Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 6 of 6 matches in All Departments
This book highlights the latest advances in functional micro/nano imaging probes and their applications for biomedical imaging and therapy. Given the rapid emergence of transdisciplinary research and applications in materials, chemical probes and translational medicine in recent years, scientists in these areas are expected to keep up to date on the latest technologies and advances to promote comprehensive innovations. Addressing this need, the book presents recently introduced features, emerging techniques, and new strategies, complemented by detailed illustrations. Covering the status quo and offering an outlook on the future, it benefits all readers with an interest in functional materials, especially micro/nano imaging materials for biomedical imaging applications, providing them with both vital updates and inspiration for their own research.
This book highlights the latest advances in functional micro/nano imaging probes and their applications for biomedical imaging and therapy. Given the rapid emergence of transdisciplinary research and applications in materials, chemical probes and translational medicine in recent years, scientists in these areas are expected to keep up to date on the latest technologies and advances to promote comprehensive innovations. Addressing this need, the book presents recently introduced features, emerging techniques, and new strategies, complemented by detailed illustrations. Covering the status quo and offering an outlook on the future, it benefits all readers with an interest in functional materials, especially micro/nano imaging materials for biomedical imaging applications, providing them with both vital updates and inspiration for their own research.
The three-volume set LNCS 12937 - 12939 constitutes the proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2021, which was held during June 25-27, 2021. The conference took place in Nanjing, China.The 103 full and 57 short papers presented in these proceedings were carefully reviewed and selected from 315 submissions. The following topics are covered in Part I of the set: network protocols, signal processing, wireless telecommunication systems, blockchain, IoT and edge computing, artificial intelligence, computer security, distributed computer systems, machine learning, and others.
The three-volume set constitutes the proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2021, which was held during June 25-27, 2021, in Nanjing, China.The 103 full and 57 short papers presented in these proceedings were carefully reviewed and selected from 315 submissions. Part III of the set includes the papers of the contributors that took part in the workshops co-located with the conference.The following topics are covered in the volume: network protocols, signal processing, wireless telecommunication systems, routing algorithms, cryptography, local area networks, and others.
The three-volume set constitutes the proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2021, which was held during June 25-27, 2021. The conference took place in Nanjing, China.The 103 full and 57 short papers presented in these proceedings were carefully reviewed and selected from 315 submissions. The contributions in Part II of the set are subdivided into the following topical sections: Scheduling & Optimization II; Security; Data Center Networks and Cloud Computing; Privacy-Aware Computing; Internet of Vehicles; Visual Computing for IoT; Mobile Ad-Hoc Networks.
This book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019. The 23 full papers presented together with 8 short papers and 2 invited papers were carefully reviewed and selected from 94 submissions. The papers cover topics in the fields of post-quantum cryptology; AI security; systems security; side channel attacks; identity-based cryptography; signatures; cryptanalysis; authentication; and mathematical foundations.
|
You may like...
The Asian Aspiration - Why And How…
Greg Mills, Olusegun Obasanjo, …
Paperback
|