feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • HPol Brandenburg  (38)
  • Kinemathek  (11)
  • Kreismedienzentrum Teltow-Fläming  (1)
Type of Medium
Language
Region
Library
Access
  • 1
    UID:
    almahu_9949568766902882
    Format: 1 online resource (310 pages)
    Edition: 1st ed.
    ISBN: 9789819936687
    Series Statement: Springer Tracts in Electrical and Electronics Engineering Series
    Note: Intro -- Preface -- Contents -- Editors and Contributors -- 1 Evolution of Next-Generation Communication Technology -- Introduction -- Existing Cellular Network and Its Challenges -- First Generation -- Second Generation -- Third Generation -- Fourth Generation -- Fifth Generation -- Conventional Cellular Systems-Limitations -- Vision and Mission-5G -- Architecture-5G -- C-Ran -- SBA-Based Core Network -- Next-Generation Network-Applications -- Example of Next-Generation Network Applications -- Conclusion and Future Scope -- References -- 2 Third Industrial Revolution: 5G Wireless Systems, Internet of Things, and Beyond -- Introduction -- IoT and Its Devices -- A 5G and IoT -- 5G and Ubiquitous Computing -- The Internet of Things -- A 5G Network -- History and Present Researches on IoT as Well as 5G -- Requirements of IoT and Shortcomings of Wireless 4G Network -- Needs for IoT that is 5G Enabled -- The Vision of 5G IOT: Industrial and Research Context -- Unification of Technologies -- Enabling Technology Drivers in 5G IoT -- Challenges and Trends of Future of the Research -- Conclusion and Future Scope -- Appendix 1: Wireless Technology Features -- Appendix 2: Information Speed Increment -- Appendix 3: 5G Network Architecture -- Appendix 4: 5G Tower Signals -- References -- 3 Network Architectures and Protocols for Efficient Exploitation of Spectrum Resources in 5G -- Introduction -- Enabler Technologies -- Architecture of 5G -- Multiple-Input Multiple-Output Technology in 5G -- Antenna Array for MIMO in 5G -- Device-to-Device Communication in 5G -- Interference Management for 5G -- Multi-tier 5G Architecture -- Spectrum Sharing with Cognitive Radio in 5G -- Ultra-dense Networks in Multi-radio Access Technology Association in 5G -- UDN Moving Cells with 5G+ Network -- Cloud Technologies for 5G -- Methodology. , The Methodology of the Proposed Scheme -- Spectrum Band -- 5G Base Station -- Energy Module -- Energy Controller -- Challenges and Future Research Directions -- Conclusion -- References -- 4 Wireless Backhaul Optimization Algorithm in 5G Communication -- Introduction -- Network Scenarios and System Assumptions -- Analysis of Delay Jitter Indicators -- Delay Analysis -- Delay Jitter Analysis -- Optimization Model Establishments -- Basic Backhaul Model -- Improved Model 1 -- Improved Model 2 -- Improved Model Solutions -- Improved Model 1 Solution -- Improved Model 2 Solution -- Simulation Analysis -- Conclusions -- References -- 5 Security Attacks and Vulnerability Analysis in Mobile Wireless Networking -- Introduction -- Types of Wireless Mobile Network -- Wireless PAN -- Wireless LAN -- Manet -- Wireless MAN -- Wireless WAN -- Mobile Network -- Gan -- Aerospace Network -- Challenges and Issues in Wireless Mobile Network -- Information Management -- Endless Communication -- Delay Tolerance -- Heterogeneity -- Contextual Awareness -- Buffer Management -- Power Features -- Privacy and Security -- Security Goals of Wireless Mobile Network -- Classification of Security Attacks -- Most Prevalent Attacks in Wireless Systems -- Denial of Service (DoS) Attack -- Flooding Attack -- Jamming -- Intervention -- Sleep Deprivation Attack -- Blackhole Attack -- Rushing Attack -- Sybil Attack -- Sinkhole Attack -- Gray Hole Attack -- Byzantine Attack -- Jellyfish Attack -- Wormhole Attack -- Eavesdropping -- Disclosure of Information Attack -- Man-In-The-Middle Attack -- Replay Attack -- ACK Attack -- Spoofing Attack -- Link Spoofing Attack -- Spear-Phishing Attack -- Repudiation Attack -- Infected Code Injection -- Colluding Mis-Relay Attack -- Selective-Forwarding Attack -- Database Hack Attack -- Conclusion -- References. , 6 Utilities of 5G Communication Technologies for Promoting Advancement in Agriculture 4.0: Recent Trends, Research Issues and Review of Literature -- Introduction -- Challenges Faced by Existing Network Technologies -- Motivation of the Work -- Existing Problems and Contribution -- Scope of 5G-Enabled Networks in AgriIoT -- Energy Consumption Management Methods in 5G Networks -- Application Areas of 5G in Smart Farming -- Data Aggregation -- Predictive Analytics -- Drone Operations -- Animal Tracking and Real-Time Monitoring -- Autonomous Agriculture Vehicles -- Weather Stations -- 5G Enabled Components in Agriculture -- Drones and Unmanned Aerial Vehicles (UAVs) -- Virtual Consultation and Predictive Maintenance -- Augmented and Virtual Reality -- Agriculture Robots -- Cloud-Based Data Analytics -- Recent Development Scenarios in 5G-Based Agriculture -- Conclusion and Future Work -- References -- 7 Security Attacks and Countermeasures in 5G Enabled Internet of Things -- Introduction -- Overview of 5G -- Overview of IoT -- 5G Enabled IoT -- 5G Enabled IoT Architecture -- L1 Physical Device Layer -- L2 Communication Layer -- L3 Fog Computing Layer -- L4 Data Storage Layer -- L5 Management Service Layer -- L6 Application Layer -- L7 Process and Collaboration Layer -- L8 Security Layer -- Technologies in 5G Enabled IoT -- Threat Analysis in 5G IoT -- Eavesdropping -- Contaminating -- Spoofing -- Jamming -- Physical Layer Security -- Trust Mechanism in WSN -- Crowdsourcing Analysis -- Attacks at the Architecture Level -- Current Research for 5G and IoT -- Future Research Directions and Challenges -- Characteristics Synthesis -- Signal Revoking -- Location Awareness -- Technical Challenges -- Wireless Software Defined Network -- Security Assurance and Privacy Analysis -- Standardization Issues -- Conclusion -- References. , 8 Energy Efficiency and Scalability of 5G Networks for IoT in Mobile Wireless Sensor Networks -- Introduction -- Energy Efficiency in Mobile Wireless Sensor Networks -- Basic Concept of 5G Technology -- Evolution of 5G -- Frequency Band of 5G System -- 5G Innovative Technologies -- IoT Services Based on 5G -- IoT Industry Supported by 5G Technology -- Industry 4.0 -- Palpable Internet -- Security of IoT in 5G System -- Conclusion -- References -- 9 Security Services for Wireless 5G Internet of Things (IoT) Systems -- Introduction -- Inspiration and Ideas for 5G Based on IoT -- Structure of IoT in Cooperation with 5G -- Sensor Layer -- Network Layer -- Communication Layer -- Architecture Layer -- Application Layer -- Current Resolutions for Communication for IoT in 5G -- Bluetooth Low Energy (BLE) -- SigFox -- IEEE 802.15.4 -- LoRa -- Wi-Fi -- ZigBee -- NarrowBand IoT -- Challenges and Security Vulnerabilities -- Confidentiality and Safety -- Energy Efficacy -- Future Research Directions -- Structure of Network Based on Big Data -- 5G New Radio (NR): A New Wave-Form Design Consideration -- Energy Efficacy -- Interchange Between Communication, Gathering, and Computing -- Design of Synchronized Multi-Band, and High-Power Effective Amplifier -- Conclusion -- References -- 10 Securing the IoT-Based Wireless Sensor Networks in 5G and Beyond -- Introduction -- Literature Survey -- IoT-Based Wireless Networks -- Different Types of Attacks -- Perception Layer -- Abstraction Layer -- Network Layer -- Computing Layer -- Operation Layer -- Application Layer -- Importance of 5G -- Background -- Mathematical Explanation for Euclidean Distance -- Proposed Work -- Assumptions -- Creating Trial Data Sets -- Transmitting the Messages -- Analysis of the Proposal -- Security -- Conclusion -- References. , 11 5G and Internet of Things-Integration Trends, Opportunities, and Future Research Avenues -- Introduction -- Overview of 5G -- Evolution of 5G -- Characteristics and Requirements of 5G Ecosystem -- 5G Architecture -- An Insight into IoT -- Characteristics of IoT -- Layered Architecture of IoT -- Requirements for 5G Integrated IoT Architecture -- Edge Layer of 5G IoT -- Network Layer of 5G IoT -- Application Layer of 5G IoT -- Blockchain-Based 5G IoT -- 5G IoT with Artificial Intelligence -- Opportunities of 5G Integrated IoT -- Technological Advancement -- Smart Cities -- Business -- Aerial and Satellite Research -- Mitigating Pandemic Situation -- Industrial Usage with Other Technologies -- Video Surveillance -- Challenges of 5G Integrated IoT -- General Challenges -- Heterogeneity of 5G and IoT Data -- Blockchain Integrating 5G IoT Issues -- 5G mm-Wave Issues -- Threat Protection of 5G IoT -- Conclusion -- References -- 12 Post-Quantum Cryptographic Schemes for Security Enhancement in 5G and B5G (Beyond 5G) Cellular Networks -- Introduction -- Emerging Cellular Networks -- 5G Overview -- Evolution of 6G/B5G Overview -- State-Of-The-Art -- Taxonomy of 6G/B5G Wireless Systems -- Security Services in 6G/B5G Wireless Networks -- Data Security Techniques for 5G Heterogeneous Networks -- Visual Secret Sharing -- Steganography -- Cryptographic Algorithms -- Key Management -- Overview and Fundamentals of Quantum Computing -- Architecture of Classical Computing Versus Quantum Computing -- Mathematical Representation for Quantum Computing -- The Impact of Quantum Computing on Modern Cryptography -- Quantum Algorithms Affecting Cryptosystems -- Post-Quantum Cryptography -- Mathematical View -- Post-Quantum Analysis -- Conclusion -- References -- 13 Enhanced Energy Efficiency and Scalability in Cellular Networks for Massive IoT -- Introduction. , Literature Review.
    Additional Edition: Print version: Bhushan, Bharat 5G and Beyond Singapore : Springer,c2023 ISBN 9789819936670
    Language: English
    Keywords: Electronic books. ; Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
  • 3
    UID:
    almahu_9949517373702882
    Format: 1 online resource (177 pages)
    ISBN: 9781000791266
    Content: Dynamic Resource Allocation in Embedded, High-Performance and Cloud Computing covers dynamic resource allocation heuristics for manycore systems, aiming to provide appropriate guarantees on performance and energy efficiency.
    Additional Edition: Print version: Indrusiak, Leando Soares Dynamic Resource Allocation in Embedded, High-Performance and Cloud Computing Milton : River Publishers,c2016 ISBN 9788793519084
    Language: English
    Keywords: Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    London :IntechOpen,
    UID:
    almahu_9949728667002882
    Format: 1 online resource (396 pages)
    Edition: 1st ed.
    ISBN: 9781803556260
    Additional Edition: Print version: Kumar, Vijay Macrophages London : IntechOpen,c2022
    Language: English
    Keywords: Electronic books. ; Electronic books.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9949692693102882
    Format: 1 online resource (342 pages)
    Edition: 1st ed.
    ISBN: 9789819944132
    Series Statement: India Studies in Business and Economics Series
    Additional Edition: Print version: Dev, S. Mahendra Achieving Zero Hunger in India Singapore : Springer,c2023 ISBN 9789819944125
    Language: English
    Keywords: Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9949568770802882
    Format: 1 online resource (576 pages)
    Edition: 1st ed.
    ISBN: 9789464632224
    Series Statement: Atlantis Highlights in Intelligent Systems Series ; v.9
    Note: Intro -- Preface -- Organization -- Contents -- Peer-Review Statements -- 1 Review Procedure -- 2 Quality Criteria -- 3 Key Metrics -- Digital Economy Enabling High-Quality Manufacturing Development: Evidence from Chinese Provincial Data -- 1 Introduction -- 2 Theoretical Mechanism and Research Hypothesis -- 2.1 Digital Economy Enables the Direct Mechanism of Action of High-Quality Manufacturing Development -- 2.2 Digital Economy, Innovation Effect and High-Quality Development of Manufacturing -- 2.3 Digital Economy, Efficient Resource Allocation and High-Quality Development of Manufacturing -- 3 Study Design -- 3.1 Model Building -- 3.2 Variable Selection and Data Sources -- 4 Empirical Analysis -- 4.1 Baseline Regression Analysis -- 4.2 Endogeneity Analysis -- 4.3 Subregional Inspection -- 4.4 Mechanism of Action Analysis -- 5 Conclusions -- References -- The Lexicon Construction and Quantitative Research of Digital Economy Policy Texts -- 1 Introduction -- 2 Research Status -- 3 Lexicon Construction of Digital Economic Policy -- 3.1 Data Sources -- 3.2 Neologism Discovery -- 3.3 Comparison of Segmentation Effect -- 4 Classification of Policy Text -- 4.1 Experimental Data -- 4.2 Model and Parameter -- 4.3 Experimental Result -- 5 Analysis of Policy Hotspots -- 5.1 Policy Keywords -- 5.2 Policy Topics -- 6 Conclusion -- References -- Measurement and Evaluation of Provincial Digital Economy Development Efficiency -- 1 Introduction -- 2 Provincial Digital Economy Development Level Measurement -- 2.1 Construction of Indicator System -- 2.2 Data Sources -- 2.3 Analysis of Results -- 3 Analysis of Provincial Digital Economy Output Efficiency -- 3.1 Research Models -- 3.2 Empirical Results and Analysis -- 4 Conclusions and Recommendations -- 4.1 Conclusions -- 4.2 Research Recommendations -- References. , How Digital Transformation of Enterprises Can Improve Labor Productivity: Evidence from Chinese-Listed Companies -- 1 Introduction -- 2 Literature Review and Hypothesis -- 3 Models and Data -- 3.1 Models -- 3.2 Data -- 4 Results and Discussion -- 4.1 Digital Transformation and Labor Productivity -- 4.2 Intermediate Mechanism: Capital Intensity (CI) and Innovation Input (R& -- D) -- 4.3 Heterogeneity Analysis -- 5 Conclusions -- References -- Design of Adaptive Defense System for Marketing Information Management Based on Blockchain Technology -- 1 Introduction -- 2 Application of Blockchain Technology in Marketing Information Management Adaptive Defense System -- 2.1 Blockchain Basics -- 2.2 Blockchain-Related Technologies -- 2.3 Scenarios of Blockchain Technology Application -- 3 Network Security Adaptive Defense Technology -- 3.1 Intrusion Detection -- 3.2 Intrusion Prevention -- 4 Design of Adaptive Defense System for Marketing Information Management -- 4.1 System Architecture -- 4.2 System Function Module -- 5 System Testing -- 5.1 Set up the Network Environment -- 5.2 Verify the Performance Improvement Effect -- 6 Conclusion -- References -- Comparative Study of LSTM and Transformer for A-Share Stock Price Prediction -- 1 Introduction -- 2 Related Work -- 2.1 Stock Price in China -- 2.2 Deep Learning in Stock Prediction -- 3 Methodology -- 3.1 LSTM -- 3.2 Transformer -- 3.3 Evaluation Metrics -- 4 Experiments -- 4.1 Data Selection -- 4.2 Data Pre-processing -- 5 Experiment Result -- 6 Conclusions -- References -- Can Digital Inclusive Finance Improve Business Export Resilience? -- 1 Introduction -- 2 Theoretical Analysis and Hypotheses -- 3 Study Design -- 3.1 Sample Selection and Data Sources -- 3.2 Variable Setting -- 3.3 Model Construction -- 4 Analysis of Empirical Results -- 4.1 Descriptive Statistics -- 4.2 Correlation Analysis. , 4.3 Analysis of Regression Results -- 4.4 Analysis of the Mechanism of Action -- 4.5 Heterogeneity Analysis -- 5 Robustness Test -- 5.1 Substitution of Explanatory Variables -- 5.2 Change in Estimation Method and Sample Scope -- 5.3 Instrumental Variable Method -- 6 Research Findings and Insights -- References -- Research on Active Firefighting Robot Navigation Based on the Improved AUKF Algorithm -- 1 Introduction -- 2 Multi-source Fusion Localization Method Based on Improved AUKF Algorithm -- 3 Experimental Analysis -- 4 Conclusion -- References -- Analysis and Research on Big Data Storage Technology Based on Machine Learning -- 1 Introduction -- 2 Neural Network Overview -- 3 The Basic Principles and Models of Artificial Neural Networks -- 3.1 The Basic Principle of Neural Network Composition -- 3.2 Structure of Neural Networks -- 4 BP Algorithm -- 4.1 Mathematical Description of BP Algorithm -- 4.2 Shortcomings of BP Algorithm -- 5 Improved Modeling of Neural Network BP Algorithm Using Genetic Algorithm (GA) -- 6 Design of the System -- 6.1 System Composition -- 7 Conclusions -- References -- k-Surrounding Neighbors: Incorporating Serendipity in Collaborative Recommendations -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Evaluation on the MovieLens Dataset -- 4.1 Prediction Accuracy -- 4.2 Intra-list Diversity -- 4.3 Novelty -- 5 Conclusion -- References -- Data Generation and Latent Space Based Feature Transfer Using ED-VAEGAN, an Improved Encoder and Decoder Loss VAEGAN Network -- 1 Introduction -- 2 Methods -- 2.1 VAE'S Reparameterization Trick -- 2.2 Training Theory of GANs -- 2.3 Loss Functions VAE -- 2.4 Loss Functions DCGAN -- 2.5 Loss Functions ED-VAEGAN -- 2.6 Loss Functions f-w VAEGAN -- 2.7 Loss Functions p-w VAEGAN -- 2.8 Latent Space Continuity Quality -- 3 Experiments -- 4 Results and Discussions -- 5 Conclusion. , References -- Digital Investment Risk Evaluation Model of Power Grid Enterprises Based on FAHP-AOA-LSSVM -- 1 Introduction -- 2 Fuzzy Analytic Hierarchy Process -- 2.1 Establish Judgment Matrix -- 2.2 Determine the Membership Function -- 2.3 Single-Factor Evaluation -- 2.4 Determine the Weight Vector -- 2.5 Consistency Test -- 3 AOA's Improved Risk Evaluation Model of LSSVM -- 3.1 Principle of LSSVM Evaluation -- 3.2 AOA Search for Optimal Solutions of LSSVM Parameters -- 4 Construction of Risk Evaluation Index System for Power Grid Digital Investment -- 4.1 Questionnaire Design and Data Sources -- 4.2 Expert Evaluation -- 5 Example Analysis -- 5.1 Determining the Evaluation Value of the Project -- 5.2 Parameter Setting -- 5.3 Analysis of Results -- 6 Conclusion -- References -- Research on Machine Learning Driven Stock Selection Strategy -- 1 Introduction -- 2 Methodology -- 2.1 Research Scheme -- 2.2 Data -- 3 Empirical Analysis -- 3.1 Single Machine Learning Algorithm Performance -- 3.2 Integrated Machine Learning Algorithm Performance -- 4 Important Anomalies of Chinese Stock Market -- 5 Discussion and Conclusion -- 5.1 Discussion -- 5.2 Conclusion -- References -- An Identification Method for High Voltage Power Grid Insulator Based on Mobilenet-SSD Network -- 1 Introduction -- 2 Target Detection Network of Lightweight Mobilenet-SSD -- 2.1 Multi-scale Feature Fusion Target Detection Network -- 2.2 Light Weight Backbone Feature Extraction Network -- 2.3 Fused Network of MobileNet and SSD -- 3 Sample Analysis -- 4 Conclusion -- References -- Insights into the Correlation Between Digital Marketing Effectiveness and the 5A Crowd Assets Model -- 1 Introduction -- 2 Digital Marketing Theory and the Landing of Contemporary e-commerce Data Platforms -- 2.1 Digital Marketing and Consumer Operations. , 2.2 Crowd Assets Model from Traditional to Digital Marketing -- 2.3 Upgrade of Crowd Assets Model-- 5A -- 3 Study Design -- 3.1 Research Background -- 3.2 Correlation Analysis of Seeding with A3 -- 3.3 Correlation Analysis Between A3 and GMV (Gross Merchandise Volume) -- 3.4 K-means Clustering Algorithm -- 4 Research Conclusions and Values -- References -- A Credit Card Default Prediction Method Based on CatBoost -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Experiment -- 4.1 Feature Engineering -- 4.2 Training Parameters -- 4.3 Evaluation Metrics -- 4.4 Evaluation Results -- 5 Conclusion -- References -- Prediction of Shanghai Composite Index Based on Macroeconomic Indicators and Artificial Intelligence Method -- 1 Introduction -- 2 Macro-economy and Stock Market Forecast -- 2.1 Macro-economy -- 2.2 Stock Market Forecast -- 3 Neural Network and Support Vector Machine Research -- 3.1 Introduction to Neural Networks -- 3.2 Learning of Neural Networks -- 3.3 Support Vector Machine -- 4 An Empirical Study of Machine Learning Methods in SSE Index Forecasting -- 4.1 Introduction to the Empirical Environment -- 4.2 SSE Index Prediction Based on BP Neural Network -- 4.3 SSE Index Prediction Based on Support Vector Machine -- 5 Conclusion -- References -- Research on the Development Level of Digital Economy Based on Fuzzy Comprehensive Evaluation -- 1 Introduction -- 2 Fuzzy Comprehensive Evaluation of Digital Economy Development in Anhui Province -- 2.1 Indicator System Determination and Weight Calculation -- 2.2 Fuzzy Comprehensive Evaluation -- 2.3 Chapter Summary -- 3 Conclusions -- References -- Factors Influencing Customer Addictive Purchase Behaviours of Toy Blind Boxes -- 1 Introduction -- 2 Research Methods -- 3 Research Design -- 4 Analysis -- 4.1 Qualitative Analysis -- 4.2 Further Analysis -- 5 Discussions -- 6 Conclusion. , References.
    Additional Edition: Print version: Hemachandran, K. Proceedings of the 2023 2nd International Conference on Artificial Intelligence, Internet and Digital Economy (ICAID 2023) Dordrecht : Atlantis Press (Zeger Karssen),c2023 ISBN 9789464632217
    Language: English
    Keywords: Electronic books. ; Electronic books. ; Electronic books ; Electronic books
    URL: FULL  ((OIS Credentials Required))
    URL: FULL  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9949301296502882
    Format: 1 online resource (1965 pages)
    ISBN: 9789811513466
    Note: Intro -- Preface -- Contents -- List of Videos -- Chapter Contributors and Video Contributors -- Contributors -- Video Contributors -- About the Editors -- Part I: Introduction -- 1: Oral and Maxillofacial Surgery in India: How Did We Get Here and Where Are We Going? -- 1.1 History of Our Missions and Our Challenges -- 1.2 Expertise, Familiarity, and Competence -- 1.3 Predicting the Future -- References -- Part II: Preoperative Assessment and Patient Preparation/Optimization -- 2: Preoperative Evaluation and Investigations for Maxillofacial Surgery -- 2.1 Introduction -- 2.2 Preoperative Evaluation -- 2.3 Laboratory Investigations -- 2.4 Preanesthetic Evaluation -- 2.5 Aspects of Evaluation Unique to Anesthesia -- 2.6 Assessment of the Pediatric Patient -- 2.7 Assessment of the Elderly Patient -- 2.8 Specialist Consultation and Work-up -- 2.9 The Process of Risk Assessment -- 2.10 Risk Reduction Strategies -- 2.10.1 Premedication [4] -- 2.10.2 Fasting Guidelines -- 2.10.3 Perioperative Beta-Blocker Therapy -- 2.10.4 PONV Prophylaxis [47] -- 2.10.5 Plan for Postoperative Analgesia [51] -- 2.11 Preoperative Decision Making and Obtaining Informed Consent: The Team Concept [53] -- 2.12 Conclusion -- References -- 3: Management of Medical Comorbidities in Maxillofacial Surgery -- 3.1 Introduction -- 3.2 Changing Demographics in India -- 3.3 Lifestyle Changes in India -- 3.4 The Changing Face of Oral and Maxillofacial Surgery -- 3.4.1 Medical History and India -- 3.5 Cardiovascular System -- 3.5.1 Hypertension -- 3.5.1.1 Minor Oral Surgery -- 3.5.1.2 Major Maxillofacial Surgery -- 3.5.1.3 Vasoconstrictors and Hypertension -- 3.5.2 Ischemic Heart Disease (IHD) -- 3.5.2.1 Minor Oral Surgery -- 3.5.2.2 Major Surgery -- 3.5.3 Postintervention Cardiac Patients. , 3.5.3.1 Percutaneous Coronary Angioplasty (PTCA) and Coronary Artery Bypass Graft (CABG) and Valve Replacement Procedures -- 3.5.4 Conventional Antiplatelets, Anticoagulants, and Novel Oral Anticoagulants (NOAC) -- 3.5.4.1 Minor Dentoalveolar Surgery: Antiplatelets -- 3.5.4.2 Maxillofacial Surgery -- 3.5.4.3 Bridging with Heparin -- 3.5.4.4 Anticoagulants and Oral/Maxillofacial Surgery -- 3.5.4.5 Minor Oral Surgery -- 3.5.4.6 Major Maxillofacial Surgery -- 3.5.5 Infective Endocarditis Prophylaxis -- 3.5.6 Implantable Cardioverter Defibrillators (ICD) -- 3.5.6.1 Implications -- 3.6 Impact of Central Nervous System Disorders in Maxillofacial Surgery -- 3.6.1 Epilepsy -- 3.6.1.1 Basic considerations -- 3.6.1.2 Outpatient maxillofacial considerations -- 3.6.1.3 Major Surgical Considerations -- 3.6.1.4 Precautions, complications, & -- management -- 3.6.1.5 Management of an acute episode on the dental chair -- 3.6.2 Stroke -- 3.6.2.1 Basic Considerations -- 3.6.2.2 Maxillofacial considerations -- 3.6.2.3 Precautions -- 3.7 Impact of Psychiatric Disorders in Maxillofacial Surgery -- 3.7.1 Maxillofacial Considerations -- 3.8 Dental and Maxillofacial Implications in Liver Disease -- 3.8.1 Introduction -- 3.8.1.1 The Function of the Liver [36] -- 3.8.2 Classification of Liver Dysfunctions [35] -- 3.8.2.1 Viral Hepatitis -- 3.8.2.2 Autoimmune Hepatitis -- 3.8.2.3 Fulminant Hepatitis -- 3.8.2.4 Cirrhosis -- 3.8.2.5 Hepatocellular Carcinoma -- 3.8.2.6 Alcoholic Liver Disease -- 3.8.3 Oral Manifestations of Liver Disease -- 3.8.4 Implications of Liver Disease -- 3.8.4.1 Liver Disease and Maxillofacial Surgery -- 3.9 Maxillofacial Implications in GI Disorders -- 3.9.1 Perioperative Maxillofacial Implications -- 3.9.1.1 GERD -- 3.9.1.2 Peptic Ulcers -- 3.9.1.3 Ulcerative Colitis -- 3.10 Pregnancy -- 3.10.1 Physiologic Changes. , 3.10.2 Treatment Protocol -- 3.10.2.1 Minor Surgery -- 3.10.2.2 Dental Radiology -- 3.10.2.3 Major Surgery -- 3.10.3 Drug Usage in Pregnancy -- 3.11 Endocrine Disorders -- 3.11.1 Diabetes -- 3.11.1.1 Management of Patients Undergoing Procedures -- 3.11.1.2 Preoperative Glycemic Control in patients on Oral Hypoglycemic Agents -- 3.11.1.2.1 Minor surgery -- 3.11.1.2.2 Major surgery -- 3.11.1.3 Preoperative Glycemic Control in Type 2 Diabetics on Insulin -- 3.11.1.4 Preoperative Glycemic Control in Type 1 Diabetics on Insulin -- 3.11.1.4.1 Minor surgery: -- 3.11.1.4.2 Major surgery: -- 3.11.1.4.3 Intraoperative glycemic control: -- 3.11.1.4.4 Postoperative glycemic control: -- 3.11.2 Hypo/Hyperthyroidism -- 3.11.2.1 Hypothyroidism -- 3.11.2.1.1 Physiologic Challenges -- 3.11.2.1.2 Management -- 3.11.2.2 Hyperthyroidism -- 3.11.3 Adrenal Gland Disorders -- 3.11.3.1 Primary Adrenocortical Hypofunction -- 3.11.3.2 Secondary Adrenocortical Insufficiency -- 3.11.4 Renal Disorders -- 3.11.4.1 Acute Renal Failure (ARF) -- 3.11.4.2 Chronic Renal Failure (CRF) -- 3.12 Patients with Non-head and Neck Malignancies -- 3.12.1 Introduction -- 3.12.2 Treatment Protocol -- 3.12.2.1 Chemotherapy -- 3.12.2.2 Radiotherapy -- 3.12.3 Prevention and Treatment of Osteonecrosis After Chemotherapy and Radiation -- References -- 4: Medical Emergencies in Oral and Maxillofacial Surgical Practice -- 4.1 Introduction -- 4.2 Acute Asthmatic Attack -- 4.2.1 Life-Threatening Acute Asthma -- 4.3 Acute Adrenal Insufficiency/Adrenal Crisis/Steroid Crisis/Addisonian Crisis -- 4.4 Airway Obstruction -- 4.5 Anaphylaxis -- 4.6 Chest Pain -- 4.6.1 Angina -- 4.6.2 Myocardial Infarction (Heart Attack) -- 4.7 Cardiac Arrest -- 4.8 Hypoglycemia -- 4.9 Grand Mal Seizures -- 4.10 Syncope -- 4.11 Other Causes of Loss of Consciousness -- 4.12 Conclusion -- References. , Part III: Anesthesia for Oral and Maxillofacial Surgery -- 5: Local Anesthesia in Oral and Maxillofacial Surgery -- 5.1 Introduction -- 5.1.1 Historical Background -- 5.1.2 Definition -- 5.1.3 Ideal Characteristic of Local Anesthesia -- 5.2 Classification (Tables 5.1 and 5.2) -- 5.3 Local Anesthetic Agents -- 5.3.1 Lidocaine (Lignocaine) -- 5.3.2 Bupivacaine -- 5.3.3 Articaine -- 5.4 Vasoconstrictors -- 5.4.1 Dilution of Vasoconstrictor -- 5.5 Causes of Failure of LA -- 5.6 LA Toxicity and Antidote for Toxicity -- 5.6.1 Reversal of Cardiomyotoxicity -- 5.7 Reversal of Soft-Tissue Anesthesia -- 5.8 Plain Local Anesthetic (Without Epinephrine) -- 5.9 Topical Local Anesthetic Agent -- 5.10 Surface Anesthesia -- 5.11 Methods of Local Anesthetic Administration -- 5.11.1 Percentage of Blood Vessel Penetration During IANB -- 5.11.2 Controversy in the Use of Bilateral IANB and Lingual Nerve Block [17] -- 5.12 Techniques -- 5.12.1 Inferior Alveolar Nerve Block (Also Known as Mandibular Nerve Block) [Along with Lingual & -- Long Buccal Nerve Blocks] -- 5.12.2 Technique -- 5.12.3 Areas Anesthetized by This Block -- 5.12.4 Signs and Symptoms of Anesthesia -- 5.12.5 Complications (Table 5.6) -- 5.12.5.1 Failure to Obtain Anesthesia -- 5.12.5.2 Hematoma Formation -- 5.12.5.3 Transient Facial Nerve Palsy -- 5.12.5.4 Trismus -- 5.12.5.5 Accidental Breakage of the Needle -- 5.13 Vazirani-Akinosi (VA) Versus Inferior Alveolar Nerve Block -- 5.13.1 Indications for VA [24] -- 5.13.2 Akinosi-Vazirani Technique (Closed-Mouth Technique) -- 5.13.3 Technique -- 5.14 Mental/Incisive Nerve Block -- 5.14.1 Technique -- 5.14.2 Areas Anesthetized -- 5.14.3 Signs and Symptoms -- 5.15 Nerve Blocks in the Maxilla -- 5.15.1 Posterior Superior Alveolar Nerve Block Technique -- 5.15.1.1 Areas Anesthetized -- 5.15.1.2 Signs and Symptoms. , 5.15.2 Infraorbital Nerve Block [Also Anterior and Middle Superior Nerve Blocks] -- 5.15.2.1 Technique -- 5.15.2.2 Areas Anesthetized -- 5.15.2.3 Signs and Symptoms of Anesthesia -- 5.15.3 Palatal Anesthesia -- 5.15.3.1 Greater Palatine Nerve Block -- 5.15.3.2 Nasopalatine Nerve Block -- 5.16 Regional Blocks in Oral and Maxillofacial Surgery -- 5.16.1 Maxillary Nerve Block -- 5.16.2 Mandibular Nerve Block -- 5.16.3 Greater Auricular Nerve Block -- 5.16.4 Glossopharyngeal Nerve Block -- 5.16.5 Sphenopalatine Ganglion Block -- 5.17 Recent Advances in Local Anesthesia -- 5.17.1 Vibrotactile Devices -- 5.17.1.1 Vibraject [38] -- 5.17.1.2 Dental Vibe [39] -- 5.17.1.3 Accupal -- 5.17.2 C-CLAD (Computer-Controlled Local Anesthetic Delivery) -- 5.17.3 Compu-Flo -- 5.17.4 STA-single tooth anesthesia -- 5.17.5 Jet Injection -- 5.17.6 MED-JET H III -- 5.17.7 Safety Dental Syringes [43] -- 5.17.8 Devices for Intraosseous Anesthesia [44] -- 5.18 Conclusion -- References -- 6: Office-Based Anesthesia in Oral and Maxillofacial Surgery-The American Model and Training -- 6.1 Introduction -- 6.2 Brief History of Anesthesia in OMS -- 6.3 The Anesthesia Team -- 6.4 AAOMS Office Anesthesia Guidelines -- 6.5 Office Requirements -- 6.6 Record Keeping -- 6.7 Office Anesthesia Evaluation Program and Parameters of Care -- 6.8 AAOMS National Simulation Program -- 6.9 Dental Anesthesia Assistant National Certification Examination (DAANCE) -- 6.10 Anesthesia Training during OMS Residency -- 6.11 Preanesthetic Evaluation of the Patient -- 6.12 Monitoring -- 6.12.1 Methods for Monitoring Ventilation -- 6.13 Airway Armamentarium -- 6.14 Oxygen and Supplemental Gas Delivery System -- 6.15 Suction Equipment -- 6.16 Recovery Room -- 6.17 Techniques in Anesthesia -- 6.17.1 Enteral Anesthesia. , 6.17.2 Parenteral Anesthesia: Intravenous Anesthesia and Inhalational Anesthesia.
    Additional Edition: Print version: Bonanthaya, Krishnamurthy Oral and Maxillofacial Surgery for the Clinician Singapore : Springer Singapore Pte. Limited,c2021 ISBN 9789811513459
    Language: English
    Keywords: Electronic books. ; Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    gbv_1851408738
    Format: 1 online resource (183 pages)
    ISBN: 9781000397444
    Series Statement: Routledge Explorations in Energy Studies
    Note: Description based on publisher supplied metadata and other sources
    Additional Edition: ISBN 9780367486440
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9780367486440
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    almahu_9949517301302882
    Format: 1 online resource (308 pages)
    Edition: 1st ed.
    ISBN: 9781839687587
    Additional Edition: Print version: Samanta, Ashis Kumar Chemistry and Technology of Natural and Synthetic Dyes and Pigments London : IntechOpen,c2020
    Language: English
    Keywords: Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    gbv_1896435122
    Format: 1 online resource (341 pages)
    Edition: 1st ed.
    ISBN: 9781000995435
    Series Statement: Routledge Research in International and Comparative Education Series
    Content: Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- List of Figures -- List of Tables -- Acknowledgments -- About the Editors -- About the Contributors -- Part I: Violence Responses through Relational and Mindful Education -- Chapter 1: Introduction -- Introduction -- Overview of Chapters -- References -- Chapter 2: Imagining Relational Ontologies for Education amidst Ricocheting (non)Violence: Notes from Vancouver, Canada -- Conceptualizing Education and Pedagogy alongside a Relational Ontological Imagination -- Autoethnographic Reflection for Imaginative Practice -- Resultant Considerations -- Conclusion -- Notes -- References -- Appendix -- Chapter 3: Embodied Universal Peace: Curriculum Theory and Buddhist Intersubjective Contemplative Inquiry -- Methodology: Curriculum Theory and Buddhist Intersubjective Contemplative Inquiry -- Intrascape -- Intrascape to Interscape -- Intrascape Reconsidered -- Intrascape-Interscape Expanded -- Interscape -- Intrascape-Interscape Redux -- Interscape Expanded -- Conclusion -- Note -- References -- Appendix -- Part II: Cross-Cultural Education Countering Violence -- Chapter 4: Creating an Intercultural Peace Education Course Online with Devised Theatre for High-Ability Teenagers of Different Backgrounds and World Regions -- Teenagers with High Ability -- The Summer Academic Enrichment Camp -- Intercultural Education -- Devised Theatre -- Conceptual Understandings of an Online Culture of Peace using Devised Theatre -- Building Cultures of Peace with Students with HA through Devised Theatre -- Pedagogical Considerations Relevant for Instructors and Curriculum Developers -- The Course as Process and Product -- Course Goals and Learning Outcomes -- Specific Peace Education Standards for Students -- Using Devised Theatre Techniques in an Online Classroom.
    Note: Description based on publisher supplied metadata and other sources
    Additional Edition: ISBN 9781032468259
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781032468259
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages