Information and communication technology (ICT) has become a generic and indispensable tool for addressing and solving problems in such diverse areas as management, social and health services, transportation, security and education. As the cost of equipment drops dramatically, it also becomes widely accessible in the developing countries. However, problems of high costs for adequate training of personnel, access to state-to-the-art software and the consultancies needed to facilitate access to ICT can constitute highly dissuasive factors in the dissemination of ICT in developing countries.This volume describes a series of successful initiatives for the insertion of ICT in developing economies. It also identifies significant problems that are likely to be encountered, and suggests useful solutions to these problems. It therefore serves as a useful tool for example applications, and for the successful assimilation of these technologies in developing societies and countries.
Algorithm and Computation: Combinatorial Generation of Matroid Representations: Theory and Practice (P Hlineny); Detection of Certain False Data Races from Runtime Traces (K Sinha & R Gupta); Accelerating Boolean SAT Engines Using Hyper-Threading Technology (T Schubert et al.); Community Informatics: THINK!: Towards Handling Intuitive and Nurtured Knowledge (V Ananthakrishnan & R Tripathi); Design and Development of a Data Mining System for Superstore Business (S M Shamimul Hasan & I Haque); Innovative Applications for the Developing World: Locating Cell Phone Towers in a Rural Environment (H A Eiselt & V Marianov); Mobile and Ubiquitous Computing: Mobile Payments: Partner or Perish? (E Lawrence et al.); Combadge: A Voice-Messaging Device for the Masses (J L Frankel & D Bromberg); Natural Language Processing: An Implementation Level Formal Model for Javabeans (B P Upadhyaya & B Keshari); Soft Computing: A Symmetric Encryption Technique through Recursive Modulo-2 Operation of Paired Bits of Streams (RMOPB) (P K Jha & J K Mandal); Software Reliability Growth Modeling for Exponentiated Weibull Function with Actual Software Failures Data (U Bokhari & N Ahmad); Speech Recognition: Recognition of Facial Pattern by Modified Kohonen's Self-Organizing Map (MKSOM) and Analyze of Performance (S M Kamrul Hasan et al.); Others: Intrusion Detection System (IDS) Using Network Processor (P G Shete & R A Patil); and other papers.
Number Of Pages:
- ID: 9781860948275
- Saver Delivery: Yes
- 1st Class Delivery: Yes
- Courier Delivery: Yes
- Store Delivery: Yes
Prices are for internet purchases only. Prices and availability in WHSmith Stores may vary significantly
© Copyright 2013 - 2016 WHSmith and its suppliers.
WHSmith High Street Limited Greenbridge Road, Swindon, Wiltshire, United Kingdom, SN3 3LD, VAT GB238 5548 36