feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2020-2024  (662)
  • 1965-1969  (3)
  • Electronic books.  (662)
  • Kaste
Type of Medium
Language
Region
Years
Year
Access
  • 1
    UID:
    almahu_9949568766902882
    Format: 1 online resource (310 pages)
    Edition: 1st ed.
    ISBN: 9789819936687
    Series Statement: Springer Tracts in Electrical and Electronics Engineering Series
    Note: Intro -- Preface -- Contents -- Editors and Contributors -- 1 Evolution of Next-Generation Communication Technology -- Introduction -- Existing Cellular Network and Its Challenges -- First Generation -- Second Generation -- Third Generation -- Fourth Generation -- Fifth Generation -- Conventional Cellular Systems-Limitations -- Vision and Mission-5G -- Architecture-5G -- C-Ran -- SBA-Based Core Network -- Next-Generation Network-Applications -- Example of Next-Generation Network Applications -- Conclusion and Future Scope -- References -- 2 Third Industrial Revolution: 5G Wireless Systems, Internet of Things, and Beyond -- Introduction -- IoT and Its Devices -- A 5G and IoT -- 5G and Ubiquitous Computing -- The Internet of Things -- A 5G Network -- History and Present Researches on IoT as Well as 5G -- Requirements of IoT and Shortcomings of Wireless 4G Network -- Needs for IoT that is 5G Enabled -- The Vision of 5G IOT: Industrial and Research Context -- Unification of Technologies -- Enabling Technology Drivers in 5G IoT -- Challenges and Trends of Future of the Research -- Conclusion and Future Scope -- Appendix 1: Wireless Technology Features -- Appendix 2: Information Speed Increment -- Appendix 3: 5G Network Architecture -- Appendix 4: 5G Tower Signals -- References -- 3 Network Architectures and Protocols for Efficient Exploitation of Spectrum Resources in 5G -- Introduction -- Enabler Technologies -- Architecture of 5G -- Multiple-Input Multiple-Output Technology in 5G -- Antenna Array for MIMO in 5G -- Device-to-Device Communication in 5G -- Interference Management for 5G -- Multi-tier 5G Architecture -- Spectrum Sharing with Cognitive Radio in 5G -- Ultra-dense Networks in Multi-radio Access Technology Association in 5G -- UDN Moving Cells with 5G+ Network -- Cloud Technologies for 5G -- Methodology. , The Methodology of the Proposed Scheme -- Spectrum Band -- 5G Base Station -- Energy Module -- Energy Controller -- Challenges and Future Research Directions -- Conclusion -- References -- 4 Wireless Backhaul Optimization Algorithm in 5G Communication -- Introduction -- Network Scenarios and System Assumptions -- Analysis of Delay Jitter Indicators -- Delay Analysis -- Delay Jitter Analysis -- Optimization Model Establishments -- Basic Backhaul Model -- Improved Model 1 -- Improved Model 2 -- Improved Model Solutions -- Improved Model 1 Solution -- Improved Model 2 Solution -- Simulation Analysis -- Conclusions -- References -- 5 Security Attacks and Vulnerability Analysis in Mobile Wireless Networking -- Introduction -- Types of Wireless Mobile Network -- Wireless PAN -- Wireless LAN -- Manet -- Wireless MAN -- Wireless WAN -- Mobile Network -- Gan -- Aerospace Network -- Challenges and Issues in Wireless Mobile Network -- Information Management -- Endless Communication -- Delay Tolerance -- Heterogeneity -- Contextual Awareness -- Buffer Management -- Power Features -- Privacy and Security -- Security Goals of Wireless Mobile Network -- Classification of Security Attacks -- Most Prevalent Attacks in Wireless Systems -- Denial of Service (DoS) Attack -- Flooding Attack -- Jamming -- Intervention -- Sleep Deprivation Attack -- Blackhole Attack -- Rushing Attack -- Sybil Attack -- Sinkhole Attack -- Gray Hole Attack -- Byzantine Attack -- Jellyfish Attack -- Wormhole Attack -- Eavesdropping -- Disclosure of Information Attack -- Man-In-The-Middle Attack -- Replay Attack -- ACK Attack -- Spoofing Attack -- Link Spoofing Attack -- Spear-Phishing Attack -- Repudiation Attack -- Infected Code Injection -- Colluding Mis-Relay Attack -- Selective-Forwarding Attack -- Database Hack Attack -- Conclusion -- References. , 6 Utilities of 5G Communication Technologies for Promoting Advancement in Agriculture 4.0: Recent Trends, Research Issues and Review of Literature -- Introduction -- Challenges Faced by Existing Network Technologies -- Motivation of the Work -- Existing Problems and Contribution -- Scope of 5G-Enabled Networks in AgriIoT -- Energy Consumption Management Methods in 5G Networks -- Application Areas of 5G in Smart Farming -- Data Aggregation -- Predictive Analytics -- Drone Operations -- Animal Tracking and Real-Time Monitoring -- Autonomous Agriculture Vehicles -- Weather Stations -- 5G Enabled Components in Agriculture -- Drones and Unmanned Aerial Vehicles (UAVs) -- Virtual Consultation and Predictive Maintenance -- Augmented and Virtual Reality -- Agriculture Robots -- Cloud-Based Data Analytics -- Recent Development Scenarios in 5G-Based Agriculture -- Conclusion and Future Work -- References -- 7 Security Attacks and Countermeasures in 5G Enabled Internet of Things -- Introduction -- Overview of 5G -- Overview of IoT -- 5G Enabled IoT -- 5G Enabled IoT Architecture -- L1 Physical Device Layer -- L2 Communication Layer -- L3 Fog Computing Layer -- L4 Data Storage Layer -- L5 Management Service Layer -- L6 Application Layer -- L7 Process and Collaboration Layer -- L8 Security Layer -- Technologies in 5G Enabled IoT -- Threat Analysis in 5G IoT -- Eavesdropping -- Contaminating -- Spoofing -- Jamming -- Physical Layer Security -- Trust Mechanism in WSN -- Crowdsourcing Analysis -- Attacks at the Architecture Level -- Current Research for 5G and IoT -- Future Research Directions and Challenges -- Characteristics Synthesis -- Signal Revoking -- Location Awareness -- Technical Challenges -- Wireless Software Defined Network -- Security Assurance and Privacy Analysis -- Standardization Issues -- Conclusion -- References. , 8 Energy Efficiency and Scalability of 5G Networks for IoT in Mobile Wireless Sensor Networks -- Introduction -- Energy Efficiency in Mobile Wireless Sensor Networks -- Basic Concept of 5G Technology -- Evolution of 5G -- Frequency Band of 5G System -- 5G Innovative Technologies -- IoT Services Based on 5G -- IoT Industry Supported by 5G Technology -- Industry 4.0 -- Palpable Internet -- Security of IoT in 5G System -- Conclusion -- References -- 9 Security Services for Wireless 5G Internet of Things (IoT) Systems -- Introduction -- Inspiration and Ideas for 5G Based on IoT -- Structure of IoT in Cooperation with 5G -- Sensor Layer -- Network Layer -- Communication Layer -- Architecture Layer -- Application Layer -- Current Resolutions for Communication for IoT in 5G -- Bluetooth Low Energy (BLE) -- SigFox -- IEEE 802.15.4 -- LoRa -- Wi-Fi -- ZigBee -- NarrowBand IoT -- Challenges and Security Vulnerabilities -- Confidentiality and Safety -- Energy Efficacy -- Future Research Directions -- Structure of Network Based on Big Data -- 5G New Radio (NR): A New Wave-Form Design Consideration -- Energy Efficacy -- Interchange Between Communication, Gathering, and Computing -- Design of Synchronized Multi-Band, and High-Power Effective Amplifier -- Conclusion -- References -- 10 Securing the IoT-Based Wireless Sensor Networks in 5G and Beyond -- Introduction -- Literature Survey -- IoT-Based Wireless Networks -- Different Types of Attacks -- Perception Layer -- Abstraction Layer -- Network Layer -- Computing Layer -- Operation Layer -- Application Layer -- Importance of 5G -- Background -- Mathematical Explanation for Euclidean Distance -- Proposed Work -- Assumptions -- Creating Trial Data Sets -- Transmitting the Messages -- Analysis of the Proposal -- Security -- Conclusion -- References. , 11 5G and Internet of Things-Integration Trends, Opportunities, and Future Research Avenues -- Introduction -- Overview of 5G -- Evolution of 5G -- Characteristics and Requirements of 5G Ecosystem -- 5G Architecture -- An Insight into IoT -- Characteristics of IoT -- Layered Architecture of IoT -- Requirements for 5G Integrated IoT Architecture -- Edge Layer of 5G IoT -- Network Layer of 5G IoT -- Application Layer of 5G IoT -- Blockchain-Based 5G IoT -- 5G IoT with Artificial Intelligence -- Opportunities of 5G Integrated IoT -- Technological Advancement -- Smart Cities -- Business -- Aerial and Satellite Research -- Mitigating Pandemic Situation -- Industrial Usage with Other Technologies -- Video Surveillance -- Challenges of 5G Integrated IoT -- General Challenges -- Heterogeneity of 5G and IoT Data -- Blockchain Integrating 5G IoT Issues -- 5G mm-Wave Issues -- Threat Protection of 5G IoT -- Conclusion -- References -- 12 Post-Quantum Cryptographic Schemes for Security Enhancement in 5G and B5G (Beyond 5G) Cellular Networks -- Introduction -- Emerging Cellular Networks -- 5G Overview -- Evolution of 6G/B5G Overview -- State-Of-The-Art -- Taxonomy of 6G/B5G Wireless Systems -- Security Services in 6G/B5G Wireless Networks -- Data Security Techniques for 5G Heterogeneous Networks -- Visual Secret Sharing -- Steganography -- Cryptographic Algorithms -- Key Management -- Overview and Fundamentals of Quantum Computing -- Architecture of Classical Computing Versus Quantum Computing -- Mathematical Representation for Quantum Computing -- The Impact of Quantum Computing on Modern Cryptography -- Quantum Algorithms Affecting Cryptosystems -- Post-Quantum Cryptography -- Mathematical View -- Post-Quantum Analysis -- Conclusion -- References -- 13 Enhanced Energy Efficiency and Scalability in Cellular Networks for Massive IoT -- Introduction. , Literature Review.
    Additional Edition: Print version: Bhushan, Bharat 5G and Beyond Singapore : Springer,c2023 ISBN 9789819936670
    Language: English
    Keywords: Electronic books. ; Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9949602262502882
    Format: 1 online resource (515 pages)
    Edition: 1st ed.
    ISBN: 9781484228968
    Note: Intro -- Table of Contents -- About the Authors -- Acknowledgments -- Foreword -- Introduction -- Chapter 1: Conceptualizing the Secure Internet of Things -- The BadUSB Thumb Drive -- Air-Gap Security -- Stuxnet -- Designing Safe and Secure Cyber-Physical Systems -- Constrained Computing and Moore's Law -- Trusted IoT Networks and the Network Edge -- Conclusion -- Chapter 2: IoT Frameworks and Complexity -- Introduction -- Historical Background to IoT -- IoT Ecosystem -- Connectivity Technology -- Messaging Technology -- Platform Technology -- Elements of an IoT System -- IoT Device -- IoT Device Architectural Goals -- Interoperability -- Security -- IoT Network -- IoT System Management -- Device Lifecycle -- Manufacturing -- Supply Chain -- Deployment -- Normal Operation and Monitoring -- Manage -- Update -- Decommissioning -- IoT Framework -- IoT Framework Design Goals -- IoT Data Model and System Abstractions -- IoT Node -- IoT Operations Abstraction -- Connectivity Elements -- Manageability Elements -- Security Elements -- Consider the Cost of Cryptography -- Summary IoT Framework Considerations -- IoT Framework Architecture -- Data Object Layer -- Node Interaction Layer -- Platform Abstraction Layer -- Platform Layer -- Security Challenges with IoT Frameworks -- Consumer IoT Framework Standards -- Open Connectivity Foundation (OCF) -- OCF Core Framework Layer -- OCF Profiles Framework Layer -- The OCF Device Abstraction -- OCF Security -- AllSeen Alliance/AllJoyn -- AllJoyn Security -- Universal Plug and Play -- UPnP Security -- Lightweight Machine 2 Machine (LWM2M) -- LWM2M Architecture -- LWM2M Device Management -- LWM2M Security -- One Machine to Machine (OneM2M) -- OneM2M Security -- Industrial IoT Framework Standards -- Industrial Internet of Things Consortium (IIC) and OpenFog Consortium. , Open Platform Communications-Unified Architecture (OPC-UA) -- OPC-UA Framework Architecture -- OPC-UA Security -- Data Distribution Service (DDS) -- DDS Framework Architecture -- DDS Security -- Security Enveloping -- Security Tokens -- Security Plugin Modules -- Framework Gateways -- Framework Gateway Architecture -- Type I Framework Gateway -- Type II Framework Gateway -- Type III Framework Gateway -- Type IV Framework Gateway -- Security Considerations for Framework Gateways -- Security Endpoints Within the Gateway -- Security Endpoints in Type I Gateways -- Security Endpoints in Type II Gateways -- Security Endpoints in Type III Gateways -- Security Endpoints in Type IV Gateways -- Security Framework Gateway Architecture -- Summary -- Chapter 3: Base Platform Security Hardware Building Blocks -- Background and Terminology -- Assets, Threats, and Threat Pyramid -- Inverted Threat Pyramid -- Sample IoT Device Lifecycle -- End-to-End (E2E) Security -- Security Essentials -- Device Identity -- Protected Boot -- Protected Storage -- Trusted Execution Environment (TEE) -- Built-In Security -- Base Platform Security Features Overview -- CPU Hosted Crypto Implementations -- Malware Protection (OS Guard) -- OS Guard (SMEP) -- OS Guard (SMAP) -- Encryption/Decryption Using AES-NI -- Sign/Verify Using Intel® SHA Extensions -- Intel® Data Protection Technology with Secure Key (DRNG) -- Converged Security and Manageability Engine (CSME) -- Secure/Verified, Measured Boot and Boot Guard -- Trusted Execution Technology (TXT) -- Platform Trust Technology (PTT) -- Enhanced Privacy ID (EPID) -- Memory Encryption Technologies -- TME -- MKTME -- Dynamic Application Loader (DAL) -- Software Guard Extensions (SGX) - IA CPU Instructions -- Identity Crisis -- Enhanced Privacy Identifier (EPID) -- Anonymity -- PTT/TPM -- Device Boot Integrity - Trust But Verify. , Secure Boot Mechanisms -- Secure Boot Terminology Overview -- Overview of BIOS/UEFI Secure Boot Using Boot Guard Version 1.0 (BtG) -- Data Protection - Securing Keys, Data at Rest and in Transit -- Intel Platform Trust Technology (PTT) -- Windows PTT Architecture -- Linux PTT Software Stack -- Runtime Protection - Ever Vigilant -- Intel Virtualization Technology (Intel VT) -- Software Guard Extensions (SGX) -- Intel CSE/CSME - DAL -- Isolation from Rich Execution Environment -- Authenticity and Security -- Portability -- Intel Trusted Execution Technology (TXT) -- Threats Mitigated -- Zero-Day Attacks -- Other Attacks -- Conclusion -- References -- Chapter 4: IoT Software Security Building Blocks -- Understanding the Fundamentals of Our Architectural Model -- Operating Systems -- Threats to Operating Systems -- Zephyr: Real-Time Operating System for Devices -- Zephyr Execution Separation -- Zephyr Memory Separation -- Zephyr Privilege Levels and System Authorization -- Zephyr Programming Error Protections -- Zephyr's Other Security Features -- Zephyr Summary -- Linux Operating Systems -- Pulsar: Wind River Linux -- Ubuntu IoT Core -- Intel® Clear Linux -- Linux Summary -- Hypervisors and Virtualization -- Threats to Hypervisors -- Intel® ACRN -- Real-Time and Power Management Guarantees in ACRN -- ACRN Summary -- Software Separation and Containment -- Containment Security Principles -- Threats to Extended Application Containment -- Containers -- Kata Containers -- Kata Containers Summary -- Trusted Execution Environments -- Software Guard Extensions -- SGX Security Summary -- Android Trusty -- Trusty TEE Security Summary -- Containment Summary -- Network Stack and Security Management -- Intel Data Plane Development Kit -- Security Management -- Secure Device Onboarding -- Platform Integrity -- Network Defense -- Platform Monitoring. , McAfee Embedded Control -- Network Stack and Security Summary -- Device Management -- Mesh Central -- Wind River Helix Device Cloud -- Device Management Summary -- System Firmware and Root-of-Trust Update Service -- Threats to Firmware and RoT Update -- Turtle Creek System Update and Manageability Service -- System Firmware and RoT Summary -- Application-Level Language Frameworks -- JavaScript and Node.js or Sails -- Java and Android -- EdgeX Foundry -- Application-Level Framework Summary -- Message Orchestration -- Message Queuing Telemetry Transport -- OPC Unified Architecture -- Constrained Application Protocol -- Message Orchestration Summary -- Applications -- Summary -- Chapter 5: Connectivity Technologies for IoT -- Ethernet Time-Sensitive Networking -- Legacy Ethernet-Based Connectivity in Industrial Applications -- Key Benefits of TSN -- TSN Standards -- TSN Profiles -- 802.1AS/AS-Rev -- 802.1Qbv -- 802.1Qbu -- 802.1CB -- 802.1Qcc -- 802.1Qci -- 802.1Qch -- 802.1Qcr -- TSN and Security -- OPC-UA Over TSN -- Overview of Wireless Connectivity Technologies -- Considerations for Choosing Wireless Technologies for IoT -- Spectrum -- Range and Capacity -- Network Topology -- Quality of Service -- Network Management -- Security -- Wi-Fi -- Bluetooth -- Zigbee -- NFC -- GPS/GNSS -- Cellular -- 5G Cellular -- Key Standards, Regulatory, and Industry Bodies Involved in 5G -- New Use Cases Enabled by 5G -- Key Technology Enablers for 5G -- LPWAN - Low-Power Wide Area Networks -- LoRa -- Sigfox -- Weightless -- Comparison of Low-Power LTE and Other LPWAN Technologies -- A Case Study - Smart Homes -- Summary -- References -- Chapter 6: IoT Vertical Applications and Associated Security Requirements -- Common Domain Requirements and the Security MVP -- Some Common Threats -- Retail Solutions -- Security Objectives and Requirements -- Threats. , Standards - Regulatory and Industry -- Transportation Solutions14 -- Connected Vehicle Infrastructure -- Security Objectives and Requirements -- Threats -- Mitigations -- Standards - Regulatory and Industry -- Industrial Control System (ICS) and Industrial IoT (IIoT) -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Digital Surveillance System -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Summary -- Appendix: Conclusion -- Economics of Constrained Roots-of-Trust -- IoT Frameworks - Necessary Complexity -- Hardware Security - More Than a Toolbox -- IOT Software - Building Blocks with Glue -- Ethernet TSN - Everybody's Common Choice? -- Security MVP - The Champion Within a Fractured IoT Ecosystem -- The Way Forward -- Index.
    Additional Edition: Print version: Cheruvu, Sunil Demystifying Internet of Things Security Berkeley, CA : Apress L. P.,c2019 ISBN 9781484228951
    Language: English
    Subjects: Computer Science , Economics
    RVK:
    RVK:
    RVK:
    Keywords: Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    London :IntechOpen,
    UID:
    almahu_9949728667002882
    Format: 1 online resource (396 pages)
    Edition: 1st ed.
    ISBN: 9781803556260
    Additional Edition: Print version: Kumar, Vijay Macrophages London : IntechOpen,c2022
    Language: English
    Keywords: Electronic books. ; Electronic books.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Abingdon, Oxon ; : Routledge, Taylor & Francis Group,
    UID:
    almahu_9949385989302882
    Format: 1 online resource (xxxiv, 618 pages) : , illustrations.
    ISBN: 9780429203916 , 0429203918 , 0429512317 , 9780429515743 , 042951574X , 9780429512315
    Series Statement: Routledge international handbooks
    Content: "The Routledge Handbook of Tourism Experience Management and Marketing offers a comprehensive and thorough inquiry into both customary and emergent issues of tourism experience and co - creation. Drawing together contributions from 83 authors from 28 countries with varied backgrounds and interdisciplinary interests, the handbook highlights multiple representations and interpretations of the theme. It also integrates a selection of illustrative global case studies to effectively present its chapter contents. Tourism experience drives the contemporary tourist's behavior as they travel in pursuit of experiencing unique and unusual destinations and activities. Creating a memorable and enduring experience is therefore a prerequisite for the all tourism business organizations irrespective of the nature of their products or services. This handbook focuses on conceptualizing, designing, staging, managing and marketing paradigms of tourism experiences from both supply and demand perspectives. It sheds substantial light on the contemporary theories, practices and future developments in the arena of experiential tourism management and marketing. Encompassing the latest thinking and research themes, this will be an essential reference for upper-level students, researchers, academics and industry practitioners of hospitality as well as those of tourism, gastronomy, management, marketing, consumer behavior, cultural studies, development studies and international business, encouraging dialogue across disciplinary boundaries"--
    Additional Edition: Print version: The Routledge handbook of tourism experience management and marketing Abingdon, Oxon ; New York, NY : Routledge, 2020. ISBN 9780367196783
    Language: English
    Subjects: Economics , Geography , Sociology
    RVK:
    RVK:
    RVK:
    Keywords: Electronic books. ; Electronic books. ; Aufsatzsammlung
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9949858790202882
    Format: 1 online resource (608 pages)
    Edition: 1st ed.
    ISBN: 94-6463-490-1
    Series Statement: Atlantis Highlights in Intelligent Systems Series ; v.11
    Note: Intro -- Preface -- Organization -- Contents -- Peer-Review Statements -- Research on evaluation system and method of EVs' development trend -- ChatGPT & -- RPG Game: A New Option for Student to Study with Artificial Intelligence -- Research on the evaluation of enterprise digital transformation maturity based on comprehensive evaluation model -- Optimizing Portfolio Management and Risk Assessment in Digital Assets Using Deep Learning for Predictive Analysis -- Design and implementation of a data-driven tobacco production line warning system -- Analysis of Spatial Structure of Digital Information Service Industry - Based on Social Network Model and Modified Gravity Model -- Design of electronic shelf label and Zigbee gateway based on electrophoretic display technology -- Overview of water supply operation and maintenance management service system -- Intelligent Foundation Pit based on Digital TwinTechnology Safety Monitoring and Prediction -- How do artificial intelligence applications affect the performance of intelligent manufacturing enterprises-- Research from the Perspective of Human Capital Structure -- 2 LITERATURE REVIEW -- 3 THEORETICAL ANALYSIS AND RESEARCH HYPOTHESIS -- 3.1 The direct impact of artificial intelligence applications on the performance of smart manufacturing companies -- 3.2 Indirect impact of artificial intelligence application on intelligent manufacturing enterprise performance -- 4 RESEARCH DESIGN -- 4.1 Model construction -- 4.2 Variable Selection and Explanation -- 4.3 Sample Selection and Data Sources -- 5 ANALYSIS OF EMPIRICAL RESULTS -- 5.1 Analysis of benchmark regression results -- 5.2 Robustness Tests -- 5.2.1 Endogeneity issues -- 5.2.2 Further Robustness Tests -- 5.3 Heterogeneity analysis -- 5.3.1 Analysis of regional heterogeneity -- 5.3.2 Analysis of Industry Heterogeneity -- 6 RESULTS. , 7 DISCUSSION AND CONCLUSION -- ACKNOWLEDGMENTS -- REFERENCES -- Research on fusion and integration method of BIM and GIS data -- Research on manufacturing service recommendation method based on Product-based Neural Network -- Research on Self-inspired Intelligent Question Answering Method Based on Socratic Questioning -- The Impact Factors of TikTok Live Shopping Features on Consumer Purchase Intentions: Evidence from China -- Combating Illegal Wildlife Trade through Big Data Monitoring and Management -- Research on Tourism Experience of Tourists in Natural Resource-based Scenic Spots in the Context of Big Data -- Practice and Exploration of Artificial Intelligence Ethics Education in Higher Education -- Hot topics and frontier evolution of strength training for physical health in older adults research: a bibliometric mapping from 2012 to 2021 -- Stock price forecast based on improved Transformer -- Analysis of China-Myanmar Energy Interconnection and Trade Cooperation via AHP-SWOT Approach -- Research and Implementation of Digital Transformation Methods for Process Manufacturing Enterprises Based on Employee Performance -- Selection of Excellent Digital Demonstration Units Based on Entropy Weight TOPSIS Method -- Construction of the Effectiveness Evaluation System for Digital Transformation of Power Grid Enterprises -- Revolutionizing Credit Card Marketing: Bank N's Journey with a Smart Credit Card Marketing Platform -- Data Statistics Applications in Regulating the Balance of the Wildlife Trade -- Untitled -- Innovative Chatbot Technologies and Trends -- Innovative Practice of Collaborative Education between Industry and Academia in Talent Cultivation in the Field of E-commerce Under the Background of Mass Entrepreneurship and Innovation -- A Study of the Impact of Digital Transformation on the Risk Level of Commercial Banks. , Research on the design of intelligent tourism auxiliary decision-making service platform based on local tourism big data -- Research on the Prediction of Overall Monthly Active Users of WeChat Mini Programs Based on Linear Regression -- A data-driven comprehensive evaluation method for Data Link -- Exploration and Research on the New Mode of Enterprise Innovation and Development Based on Big Data Analysis Technology -- Research on the Influence of Transnational Technology Merger and Acquisition on the Rate of Domestic Added Value of Chinese Enterprises' Exports -- Mining of Credit Risk Factors for New Agricultural Entities under the Big Data of Agricultural Economy in Jilin Province -- Development of Tourism Website Based on Java -- Application Research of RPA Technology in the Construction of Financial Robot Business Automation Processing Platform -- Web 3.0: the impact of virtual spokesperson generation characteristics on consumer brand attitudes -- Command Execution Bypassing Evasion Based on Win32Net Module -- A study on speech recognition of Tibetan Amdo based on whisper -- A Cross-Chain Scheme for Goods Atomicity in E-commerce Transactions -- Research on Carbon Emission Reduction of ICT Enabled Manufacturing Industry--A Case Study of China Telecom -- Synthesis of Tibetan Amdo based on VITS -- Research on the Interpretability Analysis Method of Transient Stability Assessment in Power Systems Based on Deep Learning -- Study on voluntary environmental regulation and ESG performance based on PSM-DID model -- Research on the Mechanism and Pathway of Digital Intelligence Technology Application in Collaborative Emission Reduction in the Chemical Industry -- Construction of information security literacy evaluation model for College students based on Analytic Hierarchy Process -- New Media Operation: Art of Content Innovation and User Interaction. , Analysis of Transportation Carbon Emissions in Xinjiang Based on the Carbon Emission Factor Method for Load Weights -- Research on the Innovative Model of Integrating Smart Tourism and Agricultural E-commerce in Shiyan City Based on Digital Enablement -- The Application and Challenges of Blockchain Technology in Accounting and Financial Information Systems -- Applying Machine Learning and Time Series to Predict Real Estate Valuations -- An Improved YOLOv8 Algorithm Model for Detection of Personal Protective Products in Chemical Plants -- Research on the Optimization of Picking Path Considering the Minimization of Goods Damage Cost -- Intelligent Operation and Maintenance Control Platform for Energy Internet Analysis -- Application of Video Artificial Intelligence in Smart Expressway Scenarios -- Research on Data Link Knowledge Graph Technology and Its Application Based on Data -- Analysing the theoretical connotation and practical path of blockchain technology affecting the digital economy--Evidence from China -- 2 RELATED WORK -- 3 PROPOSED METHODOLOGY -- 3.1 Data Set Construction -- 3.2 Detection Strategy -- 3.3 Training Design -- 4 EXPERIMENTS -- 4.1 Data Sets and Parameters -- 4.2 Experimental Results and Analysis -- 5 CONCLUSIONS -- REFERENCES -- Research on The Effect of UGC Characteristics on Consumers' Impulse Purchase Intention in Community E.commerce Platform -- Knowledge Graph Completion Model Based on Con-distillation -- Research and Application of Copyright Protection of Ethnic Cultural Resources Based on Blockchain.
    Additional Edition: ISBN 94-6463-489-8
    Language: English
    Keywords: Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9949568770802882
    Format: 1 online resource (576 pages)
    Edition: 1st ed.
    ISBN: 9789464632224
    Series Statement: Atlantis Highlights in Intelligent Systems Series ; v.9
    Note: Intro -- Preface -- Organization -- Contents -- Peer-Review Statements -- 1 Review Procedure -- 2 Quality Criteria -- 3 Key Metrics -- Digital Economy Enabling High-Quality Manufacturing Development: Evidence from Chinese Provincial Data -- 1 Introduction -- 2 Theoretical Mechanism and Research Hypothesis -- 2.1 Digital Economy Enables the Direct Mechanism of Action of High-Quality Manufacturing Development -- 2.2 Digital Economy, Innovation Effect and High-Quality Development of Manufacturing -- 2.3 Digital Economy, Efficient Resource Allocation and High-Quality Development of Manufacturing -- 3 Study Design -- 3.1 Model Building -- 3.2 Variable Selection and Data Sources -- 4 Empirical Analysis -- 4.1 Baseline Regression Analysis -- 4.2 Endogeneity Analysis -- 4.3 Subregional Inspection -- 4.4 Mechanism of Action Analysis -- 5 Conclusions -- References -- The Lexicon Construction and Quantitative Research of Digital Economy Policy Texts -- 1 Introduction -- 2 Research Status -- 3 Lexicon Construction of Digital Economic Policy -- 3.1 Data Sources -- 3.2 Neologism Discovery -- 3.3 Comparison of Segmentation Effect -- 4 Classification of Policy Text -- 4.1 Experimental Data -- 4.2 Model and Parameter -- 4.3 Experimental Result -- 5 Analysis of Policy Hotspots -- 5.1 Policy Keywords -- 5.2 Policy Topics -- 6 Conclusion -- References -- Measurement and Evaluation of Provincial Digital Economy Development Efficiency -- 1 Introduction -- 2 Provincial Digital Economy Development Level Measurement -- 2.1 Construction of Indicator System -- 2.2 Data Sources -- 2.3 Analysis of Results -- 3 Analysis of Provincial Digital Economy Output Efficiency -- 3.1 Research Models -- 3.2 Empirical Results and Analysis -- 4 Conclusions and Recommendations -- 4.1 Conclusions -- 4.2 Research Recommendations -- References. , How Digital Transformation of Enterprises Can Improve Labor Productivity: Evidence from Chinese-Listed Companies -- 1 Introduction -- 2 Literature Review and Hypothesis -- 3 Models and Data -- 3.1 Models -- 3.2 Data -- 4 Results and Discussion -- 4.1 Digital Transformation and Labor Productivity -- 4.2 Intermediate Mechanism: Capital Intensity (CI) and Innovation Input (R& -- D) -- 4.3 Heterogeneity Analysis -- 5 Conclusions -- References -- Design of Adaptive Defense System for Marketing Information Management Based on Blockchain Technology -- 1 Introduction -- 2 Application of Blockchain Technology in Marketing Information Management Adaptive Defense System -- 2.1 Blockchain Basics -- 2.2 Blockchain-Related Technologies -- 2.3 Scenarios of Blockchain Technology Application -- 3 Network Security Adaptive Defense Technology -- 3.1 Intrusion Detection -- 3.2 Intrusion Prevention -- 4 Design of Adaptive Defense System for Marketing Information Management -- 4.1 System Architecture -- 4.2 System Function Module -- 5 System Testing -- 5.1 Set up the Network Environment -- 5.2 Verify the Performance Improvement Effect -- 6 Conclusion -- References -- Comparative Study of LSTM and Transformer for A-Share Stock Price Prediction -- 1 Introduction -- 2 Related Work -- 2.1 Stock Price in China -- 2.2 Deep Learning in Stock Prediction -- 3 Methodology -- 3.1 LSTM -- 3.2 Transformer -- 3.3 Evaluation Metrics -- 4 Experiments -- 4.1 Data Selection -- 4.2 Data Pre-processing -- 5 Experiment Result -- 6 Conclusions -- References -- Can Digital Inclusive Finance Improve Business Export Resilience? -- 1 Introduction -- 2 Theoretical Analysis and Hypotheses -- 3 Study Design -- 3.1 Sample Selection and Data Sources -- 3.2 Variable Setting -- 3.3 Model Construction -- 4 Analysis of Empirical Results -- 4.1 Descriptive Statistics -- 4.2 Correlation Analysis. , 4.3 Analysis of Regression Results -- 4.4 Analysis of the Mechanism of Action -- 4.5 Heterogeneity Analysis -- 5 Robustness Test -- 5.1 Substitution of Explanatory Variables -- 5.2 Change in Estimation Method and Sample Scope -- 5.3 Instrumental Variable Method -- 6 Research Findings and Insights -- References -- Research on Active Firefighting Robot Navigation Based on the Improved AUKF Algorithm -- 1 Introduction -- 2 Multi-source Fusion Localization Method Based on Improved AUKF Algorithm -- 3 Experimental Analysis -- 4 Conclusion -- References -- Analysis and Research on Big Data Storage Technology Based on Machine Learning -- 1 Introduction -- 2 Neural Network Overview -- 3 The Basic Principles and Models of Artificial Neural Networks -- 3.1 The Basic Principle of Neural Network Composition -- 3.2 Structure of Neural Networks -- 4 BP Algorithm -- 4.1 Mathematical Description of BP Algorithm -- 4.2 Shortcomings of BP Algorithm -- 5 Improved Modeling of Neural Network BP Algorithm Using Genetic Algorithm (GA) -- 6 Design of the System -- 6.1 System Composition -- 7 Conclusions -- References -- k-Surrounding Neighbors: Incorporating Serendipity in Collaborative Recommendations -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Evaluation on the MovieLens Dataset -- 4.1 Prediction Accuracy -- 4.2 Intra-list Diversity -- 4.3 Novelty -- 5 Conclusion -- References -- Data Generation and Latent Space Based Feature Transfer Using ED-VAEGAN, an Improved Encoder and Decoder Loss VAEGAN Network -- 1 Introduction -- 2 Methods -- 2.1 VAE'S Reparameterization Trick -- 2.2 Training Theory of GANs -- 2.3 Loss Functions VAE -- 2.4 Loss Functions DCGAN -- 2.5 Loss Functions ED-VAEGAN -- 2.6 Loss Functions f-w VAEGAN -- 2.7 Loss Functions p-w VAEGAN -- 2.8 Latent Space Continuity Quality -- 3 Experiments -- 4 Results and Discussions -- 5 Conclusion. , References -- Digital Investment Risk Evaluation Model of Power Grid Enterprises Based on FAHP-AOA-LSSVM -- 1 Introduction -- 2 Fuzzy Analytic Hierarchy Process -- 2.1 Establish Judgment Matrix -- 2.2 Determine the Membership Function -- 2.3 Single-Factor Evaluation -- 2.4 Determine the Weight Vector -- 2.5 Consistency Test -- 3 AOA's Improved Risk Evaluation Model of LSSVM -- 3.1 Principle of LSSVM Evaluation -- 3.2 AOA Search for Optimal Solutions of LSSVM Parameters -- 4 Construction of Risk Evaluation Index System for Power Grid Digital Investment -- 4.1 Questionnaire Design and Data Sources -- 4.2 Expert Evaluation -- 5 Example Analysis -- 5.1 Determining the Evaluation Value of the Project -- 5.2 Parameter Setting -- 5.3 Analysis of Results -- 6 Conclusion -- References -- Research on Machine Learning Driven Stock Selection Strategy -- 1 Introduction -- 2 Methodology -- 2.1 Research Scheme -- 2.2 Data -- 3 Empirical Analysis -- 3.1 Single Machine Learning Algorithm Performance -- 3.2 Integrated Machine Learning Algorithm Performance -- 4 Important Anomalies of Chinese Stock Market -- 5 Discussion and Conclusion -- 5.1 Discussion -- 5.2 Conclusion -- References -- An Identification Method for High Voltage Power Grid Insulator Based on Mobilenet-SSD Network -- 1 Introduction -- 2 Target Detection Network of Lightweight Mobilenet-SSD -- 2.1 Multi-scale Feature Fusion Target Detection Network -- 2.2 Light Weight Backbone Feature Extraction Network -- 2.3 Fused Network of MobileNet and SSD -- 3 Sample Analysis -- 4 Conclusion -- References -- Insights into the Correlation Between Digital Marketing Effectiveness and the 5A Crowd Assets Model -- 1 Introduction -- 2 Digital Marketing Theory and the Landing of Contemporary e-commerce Data Platforms -- 2.1 Digital Marketing and Consumer Operations. , 2.2 Crowd Assets Model from Traditional to Digital Marketing -- 2.3 Upgrade of Crowd Assets Model-- 5A -- 3 Study Design -- 3.1 Research Background -- 3.2 Correlation Analysis of Seeding with A3 -- 3.3 Correlation Analysis Between A3 and GMV (Gross Merchandise Volume) -- 3.4 K-means Clustering Algorithm -- 4 Research Conclusions and Values -- References -- A Credit Card Default Prediction Method Based on CatBoost -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Experiment -- 4.1 Feature Engineering -- 4.2 Training Parameters -- 4.3 Evaluation Metrics -- 4.4 Evaluation Results -- 5 Conclusion -- References -- Prediction of Shanghai Composite Index Based on Macroeconomic Indicators and Artificial Intelligence Method -- 1 Introduction -- 2 Macro-economy and Stock Market Forecast -- 2.1 Macro-economy -- 2.2 Stock Market Forecast -- 3 Neural Network and Support Vector Machine Research -- 3.1 Introduction to Neural Networks -- 3.2 Learning of Neural Networks -- 3.3 Support Vector Machine -- 4 An Empirical Study of Machine Learning Methods in SSE Index Forecasting -- 4.1 Introduction to the Empirical Environment -- 4.2 SSE Index Prediction Based on BP Neural Network -- 4.3 SSE Index Prediction Based on Support Vector Machine -- 5 Conclusion -- References -- Research on the Development Level of Digital Economy Based on Fuzzy Comprehensive Evaluation -- 1 Introduction -- 2 Fuzzy Comprehensive Evaluation of Digital Economy Development in Anhui Province -- 2.1 Indicator System Determination and Weight Calculation -- 2.2 Fuzzy Comprehensive Evaluation -- 2.3 Chapter Summary -- 3 Conclusions -- References -- Factors Influencing Customer Addictive Purchase Behaviours of Toy Blind Boxes -- 1 Introduction -- 2 Research Methods -- 3 Research Design -- 4 Analysis -- 4.1 Qualitative Analysis -- 4.2 Further Analysis -- 5 Discussions -- 6 Conclusion. , References.
    Additional Edition: Print version: Hemachandran, K. Proceedings of the 2023 2nd International Conference on Artificial Intelligence, Internet and Digital Economy (ICAID 2023) Dordrecht : Atlantis Press (Zeger Karssen),c2023 ISBN 9789464632217
    Language: English
    Keywords: Electronic books. ; Electronic books. ; Electronic books ; Electronic books
    URL: FULL  ((OIS Credentials Required))
    URL: FULL  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9949692693102882
    Format: 1 online resource (342 pages)
    Edition: 1st ed.
    ISBN: 9789819944132
    Series Statement: India Studies in Business and Economics Series
    Additional Edition: Print version: Dev, S. Mahendra Achieving Zero Hunger in India Singapore : Springer,c2023 ISBN 9789819944125
    Language: English
    Keywords: Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    almahu_9949544896902882
    Format: 1 online resource (XIII, 319 p.)
    ISBN: 9783110711349 , 9783110766820
    Series Statement: Management, Spirituality and Religion , 1
    Content: Workplace spirituality is an emerging field of study and practice and this book asks the questions: Where have we been in the last ten years as a field and where should we be headed in the next ten years? The editors asked these questions of thought leaders from around the globe, leaders who represent different sectors, faith traditions, worldviews and organizational functions. This volume represents the best of current thinking about the state of the field of workplace spirituality and of what the future holds. There are four themes: (1) management themes such as leadership, ethics, change management, and diversity; (2) workplace spirituality in sectors such as health and wellbeing, policing and creative industries, (3) key issues that are emerging, such as self-spirituality, mindfulness, storytelling and the importance of nature, and (4) cutting edge epistemologies and methodologies including indigenous studies, relational ontology, ethnography, and psychodynamics. These articles were chosen to provoke new thinking, new research, and new practice in the field of workplace spirituality, with the goal of helping the field mature in the next decade.
    Note: Frontmatter -- , Acknowledgements -- , Foreword -- , Contents -- , Introduction -- , 1 The Past, Present and Future of Workplace Spirituality -- , 2 Introduction to Spirituality -- , Themes -- , 3 Leadership and Spirituality -- , 4 Ethics and Spirituality -- , 5 Spirituality and Religion: Influencing the Strategic Management Field of Research -- , 6 Organizational Change and Work Spirituality: Expanding the Moral Circle -- , 7 Organizational Behavior and Workplace Spirituality -- , 8 Spirituality at Work and Human Resource Management -- , 9 Family Business and Work Spirituality and Religion -- , 10 Gender and Diversity: Intersections of Faith, Religion, and Spirituality -- , Sectors -- , 11 Health and Wellbeing in the Context of Workplace Spirituality -- , 12 Workplace Spirituality and Policing -- , 13 Workplace Spirituality and Creative Industries -- , Key Issues -- , 14 (Western) Self-Spirituality: Literature Review, Conceptual Framework and Research Agenda -- , 15 Mindfulness and More: Spiritual Forms of Meditation -- , 16 Storytelling Nature-spirituality: An Autoethnographic Journey of Rediscovery -- , Epistemologies/Methodologies -- , 17 Indigenous Studies with an Integrative Research Approach -- , 18 Relating Differently: Exploring How a Relational Ontology Might Catalyze Transformative and Emancipatory Action- Oriented MSR Research -- , 19 Workplace Spirituality and the Ethnographic Gaze -- , 20 Psychodynamics and the Field of Management, Spirituality and Religion: Deciphering the Unconscious, Mapping the Soul -- , List of Figures -- , List of Tables -- , About the Authors -- , Index -- , MSR Journal , Issued also in print. , Mode of access: Internet via World Wide Web. , In English.
    In: DG Plus DeG Package 2022 Part 1, De Gruyter, 9783110766820
    In: EBOOK PACKAGE Business and Economics 2022 English, De Gruyter, 9783110992823
    In: EBOOK PACKAGE COMPLETE 2022 English, De Gruyter, 9783110993899
    In: EBOOK PACKAGE COMPLETE 2022, De Gruyter, 9783110994810
    In: EBOOK PACKAGE Economics 2022, De Gruyter, 9783110992922
    Additional Edition: ISBN 9783110711400
    Additional Edition: ISBN 9783110711295
    Language: English
    Keywords: Electronic books. ; Electronic books.
    URL: Cover
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Abingdon, Oxon ; : Routledge,
    UID:
    almahu_9949383755702882
    Format: 1 online resource (xlv, 557 pages)
    ISBN: 9780429281266 , 0429281269 , 9781000760170 , 1000760170 , 9781000760354 , 1000760359 , 1000760537 , 9781000760538
    Series Statement: Routledge international handbook
    Content: "This uniquely interdisciplinary volume deliberates upon the current issues and applications of military psychology not only within the military organization and the discipline of psychology, but also in the larger context of its role of building a better world. Split into three parts dedicated to specific themes, the first part of the book, 'Military Psychology: The Roots and the Journey' provides an overview of the evolution of the discipline over the years, delving into concepts as varied as culture and cognition in the military, a perspective on the role of military psychology in future warfare and ethical issues. The second part, 'Soldiering: Deployment and Beyond', considers the complexities involved in soldiering in view of the changing nature of warfare, generating a focal discourse on various aspects of military leadership, soldier resilience and post-traumatic growth in the face of extreme situations, bravery and character strengths and transitioning to civilian life. In the final section, 'Making a Choice: Mental Health Issues and Prospects in the Military', the contributors focus on the challenges and practices involved in maintaining the mental health of the soldier, covering issues ranging from stress, mental health and well-being, through to suicide risk and its prevention, intervention and management strategies, moral injury and post-traumatic stress disorder"--
    Note: PART I -Military Psychology: The Roots and the Journey -- Military Psychology in War and Peace: An Appraisal / Swati Mukherjee and Updesh Kumar -- War, Peace and the Military in Biblical and Ancient Greek Societies / Matthew B. Schwartz and Kalman J. Kaplan -- Four Stages in the Evolution of Military Enlisted Testing / Michael G. Rumsey -- Polemology: Orphan of Military Psychology / Jacques J. Gouws -- The Application of Culture and Cognition within a Military Context / Faizan Imtiaz, Mark Khei, and Li-Jun Ji -- Military Psychology and the Fourth Industrial Revolution: Implications for the South African National Defence Force's Directorate Psychology / Petrus C. Bester -- War of the Future and Prospective Directions of Military Psychology / Alexander G. Karayani -- Ethical Issues in Military Psychology: Promoting International Ethical Readiness / Thomas E. Myers and Shane S. Bush -- PART II -- Soldiering: Deployment and Beyond -- Shaping Military Leaders: Role of Character Strengths and Virtues / Archana, Samridhi Ahuja and Updesh Kumar -- Posttraumatic Growth in Military Populations: Theory, Research, and Application / K.C. Kalmbach and Bret A. Moore -- Building Resilience and Hardiness in Military Leaders -Robustness Training Programs of the German Army / Oliver Krueckel, Annett Heidler, Nicola von Luedinghausen, Markus Auschekis and Matthias Soest -- Sustainable Team Leadership: Social Identity and Collective Leadership for Military and Society / António P. Rosinha, Hermes Andrade Junior and Marcos Aguiar de Souza -- The Physical Bravery Study: Findings and Implications for Small, Innovative Research Studies with Military/Veteran Populations / Kristen J. Vescera, Jacie Brown, Catherine Hausman, and Bruce Bongar -- Military Recruiting in the United States: Selection, Assessment, Training, Well-being, and Performance Coaching / Steven V. Bowles, Bettina Schmid, Laurel K. Cofell Rashti, Susan J. Scapperotti, Tracy D. Smith, Paul T. Bartone and Peter Mikoski -- Validity Assessment in Military Psychology / Noah K. Kaufman and Shane S. Bush -- Reintegration and Military Family Health: Military Training and its Relationship to Post-Deployment Role Conflict in Intimate Partner Relationships / E. Ann Jeschke, Jessica M. LaCroix, Amber M. Fox, Laura A. Novak, and Marjan Ghahramanlou Holloway -- Lone Wolf Terrorism / Bruce Bongar, Anna Feinman, and Renata Sargon -- Why Do They Leave? A Conceptual Model of Military Turnover / H. Canan Sümer and Ipek Mete -- Transition from Military to Civilian Life / Harprit Kaur and Swati -- PART III -- Making a Choice: Mental Health Issues and Prospects in the Military -- Militaries' Burnout and Work Engagement: A Qualitative Systematic Literature Review / Maria José Chambel, Silvia Lopes, Filipa Castanheira and Carolina Rodrigues-Silveira -- Stress, Burnout and Coping in Military Environment / Yonel Ricardo de Souza and Fabio Biasotto Feitosa -- Stress Experiences and Abilities to Cope: Civil Population versus Military Personnel / Vijay Parkash -- Military Related Mental Health Morbidities: A Neurobiological Approach / Shobit Garg and Jyoti Mishra Pandey -- Clinical Health Psychology Applications in Military Settings / Ryaja Johnson and Larry C. James -- Suicide Prevention Strategies in Military Populations / Marissa N. Eusebio, Abigale Brady, and Bruce Bongar -- Military Sexual Trauma and Suicidal Self-Directed Violence: A Narrative Review and Proposed Agenda for Future Research / Lindsey L. Monteith, Ryan Holliday, Tim Hoyt and Nazanin H. -- Bahraini -- Understanding Suicide among Female Veterans: A Theory-Driven Approach / Lindsey L. Monteith, Ryan Holliday, Diana P. Brostow and Claire A. Hoffmire -- Resilience and Stress in Military Combat Flight Engineers / Reoot Cohen-Koren, Dror Garbi, Shirley Gordon, Nirit Yavnai, Yifat Erlich Shoham and Leah Shelef -- Family Based Psychological Interventions: A Heuristic Approach / Jyoti Mishra Pandey and Shobit Garg -- Chronic Disease Risks and Service-Related Post-traumatic Stress Disorder in Military Veterans / Jeanne Mager Stellman and Steven D. Stellman -- Neurotransmitter and Neurotrophic Biomarkers in Combat Related PTSD / Gordana Nedic Erjavec, Matea Nikolac Perkovic, Dubravka Svob Strac, Lucija Tudor and Nela Pivac -- Neuroendocrine and Immune Biomarkers of PTSD in Combat Veterans / Nela Pivac, Marcela Konjevod, Marina Sagud, Suzana Uzun, and Oliver Kozumplik -- Moral Injury in Service Members and Veterans / Sheila Frankfurt, Alanna Coady, Breanna Grunthal, Stephanie EllicksonLarew and Bret T. Litz -- Student Service Members/Veterans' Mental Health on Campuses: Risk and Resources / Dan Nyaronga -- Resilience and Clinical Issues in Survival Behaviour under Isolation and Captivity / Vasile Marineanu.
    Additional Edition: Print version: The Routledge international handbook of military psychology and mental health Abingdon, Oxon ; New York, NY : Routledge, 2020. ISBN 9780367237073
    Language: English
    Keywords: Electronic books. ; Electronic books. ; Handbooks and manuals. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almahu_9949385391902882
    Format: 1 online resource (1 volume) : , illustrations (black and white)
    Edition: Second edition.
    ISBN: 9781003030362 , 100303036X , 9781000412901 , 1000412903 , 9781000412956 , 1000412954
    Series Statement: Routledge handbooks
    Content: This comprehensive handbook introduces the reader to the education system in India in terms of its structural features, its relations with society and culture, and the debates that have shaped the present-day policy ethos. The book provides an overview of major debates that have shaped India's education systems, as well as the significant issues within higher and school education, education studies, and policies. Expert scholars provide a lucid analysis of complex themes such as the equity, access, and the quality of education. The volume also examines legal provisions and policies shaping the distribution structure andcurricular issues in major areas of knowledge, as well as the provision of schools for the marginalised, economically weak, and people with disabilities. This new edition includes an analysis of the private sector's participation in higher education and the technical and vocational education and training systems in India. This handbook will serve as a valuable resource and guide to educators and public policy practitioners seeking information about India's contemporary educational challenges. It will also be useful to scholars and researchers of education, public policy and administration, sociology, andpolitical studies, as well as think-tanks, the media, policy-makers, and NGOs.
    Additional Edition: Print version: Routledge handbook of education in India. London : Routledge, 2021 ISBN 9780367466770
    Language: English
    Subjects: Education
    RVK:
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages