Sebanyak 96 item atau buku ditemukan

Renal Medicine, Second Edition

A Color Handbook

This is a comprehensive, authoritative, yet user-friendly guide to renal disease. More than any other subdivision of internal medicine successful nephrological practice is dependent on other specialities. The kidneys are affected by many systemic diseases. There is increased incidence of cardiovascular and neoplastic disease in patients with renal failure. Expertise is needed in renal imaging, arterial intervention and renal histopathological examination. Reflecting all these elements, the authors have compiled a practical handbook to help physicians in practice and training to diagnose and manage patients with renal disease. The format of this book follows the stages of renal disease beginning with presenting symptoms and syndromes. It goes on to cover inherited renal diseases, glomerular and systemic diseases, acute and chronic renal failure, dialysis and renal transplantation. The Handbook is of value to physicians and trainees in nephrology and internal medicine, and to medical students in their clinical years.

These include Dr A. Kawashima, Dr B. King, Dr V. Torres, Dr J. McCarthy, Dr P.
Harris, Dr G. Miller, Dr D. Milliner, Dr N. Campeau, Dr R. Desnick, Dr J. Berstein,
Dr J. Reidy, Dr A. Saunders, Dr J. Bingham, Dr S. Rankin, Dr G. Rottenberg, Dr T.

Information Technology and Computer Application Engineering

Proceedings of the International Conference on Information Technology and Computer Application Engineering (ITCAE 2013)

This proceedings volume brings together some 189 peer-reviewed papers presented at the International Conference on Information Technology and Computer Application Engineering, held 27-28 August 2013, in Hong Kong, China. Specific topics under consideration include Control, Robotics, and Automation, Information Technology, Intelligent Computing and Telecommunication, Computer Science and Engineering, Computer Education and Application and other related topics. This book provides readers a state-of-the-art survey of recent innovations and research worldwide in Information Technology and Computer Application Engineering, in so-doing furthering the development and growth of these research fields, strengthening international academic cooperation and communication, and promoting the fruitful exchange of research ideas. This volume will be of interest to professionals and academics alike, serving as a broad overview of the latest advances in the dynamic field of Information Technology and Computer Application Engineering.

Wen-Pei Sung, National Chin-Yi University of Technology, Taiwan PROGRAM
COMMITTEE Ghamgeen Izat Rashed, Wuhan University, China Andrey
Nikolaevich Belousov, Laboratory of Applied Nanothechnology, Ukraine Krupa
Ranjeet ...

Information Technology And Organisational Change

Introduction The preceding chapters have led to two conclusions. The first is that
we are unlikely to achieve real benefits from information technology unless we
find ways of designing for the human and organisational changes that are
needed ...

Library Information Technology and Networks

Offers an historical perspective of the past 25 years of computers in libraries, profileing currently available processing systems according to their size and platform. The short- and long-term future of information technology in libraries.;College or university bookstores may order five or more copies at a special student price which is available from Marcel Dekker upon request.

TECHNOLOGY. THE. TOOLS. OF. TOMORROW. The flashiest graphics will
never save a poor user interface. Sexy graphics are like lipstick on a bulldog.
Lipstick may make the bulldog look better but you still don't want to kiss it. —
Norm Cox ...

Geospatial Information Technology for Emergency Response

Disaster management is generally understood to consist of four phases: mitigation, preparedness, response and recovery. While these phases are all important and interrelated, response and recovery are often considered to be the most critical in terms of saving lives. Response is the acute phase occurring after the event, and includes all arrangements to remove detriments and a long-term inventory of supplies to deal with irreversible damage. The timely provision of geospatial information is crucial in the decision-making process, and can save lives and rescue citizens. The aim of this volume is to share technological advances that allow wider, faster and more effective utilization of geospatial information in emergency response situations. The volume describes current accomplishments and challenges in providing geospatial information with these attributes, and is organized in six parts: - Practice and legislation, with a focus on the utilization of geospatial information in recent disaster events, as well as resulting legislative attempts to share and access data. - Data collection and data products. - Data management and routing in 3D. - Emerging technologies, including positioning, virtual reality and simulation models. - Integration of heterogeneous data. - Applications and solutions. This volume is aimed at researchers, practitioners and students who work in the variety of disciplines related to geospatial information technology for emergency response, and represents the very best of current thinking from a number of pioneering studies over the past four years.

Dr. Sisi Zlatanova Associate Professor at the GIS Technology Section, Delft
University of Technology, and currently leading a theme group on 'Geo-
information for Crisis Response'. She holds a Ph.D degree in 3D GIS for urban
modelling from ...

Information Technology & Financial Services

The New Partnership

The development of new electronic virtual markets means that banks can now offer new and improved levels of customer service. Information Technology and Financial Services offers a thorough examination of the benefits that can be gained from the application of the new technologies to banking. The book opens with an overview of the impact of technology on the business of banking and discusses the issues that management needs to consider in order to implement these new technologies successfully. Case studies are used extensively to explore subjects ranging from the view of the customer (Bank One, US) to the role of the branch network (Znrcher Kantonalbank, Switzerland) and from market dealing and settlement (Nikko Securities, Japan) to electronic banking services for customers (The Royal Bank of Scotland, Great Britain).

As hankers face the certainty that technology will increasingly influence the
development of the banking industry. technology firms have come to realize that
hanking is one of the largest and most sophisticated markets for their products.

Introduction to Information Theory and Data Compression, Second Edition

An effective blend of carefully explained theory and practical applications, this text imparts the fundamentals of both information theory and data compression. Although the two topics are related, this unique text allows either topic to be presented independently, and it was specifically designed so that the data compression section requires no prior knowledge of information theory. The treatment of information theory, while theoretical and abstract, is quite elementary, making this text less daunting than many others. After presenting the fundamental definitions and results of the theory, the authors then apply the theory to memoryless, discrete channels with zeroth-order, one-state sources. The chapters on data compression acquaint students with a myriad of lossless compression methods and then introduce two lossy compression methods. Students emerge from this study competent in a wide range of techniques. The authors' presentation is highly practical but includes some important proofs, either in the text or in the exercises, so instructors can, if they choose, place more emphasis on the mathematics. Introduction to Information Theory and Data Compression, Second Edition is ideally suited for an upper-level or graduate course for students in mathematics, engineering, and computer science. Features: Expanded discussion of the historical and theoretical basis of information theory that builds a firm, intuitive grasp of the subject Reorganization of theoretical results along with new exercises, ranging from the routine to the more difficult, that reinforce students' ability to apply the definitions and results in specific situations. Simplified treatment of the algorithm(s) of Gallager and Knuth Discussion of the information rate of a code and the trade-off between error correction and information rate Treatment of probabilistic finite state source automata, including basic results, examples, references, and exercises Octave and MATLAB image compression codes included in an appendix for use with the exercises and projects involving transform methods Supplementary materials, including software, available for download from the authors' Web site at www.dms.auburn.edu/compression

Introduction to Information Theory and Data Compression, Second Edition

An effective blend of carefully explained theory and practical applications, this text imparts the fundamentals of both information theory and data compression. Although the two topics are related, this unique text allows either topic to be presented independently, and it was specifically designed so that the data compression section requires no prior knowledge of information theory. The treatment of information theory, while theoretical and abstract, is quite elementary, making this text less daunting than many others. After presenting the fundamental definitions and results of the theory, the authors then apply the theory to memoryless, discrete channels with zeroth-order, one-state sources. The chapters on data compression acquaint students with a myriad of lossless compression methods and then introduce two lossy compression methods. Students emerge from this study competent in a wide range of techniques. The authors' presentation is highly practical but includes some important proofs, either in the text or in the exercises, so instructors can, if they choose, place more emphasis on the mathematics. Introduction to Information Theory and Data Compression, Second Edition is ideally suited for an upper-level or graduate course for students in mathematics, engineering, and computer science. Features: Expanded discussion of the historical and theoretical basis of information theory that builds a firm, intuitive grasp of the subject Reorganization of theoretical results along with new exercises, ranging from the routine to the more difficult, that reinforce students' ability to apply the definitions and results in specific situations. Simplified treatment of the algorithm(s) of Gallager and Knuth Discussion of the information rate of a code and the trade-off between error correction and information rate Treatment of probabilistic finite state source automata, including basic results, examples, references, and exercises Octave and MATLAB image compression codes included in an appendix for use with the exercises and projects involving transform methods Supplementary materials, including software, available for download from the authors' Web site at www.dms.auburn.edu/compression

Information theory leaped fully clothed from the forehead of Claude Shannon in
1948 [63]. The foundation of the theory is a quantification of information, a
quantification that a few researchers had been floundering toward for 20 or 30
years ...

A Multidisciplinary Introduction to Information Security

With most services and products now being offered through digital communications, new challenges have emerged for information security specialists. A Multidisciplinary Introduction to Information Security presents a range of topics on the security, privacy, and safety of information and communication technology. It brings together methods in pure mathematics, computer and telecommunication sciences, and social sciences. The book begins with the cryptographic algorithms of the Advanced Encryption Standard (AES) and Rivest, Shamir, and Adleman (RSA). It explains the mathematical reasoning behind public key cryptography and the properties of a cryptographic hash function before presenting the principles and examples of quantum cryptography. The text also describes the use of cryptographic primitives in the communication process, explains how a public key infrastructure can mitigate the problem of crypto-key distribution, and discusses the security problems of wireless network access. After examining past and present protection mechanisms in the global mobile telecommunication system, the book proposes a software engineering practice that prevents attacks and misuse of software. It then presents an evaluation method for ensuring security requirements of products and systems, covers methods and tools of digital forensics and computational forensics, and describes risk assessment as part of the larger activity of risk management. The final chapter focuses on information security from an organizational and people point of view. As our ways of communicating and doing business continue to shift, information security professionals must find answers to evolving issues. Offering a starting point for more advanced work in the field, this volume addresses various security and privacy problems and solutions related to the latest information and communication technology.

At this point in the protocol, Alice and Bob share classical information with high
but not 100% correlation, and assume that the third party Eve has partial
knowledge of this information. This problem can be solved by classical
information theory, ...

An Introduction to Information Science

Information science is a relatively new field and has its origins in various
branches of study. Mathematical communication theory (Shannon, Claude F. and
Weaver, Warren, The Mathematical Theory of Communication. Urbana:
University of ...