Sebanyak 180 item atau buku ditemukan

Handbook of Public Budgeting

The Handbook is organized around two major themes: the budget process and budgeting fundamentals. Each chapter is a bibliographical treatise providing an in-depth overview of a major subfield of the disciple. The first section of the volume, on the budget process, presents background theories, histo

The Handbook is organized around two major themes: the budget process and budgeting fundamentals. Each chapter is a bibliographical treatise providing an in-depth overview of a major subfield of the disciple.

Analysis of Incomplete Multivariate Data

The last two decades have seen enormous developments in statistical methods for incomplete data. The EM algorithm and its extensions, multiple imputation, and Markov Chain Monte Carlo provide a set of flexible and reliable tools from inference in large classes of missing-data problems. Yet, in practical terms, those developments have had surprisingly little impact on the way most data analysts handle missing values on a routine basis. Analysis of Incomplete Multivariate Data helps bridge the gap between theory and practice, making these missing-data tools accessible to a broad audience. It presents a unified, Bayesian approach to the analysis of incomplete multivariate data, covering datasets in which the variables are continuous, categorical, or both. The focus is applied, where necessary, to help readers thoroughly understand the statistical properties of those methods, and the behavior of the accompanying algorithms. All techniques are illustrated with real data examples, with extended discussion and practical advice. All of the algorithms described in this book have been implemented by the author for general use in the statistical languages S and S Plus. The software is available free of charge on the Internet.

3.2 The EM algorithm 3.2.1 Definition EM capitalizes on the interdependence
between missing data Ymis and parameters 6. The fact that Ymis contains
information relevant to estimating 0, and 6 in turn helps us to find likely values of
Ymis, ...

Pharmacokinetic and Pharmacodynamic Data Analysis: Concepts and Applications, Third Edition

This is a revised and very expanded version of the previous second edition of the book. "Pharmacokinetic and Pharmacodynamic Data Analysis" provides an introduction into pharmacokinetic and pharmacodynamic concepts using simple illustrations and reasoning. It describes ways in which pharmacodynamic and pharmacodynamic theory may be used to give insight into modeling questions and how these questions can in turn lead to new knowledge. This book differentiates itself from other texts in this area in that it bridges the gap between relevant theory and the actual application of the theory to real life situations. The book is divided into two parts; the first introduces fundamental principles of PK and PD concepts, and principles of mathematical modeling, while the second provides case studies obtained from drug industry and academia. Topics included in the first part include a discussion of the statistical principles of model fitting, including how to assess the adequacy of the fit of a model, as well as strategies for selection of time points to be included in the design of a study. The first part also introduces basic pharmacokinetic and pharmacodynamic concepts, including an excellent discussion of effect compartment (link) models as well as indirect response models. The second part of the text includes over 70 modeling case studies. These include a discussion of the selection of the model, derivation of initial parameter estimates and interpretation of the corresponding output. Finally, the authors discuss a number of pharmacodynamic modeling situations including receptor binding models, synergy, and tolerance models (feedback and precursor models). This book will be of interest to researchers, to graduate students and advanced undergraduate students in the PK/PD area who wish to learn how to analyze biological data and build models and to become familiar with new areas of application. In addition, the text will be of interest to toxicologists interested in learning about determinants of exposure and performing toxicokinetic modeling. The inclusion of the numerous exercises and models makes it an excellent primary or adjutant text for traditional PK courses taught in pharmacy and medical schools. A diskette is included with the text that includes all of the exercises and solutions using WinNonlin.

CHAPTER 1 - The meaning of modeling Objectives - To introduce the reader to
the book • To explain why we model biological systems • To discuss constants,
parameters and variables 1.1 Where Do You Want to Begin? This is a revised
and ...

Internet of Things

Challenges, Advances, and Applications

Internet of Things: Challenges, Advances, and Applications provides a comprehensive introduction to IoT, related technologies, and common issues in the adoption of IoT on a large scale. It surveys recent technological advances and novel solutions for challenges in the IoT environment. Moreover, it provides detailed discussion of the utilization of IoT and its underlying technologies in critical application areas, such as smart grids, healthcare, insurance, and the automotive industry. The chapters of this book are authored by several international researchers and industry experts. This book is composed of 18 self-contained chapters that can be read, based on interest. Features: Introduces IoT, including its history, common definitions, underlying technologies, and challenges Discusses technological advances in IoT and implementation considerations Proposes novel solutions for common implementation issues Explores critical application domains, including large-scale electric power distribution networks, smart water and gas grids, healthcare and e-Health applications, and the insurance and automotive industries The book is an excellent reference for researchers and post-graduate students working in the area of IoT, or related areas. It also targets IT professionals interested in gaining deeper knowledge of IoT, its challenges, and application areas.

The chapters of this book are authored by several international researchers and industry experts. This book is composed of 18 self-contained chapters that can be read, based on interest.

The Internet of Things

Enabling Technologies, Platforms, and Use Cases

As more and more devices become interconnected through the Internet of Things (IoT), there is an even greater need for this book,which explains the technology, the internetworking, and applications that are making IoT an everyday reality. The book begins with a discussion of IoT "ecosystems" and the technology that enables them, which includes: Wireless Infrastructure and Service Discovery Protocols Integration Technologies and Tools Application and Analytics Enablement Platforms A chapter on next-generation cloud infrastructure explains hosting IoT platforms and applications. A chapter on data analytics throws light on IoT data collection, storage, translation, real-time processing, mining, and analysis, all of which can yield actionable insights from the data collected by IoT applications. There is also a chapter on edge/fog computing. The second half of the book presents various IoT ecosystem use cases. One chapter discusses smart airports and highlights the role of IoT integration. It explains how mobile devices, mobile technology, wearables, RFID sensors, and beacons work together as the core technologies of a smart airport. Integrating these components into the airport ecosystem is examined in detail, and use cases and real-life examples illustrate this IoT ecosystem in operation. Another in-depth look is on envisioning smart healthcare systems in a connected world. This chapter focuses on the requirements, promising applications, and roles of cloud computing and data analytics. The book also examines smart homes, smart cities, and smart governments. The book concludes with a chapter on IoT security and privacy. This chapter examines the emerging security and privacy requirements of IoT environments. The security issues and an assortment of surmounting techniques and best practices are also discussed in this chapter.

The book also examines smart homes, smart cities, and smart governments. The book concludes with a chapter on IoT security and privacy. This chapter examines the emerging security and privacy requirements of IoT environments.

Internet of Things (IoT)

Technologies, Applications, Challenges and Solutions

The term IoT, which was first proposed by Kevin Ashton, a British technologist, in 1999 has the potential to impact everything from new product opportunities to shop floor optimization to factory worker efficiency gains, that will power top-line and bottom-line gains. As IoT technology is being put to diversified use, the current technology needs to be improved to enhance privacy and built secure devices by adopting a security-focused approach, reducing the amount of data collected, increasing transparency and providing consumers with a choice to opt out. Therefore, the current volume has been compiled, in an effort to draw the various issues in IoT, challenges faced and existing solutions so far. Key Points: • Provides an overview of basic concepts and technologies of IoT with communication technologies ranging from 4G to 5G and its architecture. • Discusses recent security and privacy studies and social behavior of human beings over IoT. • Covers the issues related to sensors, business model, principles, paradigms, green IoT and solutions to handle relevant challenges. • Presents the readers with practical ideas of using IoT, how it deals with human dynamics, the ecosystem, the social objects and their relation. • Deals with the challenges involved in surpassing diversified architecture, protocol, communications, integrity and security.

Therefore, the current volume has been compiled, in an effort to draw the various issues in IoT, challenges faced and existing solutions so far.

Customer Relationship Management

A Global Perspective

Customer Relationship Management is the first book to explore the benefits to the firm of a globally integrated approach to the management philosophy of Customer Relationship Management (CRM). The best hope for achieving a sustainable competitive advantage in a global marketplace is by means of better understanding which customers are in the best position to experience long-term, profitable relationships for the globally oriented firm. This book offers both an academic and a practical viewpoint of the importance of CRM in a global framework. It integrates the topics of knowledge management, total quality management, and relationship marketing with the goal of explaining the benefits of CRM for internationally active firms. The authors have included six case studies which allow the reader to undertake the role of CRM consultant in a 'learning by doing' approach. The book should be required reading for all business executives who desire a customer-oriented approach to success, and for all students of business who desire to gain insight into a relationship management approach which will become ever-more important in the years ahead.

Customer Relationship Management is the first book to explore the benefits to the firm of a globally integrated approach to the management philosophy of Customer Relationship Management (CRM).

Quality Aspects in Spatial Data Mining

Describes the State-of-the-Art in Spatial Data Mining, Focuses on Data Quality Substantial progress has been made toward developing effective techniques for spatial information processing in recent years. This science deals with models of reality in a GIS, however, and not with reality itself. Therefore, spatial information processes are often imprecise, allowing for much interpretation of abstract figures and data. Quality Aspects in Spatial Data Mining introduces practical and theoretical solutions for making sense of the often chaotic and overwhelming amount of concrete data available to researchers. In this cohesive collection of peer-reviewed chapters, field authorities present the latest field advancements and cover such essential areas as data acquisition, geoinformation theory, spatial statistics, and dissemination. Each chapter debuts with an editorial preview of each topic from a conceptual, applied, and methodological point of view, making it easier for researchers to judge which information is most beneficial to their work. Chapters Evolve From Error Propagation and Spatial Statistics to Address Relevant Applications The book advises the use of granular computing as a means of circumventing spatial complexities. This counter-application to traditional computing allows for the calculation of imprecise probabilities – the kind of information that the spatial information systems community wrestles with much of the time. Under the editorial guidance of internationally respected geoinformatics experts, this indispensable volume addresses quality aspects in the entire spatial data mining process, from data acquisition to end user. It also alleviates what is often field researchers’ most daunting task by organizing the wealth of concrete spatial data available into one convenient source, thereby advancing the frontiers of spatial information systems.

In this cohesive collection of peer-reviewed chapters, field authorities present the latest field advancements and cover such essential areas as data acquisition, geoinformation theory, spatial statistics, and dissemination.

Acoustic Waves in Boreholes

Introducing the first, self-contained reference on acoustic waveform logging Acoustic measurements in boreholes were first made as a specialized logging technique in geological exploration, but recent advances have greatly expanded the potential applications of this technique. Acoustic Waves in Boreholes provides a thorough review of the theory and interpretation techniques needed to realize these applications, emphasizing the role of guided modes and critically refracted waves in determining the characteristics of recorded waveforms. Topics covered in this comprehensive volume include the seismic properties of rocks; propagation of axisymmetric waves along fluid-filled boreholes in isotropic rocks; and symmetric and nonsymmetric sources in isotropic, transversely isotropic, and porous, permeable formations in open and cased boreholes. Each chapter includes the theory of synthetic microseismogram computation, interpretation and data inversion techniques illustrated using computed seismograms, and case histories using experimental data. Appendices providing the mathematical formulation needed to compute microseismograms, with a single consistent notation used throughout, are also included in appropriate chapters. The wide range of geomechanical properties covered in this book will interest exploration geophysicists, reservoir engineers, civil engineers, geologists, and soil scientists.

Frederick L. Paillet, Chuen Hon Cheng. Appendix. 3.1. Complex. Contour.
Integration. Evaluation. of. Wavenumber. Transform. for. Synthetic.
Microseismograms. Although direct numerical evaluation of transform integrals
such as that in Equation 3.1 is now the preferred method of synthetic
microseismogram calculation, complex contour integration methods can provide
considerable insight into the properties of waveforms. Complex contour
integration and residue theory also provide ...

Computing Handbook, Third Edition

Information Systems and Information Technology

Computing Handbook, Third Edition: Information Systems and Information Technology demonstrates the richness and breadth of the IS and IT disciplines. The second volume of this popular handbook explores their close links to the practice of using, managing, and developing IT-based solutions to advance the goals of modern organizational environments. Established leading experts and influential young researchers present introductions to the current status and future directions of research and give in-depth perspectives on the contributions of academic research to the practice of IS and IT development, use, and management Like the first volume, this second volume describes what occurs in research laboratories, educational institutions, and public and private organizations to advance the effective development and use of computers and computing in today’s world. Research-level survey articles provide deep insights into the computing discipline, enabling readers to understand the principles and practices that drive computing education, research, and development in the twenty-first century.

Many service-oriented businesses and organizations, such as banks, airlines,
catalog retailers, and hospitals, have grown to depend on fast, reliable, and
correct access to their “mission-critical” data on a constant basis. In many cases,
particularly for global enterprises, 7 × 24 access is required, that is, the data must
be available 7 days a week, 24 h a day. Database management systems (DBMSs
) are often employed to meet these stringent performance, availability, and
reliability ...