You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The method of CVD (chemical vapor deposition) is a versatile technique to fabricate high-quality thin films and structured surfaces in the nanometer regime from the vapor phase. Already widely used for the deposition of inorganic materials in the semiconductor industry, CVD has become the method of choice in many applications to process polymers as well. This highly scalable technique allows for synthesizing high-purity, defect-free films and for systematically tuning their chemical, mechanical and physical properties. In addition, vapor phase processing is critical for the deposition of insoluble materials including fluoropolymers, electrically conductive polymers, and highly crosslinked or...
This three-volume collection, titled Enterprise Information Systems: Concepts, Methodologies, Tools and Applications, provides a complete assessment of the latest developments in enterprise information systems research, including development, design, and emerging methodologies. Experts in the field cover all aspects of enterprise resource planning (ERP), e-commerce, and organizational, social and technological implications of enterprise information systems.
Twelve years old Emaddin lives on the street of ancient Baghdad with his mother after the death of his father. Striving through fate and bullies, he dreams of a better life for him and her. He soon befriends Lamar, who unknown to him is the daughter of the Sultan Omran, and with help from the wise sorcerer Zeriab, subsequently rises above the filth of street life. But within the corridors of power unfurls a covert plot to overthrow Sultan Omran with his most trusted minister, Aqrab, spearheading the plot. What do you do when your best friend is a greedy two-faced magician seeking your downfall? This is the question Sultan Omran ultimately has to deal with, and he does so with his life and kingdom in great danger. This book is book one in the series which consists of three parts, all three parts are included in this edition.A sequel to 1001 Arabian Nights that will let you dive into the world of Emaddin and old 1001 nights world.
"This reference set provides a complete understanding of the development of applications and concepts in clinical, patient, and hospital information systems"--Provided by publisher.
UNISCON 2009 (United Information Systems Conference) was the third conf- ence in the series that is based on the idea to pool smaller but highly interesting scienti?c events on information systems into one large conference. Here, people from di?erent scienti?c backgrounds can present their research results, share their ideas and discuss future trends in these various areas. UNISCON 2009 was held in Sydney, Australia in the University of Western Sydney, Campbelltown Campus. In 2009 the following scienti?c events were held under the umbrella of UNISCON 2009: th – 8 International Conference on Information Systems Technology and Its Applications (ISTA 2009) th – 8 International Workshop on C...
As an emerging global phenomenon, Islamic economics and the financial system has expanded exponentially in recent decades. Many components of the industry are still unknown, but hopefully, the lack of awareness will soon be stilled. The Handbook of Research on Theory and Practice of Global Islamic Finance provides emerging research on the latest global Islamic economic practices. The content within this publication examines risk management, economic justice, and stock market analysis. It is designed for financiers, banking professionals, economists, policymakers, researchers, academicians, and students interested in ideas centered on the development and practice of Islamic finance.
Today, Artificial Intelligence (AI) and Machine Learning/ Deep Learning (ML/DL) have become the hottest areas in information technology. In our society, many intelligent devices rely on AI/ML/DL algorithms/tools for smart operations. Although AI/ML/DL algorithms and tools have been used in many internet applications and electronic devices, they are also vulnerable to various attacks and threats. AI parameters may be distorted by the internal attacker; the DL input samples may be polluted by adversaries; the ML model may be misled by changing the classification boundary, among many other attacks and threats. Such attacks can make AI products dangerous to use. While this discussion focuses on ...
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.
As effective organizational decision making is a major factor in a company's success, a comprehensive account of current available research on the core concepts of the decision support agenda is in high demand by academicians and professionals. Through 110 authoritative contributions by over 160 of the world's leading experts the Encyclopedia of Decision Making and Decision Support Technologies presents a critical mass of research on the most up-to-date research on human and computer support of managerial decision making, including discussion on support of operational, tactical, and strategic decisions, human vs. computer system support structure, individual and group decision making, and multi-criteria decision making.