DPP IV has been attributed a large array of functions, some of which are mediated by
its exopeptidase activity. Although it only removes two amino acid residues at the N-terminus
of the peptide, this cleavage can inactivate or modify the activity of regulatory peptides, peptide
hormones, chemokines and neuropeptides. Several...
Fuzzy Cognitive Maps (FCM) constitute cognitive models in the form of fuzzy directed graphs consisting of two basic elements: the nodes, which basically correspond to “concepts” bearing different states of activation depending on the knowledge they represent, and the “edges” denoting the causal effects...
Transformation electromagnetics is a systematic design technique for optical and electromagnetic devices that enables novel wave-material interaction properties. The associated metamaterials technology for designing and realizing optical and electromagnetic devices can control the behavior of light and electromagnetic waves in ways that have...
“The invaluable advice in How to Wow guarantees your success in any meeting situation, from the boardroom to the breakfast table.”
–Keith Ferrazzi, author of Never Eat Alone
In today’s fast-paced world, where an elevator ride with your CEO can turn into an impromptu meeting, your lunch...
If there's anything the recession of 2009 taught us, it was the importance of investing in our customers, but when was this any different? So says Joseph Jaffe, bestselling author of Life After the 30-Second Spot and Join the Conversation, and a leading expert and...
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of...
As more and more businesses around the world adopt enterprise systems, it
becomes increasingly important for students to develop a more process-centric
perspective that refl ects the realities of the modern business environment in
which they will work. Because business operations and enterprise systems are
so tightly...
This book began life as a comparatively short chapter in a book called Database in Depth: Relational Theory for
Practitioners (O’Reilly, 2005). That book was superseded by SQL and Relational Theory: How to Write Accurate
SQL Code (O’Reilly, 2009), where the design material, since it was somewhat tangential to...
Bulletproof your organization against data breach, identity theft, and corporate espionage
In this updated and revised edition of Privacy Means Profit, John Sileo demonstrates how to keep data theft from destroying your bottom line, both personally and professionally. In addition to sharing his gripping tale of losing...
During bull and bear markets, there is a group of hedge funds and professional traders which have been consistently outperforming traditional investment strategies for the past 30 odd years. They have shown remarkable uncorrelated performance and in the great bear market of 2008 they had record gains. These traders are highly secretive...
The use of Bayesian methods for the analysis of data has grown substantially in areas as diverse as applied statistics, psychology, economics and medical science. Bayesian Methods for Categorical Data sets out to demystify modern Bayesian methods, making them accessible to students and researchers alike. Emphasizing the use of statistical...
Since I wrote The Green and Virtual Data Center (CRC Press, 2009), I have had the
opportunity to meet and speak with thousands of information technology (IT) professionals
around the world, both in person and virtually via different venues. Even as
that last book was being printed, the ideas to be found in this new book were coming...