Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Systems and Complexity in Health
Handbook of Systems and Complexity in Health

This book is an introduction to health care as a complex adaptive system, a system that feeds back on itself. The first section introduces systems and complexity theory from a science, historical, epistemological, and technical perspective, describing the principles and mathematics. Subsequent sections build on the health applications of...

Molecular Basis of Thyroid Cancer (Cancer Treatment and Research)
Molecular Basis of Thyroid Cancer (Cancer Treatment and Research)
Thyroid cancer is the fastest growing cancer in the U.S., especially among women. Given the relative success we have had in its treatment, there is a need to capitalize on it by better understanding the factors that underpin this malignancy, and exploring better strategies for diagnosis, treatment, and follow-up. To do so, we must...
Principles of Molecular Cardiology (Contemporary Cardiology)
Principles of Molecular Cardiology (Contemporary Cardiology)

An easy-to-read survey of all the latest developments in molecular cardiologic research and therapy. The authors explain in a readable style the complex process of the heart's development, the molecular basis of cardiovascular diseases, and the translation of these research advances to actual clinical treatments. The expert information...

Applications of Data Mining in E-Business and Finance (Frontiers in Artificial Intelligence and Applications)
Applications of Data Mining in E-Business and Finance (Frontiers in Artificial Intelligence and Applications)
The application of Data Mining (DM) technologies has shown an explosive growth in an increasing number of different areas of business, government and science. Two of the most important business areas are finance, in particular in banks and insurance companies, and e-business, such as web portals, e-commerce and ad management services.In...
The Enchanted Hour: The Miraculous Power of Reading Aloud in the Age of Distraction
The Enchanted Hour: The Miraculous Power of Reading Aloud in the Age of Distraction

A Wall Street Journal writer’s conversation-changing look at how reading aloud makes adults and children smarter, happier, healthier, more successful and more closely attached, even as technology pulls in the other direction.

A miraculous alchemy occurs when one person reads to another, transforming
...

Ethernet Passive Optical Networks (McGraw-Hill Communications Engineering)
Ethernet Passive Optical Networks (McGraw-Hill Communications Engineering)
THE DEFINITIVE GUIDE TO EPON
Written by one of the authors of the IEEE802.3ah standard, this is the first book to fully explain the EPON architecture, analyze its performance, and annotate the standard.

Clearly addressing efficiency, performance, and implementation issues, Ethernet Passive Optical Networks...

MEMS Mechanical Sensors
MEMS Mechanical Sensors
    With this practical guide to design tools and packaging, professionals and academics can create the sensors they need for a complete range of next generation applications.

    Here's the book to keep handy when you have to overcome obstacles in design, simulation,
...
Integration of ICT in Smart Organizations
Integration of ICT in Smart Organizations
The production and service of the 21st century is based on distributed or networked organizations. The denomination of these organizations can be different (extended-, virtual-, smart-organization, etc.), but there are some main important common characteristics. In this type of organizations, flexible, independent organizational and production...
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
Artificial Mind System: Kernel Memory Approach (Studies in Computational Intelligence)
Artificial Mind System: Kernel Memory Approach (Studies in Computational Intelligence)

This book is written from an engineer's perspective of the mind. "Artificial Mind System" exposes the reader to a broad spectrum of interesting areas in general brain science and mind-oriented studies. In this research monograph a picture of the holistic model of an artificial mind system and its behaviour is drawn, as concretely as...

SPSS For Dummies (Computer/Tech)
SPSS For Dummies (Computer/Tech)
Program SPSS with Python® and Command Syntax

The fun and easy way® to generate solid decision-making results with SPSS

Stymied by SPSS? This friendly, plain-English guide gets you up and running with the latest version of the software so that you can start performing calculations...

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Communication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony...

unlimited object storage image
Result Page: 546 545 544 543 542 541 540 539 538 537 536 535 534 533 532 531 530 529 528 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy