You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
We live in an inter-connected world. In the era of Industry 4.0, technology is getting embedded more and more in the way ‘we learn, live, work, and play’. This progression is accelerating at a pace never seen before. Interdisciplinary and collaborative research across disciplines within the Technology domain and Management domain, and across the Technology-Management interface is opening up exciting new possibilities for solving problems whose solutions are beyond the scope of a single discipline, domain or practice, and helping to create a brave new world. The goal of this conference was to bring together scholars, researchers, consultants, and practitioners to share their interdisciplinary research and consultative work in Technology and Management. Selected papers were then peer-reviewed and authors were invited to present their work in the conference.
The concept originated in Japan in the 1980s when government agencies started approving foods with proven benefits in an effort to better the health of the general population.Functional foods is a very popular term in the social and scientific media; consequently, food producers have invested resources in the development of processed foods that may provide added functional benefits to consumers’ well-being. Because of intrinsic regulation and end-of-use purposes in different countries, worldwide meanings and definitions of this term are still unclear. Hence, here we standardize this definition and propose a guideline to attest that some ingredients or foods truly deserve this special desig...
This book examines the links between public policy and Fourth Industrial Revolution (4IR) technological developments in Africa. It broadly assesses three key areas – policy entrepreneurship, policy tools and citizen participation – in order to better understand the interfaces between public policy and technological transformations in African countries. The book presents incisive case studies on topics including AI policies, mobile money, e-budgeting, digital economy, digital agriculture and digital ethical dilemmas in order to illuminate technological proliferation in African policy systems. Its analysis considers the broader contexts of African state politics and governance. It will appeal to students, instructors, researchers and practitioners interested in governance and digital transformations in developing countries.
Face detection and recognition are the nonintrusive biometrics of choice in many security applications. Examples of their use include border control, driver's license issuance, law enforcement investigations, and physical access control.Face Detection and Recognition: Theory and Practice elaborates on and explains the theory and practice of face de
None
This IBM® RedpaperTM publication is written to assist you in locating the optimal server/workload fit within the IBM Power SystemsTM L and IBM OpenPOWER LC product lines. IBM has announced several scale-out servers, and as a partner in the OpenPOWER organization, unique design characteristics that are engineered into the LC line have broadened the suite of available workloads beyond typical client OS hosting. This paper looks at the benefits of the Power Systems L servers and OpenPOWER LC servers, and how they are different, providing unique benefits for Enterprise workloads and use cases.
This volume is the first part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed proceedings of the First International Conference on Computing and Communications, ACC 2011, held in Kochi, India, in July 2011. The 68 revised full papers presented in this volume were carefully reviewed and selected from a large number of submissions. The papers are organized in topical sections on ad hoc networks; advanced micro architecture techniques; autonomic and context-aware computing; bioinformatics and bio-computing; cloud, cluster, grid and P2P computing; cognitive radio and cognitive networks; cyber forensics; database and information systems.