feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • HPol Brandenburg  (26)
  • Kinemathek
  • 2020-2024  (26)
Type of Medium
Language
Region
Years
Year
Access
  • 1
    UID:
    almahu_9949568766902882
    Format: 1 online resource (310 pages)
    Edition: 1st ed.
    ISBN: 9789819936687
    Series Statement: Springer Tracts in Electrical and Electronics Engineering Series
    Note: Intro -- Preface -- Contents -- Editors and Contributors -- 1 Evolution of Next-Generation Communication Technology -- Introduction -- Existing Cellular Network and Its Challenges -- First Generation -- Second Generation -- Third Generation -- Fourth Generation -- Fifth Generation -- Conventional Cellular Systems-Limitations -- Vision and Mission-5G -- Architecture-5G -- C-Ran -- SBA-Based Core Network -- Next-Generation Network-Applications -- Example of Next-Generation Network Applications -- Conclusion and Future Scope -- References -- 2 Third Industrial Revolution: 5G Wireless Systems, Internet of Things, and Beyond -- Introduction -- IoT and Its Devices -- A 5G and IoT -- 5G and Ubiquitous Computing -- The Internet of Things -- A 5G Network -- History and Present Researches on IoT as Well as 5G -- Requirements of IoT and Shortcomings of Wireless 4G Network -- Needs for IoT that is 5G Enabled -- The Vision of 5G IOT: Industrial and Research Context -- Unification of Technologies -- Enabling Technology Drivers in 5G IoT -- Challenges and Trends of Future of the Research -- Conclusion and Future Scope -- Appendix 1: Wireless Technology Features -- Appendix 2: Information Speed Increment -- Appendix 3: 5G Network Architecture -- Appendix 4: 5G Tower Signals -- References -- 3 Network Architectures and Protocols for Efficient Exploitation of Spectrum Resources in 5G -- Introduction -- Enabler Technologies -- Architecture of 5G -- Multiple-Input Multiple-Output Technology in 5G -- Antenna Array for MIMO in 5G -- Device-to-Device Communication in 5G -- Interference Management for 5G -- Multi-tier 5G Architecture -- Spectrum Sharing with Cognitive Radio in 5G -- Ultra-dense Networks in Multi-radio Access Technology Association in 5G -- UDN Moving Cells with 5G+ Network -- Cloud Technologies for 5G -- Methodology. , The Methodology of the Proposed Scheme -- Spectrum Band -- 5G Base Station -- Energy Module -- Energy Controller -- Challenges and Future Research Directions -- Conclusion -- References -- 4 Wireless Backhaul Optimization Algorithm in 5G Communication -- Introduction -- Network Scenarios and System Assumptions -- Analysis of Delay Jitter Indicators -- Delay Analysis -- Delay Jitter Analysis -- Optimization Model Establishments -- Basic Backhaul Model -- Improved Model 1 -- Improved Model 2 -- Improved Model Solutions -- Improved Model 1 Solution -- Improved Model 2 Solution -- Simulation Analysis -- Conclusions -- References -- 5 Security Attacks and Vulnerability Analysis in Mobile Wireless Networking -- Introduction -- Types of Wireless Mobile Network -- Wireless PAN -- Wireless LAN -- Manet -- Wireless MAN -- Wireless WAN -- Mobile Network -- Gan -- Aerospace Network -- Challenges and Issues in Wireless Mobile Network -- Information Management -- Endless Communication -- Delay Tolerance -- Heterogeneity -- Contextual Awareness -- Buffer Management -- Power Features -- Privacy and Security -- Security Goals of Wireless Mobile Network -- Classification of Security Attacks -- Most Prevalent Attacks in Wireless Systems -- Denial of Service (DoS) Attack -- Flooding Attack -- Jamming -- Intervention -- Sleep Deprivation Attack -- Blackhole Attack -- Rushing Attack -- Sybil Attack -- Sinkhole Attack -- Gray Hole Attack -- Byzantine Attack -- Jellyfish Attack -- Wormhole Attack -- Eavesdropping -- Disclosure of Information Attack -- Man-In-The-Middle Attack -- Replay Attack -- ACK Attack -- Spoofing Attack -- Link Spoofing Attack -- Spear-Phishing Attack -- Repudiation Attack -- Infected Code Injection -- Colluding Mis-Relay Attack -- Selective-Forwarding Attack -- Database Hack Attack -- Conclusion -- References. , 6 Utilities of 5G Communication Technologies for Promoting Advancement in Agriculture 4.0: Recent Trends, Research Issues and Review of Literature -- Introduction -- Challenges Faced by Existing Network Technologies -- Motivation of the Work -- Existing Problems and Contribution -- Scope of 5G-Enabled Networks in AgriIoT -- Energy Consumption Management Methods in 5G Networks -- Application Areas of 5G in Smart Farming -- Data Aggregation -- Predictive Analytics -- Drone Operations -- Animal Tracking and Real-Time Monitoring -- Autonomous Agriculture Vehicles -- Weather Stations -- 5G Enabled Components in Agriculture -- Drones and Unmanned Aerial Vehicles (UAVs) -- Virtual Consultation and Predictive Maintenance -- Augmented and Virtual Reality -- Agriculture Robots -- Cloud-Based Data Analytics -- Recent Development Scenarios in 5G-Based Agriculture -- Conclusion and Future Work -- References -- 7 Security Attacks and Countermeasures in 5G Enabled Internet of Things -- Introduction -- Overview of 5G -- Overview of IoT -- 5G Enabled IoT -- 5G Enabled IoT Architecture -- L1 Physical Device Layer -- L2 Communication Layer -- L3 Fog Computing Layer -- L4 Data Storage Layer -- L5 Management Service Layer -- L6 Application Layer -- L7 Process and Collaboration Layer -- L8 Security Layer -- Technologies in 5G Enabled IoT -- Threat Analysis in 5G IoT -- Eavesdropping -- Contaminating -- Spoofing -- Jamming -- Physical Layer Security -- Trust Mechanism in WSN -- Crowdsourcing Analysis -- Attacks at the Architecture Level -- Current Research for 5G and IoT -- Future Research Directions and Challenges -- Characteristics Synthesis -- Signal Revoking -- Location Awareness -- Technical Challenges -- Wireless Software Defined Network -- Security Assurance and Privacy Analysis -- Standardization Issues -- Conclusion -- References. , 8 Energy Efficiency and Scalability of 5G Networks for IoT in Mobile Wireless Sensor Networks -- Introduction -- Energy Efficiency in Mobile Wireless Sensor Networks -- Basic Concept of 5G Technology -- Evolution of 5G -- Frequency Band of 5G System -- 5G Innovative Technologies -- IoT Services Based on 5G -- IoT Industry Supported by 5G Technology -- Industry 4.0 -- Palpable Internet -- Security of IoT in 5G System -- Conclusion -- References -- 9 Security Services for Wireless 5G Internet of Things (IoT) Systems -- Introduction -- Inspiration and Ideas for 5G Based on IoT -- Structure of IoT in Cooperation with 5G -- Sensor Layer -- Network Layer -- Communication Layer -- Architecture Layer -- Application Layer -- Current Resolutions for Communication for IoT in 5G -- Bluetooth Low Energy (BLE) -- SigFox -- IEEE 802.15.4 -- LoRa -- Wi-Fi -- ZigBee -- NarrowBand IoT -- Challenges and Security Vulnerabilities -- Confidentiality and Safety -- Energy Efficacy -- Future Research Directions -- Structure of Network Based on Big Data -- 5G New Radio (NR): A New Wave-Form Design Consideration -- Energy Efficacy -- Interchange Between Communication, Gathering, and Computing -- Design of Synchronized Multi-Band, and High-Power Effective Amplifier -- Conclusion -- References -- 10 Securing the IoT-Based Wireless Sensor Networks in 5G and Beyond -- Introduction -- Literature Survey -- IoT-Based Wireless Networks -- Different Types of Attacks -- Perception Layer -- Abstraction Layer -- Network Layer -- Computing Layer -- Operation Layer -- Application Layer -- Importance of 5G -- Background -- Mathematical Explanation for Euclidean Distance -- Proposed Work -- Assumptions -- Creating Trial Data Sets -- Transmitting the Messages -- Analysis of the Proposal -- Security -- Conclusion -- References. , 11 5G and Internet of Things-Integration Trends, Opportunities, and Future Research Avenues -- Introduction -- Overview of 5G -- Evolution of 5G -- Characteristics and Requirements of 5G Ecosystem -- 5G Architecture -- An Insight into IoT -- Characteristics of IoT -- Layered Architecture of IoT -- Requirements for 5G Integrated IoT Architecture -- Edge Layer of 5G IoT -- Network Layer of 5G IoT -- Application Layer of 5G IoT -- Blockchain-Based 5G IoT -- 5G IoT with Artificial Intelligence -- Opportunities of 5G Integrated IoT -- Technological Advancement -- Smart Cities -- Business -- Aerial and Satellite Research -- Mitigating Pandemic Situation -- Industrial Usage with Other Technologies -- Video Surveillance -- Challenges of 5G Integrated IoT -- General Challenges -- Heterogeneity of 5G and IoT Data -- Blockchain Integrating 5G IoT Issues -- 5G mm-Wave Issues -- Threat Protection of 5G IoT -- Conclusion -- References -- 12 Post-Quantum Cryptographic Schemes for Security Enhancement in 5G and B5G (Beyond 5G) Cellular Networks -- Introduction -- Emerging Cellular Networks -- 5G Overview -- Evolution of 6G/B5G Overview -- State-Of-The-Art -- Taxonomy of 6G/B5G Wireless Systems -- Security Services in 6G/B5G Wireless Networks -- Data Security Techniques for 5G Heterogeneous Networks -- Visual Secret Sharing -- Steganography -- Cryptographic Algorithms -- Key Management -- Overview and Fundamentals of Quantum Computing -- Architecture of Classical Computing Versus Quantum Computing -- Mathematical Representation for Quantum Computing -- The Impact of Quantum Computing on Modern Cryptography -- Quantum Algorithms Affecting Cryptosystems -- Post-Quantum Cryptography -- Mathematical View -- Post-Quantum Analysis -- Conclusion -- References -- 13 Enhanced Energy Efficiency and Scalability in Cellular Networks for Massive IoT -- Introduction. , Literature Review.
    Additional Edition: Print version: Bhushan, Bharat 5G and Beyond Singapore : Springer,c2023 ISBN 9789819936670
    Language: English
    Keywords: Electronic books. ; Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    London :IntechOpen,
    UID:
    almahu_9949728667002882
    Format: 1 online resource (396 pages)
    Edition: 1st ed.
    ISBN: 9781803556260
    Additional Edition: Print version: Kumar, Vijay Macrophages London : IntechOpen,c2022
    Language: English
    Keywords: Electronic books. ; Electronic books.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9949692693102882
    Format: 1 online resource (342 pages)
    Edition: 1st ed.
    ISBN: 9789819944132
    Series Statement: India Studies in Business and Economics Series
    Additional Edition: Print version: Dev, S. Mahendra Achieving Zero Hunger in India Singapore : Springer,c2023 ISBN 9789819944125
    Language: English
    Keywords: Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9949568770802882
    Format: 1 online resource (576 pages)
    Edition: 1st ed.
    ISBN: 9789464632224
    Series Statement: Atlantis Highlights in Intelligent Systems Series ; v.9
    Note: Intro -- Preface -- Organization -- Contents -- Peer-Review Statements -- 1 Review Procedure -- 2 Quality Criteria -- 3 Key Metrics -- Digital Economy Enabling High-Quality Manufacturing Development: Evidence from Chinese Provincial Data -- 1 Introduction -- 2 Theoretical Mechanism and Research Hypothesis -- 2.1 Digital Economy Enables the Direct Mechanism of Action of High-Quality Manufacturing Development -- 2.2 Digital Economy, Innovation Effect and High-Quality Development of Manufacturing -- 2.3 Digital Economy, Efficient Resource Allocation and High-Quality Development of Manufacturing -- 3 Study Design -- 3.1 Model Building -- 3.2 Variable Selection and Data Sources -- 4 Empirical Analysis -- 4.1 Baseline Regression Analysis -- 4.2 Endogeneity Analysis -- 4.3 Subregional Inspection -- 4.4 Mechanism of Action Analysis -- 5 Conclusions -- References -- The Lexicon Construction and Quantitative Research of Digital Economy Policy Texts -- 1 Introduction -- 2 Research Status -- 3 Lexicon Construction of Digital Economic Policy -- 3.1 Data Sources -- 3.2 Neologism Discovery -- 3.3 Comparison of Segmentation Effect -- 4 Classification of Policy Text -- 4.1 Experimental Data -- 4.2 Model and Parameter -- 4.3 Experimental Result -- 5 Analysis of Policy Hotspots -- 5.1 Policy Keywords -- 5.2 Policy Topics -- 6 Conclusion -- References -- Measurement and Evaluation of Provincial Digital Economy Development Efficiency -- 1 Introduction -- 2 Provincial Digital Economy Development Level Measurement -- 2.1 Construction of Indicator System -- 2.2 Data Sources -- 2.3 Analysis of Results -- 3 Analysis of Provincial Digital Economy Output Efficiency -- 3.1 Research Models -- 3.2 Empirical Results and Analysis -- 4 Conclusions and Recommendations -- 4.1 Conclusions -- 4.2 Research Recommendations -- References. , How Digital Transformation of Enterprises Can Improve Labor Productivity: Evidence from Chinese-Listed Companies -- 1 Introduction -- 2 Literature Review and Hypothesis -- 3 Models and Data -- 3.1 Models -- 3.2 Data -- 4 Results and Discussion -- 4.1 Digital Transformation and Labor Productivity -- 4.2 Intermediate Mechanism: Capital Intensity (CI) and Innovation Input (R& -- D) -- 4.3 Heterogeneity Analysis -- 5 Conclusions -- References -- Design of Adaptive Defense System for Marketing Information Management Based on Blockchain Technology -- 1 Introduction -- 2 Application of Blockchain Technology in Marketing Information Management Adaptive Defense System -- 2.1 Blockchain Basics -- 2.2 Blockchain-Related Technologies -- 2.3 Scenarios of Blockchain Technology Application -- 3 Network Security Adaptive Defense Technology -- 3.1 Intrusion Detection -- 3.2 Intrusion Prevention -- 4 Design of Adaptive Defense System for Marketing Information Management -- 4.1 System Architecture -- 4.2 System Function Module -- 5 System Testing -- 5.1 Set up the Network Environment -- 5.2 Verify the Performance Improvement Effect -- 6 Conclusion -- References -- Comparative Study of LSTM and Transformer for A-Share Stock Price Prediction -- 1 Introduction -- 2 Related Work -- 2.1 Stock Price in China -- 2.2 Deep Learning in Stock Prediction -- 3 Methodology -- 3.1 LSTM -- 3.2 Transformer -- 3.3 Evaluation Metrics -- 4 Experiments -- 4.1 Data Selection -- 4.2 Data Pre-processing -- 5 Experiment Result -- 6 Conclusions -- References -- Can Digital Inclusive Finance Improve Business Export Resilience? -- 1 Introduction -- 2 Theoretical Analysis and Hypotheses -- 3 Study Design -- 3.1 Sample Selection and Data Sources -- 3.2 Variable Setting -- 3.3 Model Construction -- 4 Analysis of Empirical Results -- 4.1 Descriptive Statistics -- 4.2 Correlation Analysis. , 4.3 Analysis of Regression Results -- 4.4 Analysis of the Mechanism of Action -- 4.5 Heterogeneity Analysis -- 5 Robustness Test -- 5.1 Substitution of Explanatory Variables -- 5.2 Change in Estimation Method and Sample Scope -- 5.3 Instrumental Variable Method -- 6 Research Findings and Insights -- References -- Research on Active Firefighting Robot Navigation Based on the Improved AUKF Algorithm -- 1 Introduction -- 2 Multi-source Fusion Localization Method Based on Improved AUKF Algorithm -- 3 Experimental Analysis -- 4 Conclusion -- References -- Analysis and Research on Big Data Storage Technology Based on Machine Learning -- 1 Introduction -- 2 Neural Network Overview -- 3 The Basic Principles and Models of Artificial Neural Networks -- 3.1 The Basic Principle of Neural Network Composition -- 3.2 Structure of Neural Networks -- 4 BP Algorithm -- 4.1 Mathematical Description of BP Algorithm -- 4.2 Shortcomings of BP Algorithm -- 5 Improved Modeling of Neural Network BP Algorithm Using Genetic Algorithm (GA) -- 6 Design of the System -- 6.1 System Composition -- 7 Conclusions -- References -- k-Surrounding Neighbors: Incorporating Serendipity in Collaborative Recommendations -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Evaluation on the MovieLens Dataset -- 4.1 Prediction Accuracy -- 4.2 Intra-list Diversity -- 4.3 Novelty -- 5 Conclusion -- References -- Data Generation and Latent Space Based Feature Transfer Using ED-VAEGAN, an Improved Encoder and Decoder Loss VAEGAN Network -- 1 Introduction -- 2 Methods -- 2.1 VAE'S Reparameterization Trick -- 2.2 Training Theory of GANs -- 2.3 Loss Functions VAE -- 2.4 Loss Functions DCGAN -- 2.5 Loss Functions ED-VAEGAN -- 2.6 Loss Functions f-w VAEGAN -- 2.7 Loss Functions p-w VAEGAN -- 2.8 Latent Space Continuity Quality -- 3 Experiments -- 4 Results and Discussions -- 5 Conclusion. , References -- Digital Investment Risk Evaluation Model of Power Grid Enterprises Based on FAHP-AOA-LSSVM -- 1 Introduction -- 2 Fuzzy Analytic Hierarchy Process -- 2.1 Establish Judgment Matrix -- 2.2 Determine the Membership Function -- 2.3 Single-Factor Evaluation -- 2.4 Determine the Weight Vector -- 2.5 Consistency Test -- 3 AOA's Improved Risk Evaluation Model of LSSVM -- 3.1 Principle of LSSVM Evaluation -- 3.2 AOA Search for Optimal Solutions of LSSVM Parameters -- 4 Construction of Risk Evaluation Index System for Power Grid Digital Investment -- 4.1 Questionnaire Design and Data Sources -- 4.2 Expert Evaluation -- 5 Example Analysis -- 5.1 Determining the Evaluation Value of the Project -- 5.2 Parameter Setting -- 5.3 Analysis of Results -- 6 Conclusion -- References -- Research on Machine Learning Driven Stock Selection Strategy -- 1 Introduction -- 2 Methodology -- 2.1 Research Scheme -- 2.2 Data -- 3 Empirical Analysis -- 3.1 Single Machine Learning Algorithm Performance -- 3.2 Integrated Machine Learning Algorithm Performance -- 4 Important Anomalies of Chinese Stock Market -- 5 Discussion and Conclusion -- 5.1 Discussion -- 5.2 Conclusion -- References -- An Identification Method for High Voltage Power Grid Insulator Based on Mobilenet-SSD Network -- 1 Introduction -- 2 Target Detection Network of Lightweight Mobilenet-SSD -- 2.1 Multi-scale Feature Fusion Target Detection Network -- 2.2 Light Weight Backbone Feature Extraction Network -- 2.3 Fused Network of MobileNet and SSD -- 3 Sample Analysis -- 4 Conclusion -- References -- Insights into the Correlation Between Digital Marketing Effectiveness and the 5A Crowd Assets Model -- 1 Introduction -- 2 Digital Marketing Theory and the Landing of Contemporary e-commerce Data Platforms -- 2.1 Digital Marketing and Consumer Operations. , 2.2 Crowd Assets Model from Traditional to Digital Marketing -- 2.3 Upgrade of Crowd Assets Model-- 5A -- 3 Study Design -- 3.1 Research Background -- 3.2 Correlation Analysis of Seeding with A3 -- 3.3 Correlation Analysis Between A3 and GMV (Gross Merchandise Volume) -- 3.4 K-means Clustering Algorithm -- 4 Research Conclusions and Values -- References -- A Credit Card Default Prediction Method Based on CatBoost -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Experiment -- 4.1 Feature Engineering -- 4.2 Training Parameters -- 4.3 Evaluation Metrics -- 4.4 Evaluation Results -- 5 Conclusion -- References -- Prediction of Shanghai Composite Index Based on Macroeconomic Indicators and Artificial Intelligence Method -- 1 Introduction -- 2 Macro-economy and Stock Market Forecast -- 2.1 Macro-economy -- 2.2 Stock Market Forecast -- 3 Neural Network and Support Vector Machine Research -- 3.1 Introduction to Neural Networks -- 3.2 Learning of Neural Networks -- 3.3 Support Vector Machine -- 4 An Empirical Study of Machine Learning Methods in SSE Index Forecasting -- 4.1 Introduction to the Empirical Environment -- 4.2 SSE Index Prediction Based on BP Neural Network -- 4.3 SSE Index Prediction Based on Support Vector Machine -- 5 Conclusion -- References -- Research on the Development Level of Digital Economy Based on Fuzzy Comprehensive Evaluation -- 1 Introduction -- 2 Fuzzy Comprehensive Evaluation of Digital Economy Development in Anhui Province -- 2.1 Indicator System Determination and Weight Calculation -- 2.2 Fuzzy Comprehensive Evaluation -- 2.3 Chapter Summary -- 3 Conclusions -- References -- Factors Influencing Customer Addictive Purchase Behaviours of Toy Blind Boxes -- 1 Introduction -- 2 Research Methods -- 3 Research Design -- 4 Analysis -- 4.1 Qualitative Analysis -- 4.2 Further Analysis -- 5 Discussions -- 6 Conclusion. , References.
    Additional Edition: Print version: Hemachandran, K. Proceedings of the 2023 2nd International Conference on Artificial Intelligence, Internet and Digital Economy (ICAID 2023) Dordrecht : Atlantis Press (Zeger Karssen),c2023 ISBN 9789464632217
    Language: English
    Keywords: Electronic books. ; Electronic books. ; Electronic books ; Electronic books
    URL: FULL  ((OIS Credentials Required))
    URL: FULL  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9949301296502882
    Format: 1 online resource (1965 pages)
    ISBN: 9789811513466
    Note: Intro -- Preface -- Contents -- List of Videos -- Chapter Contributors and Video Contributors -- Contributors -- Video Contributors -- About the Editors -- Part I: Introduction -- 1: Oral and Maxillofacial Surgery in India: How Did We Get Here and Where Are We Going? -- 1.1 History of Our Missions and Our Challenges -- 1.2 Expertise, Familiarity, and Competence -- 1.3 Predicting the Future -- References -- Part II: Preoperative Assessment and Patient Preparation/Optimization -- 2: Preoperative Evaluation and Investigations for Maxillofacial Surgery -- 2.1 Introduction -- 2.2 Preoperative Evaluation -- 2.3 Laboratory Investigations -- 2.4 Preanesthetic Evaluation -- 2.5 Aspects of Evaluation Unique to Anesthesia -- 2.6 Assessment of the Pediatric Patient -- 2.7 Assessment of the Elderly Patient -- 2.8 Specialist Consultation and Work-up -- 2.9 The Process of Risk Assessment -- 2.10 Risk Reduction Strategies -- 2.10.1 Premedication [4] -- 2.10.2 Fasting Guidelines -- 2.10.3 Perioperative Beta-Blocker Therapy -- 2.10.4 PONV Prophylaxis [47] -- 2.10.5 Plan for Postoperative Analgesia [51] -- 2.11 Preoperative Decision Making and Obtaining Informed Consent: The Team Concept [53] -- 2.12 Conclusion -- References -- 3: Management of Medical Comorbidities in Maxillofacial Surgery -- 3.1 Introduction -- 3.2 Changing Demographics in India -- 3.3 Lifestyle Changes in India -- 3.4 The Changing Face of Oral and Maxillofacial Surgery -- 3.4.1 Medical History and India -- 3.5 Cardiovascular System -- 3.5.1 Hypertension -- 3.5.1.1 Minor Oral Surgery -- 3.5.1.2 Major Maxillofacial Surgery -- 3.5.1.3 Vasoconstrictors and Hypertension -- 3.5.2 Ischemic Heart Disease (IHD) -- 3.5.2.1 Minor Oral Surgery -- 3.5.2.2 Major Surgery -- 3.5.3 Postintervention Cardiac Patients. , 3.5.3.1 Percutaneous Coronary Angioplasty (PTCA) and Coronary Artery Bypass Graft (CABG) and Valve Replacement Procedures -- 3.5.4 Conventional Antiplatelets, Anticoagulants, and Novel Oral Anticoagulants (NOAC) -- 3.5.4.1 Minor Dentoalveolar Surgery: Antiplatelets -- 3.5.4.2 Maxillofacial Surgery -- 3.5.4.3 Bridging with Heparin -- 3.5.4.4 Anticoagulants and Oral/Maxillofacial Surgery -- 3.5.4.5 Minor Oral Surgery -- 3.5.4.6 Major Maxillofacial Surgery -- 3.5.5 Infective Endocarditis Prophylaxis -- 3.5.6 Implantable Cardioverter Defibrillators (ICD) -- 3.5.6.1 Implications -- 3.6 Impact of Central Nervous System Disorders in Maxillofacial Surgery -- 3.6.1 Epilepsy -- 3.6.1.1 Basic considerations -- 3.6.1.2 Outpatient maxillofacial considerations -- 3.6.1.3 Major Surgical Considerations -- 3.6.1.4 Precautions, complications, & -- management -- 3.6.1.5 Management of an acute episode on the dental chair -- 3.6.2 Stroke -- 3.6.2.1 Basic Considerations -- 3.6.2.2 Maxillofacial considerations -- 3.6.2.3 Precautions -- 3.7 Impact of Psychiatric Disorders in Maxillofacial Surgery -- 3.7.1 Maxillofacial Considerations -- 3.8 Dental and Maxillofacial Implications in Liver Disease -- 3.8.1 Introduction -- 3.8.1.1 The Function of the Liver [36] -- 3.8.2 Classification of Liver Dysfunctions [35] -- 3.8.2.1 Viral Hepatitis -- 3.8.2.2 Autoimmune Hepatitis -- 3.8.2.3 Fulminant Hepatitis -- 3.8.2.4 Cirrhosis -- 3.8.2.5 Hepatocellular Carcinoma -- 3.8.2.6 Alcoholic Liver Disease -- 3.8.3 Oral Manifestations of Liver Disease -- 3.8.4 Implications of Liver Disease -- 3.8.4.1 Liver Disease and Maxillofacial Surgery -- 3.9 Maxillofacial Implications in GI Disorders -- 3.9.1 Perioperative Maxillofacial Implications -- 3.9.1.1 GERD -- 3.9.1.2 Peptic Ulcers -- 3.9.1.3 Ulcerative Colitis -- 3.10 Pregnancy -- 3.10.1 Physiologic Changes. , 3.10.2 Treatment Protocol -- 3.10.2.1 Minor Surgery -- 3.10.2.2 Dental Radiology -- 3.10.2.3 Major Surgery -- 3.10.3 Drug Usage in Pregnancy -- 3.11 Endocrine Disorders -- 3.11.1 Diabetes -- 3.11.1.1 Management of Patients Undergoing Procedures -- 3.11.1.2 Preoperative Glycemic Control in patients on Oral Hypoglycemic Agents -- 3.11.1.2.1 Minor surgery -- 3.11.1.2.2 Major surgery -- 3.11.1.3 Preoperative Glycemic Control in Type 2 Diabetics on Insulin -- 3.11.1.4 Preoperative Glycemic Control in Type 1 Diabetics on Insulin -- 3.11.1.4.1 Minor surgery: -- 3.11.1.4.2 Major surgery: -- 3.11.1.4.3 Intraoperative glycemic control: -- 3.11.1.4.4 Postoperative glycemic control: -- 3.11.2 Hypo/Hyperthyroidism -- 3.11.2.1 Hypothyroidism -- 3.11.2.1.1 Physiologic Challenges -- 3.11.2.1.2 Management -- 3.11.2.2 Hyperthyroidism -- 3.11.3 Adrenal Gland Disorders -- 3.11.3.1 Primary Adrenocortical Hypofunction -- 3.11.3.2 Secondary Adrenocortical Insufficiency -- 3.11.4 Renal Disorders -- 3.11.4.1 Acute Renal Failure (ARF) -- 3.11.4.2 Chronic Renal Failure (CRF) -- 3.12 Patients with Non-head and Neck Malignancies -- 3.12.1 Introduction -- 3.12.2 Treatment Protocol -- 3.12.2.1 Chemotherapy -- 3.12.2.2 Radiotherapy -- 3.12.3 Prevention and Treatment of Osteonecrosis After Chemotherapy and Radiation -- References -- 4: Medical Emergencies in Oral and Maxillofacial Surgical Practice -- 4.1 Introduction -- 4.2 Acute Asthmatic Attack -- 4.2.1 Life-Threatening Acute Asthma -- 4.3 Acute Adrenal Insufficiency/Adrenal Crisis/Steroid Crisis/Addisonian Crisis -- 4.4 Airway Obstruction -- 4.5 Anaphylaxis -- 4.6 Chest Pain -- 4.6.1 Angina -- 4.6.2 Myocardial Infarction (Heart Attack) -- 4.7 Cardiac Arrest -- 4.8 Hypoglycemia -- 4.9 Grand Mal Seizures -- 4.10 Syncope -- 4.11 Other Causes of Loss of Consciousness -- 4.12 Conclusion -- References. , Part III: Anesthesia for Oral and Maxillofacial Surgery -- 5: Local Anesthesia in Oral and Maxillofacial Surgery -- 5.1 Introduction -- 5.1.1 Historical Background -- 5.1.2 Definition -- 5.1.3 Ideal Characteristic of Local Anesthesia -- 5.2 Classification (Tables 5.1 and 5.2) -- 5.3 Local Anesthetic Agents -- 5.3.1 Lidocaine (Lignocaine) -- 5.3.2 Bupivacaine -- 5.3.3 Articaine -- 5.4 Vasoconstrictors -- 5.4.1 Dilution of Vasoconstrictor -- 5.5 Causes of Failure of LA -- 5.6 LA Toxicity and Antidote for Toxicity -- 5.6.1 Reversal of Cardiomyotoxicity -- 5.7 Reversal of Soft-Tissue Anesthesia -- 5.8 Plain Local Anesthetic (Without Epinephrine) -- 5.9 Topical Local Anesthetic Agent -- 5.10 Surface Anesthesia -- 5.11 Methods of Local Anesthetic Administration -- 5.11.1 Percentage of Blood Vessel Penetration During IANB -- 5.11.2 Controversy in the Use of Bilateral IANB and Lingual Nerve Block [17] -- 5.12 Techniques -- 5.12.1 Inferior Alveolar Nerve Block (Also Known as Mandibular Nerve Block) [Along with Lingual & -- Long Buccal Nerve Blocks] -- 5.12.2 Technique -- 5.12.3 Areas Anesthetized by This Block -- 5.12.4 Signs and Symptoms of Anesthesia -- 5.12.5 Complications (Table 5.6) -- 5.12.5.1 Failure to Obtain Anesthesia -- 5.12.5.2 Hematoma Formation -- 5.12.5.3 Transient Facial Nerve Palsy -- 5.12.5.4 Trismus -- 5.12.5.5 Accidental Breakage of the Needle -- 5.13 Vazirani-Akinosi (VA) Versus Inferior Alveolar Nerve Block -- 5.13.1 Indications for VA [24] -- 5.13.2 Akinosi-Vazirani Technique (Closed-Mouth Technique) -- 5.13.3 Technique -- 5.14 Mental/Incisive Nerve Block -- 5.14.1 Technique -- 5.14.2 Areas Anesthetized -- 5.14.3 Signs and Symptoms -- 5.15 Nerve Blocks in the Maxilla -- 5.15.1 Posterior Superior Alveolar Nerve Block Technique -- 5.15.1.1 Areas Anesthetized -- 5.15.1.2 Signs and Symptoms. , 5.15.2 Infraorbital Nerve Block [Also Anterior and Middle Superior Nerve Blocks] -- 5.15.2.1 Technique -- 5.15.2.2 Areas Anesthetized -- 5.15.2.3 Signs and Symptoms of Anesthesia -- 5.15.3 Palatal Anesthesia -- 5.15.3.1 Greater Palatine Nerve Block -- 5.15.3.2 Nasopalatine Nerve Block -- 5.16 Regional Blocks in Oral and Maxillofacial Surgery -- 5.16.1 Maxillary Nerve Block -- 5.16.2 Mandibular Nerve Block -- 5.16.3 Greater Auricular Nerve Block -- 5.16.4 Glossopharyngeal Nerve Block -- 5.16.5 Sphenopalatine Ganglion Block -- 5.17 Recent Advances in Local Anesthesia -- 5.17.1 Vibrotactile Devices -- 5.17.1.1 Vibraject [38] -- 5.17.1.2 Dental Vibe [39] -- 5.17.1.3 Accupal -- 5.17.2 C-CLAD (Computer-Controlled Local Anesthetic Delivery) -- 5.17.3 Compu-Flo -- 5.17.4 STA-single tooth anesthesia -- 5.17.5 Jet Injection -- 5.17.6 MED-JET H III -- 5.17.7 Safety Dental Syringes [43] -- 5.17.8 Devices for Intraosseous Anesthesia [44] -- 5.18 Conclusion -- References -- 6: Office-Based Anesthesia in Oral and Maxillofacial Surgery-The American Model and Training -- 6.1 Introduction -- 6.2 Brief History of Anesthesia in OMS -- 6.3 The Anesthesia Team -- 6.4 AAOMS Office Anesthesia Guidelines -- 6.5 Office Requirements -- 6.6 Record Keeping -- 6.7 Office Anesthesia Evaluation Program and Parameters of Care -- 6.8 AAOMS National Simulation Program -- 6.9 Dental Anesthesia Assistant National Certification Examination (DAANCE) -- 6.10 Anesthesia Training during OMS Residency -- 6.11 Preanesthetic Evaluation of the Patient -- 6.12 Monitoring -- 6.12.1 Methods for Monitoring Ventilation -- 6.13 Airway Armamentarium -- 6.14 Oxygen and Supplemental Gas Delivery System -- 6.15 Suction Equipment -- 6.16 Recovery Room -- 6.17 Techniques in Anesthesia -- 6.17.1 Enteral Anesthesia. , 6.17.2 Parenteral Anesthesia: Intravenous Anesthesia and Inhalational Anesthesia.
    Additional Edition: Print version: Bonanthaya, Krishnamurthy Oral and Maxillofacial Surgery for the Clinician Singapore : Springer Singapore Pte. Limited,c2021 ISBN 9789811513459
    Language: English
    Keywords: Electronic books. ; Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    gbv_1851408738
    Format: 1 online resource (183 pages)
    ISBN: 9781000397444
    Series Statement: Routledge Explorations in Energy Studies
    Note: Description based on publisher supplied metadata and other sources
    Additional Edition: ISBN 9780367486440
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9780367486440
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9949517301302882
    Format: 1 online resource (308 pages)
    Edition: 1st ed.
    ISBN: 9781839687587
    Additional Edition: Print version: Samanta, Ashis Kumar Chemistry and Technology of Natural and Synthetic Dyes and Pigments London : IntechOpen,c2020
    Language: English
    Keywords: Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    gbv_1896435122
    Format: 1 online resource (341 pages)
    Edition: 1st ed.
    ISBN: 9781000995435
    Series Statement: Routledge Research in International and Comparative Education Series
    Content: Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- List of Figures -- List of Tables -- Acknowledgments -- About the Editors -- About the Contributors -- Part I: Violence Responses through Relational and Mindful Education -- Chapter 1: Introduction -- Introduction -- Overview of Chapters -- References -- Chapter 2: Imagining Relational Ontologies for Education amidst Ricocheting (non)Violence: Notes from Vancouver, Canada -- Conceptualizing Education and Pedagogy alongside a Relational Ontological Imagination -- Autoethnographic Reflection for Imaginative Practice -- Resultant Considerations -- Conclusion -- Notes -- References -- Appendix -- Chapter 3: Embodied Universal Peace: Curriculum Theory and Buddhist Intersubjective Contemplative Inquiry -- Methodology: Curriculum Theory and Buddhist Intersubjective Contemplative Inquiry -- Intrascape -- Intrascape to Interscape -- Intrascape Reconsidered -- Intrascape-Interscape Expanded -- Interscape -- Intrascape-Interscape Redux -- Interscape Expanded -- Conclusion -- Note -- References -- Appendix -- Part II: Cross-Cultural Education Countering Violence -- Chapter 4: Creating an Intercultural Peace Education Course Online with Devised Theatre for High-Ability Teenagers of Different Backgrounds and World Regions -- Teenagers with High Ability -- The Summer Academic Enrichment Camp -- Intercultural Education -- Devised Theatre -- Conceptual Understandings of an Online Culture of Peace using Devised Theatre -- Building Cultures of Peace with Students with HA through Devised Theatre -- Pedagogical Considerations Relevant for Instructors and Curriculum Developers -- The Course as Process and Product -- Course Goals and Learning Outcomes -- Specific Peace Education Standards for Students -- Using Devised Theatre Techniques in an Online Classroom.
    Note: Description based on publisher supplied metadata and other sources
    Additional Edition: ISBN 9781032468259
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781032468259
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    kobvindex_HPB1425555685
    Format: 1 online resource (296 p.).
    ISBN: 3839464153 , 9783839464151
    Series Statement: Public History - Angewandte Geschichte ; 19
    Content: Die Erinnerung an den Nationalsozialismus und den Holocaust ist in stetiger Transformation begriffen. Dieser Wandel gewinnt ebenso an Bedeutung wie die Entwicklung der digitalen Holocaust Education. Dies zeigt sich nicht zuletzt an immer neuen digitalen Vermittlungsangeboten und georeferenzierten Webapplikationen, in denen Erinnerungsorte auf digitalen Landkarten markiert und im Sinne des Deep Mappings mit weiterführenden Informationen versehen werden. Die Beiträger*innen diskutieren diese Entwicklungen kritisch und stellen die unterschiedlichen Aspekte von digitalen georeferenzierten Dokumentations-, Erinnerungs- und Vermittlungsprojekten vor.
    Note: Frontmatter -- , Inhalt -- , Digital Memory -- Digital History -- Digital Mapping -- , Raum, Vergangenheits(re-)konstruktion, digitale Technologien und Authentizitätserwartungen -- , Überlegungen zu einer kritischen Kartographie traumatischer Orte des Holocaust -- , The AesthEt(h)ics of the Fragment -- , What's in a Name? From People to Data and Back -- , On Fragments: of Life and Death -- , Digitale Lerntools auf Basis von Zeitzeug:innen-Interviews bei ERINNERN:AT -- , Simulation und Emotion -- , Vermittlung und Vermittlungsperspektiven im Digitalen -- , Historisches Lernen mit der Digitalen Erinnerungslandschaft DERLA -- , Reiseberichte aus (Post)Digitalien -- , Geschichte ist Beziehung -- , GAMS, DERLA und Data Science -- , Inhalte explorativ durchsuchen -- , Der Virtuelle Guide der KZ-Gedenkstätte Mauthausen -- , Jewish Places: Die bundesweite Website zu jüdischer Lokalgeschichte -- , avArc. A Landscape of Memory and Temporalities -- , Autor:innen , In German.
    Language: German
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    kobvindex_HPB1357099061
    Format: 1 online resource (xii, 354 pages) : , illustrations (chiefly color).
    Edition: 1st ed.
    ISBN: 9789464630787 , 9464630787
    Series Statement: Advances in engineering research, 216
    Content: This is an open access book. The covid-19 pandemic today forces humans to do almost all activities from home. Consequently, inventions in many fields of engineering technology are needed to facilitate those activities. First, human activities mainly are based on information technology today and internet connection is very important. People generate, send, and receive data by their smartphones every time and everything is connected to the internet. Equipment becomes smarter to assist the owner. Second, People need powerful, efficient, and smart vehicles and machines in Industry 4.0. Third, the need for energy increases, which causes the decrease of global environmental quality. It needs new technology for saving energy by discovering new technologies in mechanical engineering. Fourth, many technologies emerge as disaster prevention by developing innovations in civil engineering and architecture. The Engineering Faculty of University of Mataram invites engineers and researchers around the world to visit Lombok island and to attend the valuable multi fields conference on science and engineering named “The First Mandalika International Multi-conference on Science and Engineering 2022″ or “1st MIMSE 2022”. This fruitful event will be the annual conference in Lombok island which is supported by the West Nusa Tenggara Province government. Initially, the 1st MIMSE 2022 consisted of 5 engineering fields are Civil, Architecture, Electrical, Mechanical, and Informatics Engineering.
    Note: International conference proceedings.
    Language: English
    Keywords: Electronic books. ; Conference papers and proceedings.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages