feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • HPol Brandenburg  (43)
  • Müncheberg Dt. Entomologisches Institut  (22)
  • Haus Wannsee-Konferenz  (16)
  • Stiftung FVV  (4)
  • Hist. Museum Berlin  (4)
Type of Medium
Language
Region
Library
Virtual Catalogues
Access
  • 1
    UID:
    almahu_9949568766902882
    Format: 1 online resource (310 pages)
    Edition: 1st ed.
    ISBN: 9789819936687
    Series Statement: Springer Tracts in Electrical and Electronics Engineering Series
    Note: Intro -- Preface -- Contents -- Editors and Contributors -- 1 Evolution of Next-Generation Communication Technology -- Introduction -- Existing Cellular Network and Its Challenges -- First Generation -- Second Generation -- Third Generation -- Fourth Generation -- Fifth Generation -- Conventional Cellular Systems-Limitations -- Vision and Mission-5G -- Architecture-5G -- C-Ran -- SBA-Based Core Network -- Next-Generation Network-Applications -- Example of Next-Generation Network Applications -- Conclusion and Future Scope -- References -- 2 Third Industrial Revolution: 5G Wireless Systems, Internet of Things, and Beyond -- Introduction -- IoT and Its Devices -- A 5G and IoT -- 5G and Ubiquitous Computing -- The Internet of Things -- A 5G Network -- History and Present Researches on IoT as Well as 5G -- Requirements of IoT and Shortcomings of Wireless 4G Network -- Needs for IoT that is 5G Enabled -- The Vision of 5G IOT: Industrial and Research Context -- Unification of Technologies -- Enabling Technology Drivers in 5G IoT -- Challenges and Trends of Future of the Research -- Conclusion and Future Scope -- Appendix 1: Wireless Technology Features -- Appendix 2: Information Speed Increment -- Appendix 3: 5G Network Architecture -- Appendix 4: 5G Tower Signals -- References -- 3 Network Architectures and Protocols for Efficient Exploitation of Spectrum Resources in 5G -- Introduction -- Enabler Technologies -- Architecture of 5G -- Multiple-Input Multiple-Output Technology in 5G -- Antenna Array for MIMO in 5G -- Device-to-Device Communication in 5G -- Interference Management for 5G -- Multi-tier 5G Architecture -- Spectrum Sharing with Cognitive Radio in 5G -- Ultra-dense Networks in Multi-radio Access Technology Association in 5G -- UDN Moving Cells with 5G+ Network -- Cloud Technologies for 5G -- Methodology. , The Methodology of the Proposed Scheme -- Spectrum Band -- 5G Base Station -- Energy Module -- Energy Controller -- Challenges and Future Research Directions -- Conclusion -- References -- 4 Wireless Backhaul Optimization Algorithm in 5G Communication -- Introduction -- Network Scenarios and System Assumptions -- Analysis of Delay Jitter Indicators -- Delay Analysis -- Delay Jitter Analysis -- Optimization Model Establishments -- Basic Backhaul Model -- Improved Model 1 -- Improved Model 2 -- Improved Model Solutions -- Improved Model 1 Solution -- Improved Model 2 Solution -- Simulation Analysis -- Conclusions -- References -- 5 Security Attacks and Vulnerability Analysis in Mobile Wireless Networking -- Introduction -- Types of Wireless Mobile Network -- Wireless PAN -- Wireless LAN -- Manet -- Wireless MAN -- Wireless WAN -- Mobile Network -- Gan -- Aerospace Network -- Challenges and Issues in Wireless Mobile Network -- Information Management -- Endless Communication -- Delay Tolerance -- Heterogeneity -- Contextual Awareness -- Buffer Management -- Power Features -- Privacy and Security -- Security Goals of Wireless Mobile Network -- Classification of Security Attacks -- Most Prevalent Attacks in Wireless Systems -- Denial of Service (DoS) Attack -- Flooding Attack -- Jamming -- Intervention -- Sleep Deprivation Attack -- Blackhole Attack -- Rushing Attack -- Sybil Attack -- Sinkhole Attack -- Gray Hole Attack -- Byzantine Attack -- Jellyfish Attack -- Wormhole Attack -- Eavesdropping -- Disclosure of Information Attack -- Man-In-The-Middle Attack -- Replay Attack -- ACK Attack -- Spoofing Attack -- Link Spoofing Attack -- Spear-Phishing Attack -- Repudiation Attack -- Infected Code Injection -- Colluding Mis-Relay Attack -- Selective-Forwarding Attack -- Database Hack Attack -- Conclusion -- References. , 6 Utilities of 5G Communication Technologies for Promoting Advancement in Agriculture 4.0: Recent Trends, Research Issues and Review of Literature -- Introduction -- Challenges Faced by Existing Network Technologies -- Motivation of the Work -- Existing Problems and Contribution -- Scope of 5G-Enabled Networks in AgriIoT -- Energy Consumption Management Methods in 5G Networks -- Application Areas of 5G in Smart Farming -- Data Aggregation -- Predictive Analytics -- Drone Operations -- Animal Tracking and Real-Time Monitoring -- Autonomous Agriculture Vehicles -- Weather Stations -- 5G Enabled Components in Agriculture -- Drones and Unmanned Aerial Vehicles (UAVs) -- Virtual Consultation and Predictive Maintenance -- Augmented and Virtual Reality -- Agriculture Robots -- Cloud-Based Data Analytics -- Recent Development Scenarios in 5G-Based Agriculture -- Conclusion and Future Work -- References -- 7 Security Attacks and Countermeasures in 5G Enabled Internet of Things -- Introduction -- Overview of 5G -- Overview of IoT -- 5G Enabled IoT -- 5G Enabled IoT Architecture -- L1 Physical Device Layer -- L2 Communication Layer -- L3 Fog Computing Layer -- L4 Data Storage Layer -- L5 Management Service Layer -- L6 Application Layer -- L7 Process and Collaboration Layer -- L8 Security Layer -- Technologies in 5G Enabled IoT -- Threat Analysis in 5G IoT -- Eavesdropping -- Contaminating -- Spoofing -- Jamming -- Physical Layer Security -- Trust Mechanism in WSN -- Crowdsourcing Analysis -- Attacks at the Architecture Level -- Current Research for 5G and IoT -- Future Research Directions and Challenges -- Characteristics Synthesis -- Signal Revoking -- Location Awareness -- Technical Challenges -- Wireless Software Defined Network -- Security Assurance and Privacy Analysis -- Standardization Issues -- Conclusion -- References. , 8 Energy Efficiency and Scalability of 5G Networks for IoT in Mobile Wireless Sensor Networks -- Introduction -- Energy Efficiency in Mobile Wireless Sensor Networks -- Basic Concept of 5G Technology -- Evolution of 5G -- Frequency Band of 5G System -- 5G Innovative Technologies -- IoT Services Based on 5G -- IoT Industry Supported by 5G Technology -- Industry 4.0 -- Palpable Internet -- Security of IoT in 5G System -- Conclusion -- References -- 9 Security Services for Wireless 5G Internet of Things (IoT) Systems -- Introduction -- Inspiration and Ideas for 5G Based on IoT -- Structure of IoT in Cooperation with 5G -- Sensor Layer -- Network Layer -- Communication Layer -- Architecture Layer -- Application Layer -- Current Resolutions for Communication for IoT in 5G -- Bluetooth Low Energy (BLE) -- SigFox -- IEEE 802.15.4 -- LoRa -- Wi-Fi -- ZigBee -- NarrowBand IoT -- Challenges and Security Vulnerabilities -- Confidentiality and Safety -- Energy Efficacy -- Future Research Directions -- Structure of Network Based on Big Data -- 5G New Radio (NR): A New Wave-Form Design Consideration -- Energy Efficacy -- Interchange Between Communication, Gathering, and Computing -- Design of Synchronized Multi-Band, and High-Power Effective Amplifier -- Conclusion -- References -- 10 Securing the IoT-Based Wireless Sensor Networks in 5G and Beyond -- Introduction -- Literature Survey -- IoT-Based Wireless Networks -- Different Types of Attacks -- Perception Layer -- Abstraction Layer -- Network Layer -- Computing Layer -- Operation Layer -- Application Layer -- Importance of 5G -- Background -- Mathematical Explanation for Euclidean Distance -- Proposed Work -- Assumptions -- Creating Trial Data Sets -- Transmitting the Messages -- Analysis of the Proposal -- Security -- Conclusion -- References. , 11 5G and Internet of Things-Integration Trends, Opportunities, and Future Research Avenues -- Introduction -- Overview of 5G -- Evolution of 5G -- Characteristics and Requirements of 5G Ecosystem -- 5G Architecture -- An Insight into IoT -- Characteristics of IoT -- Layered Architecture of IoT -- Requirements for 5G Integrated IoT Architecture -- Edge Layer of 5G IoT -- Network Layer of 5G IoT -- Application Layer of 5G IoT -- Blockchain-Based 5G IoT -- 5G IoT with Artificial Intelligence -- Opportunities of 5G Integrated IoT -- Technological Advancement -- Smart Cities -- Business -- Aerial and Satellite Research -- Mitigating Pandemic Situation -- Industrial Usage with Other Technologies -- Video Surveillance -- Challenges of 5G Integrated IoT -- General Challenges -- Heterogeneity of 5G and IoT Data -- Blockchain Integrating 5G IoT Issues -- 5G mm-Wave Issues -- Threat Protection of 5G IoT -- Conclusion -- References -- 12 Post-Quantum Cryptographic Schemes for Security Enhancement in 5G and B5G (Beyond 5G) Cellular Networks -- Introduction -- Emerging Cellular Networks -- 5G Overview -- Evolution of 6G/B5G Overview -- State-Of-The-Art -- Taxonomy of 6G/B5G Wireless Systems -- Security Services in 6G/B5G Wireless Networks -- Data Security Techniques for 5G Heterogeneous Networks -- Visual Secret Sharing -- Steganography -- Cryptographic Algorithms -- Key Management -- Overview and Fundamentals of Quantum Computing -- Architecture of Classical Computing Versus Quantum Computing -- Mathematical Representation for Quantum Computing -- The Impact of Quantum Computing on Modern Cryptography -- Quantum Algorithms Affecting Cryptosystems -- Post-Quantum Cryptography -- Mathematical View -- Post-Quantum Analysis -- Conclusion -- References -- 13 Enhanced Energy Efficiency and Scalability in Cellular Networks for Massive IoT -- Introduction. , Literature Review.
    Additional Edition: Print version: Bhushan, Bharat 5G and Beyond Singapore : Springer,c2023 ISBN 9789819936670
    Language: English
    Keywords: Electronic books. ; Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9949602262502882
    Format: 1 online resource (515 pages)
    Edition: 1st ed.
    ISBN: 9781484228968
    Note: Intro -- Table of Contents -- About the Authors -- Acknowledgments -- Foreword -- Introduction -- Chapter 1: Conceptualizing the Secure Internet of Things -- The BadUSB Thumb Drive -- Air-Gap Security -- Stuxnet -- Designing Safe and Secure Cyber-Physical Systems -- Constrained Computing and Moore's Law -- Trusted IoT Networks and the Network Edge -- Conclusion -- Chapter 2: IoT Frameworks and Complexity -- Introduction -- Historical Background to IoT -- IoT Ecosystem -- Connectivity Technology -- Messaging Technology -- Platform Technology -- Elements of an IoT System -- IoT Device -- IoT Device Architectural Goals -- Interoperability -- Security -- IoT Network -- IoT System Management -- Device Lifecycle -- Manufacturing -- Supply Chain -- Deployment -- Normal Operation and Monitoring -- Manage -- Update -- Decommissioning -- IoT Framework -- IoT Framework Design Goals -- IoT Data Model and System Abstractions -- IoT Node -- IoT Operations Abstraction -- Connectivity Elements -- Manageability Elements -- Security Elements -- Consider the Cost of Cryptography -- Summary IoT Framework Considerations -- IoT Framework Architecture -- Data Object Layer -- Node Interaction Layer -- Platform Abstraction Layer -- Platform Layer -- Security Challenges with IoT Frameworks -- Consumer IoT Framework Standards -- Open Connectivity Foundation (OCF) -- OCF Core Framework Layer -- OCF Profiles Framework Layer -- The OCF Device Abstraction -- OCF Security -- AllSeen Alliance/AllJoyn -- AllJoyn Security -- Universal Plug and Play -- UPnP Security -- Lightweight Machine 2 Machine (LWM2M) -- LWM2M Architecture -- LWM2M Device Management -- LWM2M Security -- One Machine to Machine (OneM2M) -- OneM2M Security -- Industrial IoT Framework Standards -- Industrial Internet of Things Consortium (IIC) and OpenFog Consortium. , Open Platform Communications-Unified Architecture (OPC-UA) -- OPC-UA Framework Architecture -- OPC-UA Security -- Data Distribution Service (DDS) -- DDS Framework Architecture -- DDS Security -- Security Enveloping -- Security Tokens -- Security Plugin Modules -- Framework Gateways -- Framework Gateway Architecture -- Type I Framework Gateway -- Type II Framework Gateway -- Type III Framework Gateway -- Type IV Framework Gateway -- Security Considerations for Framework Gateways -- Security Endpoints Within the Gateway -- Security Endpoints in Type I Gateways -- Security Endpoints in Type II Gateways -- Security Endpoints in Type III Gateways -- Security Endpoints in Type IV Gateways -- Security Framework Gateway Architecture -- Summary -- Chapter 3: Base Platform Security Hardware Building Blocks -- Background and Terminology -- Assets, Threats, and Threat Pyramid -- Inverted Threat Pyramid -- Sample IoT Device Lifecycle -- End-to-End (E2E) Security -- Security Essentials -- Device Identity -- Protected Boot -- Protected Storage -- Trusted Execution Environment (TEE) -- Built-In Security -- Base Platform Security Features Overview -- CPU Hosted Crypto Implementations -- Malware Protection (OS Guard) -- OS Guard (SMEP) -- OS Guard (SMAP) -- Encryption/Decryption Using AES-NI -- Sign/Verify Using Intel® SHA Extensions -- Intel® Data Protection Technology with Secure Key (DRNG) -- Converged Security and Manageability Engine (CSME) -- Secure/Verified, Measured Boot and Boot Guard -- Trusted Execution Technology (TXT) -- Platform Trust Technology (PTT) -- Enhanced Privacy ID (EPID) -- Memory Encryption Technologies -- TME -- MKTME -- Dynamic Application Loader (DAL) -- Software Guard Extensions (SGX) - IA CPU Instructions -- Identity Crisis -- Enhanced Privacy Identifier (EPID) -- Anonymity -- PTT/TPM -- Device Boot Integrity - Trust But Verify. , Secure Boot Mechanisms -- Secure Boot Terminology Overview -- Overview of BIOS/UEFI Secure Boot Using Boot Guard Version 1.0 (BtG) -- Data Protection - Securing Keys, Data at Rest and in Transit -- Intel Platform Trust Technology (PTT) -- Windows PTT Architecture -- Linux PTT Software Stack -- Runtime Protection - Ever Vigilant -- Intel Virtualization Technology (Intel VT) -- Software Guard Extensions (SGX) -- Intel CSE/CSME - DAL -- Isolation from Rich Execution Environment -- Authenticity and Security -- Portability -- Intel Trusted Execution Technology (TXT) -- Threats Mitigated -- Zero-Day Attacks -- Other Attacks -- Conclusion -- References -- Chapter 4: IoT Software Security Building Blocks -- Understanding the Fundamentals of Our Architectural Model -- Operating Systems -- Threats to Operating Systems -- Zephyr: Real-Time Operating System for Devices -- Zephyr Execution Separation -- Zephyr Memory Separation -- Zephyr Privilege Levels and System Authorization -- Zephyr Programming Error Protections -- Zephyr's Other Security Features -- Zephyr Summary -- Linux Operating Systems -- Pulsar: Wind River Linux -- Ubuntu IoT Core -- Intel® Clear Linux -- Linux Summary -- Hypervisors and Virtualization -- Threats to Hypervisors -- Intel® ACRN -- Real-Time and Power Management Guarantees in ACRN -- ACRN Summary -- Software Separation and Containment -- Containment Security Principles -- Threats to Extended Application Containment -- Containers -- Kata Containers -- Kata Containers Summary -- Trusted Execution Environments -- Software Guard Extensions -- SGX Security Summary -- Android Trusty -- Trusty TEE Security Summary -- Containment Summary -- Network Stack and Security Management -- Intel Data Plane Development Kit -- Security Management -- Secure Device Onboarding -- Platform Integrity -- Network Defense -- Platform Monitoring. , McAfee Embedded Control -- Network Stack and Security Summary -- Device Management -- Mesh Central -- Wind River Helix Device Cloud -- Device Management Summary -- System Firmware and Root-of-Trust Update Service -- Threats to Firmware and RoT Update -- Turtle Creek System Update and Manageability Service -- System Firmware and RoT Summary -- Application-Level Language Frameworks -- JavaScript and Node.js or Sails -- Java and Android -- EdgeX Foundry -- Application-Level Framework Summary -- Message Orchestration -- Message Queuing Telemetry Transport -- OPC Unified Architecture -- Constrained Application Protocol -- Message Orchestration Summary -- Applications -- Summary -- Chapter 5: Connectivity Technologies for IoT -- Ethernet Time-Sensitive Networking -- Legacy Ethernet-Based Connectivity in Industrial Applications -- Key Benefits of TSN -- TSN Standards -- TSN Profiles -- 802.1AS/AS-Rev -- 802.1Qbv -- 802.1Qbu -- 802.1CB -- 802.1Qcc -- 802.1Qci -- 802.1Qch -- 802.1Qcr -- TSN and Security -- OPC-UA Over TSN -- Overview of Wireless Connectivity Technologies -- Considerations for Choosing Wireless Technologies for IoT -- Spectrum -- Range and Capacity -- Network Topology -- Quality of Service -- Network Management -- Security -- Wi-Fi -- Bluetooth -- Zigbee -- NFC -- GPS/GNSS -- Cellular -- 5G Cellular -- Key Standards, Regulatory, and Industry Bodies Involved in 5G -- New Use Cases Enabled by 5G -- Key Technology Enablers for 5G -- LPWAN - Low-Power Wide Area Networks -- LoRa -- Sigfox -- Weightless -- Comparison of Low-Power LTE and Other LPWAN Technologies -- A Case Study - Smart Homes -- Summary -- References -- Chapter 6: IoT Vertical Applications and Associated Security Requirements -- Common Domain Requirements and the Security MVP -- Some Common Threats -- Retail Solutions -- Security Objectives and Requirements -- Threats. , Standards - Regulatory and Industry -- Transportation Solutions14 -- Connected Vehicle Infrastructure -- Security Objectives and Requirements -- Threats -- Mitigations -- Standards - Regulatory and Industry -- Industrial Control System (ICS) and Industrial IoT (IIoT) -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Digital Surveillance System -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Summary -- Appendix: Conclusion -- Economics of Constrained Roots-of-Trust -- IoT Frameworks - Necessary Complexity -- Hardware Security - More Than a Toolbox -- IOT Software - Building Blocks with Glue -- Ethernet TSN - Everybody's Common Choice? -- Security MVP - The Champion Within a Fractured IoT Ecosystem -- The Way Forward -- Index.
    Additional Edition: Print version: Cheruvu, Sunil Demystifying Internet of Things Security Berkeley, CA : Apress L. P.,c2019 ISBN 9781484228951
    Language: English
    Subjects: Computer Science , Economics
    RVK:
    RVK:
    RVK:
    Keywords: Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    New York ; Oxford :Berghahn Books,
    UID:
    almahu_BV048636433
    Format: 1 Online-Ressource (vii, 205 Seiten) : , Diagramme.
    ISBN: 978-1-80073-773-0
    Additional Edition: Erscheint auch als Druck-Ausgabe, Hardcover ISBN 978-1-80073-801-0
    Language: English
    Keywords: Islam ; Fundamentalismus ; Terrorismus ; Radikalismus ; Rechtsradikalismus ; COVID-19 ; Pandemie
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: JSTOR
    URL: Cover
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Author information: Gunaratna, Rohan, 1961-,
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almafu_BV000307408
    Format: VI, 118 S. : Ill., Kt.
    Series Statement: Monographien zur Völkerkunde 9
    Language: German
    Subjects: Ethnology , General works
    RVK:
    RVK:
    RVK:
    Keywords: Museumspädagogik ; Ausstellung ; Ethnologie ; Sammlung ; Ethnologie ; Museumspädagogik ; Museumspädagogik ; Fallstudiensammlung ; Fallstudiensammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    London :IntechOpen,
    UID:
    almahu_9949728667002882
    Format: 1 online resource (396 pages)
    Edition: 1st ed.
    ISBN: 9781803556260
    Additional Edition: Print version: Kumar, Vijay Macrophages London : IntechOpen,c2022
    Language: English
    Keywords: Electronic books. ; Electronic books.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9949517373702882
    Format: 1 online resource (177 pages)
    ISBN: 9781000791266
    Content: Dynamic Resource Allocation in Embedded, High-Performance and Cloud Computing covers dynamic resource allocation heuristics for manycore systems, aiming to provide appropriate guarantees on performance and energy efficiency.
    Additional Edition: Print version: Indrusiak, Leando Soares Dynamic Resource Allocation in Embedded, High-Performance and Cloud Computing Milton : River Publishers,c2016 ISBN 9788793519084
    Language: English
    Keywords: Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9949301335302882
    Format: 1 online resource (156 pages)
    ISBN: 9788132220145
    Series Statement: SpringerBriefs in Environmental Science Ser.
    Note: Intro -- Contents -- About the Authors -- About the Book -- Figures -- Tables -- Annexure Tables -- 1 Problem of Residue Management Due to Rice Wheat Crop Rotation in Punjab -- Abstract -- 1.1 Agricultural Growth in Punjab -- 1.2 Agricultural Residue Burning and Its Management -- 1.3 Main Objectives of the Study -- 1.4 An Overview -- References -- 2 The Extent and Management of Crop Stubble -- Abstract -- 2.1 Introduction -- 2.2 The Produce of Crop Stubble and Its Burning -- 2.2.1 StrawResidue to Grain Ratio -- 2.2.2 Chemical Composition of Rice and Wheat Stubble -- 2.3 Volume of Pollution Caused by Crop Stubble Burning -- 2.4 Effects of Crop Stubble Burning on the Fertility of the Soil -- 2.4.1 International Experience -- 2.5 Health Impacts of Pollution Due to Residue Burning -- 2.6 Management of Crop Stubble -- 2.6.1 In Situ Incorporation -- 2.6.2 Alternative Uses of Crop Stubble -- 2.6.3 Cost of Alternate Uses -- 2.6.4 End Use of Rice Residue in Different Districts of Punjab -- 2.7 Summary of the Chapter -- References -- 3 Valuation of the Health Effects -- Abstract -- 3.1 Introduction -- 3.2 Ambient Air Quality Level in Study Area -- 3.3 Household Survey Design and Data -- 3.4 The Survey Results -- 3.4.1 The Household and Farming Characteristics -- 3.4.2 Management of Stubble Among the Selected Farmers -- 3.4.3 The Effect of Crop Stubble Burning on Human Health -- 3.5 Methodology -- 3.5.1 Theoretical Model -- 3.5.2 Estimation Strategy -- 3.6 The Model Results -- 3.6.1 Welfare Loss -- 3.6.2 Increase in Medical Expenditure -- 3.6.3 Opportunity Cost of Increase in Workdays Lost -- 3.7 Summary of the Chapter -- References -- 4 Alternative Uses of Crop Stubble -- Abstract -- 4.1 Introduction -- 4.2 Disposal Pattern of Paddy Straw -- 4.3 Management of Agricultural Waste for Alternate Uses -- 4.3.1 Use of Rice Residue as Fodder for Animals. , 4.3.2 Use of Crop Residue in Bio Thermal Power Plants -- 4.3.3 Use of Rice Residue as Bedding Material for Cattle -- 4.3.4 Use of Crop Residue for Mushroom Cultivation -- 4.3.5 Use of Rice Residue in Paper Production -- 4.3.6 Use of Rice Residue for Making Bio Gas -- 4.3.7 In Situ -- 4.3.8 Incorporation of Paddy Straw in Soil -- 4.3.9 Production of Bio-oil from Straw and Other Agricultural Wastes -- 4.4 Agricultural Residues for Power Generation -- 4.4.1 Energy Technologies -- 4.4.2 Thermal Combustion -- 4.5 Summary of the Chapter -- References -- 5 Environmental Legislations: India and Punjab -- Abstract -- 5.1 Introduction -- 5.1.1 Ministry of Environment and Forest -- 5.1.2 Clean Technology Division -- 5.1.3 Control of Pollution Division -- 5.2 Various Laws to Control Pollution in India -- 5.2.1 Water Act (Prevention and Control of Pollution Act, 1974) -- 5.2.2 Air Prevention and Control of Pollution Act, 1981 -- 5.2.3 The Environment Protection Act, 1986 -- 5.2.4 The Environment (Protection) Rules, 1986 -- 5.2.5 The National Environment Tribunal Act, 1995 -- 5.2.6 The National Environment Appellate Authority Act, 1997 -- 5.2.7 The Noise Pollution (Regulation and Control) Rules, 2000 -- 5.2.8 Biological Diversity Act, 2002 -- 5.3 Central Pollution Control Board (CPCB) -- 5.3.1 Functions of the Central Board -- 5.3.2 National Ambient Air Monitoring Programme (NAMP) -- 5.3.3 Water Quality Monitoring and Surveillance Programme -- 5.4 Punjab Pollution Control Board (PPCB) -- 5.5 Punjab State Council for Science and Technology -- 5.6 Environment Division -- 5.7 Punjab Energy Development Agency (PEDA) -- 5.8 Punjab Biodiversity Board -- 5.9 Summary of the Chapter -- 6 Policies for Restricting the Agriculture Residue Burning in Punjab -- Abstract -- 6.1 Monitoring and Recording the Levels of Pollution in Punjab. , 6.2 Existing Policies to Control Air Pollution -- 6.2.1 Punjab Pollution Control Board (PPCB) -- 6.2.2 Agriculture Councils -- 6.2.3 Punjab State Council for Science and Technology -- 6.2.4 Department of Agriculture -- 6.2.5 Punjab Energy Development Agency (PEDA) -- 6.2.6 Department of Animal Husbandry -- 6.2.7 Punjab Agricultural University -- 6.2.8 Punjab State Farmers' Commission -- 6.2.9 Department of Rural Development and Panchayats -- 6.2.10 Agriculture Diversification -- 6.2.11 Promotion of Zero Tillage -- 6.2.12 Management of Agricultural Waste -- 6.2.13 Utilization of Straw and Husk -- 6.2.14 Use of Rice Residue as Fodder for Animals -- 6.2.15 Use of Crop Residue in Bio Thermal Power Plants -- 6.2.16 Use of Rice Residue as Bedding Material for Cattle -- 6.2.17 Use of Crop Residue for Mushroom Cultivation -- 6.2.18 Use of Rice Residue in Paper Production -- 6.2.19 Use of Rice Residue for Making Bio Gas -- 6.2.20 Other Measures -- 6.3 Summary of the Chapter -- Reference -- 7 Concluding Remarks and Policy Recommendations -- Abstract -- 7.1 Introduction -- 7.2 Summary of the Findings -- 7.3 Policy Recommendations and Research Needs -- Annexure -- Schedule 1 -- Schedule 2.
    Additional Edition: Print version: Kumar, Parmod Socioeconomic and Environmental Implications of Agricultural Residue Burning New Delhi : Springer (India) Private Limited,c2014
    Language: English
    Keywords: Electronic books. ; Electronic books. ; Electronic books.
    URL: FULL  ((Currently Only Available on Campus))
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (kostenfrei)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    b3kat_BV043569484
    Format: 216 Seiten , 23.4 cm x 15.6 cm
    ISBN: 9783706554190
    Series Statement: Schriften des Centrums für Jüdische Studien Band 26
    Language: German
    Subjects: History
    RVK:
    Keywords: Palästina ; Einwanderung ; Juden ; Österreich ; Geschichte 1920-1945
    Author information: Kumar, Victoria
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    almahu_BV043208288
    Format: 285 Seiten : , 64 Illustrationen, Diagramme ; , 22 cm x 16.5 cm, 500 g.
    ISBN: 978-3-902542-45-8 , 3-902542-45-4
    Language: German
    Subjects: History
    RVK:
    RVK:
    RVK:
    Keywords: Zweiter Weltkrieg ; Kriegsende ; Besetzung ; Nachkriegszeit ; Aufsatzsammlung ; Aufsatzsammlung ; Konferenzschrift ; Aufsatzsammlung
    Author information: Halbrainer, Heimo, 1963-
    Author information: Kumar, Victoria.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almahu_9949544896902882
    Format: 1 online resource (XIII, 319 p.)
    ISBN: 9783110711349 , 9783110766820
    Series Statement: Management, Spirituality and Religion , 1
    Content: Workplace spirituality is an emerging field of study and practice and this book asks the questions: Where have we been in the last ten years as a field and where should we be headed in the next ten years? The editors asked these questions of thought leaders from around the globe, leaders who represent different sectors, faith traditions, worldviews and organizational functions. This volume represents the best of current thinking about the state of the field of workplace spirituality and of what the future holds. There are four themes: (1) management themes such as leadership, ethics, change management, and diversity; (2) workplace spirituality in sectors such as health and wellbeing, policing and creative industries, (3) key issues that are emerging, such as self-spirituality, mindfulness, storytelling and the importance of nature, and (4) cutting edge epistemologies and methodologies including indigenous studies, relational ontology, ethnography, and psychodynamics. These articles were chosen to provoke new thinking, new research, and new practice in the field of workplace spirituality, with the goal of helping the field mature in the next decade.
    Note: Frontmatter -- , Acknowledgements -- , Foreword -- , Contents -- , Introduction -- , 1 The Past, Present and Future of Workplace Spirituality -- , 2 Introduction to Spirituality -- , Themes -- , 3 Leadership and Spirituality -- , 4 Ethics and Spirituality -- , 5 Spirituality and Religion: Influencing the Strategic Management Field of Research -- , 6 Organizational Change and Work Spirituality: Expanding the Moral Circle -- , 7 Organizational Behavior and Workplace Spirituality -- , 8 Spirituality at Work and Human Resource Management -- , 9 Family Business and Work Spirituality and Religion -- , 10 Gender and Diversity: Intersections of Faith, Religion, and Spirituality -- , Sectors -- , 11 Health and Wellbeing in the Context of Workplace Spirituality -- , 12 Workplace Spirituality and Policing -- , 13 Workplace Spirituality and Creative Industries -- , Key Issues -- , 14 (Western) Self-Spirituality: Literature Review, Conceptual Framework and Research Agenda -- , 15 Mindfulness and More: Spiritual Forms of Meditation -- , 16 Storytelling Nature-spirituality: An Autoethnographic Journey of Rediscovery -- , Epistemologies/Methodologies -- , 17 Indigenous Studies with an Integrative Research Approach -- , 18 Relating Differently: Exploring How a Relational Ontology Might Catalyze Transformative and Emancipatory Action- Oriented MSR Research -- , 19 Workplace Spirituality and the Ethnographic Gaze -- , 20 Psychodynamics and the Field of Management, Spirituality and Religion: Deciphering the Unconscious, Mapping the Soul -- , List of Figures -- , List of Tables -- , About the Authors -- , Index -- , MSR Journal , Issued also in print. , Mode of access: Internet via World Wide Web. , In English.
    In: DG Plus DeG Package 2022 Part 1, De Gruyter, 9783110766820
    In: EBOOK PACKAGE Business and Economics 2022 English, De Gruyter, 9783110992823
    In: EBOOK PACKAGE COMPLETE 2022 English, De Gruyter, 9783110993899
    In: EBOOK PACKAGE COMPLETE 2022, De Gruyter, 9783110994810
    In: EBOOK PACKAGE Economics 2022, De Gruyter, 9783110992922
    Additional Edition: ISBN 9783110711400
    Additional Edition: ISBN 9783110711295
    Language: English
    Keywords: Electronic books. ; Electronic books.
    URL: Cover
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages