You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The book focuses on the principles and practices of tropical maize improvement with special emphasis on early and extra-early maize to feed the increasing population in Sub-Saharan Africa. It highlights the similarities and differences between results obtained in temperate regions of the world and WCA in terms of corroboration or refutation of genetic principles and theory of maize breeding. The book is expected to be of great interest to maize breeders, advanced undergraduates, graduate students, professors and research scientists in the national and international research institutes all over the world, particularly Sub-Saharan Africa. It will also serve as a useful reference for agricultural extension and technology transfer systems, Non-governmental Organizations (NGOs) and Community-Based Organizations (CBOs), seed companies and community-based seed enterprises, policy makers, and all those who are interested in generating wealth from agriculture and alleviating hunger and poverty in Sub-Saharan Africa.
Internet technologies and systems are nowadays the key enablers of digital economy and modern world-wide connected society. This contributed book is a collection of cautiously chosen articles delivered by specialists with significant level of expertise in the domain of Internet technical foundations and its applications. The content of the book is divided into three parts: Internet - technical fundamentals and applications Information management systems Information security in distributed computer systems This book is a reference tool prepared for scientists and other persons involved in designing, implementation and evaluation of internet technologies. Its readers can be found among researchers, teachers and also students of computer science and related disciplines.
This book, the second of two volumes edited by Kemshall and McCartan, focuses on responses to sexual offending, and how risk is used by policy makers, stakeholders, academics and practitioners to both construct and respond to unknown and known sex offenders within the contexts of criminal justice, health and social policy. The chapters provide an oversight of contemporary policies, practices and debates within the area to help both professionals and researchers. The collection focuses on emerging areas (crime linkage, predictive policing, sexual offending across borders, desistence, and public health approaches), as well as more traditional topics (multi-agency working, risk assessment, sex offender policies, and treatment). The authors examine how professionals can use multi-agency approaches to prevent sexual violence, and assessing the impact of desistance on framing sex offender management. A bold and engaging volume, this edited collection will be of great importance to scholars and practitioners working reframing traditional approaches to sex offender management in a contemporary fashion.
This volume presents the proceedings of the First Euro-China Conference on Intelligent Data Analysis and Applications (ECC 2014), which was hosted by Shenzhen Graduate School of Harbin Institute of Technology and was held in Shenzhen City on June 13-15, 2014. ECC 2014 was technically co-sponsored by Shenzhen Municipal People’s Government, IEEE Signal Processing Society, Machine Intelligence Research Labs, VSB-Technical University of Ostrava (Czech Republic), National Kaohsiung University of Applied Sciences (Taiwan), and Secure E-commerce Transactions (Shenzhen) Engineering Laboratory of Shenzhen Institute of Standards and Technology.
This book constitutes the refereed proceedings of the 11th International Conference on Computer Information Systems and Industrial Management, CISIM 2012, held in Venice, Italy, in September 2012. The 35 revised full papers presented together with 2 keynote talks were carefully reviewed and selected from 80 submissions. The papers are organized in topical sections on security, access control and intrusion detection; pattern recognition and image processing; biometric applications; algorithms and data management; networking; and system models and risk assessment.
This book constitutes the refereed proceedings of the 4th International Information Security Practice and Experience Conference, ISPEC 2008, held in Sydney, Australia, in May 2008. The 29 revised full papers were carefully reviewed and selected from 95 submissions. The papers cover a wide range of topics in mathematics, computer science and security applications, including authentication and digital signatures, privacy, encryption and hash-function algorithms, security analysis, network security, access control, security devices, pairing and elliptic curve based security practice, security computation and so forth.
This book addresses important questions on the legislation, regulations, sustainability, technology transfer, safety of biomaterials and mechanism of action of nonthermal processing on the molecular level of biomaterials and its impact on health. The chapters take an interdisciplinary approach that is of interest to specialists from engineering, physics, chemistry, agriculture, life sciences and beyond, with a focus on further development of existing and new applications of nonthermal processing and their combination with other methods in the processing of biomaterials, agriculture, biotechnology and the re-use of waste and by-products. Nonthermal Processing in Agri-Food-Bio Sciences: Sustai...
This book constitutes the proceedings of the 12th IFIP TC 8 International Conference, CISIM 2013, held in Cracow, Poland, in September 2013. The 44 papers presented in this volume were carefully reviewed and selected from over 60 submissions. They are organized in topical sections on biometric and biomedical applications; pattern recognition and image processing; various aspects of computer security, networking, algorithms, and industrial applications. The book also contains full papers of a keynote speech and the invited talk.