You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
None
Containing the Proceedings of the Third International Conference on Physics Beyond the Standard Model, this book reports the latest experimental and theoretical results and ideas in this exciting field, at the interface between particle physics, astrophysics, and nuclear physics. Taken as a whole, this book presents an overview of the current status of the field and a valuable analysis of future trends in theory and experimental approaches across particle astrophysics.
Contemporary social science in general and economics in particular are dominated by the method of logical positivism in the British tradition. In contrast to the British philosophy, Subjectivism and Interpretative Methodology in Theory and Practice adopts subjectivism and interpretation methodology to understand human behavior and social action. Unlike positivism, this subjectivist approach, with its root in German idealism, takes human experience as the sole foundation of factual knowledge. All objective facts have to be interpreted and evaluated by human minds. In this approach, experience, knowledge, expectation, plans, errors and revision of plans are key elements. Specifically, this volume uses the subjectivist approach originated in Max Weber’s interpretation method, Alfred Schutz’s phenomenology, and Peter Berger and Thomas Luckmann’s sociology of knowledge to understand economic and social phenomena. The method brings human agency back into the forefront of analysis, adding new insights not only in economics and management, but also in sociology, politics, psychology and organizational behavior.
This book constitutes the refereed proceedings of the Infrastructure Security Conference, InfraSec 2002, held in Bristol, UK in October 2002. The 23 revised full papers presented were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on biometrics; identification, authentication, and process; analysis process; mobile networks; vulnerability assessment and logs; systems design; formal methods; cryptographic techniques, and networks.
This comprehensive volume describes in depth all the Celtic languages from historical, structural and sociolinguistic perspectives, with individual chapters on Irish, Scottish, Gaelic, Manx, Welsh, Breton and Cornish. Organized for ease of reference, The Celtic Languages is arranged in four parts. The first, Historical Aspects, covers the origin and history of the Celtic languages, their spread and retreat, present-day distribution and a sketch of the extant and recently extant languages. Parts II and III describe the structural detail of each language, including phonology, mutation, morphology, syntax, dialectology and lexis. The final part provides wide-ranging sociolinguistic detail, such...
This book reviews current research on the important processes involved in neurodegenerative diseases (e.g. Alzheimer's disease) and the peptides and proteins involved in the amyloidogenic processes. It covers the design and developments of anti-amyloid inhibitors, and gives readers a fundamental understanding of the underlying oligomerization and aggregation processes of these diseases from both computational and experimental points of view.
This book constitutes the proceedings of the 23rd International Workshop on Computer Algebra in Scientific Computing, CASC 2021, held in Sochi, Russia, in September 2021. The 24 full papers presented together with 1 invited talk were carefully reviewed and selected from 40 submissions. The papers cover theoretical computer algebra and its applications in scientific computing.
This book combines semi-physical simulation technology with an Internet of Things (IOT) application system based on novel mathematical methods such as the Fisher matrix, artificial neural networks, thermodynamic analysis, support vector machines, and image processing algorithms. The dynamic testing and semi-physical verification of the theory and application were conducted for typical IOT systems such as RFID systems, Internet of Vehicles systems, and two-dimensional barcode recognition systems. The findings presented are of great scientific significance and have wide application potential for solving bottlenecks in the development of RFID technology and IOT engineering. The book is a valuable resource for postgraduate students in fields such as computer science and technology, control science and engineering, and information science. Moreover, it is a useful reference resource for researchers in IOT and RFID-related industries, logistics practitioners, and system integrators.