reference discipline/originating area, originating author(s), seminal articles, level of analysis (i.e. firm, individual, industry) and links with other theories. To provide a critical review/meta-analysis of IS/IT management articles that have used a particular theory/model.To discuss how a theory can be used to better understand how information systems can be effectively deployed in today's digital world. This book contributes to our understanding of a number of theories and models. The theoretical contribution of this book is that it analyzes and synthesizes the relevant literature in order to enhance knowledge of IS theories and models from various perspectives. To cater to the information needs of a diverse spectrum of readers, this book is structured into two volumes, with each volume further broken down into two sections. The first section of Volume 1 presents detailed descriptions of a set of theories centered around the IS lifecycle, including the Success Model, Technology Acceptance Model, User Resistance Theories, and four others. The second section of Volume 1 contains strategic and economic theories, including a Resource-Based View, Theory of Slack Resources, Portfolio Theory, Discrepancy Theory Models, and eleven others. The first section of Volume 2 concerns socio-psychological theories. These include Personal Construct Theory, Psychological Ownership, Transactive Memory, Language-Action Approach, and nine others. The second section of Volume 2 deals with methodological theories, including Critical Realism, Grounded Theory, Narrative Inquiry, Work System Method, and four others. Together, these theories provide a rich tapestry of knowledge around the use of theory in IS research. Since most of these theories are from contributing disciplines, they provide a window into the world of external thought leadership."
The overall mission of this book is to provide a comprehensive understanding and coverage of the various theories and models used in IS research. Specifically, it aims to focus on the following key objectives: To describe the various theories and models applicable to studying IS/IT management issues. To outline and describe, for each of the various theories and models, independent and dependent constructs, reference discipline/originating area, originating author(s), seminal articles, level of analysis (i.e. firm, individual, industry) and links with other theories. To provide a critical review/meta-analysis of IS/IT management articles that have used a particular theory/model.To discuss how a theory can be used to better understand how information systems can be effectively deployed in today's digital world. This book contributes to our understanding of a number of theories and models. The theoretical contribution of this book is that it analyzes and synthesizes the relevant literature in order to enhance knowledge of IS theories and models from various perspectives. To cater to the information needs of a diverse spectrum of readers, this book is structured into two volumes, with each volume further broken down into two sections. The first section of Volume 1 presents detailed descriptions of a set of theories centered around the IS lifecycle, including the Success Model, Technology Acceptance Model, User Resistance Theories, and four others. The second section of Volume 1 contains strategic and economic theories, including a Resource-Based View, Theory of Slack Resources, Portfolio Theory, Discrepancy Theory Models, and eleven others. The first section of Volume 2 concerns socio-psychological theories. These include Personal Construct Theory, Psychological Ownership, Transactive Memory, Language-Action Approach, and nine others. The second section of Volume 2 deals with methodological theories, including Critical Realism, Grounded Theory, Narrative Inquiry, Work System Method, and four others. Together, these theories provide a rich tapestry of knowledge around the use of theory in IS research. Since most of these theories are from contributing disciplines, they provide a window into the world of external thought leadership."
Covering the period from Ted Heath's assumption of the leadership of the Conservative Party through to the early years of the Coalition, this volume provides a detailed analysis of the Tory Party's Macroeconomic and Microeconomic Policy-Making over the past 50 years providing an historical context for the political and economic events of today.
The People's Republic of China (PRC) continues to pursue a long-term, comprehensive military modernisation program designed to improve its armed forces' capacity to fight short-duration, high-intensity regional conflicts. China's military modernisation has the potential to reduce core U.S. military technological advantages. China is investing in capabilities designed to defeat adversary power projection and counter third-party -- including U.S. -- intervention during a crisis or conflict. This book examines the military and security developments involving the PRC. Moreover, it provides and discusses the highlights from China's new defense white paper, "China's Military Strategy".
John Carshalton, late of the British army, returns to the town of Arabella in Kansas to take up a new job as town sheriff. He quickly earns the respect of the townspeople and enjoys a peaceful life until he gets word of outlaw gangs terrorizing towns along the Kansas-Missouri border. US army intelligence suggests that these are no ordinary gangs, but part of a larger more sinister force, and when John is asked by an army officer to pose as a deserter from the British Army in Canada and try to infiltrate whatever kind of force is being raised he agrees, believing this to be a simple fact-finding mission. However, John soon finds him caught up in a web of violence and intrigue that threatens to destroy him and all he holds dear.
|
You may like...
Women In Solitary - Inside The Female…
Shanthini Naidoo
Paperback
(1)
Democracy Works - Re-Wiring Politics To…
Greg Mills, Olusegun Obasanjo, …
Paperback
|