Home | Amazing | Today | Tags | Publishers | Years | Search 
Cloud Computing Basics: A Non-Technical Introduction
Cloud Computing Basics: A Non-Technical Introduction

Ever since my childhood I had a fascination with clouds. Real clouds up in the sky, white and fluffy or gray and gloomy, afforded an ever-present drama unfolding above for the curious spectator looking toward the heavens, as inquisitive children are wont to do. Maybe it was because of ample exposure to the perennial cloudiness of my native...

Smart Intelligent Computing and Applications: Proceedings of the Second International Conference on SCI 2018, Volume 1 (Smart Innovation, Systems and Technologies, 104)
Smart Intelligent Computing and Applications: Proceedings of the Second International Conference on SCI 2018, Volume 1 (Smart Innovation, Systems and Technologies, 104)

The proceedings covers advanced and multi-disciplinary research on design of smart computing and informatics. The theme of the book broadly focuses on various innovation paradigms in system knowledge, intelligence and sustainability that may be applied to provide realistic solution to varied problems in society, environment and...

Affect Theory and Literary Critical Practice: A Feel for the Text (Palgrave Studies in Affect Theory and Literary Criticism)
Affect Theory and Literary Critical Practice: A Feel for the Text (Palgrave Studies in Affect Theory and Literary Criticism)

Affect Theory and Literary Critical Practice develops new approaches to reading literature that are informed by the insights of scholars working in affect studies across many disciplines, with essays that consider works of fiction, drama, poetry and memoir ranging from the medieval to the postmodern. While building...

Fashion Supply Chain Management in Asia: Concepts, Models, and Cases (Springer Series in Fashion Business)
Fashion Supply Chain Management in Asia: Concepts, Models, and Cases (Springer Series in Fashion Business)
This book serves as a comprehensive guide to understanding the theories and applications in managing the Asian fashion supply chain, presenting both quantitative and exploratory studies. Providing academicians and practitioners insights into the latest developments and models, it also offers diverse perspectives on areas like strategic...
Negation and Speculation Detection (Natural Language Processing)
Negation and Speculation Detection (Natural Language Processing)
Negation and speculation detection is an emerging topic that has attracted the attention of many researchers, and there is clearly a lack of relevant textbooks and survey texts. This book aims to define negation and speculation from a natural language processing perspective, to explain the need for processing these phenomena, to summarise...
Industrial Sensors and Controls in Communication Networks: From Wired Technologies to Cloud Computing and the Internet of Things (Computer Communications and Networks)
Industrial Sensors and Controls in Communication Networks: From Wired Technologies to Cloud Computing and the Internet of Things (Computer Communications and Networks)

This informative text/reference presents a detailed review of the state of the art in industrial sensor and control networks. The book examines a broad range of applications, along with their design objectives and technical challenges. The coverage includes fieldbus technologies, wireless communication technologies, network...

Highs and Lows of European Integration: Sixty Years After the Treaty of Rome
Highs and Lows of European Integration: Sixty Years After the Treaty of Rome

In light of Europe’s prolonged state of crisis, this book reassesses the challenges and prospects of the European integration process. Scholars from diverse disciplines reflect on various types of integration by analyzing political, economic and sociological variables, while also taking legal...

The Role of Toll-Like Receptor 4 in Infectious and Non Infectious Inflammation (Progress in Inflammation Research, 87)
The Role of Toll-Like Receptor 4 in Infectious and Non Infectious Inflammation (Progress in Inflammation Research, 87)
TLR4 is one of the most important innate immunity receptors, its function mainly consisting in the activation of inflammatory pathways in response to stimulation by Pathogen-Associated Molecular Patterns (PAMPs) and Damage Associated Molecular Pattern molecules (DAMPs).

This volume critically reviews the different...

Precision Medicine in Radiation Oncology
Precision Medicine in Radiation Oncology

A FRESH EXAMINATION OF PRECISION MEDICINE'S INCREASINGLY PROMINENT ROLE IN THE FIELD OF ONCOLOGY

Precision medicine takes into account each patient's specific characteristics and requirements to arrive at treatment plans that are optimized towards the best possible outcome. As the field of oncology...

Distributed Energy Management of Electrical Power Systems (IEEE Press Series on Power and Energy Systems)
Distributed Energy Management of Electrical Power Systems (IEEE Press Series on Power and Energy Systems)

Go in-depth with this comprehensive discussion of distributed energy management

Distributed Energy Management of Electrical Power Systems provides the most complete analysis of fully distributed control approaches and their applications for electric power systems available today. Authored by four respected...

Nanotechnology: Applications in Energy, Drug and Food
Nanotechnology: Applications in Energy, Drug and Food

Applications of nanotechnology are the remarkable sizes dependent on physiochemical properties of nanomaterials that have led to the developed protocols for synthesizing nanomaterials over a range of size, shapes and chemical compositions. Nanomaterials are normally powders composed of nanoparticles which exhibit properties...

Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major...

Result Page: 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy