feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Berlin International  (15)
  • SB Prenzlau  (2)
  • SB Doberlug-Kirchhain  (1)
Type of Medium
Language
Region
Library
Access
  • 11
    UID:
    kobvindex_INTEBC5573403
    Format: 1 online resource (244 pages)
    Edition: 1st ed.
    ISBN: 9781788623087
    Content: This book gives you a practical, hands-on understanding of how you can leverage the power of Python and Keras to perform effective deep learning. It presents a unique problem-solution approach to tackle various problems in training different types of neural networks while taking care of the speed and accuracy of these models
    Note: Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Keras Installation -- Introduction -- Installing Keras on Ubuntu 16.04 -- Getting ready -- How to do it... -- Installing miniconda -- Installing numpy and scipy -- Installing mkl -- Installing TensorFlow -- Installing Keras -- Using the Theano backend with Keras -- Installing Keras with Jupyter Notebook in a Docker image -- Getting ready -- How to do it... -- Installing the Docker container -- Installing the Docker container with the host volume mapped -- Installing Keras on Ubuntu 16.04 with GPU enabled -- Getting ready -- How to do it... -- Installing cuda -- Installing cudnn -- Installing NVIDIA CUDA profiler tools interface development files -- Installing the TensorFlow GPU version -- Installing Keras -- Chapter 2: Working with Keras Datasets and Models -- Introduction -- CIFAR-10 dataset -- How to do it... -- CIFAR-100 dataset -- How to do it... -- Specifying the label mode -- MNIST dataset -- How to do it... -- Load data from a CSV file -- How to do it... -- Models in Keras - getting started -- Anatomy of a model -- Types of models -- Sequential models -- How to do it... -- Create a Sequential model -- Compile the model -- Train the model -- Evaluate the model -- Predict using the model -- Putting it all together -- Model inspection internals -- Model compilation internals -- Initialize the loss -- Model training -- Output of the sample -- Shared layer models -- Introduction - shared input layer -- How to do it... -- Concatenate function -- Keras functional APIs -- How to do it... -- The output of the example -- Keras functional APIs - linking the layers -- How to do it... -- Model class -- Image classification using Keras functional APIs -- How to do it , Chapter 3: Data Preprocessing, Optimization, and Visualization -- Feature standardization of image data -- Getting ready -- How to do it... -- Initializing ImageDataGenerator -- Sequence padding -- Getting ready -- How to do it... -- Pre-padding with default 0.0 padding -- Post-padding -- Padding with truncation -- Padding with a non-default value -- Model visualization -- Getting ready -- How to do it... -- Code listing -- Optimization -- Common code for samples -- Optimization with stochastic gradient descent -- Getting ready -- How to do it... -- Optimization with Adam -- Getting ready -- How to do it... -- Optimization with AdaDelta -- Getting ready -- How to do it... -- Adadelta optimizer -- Optimization with RMSProp -- Getting ready -- How to do it... -- Chapter 4: Classification Using Different Keras Layers -- Introduction -- Classification for breast cancer -- How to do it... -- Data processing -- Modeling -- Full code listing -- Classification for spam detection -- How to do it... -- Data processing -- Modeling -- Full code listing -- Chapter 5: Implementing Convolutional Neural Networks -- Introduction -- Cervical cancer classification -- Getting ready -- How to do it... -- Data processing -- Modeling -- Predictions -- Digit recognition -- Getting ready -- How to do it... -- Modeling -- Chapter 6: Generative Adversarial Networks -- Introduction -- GAN overview -- Basic GAN -- Getting ready -- How to do it... -- Building a generator -- Building a discriminator -- Initialize the GAN instance -- Training the GAN -- Output plots -- Average metrics of the GAN -- Boundary seeking GAN -- Getting ready -- How to do it... -- Generator -- Discriminator -- Initializing the BGAN class -- Boundary seeking loss -- Train the BGAN -- Output the plots -- Iteration 0 -- Iteration 10000 -- Metrics of the BGAN model -- Plotting the metrics -- DCGAN , Getting ready -- How to do it... -- Generator -- Summary of the generator -- Training the generator -- Discriminator -- Build the discriminator -- Summary of the discriminator -- Compile the discriminator -- Combined model - generator and discriminator -- Train the generator using feedback from a discriminator -- Putting it all together -- The output of the program -- Average metrics of the model -- Chapter 7: Recurrent Neural Networks -- Introduction -- The need for RNNs -- Simple RNNs for time series data -- Getting ready -- Loading the dataset -- How to do it... -- Instantiate a sequential model -- LSTM networks for time series data -- LSTM networks -- LSTM memory example -- Getting ready -- How to do it... -- Encoder -- LSTM configuration and model -- Train the model -- Full code listing -- Time series forecasting with LSTM -- Getting ready -- Load the dataset -- How to do it... -- Instantiate a sequential model -- Observation -- Sequence to sequence learning for the same length output with LSTM -- Getting ready -- How to do it... -- Training data -- Model creation -- Model fit and prediction -- Chapter 8: Natural Language Processing Using Keras Models -- Introduction -- Word embedding -- Getting ready -- How to do it... -- Without embeddings -- With embeddings -- Sentiment analysis -- Getting ready -- How to do it... -- Full code listing -- Chapter 9: Text Summarization Using Keras Models -- Introduction -- Text summarization for reviews -- How to do it... -- Data processing -- Encoder-decoder architecture -- Training -- See also -- Chapter 10: Reinforcement Learning -- Introduction -- The CartPole game with Keras -- How to do it... -- Implementing the DQN agent -- The memory and remember -- The replay function -- The act function -- Hyperparameters for the DQN -- DQN agent class -- Training the agent -- Dueling DQN to play Cartpole -- Getting ready , DQN agent -- init method -- Setting the last layer of the network -- Dueling policy -- Init code base -- BoltzmannQPolicy -- Adjustment during training -- Sequential memory -- How to do it... -- Plotting the training and testing results -- Other Books You May Enjoy -- Index
    Additional Edition: Print version Dua, Rajdeep Keras Deep Learning Cookbook Birmingham : Packt Publishing, Limited,c2018 ISBN 9781788621755
    Language: English
    Keywords: Electronic books
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Book
    Book
    Bergisch Gladbach : Bastei Lübbe Verlag
    UID:
    kobvindex_VBRD-i97834042672860300
    Format: 300 S.; kt.
    ISBN: 9783404267286
    Content: Maya Mehra, eine immer noch bei ihren reichen indischen Eltern lebende 30-jährige verwöhnte Trendsetterin ohne geregelte Arbeit, soll nach Ansicht ihrer Familie endlich heiraten. Als Maya auch noch für die wiedergeborene Göttin Kali gehalten wird, sind turbulente Ereignisse vorprogrammiert.
    Language: German
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    UID:
    kobvindex_VBRD-i42600170660930164
    Format: 164 Min.
    ISBN: 4260017066093
    Uniform Title: Dil Dhadakne Do
    Content: Kamal & Neelam Mehra, eines der beliebtesten Paare der Delhi High Society sind seit fast 30 Jahren verheiratet. Um ihr bevorstehendes Jubiläum gebührend zu feiern, laden sie Freunde und den inneren Familienkreis zu einer 10-tägigen Kreuzfahrt durch Europa ein. Schon kurz nach der Zusammenkunft auf dem Schiff wird klar, dass die Mehras nur oberflächlich ein Bilderbuchleben führen. Kamals Firma steht kurz vor dem Bankrott; seine Ehefrau hat nur noch wenig für ihn übrig. Die Tochter Ayesha, eine kluge Geschäftsfrau, ist ihrer Ehe überdrüssig und will die Scheidung einreichen, zum Übel ihrer Eltern und des Ehegattens. Der Sohn Kabir, der das Familienunternehmen durch eine Heirat mit einer reichen Erbin retten soll, verliebt sich in eine Animateurin auf dem Schiff und beginnt zu realisieren, dass das Leben als Geschäftsmann nichts für ihn ist. Ist dies nun das gesellschaftliche Aus für die Mehras? Wie sollen sie angesichts all der Probleme der High Society gegenüber treten? Werden sie an Land finden und als glückliche Familie überleben?
    Language: German
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Santa Barbara, CA, USA] :punctum books
    UID:
    kobvindex_INT37074
    Format: 1 online resource (118 pages).
    Edition: 1st edition
    ISBN: 9781947447851 , 9781947447868
    Content: At once memoir, theory, poetic prose, and fragment, No Archive Will Restore You is a feverish meditation on the body. Departing from Antonio Gramsci's summons to compile an inventory of the historical traces left in each of us, Singh engages with both the impossibility and urgent necessity of crafting an archive of the body. Through reveries on the enduring legacies of pain, desire, sexuality, race, and identity, she asks us to sense and feel what we have been trained to disavow, to re-member the body as more than itself. Why this desire for a body archive, for an assembly of history's traces deposited in me? (I worry over how to describe it, how to frame it without sounding banal or bafflingly idiosyncratic.) The body archive is an attunement, a hopeful gathering, an act of love against the foreclosures of reason. It is a way of knowing the body-self as a becoming and unbecoming thing, of scrambling time and matter, of turning toward rather than against oneself. And vitally, it is a way of thinking-feeling the body's unbounded relation to other bodies. I begin then to compile an archive of my body, an activity that from the start feels discomfortingly intimate. Too intimate and too bewildering an undertaking, because like all other bodies mine has become so many things over time, has changed dramatically through forces both natural and social. I am also, it must be noted, a person whose body has been broken and maimed many times over-a fact that I cannot yet entirely account for.
    Note: Available through punctum books. , Mode of access: World Wide Web.
    Language: English
    URL: FULL
    URL: FULL
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Bradford, West Yorkshire : Emerald Publishing Limited
    UID:
    kobvindex_INT59840
    Format: 1 online resource (112 pages)
    Edition: 1st ed.
    ISBN: 9781800711853
    Series Statement: International Journal of Structural Integrity Series v.4
    Note: Cover -- Guest editorial -- Finite element analysis of gradient lattice structure patterns for bone implant design -- Three-dimensional fatigue crack growth simulation of embedded cracks using s-version FEM -- Effect of ballistic impact on Ti6Al-4V titanium alloy and 1070 carbon steel bi-layer armour panel -- The implementation of extrapolation with smoothing technique in solving stiff ordinary differential equations -- Analysis of stress intensity factor for fatigue crack using bootstrap S-version finite element model -- Hardening model of severe plastically deformed AA2024 by high-pressure torsion -- Moisture absorption effects on the mechanical properties of carbon/epoxy composites -- Detection of high stress concentration zone using magnetic flux leakage method -- Effect of chewing and cutting condition for V-shape three-dimensional titanium miniplate for fixation of mandibular angle fractures (MAFs) -- Fatigue damage assessment of reinforced concrete beam using average frequency and rise angle value of acoustic emission signal
    Additional Edition: Print version Singh, Salvinder Damage Mechanisms in Materials and Structures and Numerical Analysis in Engineering Bradford, West Yorkshire : Emerald Publishing Limited,c2020
    Language: English
    Keywords: Electronic books ; Electronic books
    URL: FULL  ((OIS Credentials Required))
    URL: FULL  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Bradford, West Yorkshire : Emerald Publishing Limited
    UID:
    kobvindex_INT59088
    Format: 1 online resource (201 pages)
    Edition: 1st ed.
    ISBN: 9781803829906
    Series Statement: Journal of Asia Business Studies v.2
    Note: C01_EM-JABS220015_print -- JABS_16_2_Text_V01 -- Guest editorial: Cutting-edge technologies for the development of Asian countries -- Introduction -- Between the technological and social determinisms -- The duality of cutting-edge technologies -- References -- Information technology investment and innovation performance: does investment paradox exist? -- 1. Introduction -- 2. Literature review -- 2.1 Benefits of information technology investment -- 2.2 Innovation performance in firms -- 3. Theoretical framework and hypotheses development -- 3.1 Research framework -- 3.2 Research hypotheses -- 4. Data and method -- 4.1 Data -- 4.2 Method -- 5. Results -- 5.1 Results for the full sample -- 5.2 Results for the manufacturing industry sample -- 5.3 Results for the software industry sample -- 6. Conclusions -- 7. Limitations and future research -- References -- Enabling organizational use of artificial intelligence: an employee perspective -- Introduction -- 2. Theoretical background -- 2.1 Theoretical framework -- 2.2 Conceptual framework and hypotheses development -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- 3. Research methodology -- 3.1 Sample and data collection -- 3.2 Methodological information and model building -- 4. Data analysis -- 4.1 Common method bias, multicollinearity -- 4.2 Exploratory factor analysis -- 4.3 Measurement model: reliability and validity -- 5. Results -- 5.1 Structural model results , 2.3 Artificial intelligence and narrow artificial intelligence in governments and defense sector -- 2.4 Artificial intelligence/narrow artificial intelligence, resource-based view and resources in defense sector -- 3. Research methodology and context -- 3.1 Context of the study: artificial intelligence in the Lebanese Armed Forces -- 4. Analysis and discussion of results -- 4.1 What are main challenges in the Lebanese Armed Forces from resource perspective? -- 4.2 Are there any signs of isomorphism in the Lebanese Armed Forces? -- 4.3 What structure of narrow artificiall intelligence applications should the Lebanese Armed Forces adopt or adapt to avoid isomorphism? -- 5. Conclusion and recommendations -- References -- FinTech innovation and knowledge flows in Hong Kong's financial sector: a social network analysis approach -- Introduction -- Technological innovation and patents -- A social network analysis approach to patents and knowledge flows -- Methods -- Data collection -- Data analysis -- Dependent variables -- Independent variables -- Control variables -- Results -- Discussion -- References -- Smart technologies challenges and issues in social inclusion - case of disabled youthin a developing country -- 1. Introduction -- 2. Literature review -- 2.1 Social inclusion and capability theory -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- 2.2 Role of smart technologies in social inclusion of disabled young people -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- 2.3 Background of disabled people in Lebanon -- 3. Methodology -- 4. Results and discussion -- 4.1 Acquired capabilities -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed , 5.2 Mediation analysis results -- 5.3 Results discussion -- 6. Contributions, limitations and conclusion -- 6.1 Theoretical contributions -- 6.2 Managerial implications -- 6.3 Limitations and future research -- 6.4 Conclusion -- References -- Artificial intelligence impact on banks clients and employees in an Asian developing country -- 1. Introduction and context of the study -- 1.1 Introduction -- 2. Research statement -- 3. Literature review -- 3.1 Theories of consumer behavior in the banking system -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- 3.2 Theories of employability in the banking system -- 3.3 Theory of financial innovation -- 3.4 Theoretical framework -- 4. Research methodology -- 4.1 Approach -- 4.2 Data collection -- 4.3 Methods of analysis -- 5 Results and findings -- 5.1 Schematic 1 -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Schematic 2 -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- 6. Conclusion and implications -- References -- Artificial intelligence in the defense sector: an RBV and isomorphism perspectives to the case of the Lebanese Armed Forces -- 1. Introduction -- 2. Literature review -- 2.1 Resource based view -- 2.2 Neo-institutional isomorphism in government and defense , Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- 3.3 Case 2: Company Y -- 3.4 Case 3: Company Z -- 4. Findings and discussions -- 4.1 Potential benefits of adopting disruptive technologies -- 4.2 Integration of Lean Six Sigma and digital technologies for process improvements -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- folink1 -- fivelink1 -- fivelink2 -- fivelink3 -- 5. Conclusion -- 6. Research limitations and future research directions -- References -- Unbanked to banked: reintermediation role of banks in e-government services for financial inclusion in an Indian context -- Introduction -- Literature review -- Role of financial institution in reintermediation: premises for financial inclusion through e-government services -- Demand side factors: empowering citizens through e-government intermediation -- Supply side factors: role of governments in financial inclusion -- Institution: intermediaries as facilitators in financial inclusion -- Innovation: a key to move from transactional to collaborative financial inclusion -- Framework for reintermediation: role of financial institutions -- Research methodology -- Preliminary research: general morphological analysis of financial inclusiveness -- Background of financial institutions chosen as sample for in-depth interviews -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed , Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- 4.2 Challenges -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- 5. Conclusion and future research perspectives -- References -- Understanding artificial intelligence: insights on China -- 1. Introduction -- 2. Literature review -- 3. Research methodology -- 4. Qualitative data analysis: processes and findings -- 4.1 Data collection and analysis -- 4.2 Theoretical framework -- 4.3 Artificial intelligence in China -- 4.4 Artificial intelligence in China: emerging results -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- 5. Discussion and conclusions -- References -- Digital transformations and supply chain management: a Lean Six Sigma perspective -- 1. Introduction -- 2. Literature review -- 2.1 Significance of digital transformation in the supply chain -- 2.2 Leveraging digital transformation for supply chain process improvements using Lean Six Sigma -- 2.3 Integrating Lean Six Sigma with data science in supply chain management -- 3. Research design and method -- 3.1 Case-study research -- 3.2 Case 1: Company X. , Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed
    Additional Edition: Print version Singh, Sanjay Cutting-Edge Technologies for the Development of Asian Countries Bradford, West Yorkshire : Emerald Publishing Limited,c2022
    Language: English
    Keywords: Electronic books ; Electronic books
    URL: FULL  ((OIS Credentials Required))
    URL: FULL  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    UID:
    kobvindex_INT73512
    Format: 1 online resource (133 pages)
    Edition: 1st ed.
    ISBN: 9789811655654 , 9789811655661
    Series Statement: SpringerBriefs in Public Health Series
    Note: Intro -- Foreword -- Preface -- Contents -- About the Editor -- Abbreviations and Acronyms -- 1 A Historic Paradigm Shift in Communicable Diseases in South-East Asia: From Control to Elimination -- 1.1 Introduction -- 1.2 Disease Elimination as a Goal-The Early Years -- 1.3 Disease Elimination and the Push for Universal Health Coverage -- 1.4 Elimination in the South-East Asia Region -- 1.5 The Way Forward -- References -- 2 Thailand: Elimination of Mother-to-Child Transmission of HIV and Syphilis -- 2.1 Background -- 2.2 The Process -- 2.2.1 The Initial years -- 2.2.2 Reducing Costs -- 2.2.3 Moving Towards Elimination -- 2.3 Other Factors for Success -- 2.4 Maintenance of Validation -- References -- 3 Yaws: Freeing Young Children in India from an Old Scourge -- 3.1 Background -- 3.2 Disease of the Young -- 3.3 India's Approach to Yaws Elimination -- 3.4 Challenges Faced by India in Its Efforts to Eliminate Yaws -- 3.5 Yaws Elimination in India: Key Elements of Success -- 3.6 The Road Ahead: Lessons Learned -- References -- 4 The Maldives: A Long Battle to Banish Malaria -- 4.1 Background -- 4.2 Challenges Faced in Eliminating Malaria -- 4.3 The Maldives' Approach to Malaria Elimination: Long Road -- 4.4 Key Elements of Success -- 4.5 Moving Forward: Lessons Learnt -- References -- 5 Unburdening the Poor: Elimination of Lymphatic Filariasis in the Maldives -- 5.1 Background -- 5.2 Blueprint for Elimination -- 5.3 Overcoming Challenges to Eliminating Lymphatic Filariasis -- 5.4 Long Campaign to Eliminate Lymphatic Filariasis -- 5.5 Key Elements of Success -- 5.6 Moving Forward: Lessons Learnt -- References -- 6 Sri Lanka: Long Battle to Eliminate Malaria -- 6.1 Background -- 6.2 Malaria in Sri Lanka -- 6.3 A Century of Malaria Control -- 6.4 Challenges to Malaria Control -- 6.5 Elements of Success -- 6.6 Lessons Learnt -- 6.7 Challenges Ahead , 11.2 How EMTCT is Organized Within Maldives' Health System -- 11.3 Leaping to EMTCT from a Springboard of Maternal and Child Health Services -- 11.4 Addressing Challenges by Capitalizing on Opportunities -- 11.5 Key Highlights of Maldives' Successful Validation of EMTCT -- 11.6 Sustaining the Achievement of EMTCT-The Way Forward for Maldives -- References -- 12 Leprosy: Accelerating Towards a Leprosy-Free World -- 12.1 Background -- 12.2 The Emergence of Multidrug Therapy -- 12.3 Elimination Strategies -- 12.4 Lessons Learnt -- 12.5 The Road Ahead -- References , References -- 7 Lymphatic Filariasis Elimination in Sri Lanka: Overcoming the Odds -- 7.1 Background -- 7.2 Road to Elimination of Lymphatic Filariasis -- 7.3 Overcoming the Challenges to Eliminating Lymphatic Filariasis -- 7.4 Key Elements of Success -- 7.5 Moving Forward -- References -- 8 Elimination of Lymphatic Filariasis in Thailand: A Model for Best Practices -- 8.1 Background -- 8.2 Thailand's Approach to Elimination of Lymphatic Filariasis -- 8.3 Challenges to Eliminating Lymphatic Filariasis -- 8.4 Lymphatic Filariasis Elimination: Key Elements of Success -- 8.5 Moving Forward: Lessons Learnt -- References -- 9 Trachoma Elimination in Nepal: Bringing Light, Preventing Darkness -- 9.1 Background -- 9.2 Efforts to Eliminate Trachoma -- 9.3 Beginning of the Elimination Journey in Nepal -- 9.4 Elimination Strategy and Implementation -- 9.4.1 Assessing the Burden -- 9.4.2 Medical Interventions -- 9.4.3 Focus on Cleanliness -- 9.4.4 Surveillance -- 9.5 Overcoming Obstacles -- 9.6 Post-Elimination Challenges -- References -- 10 Sri Lanka Marches Ahead and achieves Elimination of Mother-to-Child Transmission of HIV and Syphilis -- 10.1 Background -- 10.2 Sri Lanka Takes up the Challenge -- 10.2.1 HIV Scenario and EMTCT of HIV -- 10.2.2 Syphilis Scenario and EMTCT of Syphilis -- 10.3 Key Factors that Helped Sri Lanka Achieve Elimination -- 10.3.1 Strong Public Health Services -- 10.3.2 Quick Updating of Guidelines Based on Emerging Evidence -- 10.3.3 A Comprehensive Approach to Prevent Infections Among Women -- 10.3.4 Multisectoral Coordination Was the Key to Elimination -- 10.3.5 Sound Financial Support -- References -- 11 Leveraging Health System Gains Towards Eliminating Mother-to-Child Transmission (EMTCT) of HIV and Syphilis: How Maldives Became the Second Country in WHO South-East Asia Region to Achieve This Feat -- 11.1 Background
    Additional Edition: Print version Singh, Poonam Khetrapal Elimination of Infectious Diseases from the South-East Asia Region Singapore : Springer,c2022 ISBN 9789811655654
    Language: English
    Keywords: Electronic books
    URL: FULL  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Book
    Book
    Köln : LYX Egmont
    UID:
    kobvindex_VBRD-i97838025992790411
    Format: 411 S.
    ISBN: 9783802599279
    Content: Als Charlotte Baird nach Feierabend von einem unbekannten Mann in ihrem Büro überrascht wird und ihm vor Schreck einen Tacker an den Kopf wirft, ahnt sie noch nicht, dass dies die misglückte erste Begegnung mit Gabriel Bishop, ihrem neuen Chef ist. Als er sie am nächsten Tag in sein Büro zitiert, macht sie sich auf das Schlimmste gefasst, doch alles kommt anders, als sie denkt: Gabriel ernennt sie zu seiner persönlichen Assistentin! Ein Schock für Charlotte, die sich lieber unauffällig im Hintergrund hält - und schon jetzt spürt, dass sie Gabriels Charme nicht gewachsen ist!
    Note: Ins Deutsche übertragen von Patricia Woitynek
    Language: German
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages