Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
System Reengineering in Healthcare: Application for Hospital Emergency Departments (Studies in Systems, Decision and Control)
System Reengineering in Healthcare: Application for Hospital Emergency Departments (Studies in Systems, Decision and Control)

This book presents an advanced systematic mapping review (SMR) and state-of-the-art taxonomy of emergency departments (EDs). Focusing on the patients’ level of fulfilment and how it can be enhanced, it examines existing problems like waiting periods and overcrowding and how these can be alleviated to provide a better service....

VACCINE SCIENCE REVISITED: Are Childhood Immunizations As Safe As Claimed? (The Underground Knowledge Series)
VACCINE SCIENCE REVISITED: Are Childhood Immunizations As Safe As Claimed? (The Underground Knowledge Series)
An unbiased, neutral, fact-based investigation that simply allows the science to do the talking on childhood vaccinations. Written by father and son investigative journalism/research team Lance & James Morcan, with a foreword by medical laboratory scientist Elísabet Norris, VACCINE SCIENCE REVISITED is possibly the most...
Proceedings of the 20th Congress of the International Ergonomics Association (IEA 2018): Volume IX: Aging, Gender and Work, Anthropometry, Ergonomics ... in Intelligent Systems and Computing)
Proceedings of the 20th Congress of the International Ergonomics Association (IEA 2018): Volume IX: Aging, Gender and Work, Anthropometry, Ergonomics ... in Intelligent Systems and Computing)

This book presents the proceedings of the 20th Congress of the International Ergonomics Association (IEA 2018), held on August 26-30, 2018, in Florence, Italy. By highlighting the latest theories and models, as well as cutting-edge technologies and applications, and by combining findings from a range of disciplines including...

Data Breaches: Crisis and Opportunity
Data Breaches: Crisis and Opportunity
Protect Your Organization Against Massive Data Breaches and Their Consequences

Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events,
...
International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018 (Lecture Notes on Data Engineering and Communications Technologies)
International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018 (Lecture Notes on Data Engineering and Communications Technologies)

This book discusses data communication and computer networking, communication technologies and the applications of IoT (Internet of Things), big data, cloud computing and healthcare informatics. It explores, examines and critiques intelligent data communications and presents inventive methodologies in communication technologies and...

Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features

Implement blockchain principles in your choice of domain using Ethereum

Key Features

  • Build permissioned enterprise-grade blockchain applications from scratch
  • Implement Blockchain-as-a-Service to enterprises in terms of deployment and security
  • Achieve...
Statistics in a Nutshell: A Desktop Quick Reference
Statistics in a Nutshell: A Desktop Quick Reference
One thing I (Sarah) have learned over the last 20 or so years is that a sure way to derail a promising conversation at a party is to tell people what I do for a living. And rest assured that I’m neither a tax auditor nor captain of a sludge barge.No, I’m merely a biostatistician and statistics instructor, a revelation which invariably...
IoT, AI, and Blockchain for .NET: Building a Next-Generation Application from the Ground Up
IoT, AI, and Blockchain for .NET: Building a Next-Generation Application from the Ground Up
Create applications using Industry 4.0. Discover how artificial intelligence (AI) and machine learning (ML) capabilities can be enhanced using the Internet of things (IoT) and secured using Blockchain, so your latest app can be not just smarter but also more connected and more secure than ever before. This book covers the latest...
Intelligent Projects Using Python: 9 real-world AI projects leveraging machine learning and deep learning with TensorFlow and Keras
Intelligent Projects Using Python: 9 real-world AI projects leveraging machine learning and deep learning with TensorFlow and Keras

Implement machine learning and deep learning methodologies to build smart, cognitive AI projects using Python

Key Features

  • A go-to guide to help you master AI algorithms and concepts
  • 8 real-world projects tackling different challenges in healthcare, e-commerce, and...
Beginning LoRa Radio Networks with Arduino: Build Long Range, Low Power Wireless IoT Networks
Beginning LoRa Radio Networks with Arduino: Build Long Range, Low Power Wireless IoT Networks
Create your own LoRa wireless projects for non-industrial use and gain a strong basic understanding of the LoRa technology, LoRa WAN, and LPWAN. 

You'll start by building your first LoRa wireless channel and then move on to various interesting projects such as setting up networks with a LoRa gateway,
...
Artificial Intelligence Basics: A Non-Technical Introduction
Artificial Intelligence Basics: A Non-Technical Introduction

Artificial intelligence touches nearly every part of your day. While you may initially assume that technology such as smart speakers and digital assistants are the extent of it, AI has in fact rapidly become a general-purpose technology, reverberating across industries including transportation, healthcare, financial services, and...

RFID Applied
RFID Applied
Everything you need to know to implement and fully leverage RFID technology

RFID Applied is just that—the application of radio-frequency identification (RFID) technology. The book discusses both the technical and the business issues involved in selecting, developing, and implementing an RFID system.

...
Result Page: 27 26 25 24 23 22 21 20 19 18 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy