Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 25 of 26 matches in All Departments
The science and technology related to semiconductors have received significant attention for applications in various fields including microelectronics, nanophotonics, and biotechnologies. Understanding of semiconductors has advanced to such a level that we are now able to design novel system complexes before we go for the proof-of-principle experimental demonstration. This book explains the experimental setups for optical spectral analysis of semiconductors and describes the experimental methods and the basic quantum mechanical principles underlying the fast-developing nanotechnology for semiconductors. Further, it uses numerous case studies with detailed theoretical discussions and calculations to demonstrate the data analysis. Covering structures ranging from bulk to the nanoscale, it examines applications in the semiconductor industry and biomedicine. Starting from the most basic physics of geometric optics, wave optics, quantum mechanics, solid-state physics, it provides a self-contained resource on the subject for university undergraduates. The book can be further used as a toolbox for researching and developing semiconductor nanotechnology based on spectroscopy.
T-Cell/Macrophage Activation and HIV Infection.- 1. CD4+ and CD8+ T Lymphocyte Activation in HIV Infection: Implications for Immune Pathogenesis and Therapy.- 2. Markers of Immune Cell Activation and Disease Progression: Cell Activation in HIV Disease.- 3. The Role of the Cell Cycle in HIV-1 Infection.- 4. Molecular Basis of Cell Cycle Dependent HIV-1 Replication: Implications for Control of Virus Burden.- 5. Regulation of Macrophage Activation and HIV Replication.- 6. Investigations on Autologous T-Cells for Adoptive Immunotherapy of AIDS.- 7. Rational Problems Associated with the Development of Cellular Approaches in Controlling HIV Spread.- Apoptosis and Viropathogenesis of HIV Disease.- 8. The Role of Surface CD4 in HIV-Induced Apoptosis.- 9. Mechanism of Apoptosis in Peripheral Blood Mononuclear Cells of HIV-Infected Patients.- 10. Programmed Death of T Cells in the Course of HIV Infection.- 11. T Cell Apoptosis as a Consequence of Chronic Activation of the Immune System in HIV Infection.- 12. Apoptosis during HIV Infection: A Cytopathic Effect of HIV or an Important Host-Defense Mechanism against Viruses in General?.- Apoptosis and Immunopathogenesis of HIV Disease.- 13. From Cell Activation to Cell Depletion: The Programmed Cell Death Hypothesis of AIDS Pathogenesis.- 14. Immunosuppression by a Noncytolytic Virus Via T Cell Mediated Immunopathology: Implication for AIDS.- 15. Clonal Expansion of T Cells and HIV Genotypes in Microdissected Splenic White Pulps Indicates Viral Replication in Situ and Infiltration of HIV-Specific Cytotoxic T Lymphocytes.- 16. Autoimmunity, Apoptosis Defects, and Retroviruses.- 17. AIDS as Immune System Activation: Key Questions that Remain.- Mediators of T-Cell Activation/Apoptosis and Therapeutic Applications.- 18. Inhibition of T Lymphocyte Activation and Apoptotic Cell Death by Cyclosporin A and Tacrolimus (FK506): Its Relevance to Therapy of HIV Infection.- 19. Cyclophilin and Gag in HIV-1 Replication and Pathogenesis.- 20. Long-Term Follow-up of HIV Positive Asymptomatic Patients Having Received Cyclosporin A.- 21. Prospective Views of HIV Pathology: Clues for Therapeutic Strategies.
Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems. On the topic of intrusion detection system it is impossible to include everything there is to say on all subjects. However, we have tried to cover the most important and common ones. Network Intrusion Detection and Prevention: Concepts and Techniques is designed for researchers and practitioners in industry. This book is suitable for advanced-level students in computer science as a reference book as well.
This book aims to introduce the principle and design of various foundations, covering shallow foundations, mat foundations, earth retaining structures, excavations, pile foundations, and slope stability. Since the analysis and design of a foundation are based on the soil properties under short-term (undrained) or long-term (drained) conditions, the assessment of soil properties from the geotechnical site investigation and the concept of drained or undrained soil properties are discussed in the first two chapters. Foundation elements transfer various load combinations from the superstructure to the underlying soils or rocks. The load transfer mechanisms, vertical stress or earth pressure distributions, and failure modes of each foundation type are clearly explained in this book. After understanding the soil responses subjected to the loadings from the foundation, the design methods, required factors of safety, and improvement measures for each foundation type are elaborated. This book presents both theoretical explication and practical applications for readers to easily comprehend the theoretical background, design methods, and practical applications and considerations. Each chapter provides relevant exercise examples and a problem set for self-practice. The analysis methods introduced in the book can be applied in actual analysis and design as they contain the most up-to-date knowledge of foundation design. This book is suitable for teachers and students to use in foundation engineering courses and engineers who are engaged in foundation design to create a technically sound, construction-feasible, and economical design of the foundation system.
"Proceedings of the 2012 International Conference on Information
Technology and Software Engineering" presents selected articles
from this major event, which was held in Beijing, December 8-10,
2012. This book presents the latest research trends, methods and
experimental results in the fields of information technology and
software engineering, covering various state-of-the-art research
theories and approaches. The subjects range from intelligent
computing to information processing, software engineering, Web,
unified modeling language (UML), multimedia, communication
technologies, system identification, graphics and visualizing,
etc.
Proceedings of the 2012 International Conference on Information Technology and Software Engineering presents selected articles from this major event, which was held in Beijing, December 8-10, 2012. This book presents the latest research trends, methods and experimental results in the fields of information technology and software engineering, covering various state-of-the-art research theories and approaches. The subjects range from intelligent computing to information processing, software engineering, Web, unified modeling language (UML), multimedia, communication technologies, system identification, graphics and visualizing, etc. The proceedings provide a major interdisciplinary forum for researchers and engineers to present the most innovative studies and advances, which can serve as an excellent reference work for researchers and graduate students working on information technology and software engineering. Prof. Wei Lu, Dr. Guoqiang Cai, Prof. Weibin Liu and Dr. Weiwei Xing all work at Beijing Jiaotong University.
Proceedings of the 2012 International Conference on Information Technology and Software Engineering presents selected articles from this major event, which was held in Beijing, December 8-10, 2012. This book presents the latest research trends, methods and experimental results in the fields of information technology and software engineering, covering various state-of-the-art research theories and approaches. The subjects range from intelligent computing to information processing, software engineering, Web, unified modeling language (UML), multimedia, communication technologies, system identification, graphics and visualizing, etc. The proceedings provide a major interdisciplinary forum for researchers and engineers to present the most innovative studies and advances, which can serve as an excellent reference work for researchers and graduate students working on information technology and software engineering. Prof. Wei Lu, Dr. Guoqiang Cai, Prof. Weibin Liu and Dr. Weiwei Xing all work at Beijing Jiaotong University.
This book aims to introduce the principle and design of various foundations, covering shallow foundations, mat foundations, earth retaining structures, excavations, pile foundations, and slope stability. Since the analysis and design of a foundation are based on the soil properties under short-term (undrained) or long-term (drained) conditions, the assessment of soil properties from the geotechnical site investigation and the concept of drained or undrained soil properties are discussed in the first two chapters. Foundation elements transfer various load combinations from the superstructure to the underlying soils or rocks. The load transfer mechanisms, vertical stress or earth pressure distributions, and failure modes of each foundation type are clearly explained in this book. After understanding the soil responses subjected to the loadings from the foundation, the design methods, required factors of safety, and improvement measures for each foundation type are elaborated. This book presents both theoretical explication and practical applications for readers to easily comprehend the theoretical background, design methods, and practical applications and considerations. Each chapter provides relevant exercise examples and a problem set for self-practice. The analysis methods introduced in the book can be applied in actual analysis and design as they contain the most up-to-date knowledge of foundation design. This book is suitable for teachers and students to use in foundation engineering courses and engineers who are engaged in foundation design to create a technically sound, construction-feasible, and economical design of the foundation system.
The science and technology related to semiconductors have received significant attention for applications in various fields including microelectronics, nanophotonics, and biotechnologies. Understanding of semiconductors has advanced to such a level that we are now able to design novel system complexes before we go for the proof-of-principle experimental demonstration. This book explains the experimental setups for optical spectral analysis of semiconductors and describes the experimental methods and the basic quantum mechanical principles underlying the fast-developing nanotechnology for semiconductors. Further, it uses numerous case studies with detailed theoretical discussions and calculations to demonstrate the data analysis. Covering structures ranging from bulk to the nanoscale, it examines applications in the semiconductor industry and biomedicine. Starting from the most basic physics of geometric optics, wave optics, quantum mechanics, solid-state physics, it provides a self-contained resource on the subject for university undergraduates. The book can be further used as a toolbox for researching and developing semiconductor nanotechnology based on spectroscopy.
This book contains the refereed proceedings of the 12th International Conference on Knowledge Management in Organizations, KMO 2017, held in Beijing, China, in August 2017. The theme of the conference was "Emerging Technology and Knowledge Management in Organizations." The 45 contributions accepted for KMO 2017 were selected from 112 submissions and are organized in topical sections on: Knowledge Management Models and Behaviour Studies; Knowledge Sharing; Knowledge Transfer and Learning; Knowledge and Service Innovation; Knowledge and Organization; Information Systems Research; Value Chain and Supply Chain; Knowledge Re-presentation and Reasoning; Data Mining and Intelligent Science; Big Data Management; Internet of Things and Network.
Discover the difference between making a robot move and making a robot think. Using Mindstorms EV3 and LeJOS-an open source project for Java Mindstorms projects-you'll learn how to create Artificial Intelligence (AI) for your bot. Your robot will learn how to problem solve, how to plan, and how to communicate. Along the way, you'll learn about classical AI algorithms for teaching hardware how to think; algorithms that you can then apply to your own robotic inspirations. If you've ever wanted to learn about robotic intelligence in a practical, playful way, Beginning Robotics Programming in Java with LEGO Mindstorms is for you. What you'll learn: Build your first LEGO EV3 robot step-by-step Install LeJOS and its firmware on Lego EV3 Create and upload your first Java program into Lego EV3 Work with Java programming for motors Understand robotics behavior programming with sensors Review common AI algorithms, such as DFS, BFS, and Dijkstra's Algorithm Who this book is for: Students, teachers, and makers with basic Java programming experience who want to learn how to apply Artificial Intelligence to a practical robotic system.
Proceedings of the 2012 International Conference on Information Technology and Software Engineering presents selected articles from this major event, which was held in Beijing, December 8-10, 2012. This book presents the latest research trends, methods and experimental results in the fields of information technology and software engineering, covering various state-of-the-art research theories and approaches. The subjects range from intelligent computing to information processing, software engineering, Web, unified modeling language (UML), multimedia, communication technologies, system identification, graphics and visualizing, etc. The proceedings provide a major interdisciplinary forum for researchers and engineers to present the most innovative studies and advances, which can serve as an excellent reference work for researchers and graduate students working on information technology and software engineering. Prof. Wei Lu, Dr. Guoqiang Cai, Prof. Weibin Liu and Dr. Weiwei Xing all work at Beijing Jiaotong University.
In the past decade, the global efforts in the control of HIV disease were basically concentrated on the search for anti-retroviral agents. So far, anti-HIV therapies have been shown to be disappointing because of rapid development of drug-resistant mutant variants. Despite this drawback in the therapeutic fight against HIV infection, antiviral research should be actively pursued. However, failure of antiviral therapy indicates that other avenues of research should be rapidly explored with the same energy. In this setting, striking advances have been recently made in the dissection and understanding of the viro-immunological processes governing the progressive destruction of lymphoid organs associated with AIDS develop ment, and HIV-induced activation and apoptosis have been identified as key phenomena of the immune system destruction. This book assembles the most recent advances on basic and clinical aspects ofT-cell activationiapoptosis in HIV infection and their implications for immunotherapy. These data were presented at an international symposium held on July 11-12, 1994, in Paris. The book is partitioned into 21 chapters covering four comprehensive fields: 1) T-celllmacrophage activation and HIV infection; 2) Apoptosis and viropathogenesis of HI V disease; 3) Apop tosis and immunopathogenesis ofHIV disease; 4) Mediators ofT-cell activationiapoptosis and therapeutic applications. We hope that this book will assist the readers in understanding recent advances in the viro-immunopathogenesis of HI V disease as well as the rationales for potential immune cell-targeted therapeutic interventions.
Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems. On the topic of intrusion detection system it is impossible to include everything there is to say on all subjects. However, we have tried to cover the most important and common ones. Network Intrusion Detection and Prevention: Concepts and Techniques is designed for researchers and practitioners in industry. This book is suitable for advanced-level students in computer science as a reference book as well.
This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition.
This two-volume set of LNAI 13551 and 13552 constitutes the refereed proceedings of the 11th CCF Conference on Natural Language Processing and Chinese Computing, NLPCC 2022, held in Guilin, China, in September 2022.The 62 full papers, 21 poster papers, and 27 workshop papers presented were carefully reviewed and selected from 327 submissions. They are organized in the following areas: Fundamentals of NLP; Machine Translation and Multilinguality; Machine Learning for NLP; Information Extraction and Knowledge Graph; Summarization and Generation; Question Answering; Dialogue Systems; Social Media and Sentiment Analysis; NLP Applications and Text Mining; and Multimodality and Explainability.
This two-volume set of LNAI 13551 and 13552 constitutes the refereed proceedings of the 11th CCF Conference on Natural Language Processing and Chinese Computing, NLPCC 2022, held in Guilin, China, in September 2022.The 62 full papers, 21 poster papers, and 27 workshop papers presented were carefully reviewed and selected from 327 submissions. They are organized in the following areas: Fundamentals of NLP; Machine Translation and Multilinguality; Machine Learning for NLP; Information Extraction and Knowledge Graph; Summarization and Generation; Question Answering; Dialogue Systems; Social Media and Sentiment Analysis; NLP Applications and Text Mining; and Multimodality and Explainability.
This open access book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, held in Beijing, China, in AJuly 2021. The 14 papers presented were carefully reviewed and selected from 51 submissions. The papers are organized according to the following topical sections: data security; privacy protection; anomaly detection; traffic analysis; social network security; vulnerability detection; text classification.
This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security.
This book constitutes the thoroughly refereed post-workshop proceedings of the workshops that were held in conjunction with the 24th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2020, in Singapore, Singapore, in May 2020. The 17 revised full papers presented were carefully reviewed and selected from a total of 50 submissions. The five workshops were as follows: * First International Workshop on Literature-Based Discovery (LBD 2020) * Workshop on Data Science for Fake News (DSFN 2020) * Learning Data Representation for Clustering (LDRC 2020) * Ninth Workshop on Biologically Inspired Techniques for Data Mining (BDM * 2020) * First Pacific Asia Workshop on Game Intelligence & Informatics (GII 2020)
This book constitutes the refereed proceedings of the 26th China Conference on Information Retrieval, CCIR 2020, held in Xi'an, China, in August 2020.*The 12 full papers presented were carefully reviewed and selected from 102 submissions. The papers are organized in topical sections: search and recommendation, NLP for IR, and IR in finance. * Due to the COVID-19 pandemic the conference was held online supplemented with local on-site events.
|
You may like...
Samurai Sword Murder - The Morne Harmse…
Nicole Engelbrecht
Paperback
|