You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book provides original, innovative, and international tourism research that is embedded in interdisciplinary and transdisciplinary theoretical and methodological thought in the study of dark tourism. It is almost 25 years since the idea of dark tourism was introduced and presented into the field of tourism studies. The impact of this idea was greater, which attracted a great deal of attention from different researchers and practitioners with a good range of disciplines and farther tourism studies. This edited volume aims to capture a glimpse of the types of cutting-edge thinking and academic research in the domain of dark tourism studies as well as encourage and advance theoretical, con...
These notes deal with a set of interrelated problems and results in algebraic number theory, in which there has been renewed activity in recent years. The underlying tool is the theory of the central extensions and, in most general terms, the underlying aim is to use class field theoretic methods to reach beyond Abelian extensions. One purpose of this book is to give an introductory survey, assuming the basic theorems of class field theory as mostly recalled in section 1 and giving a central role to the Tate cohomology groups $\hat H{}^{-1}$. The principal aim is, however, to use the general theory as developed here, together with the special features of class field theory over $\mathbf Q$, ...
This book examines relationships between pairwise comparisons matrices. It first provides an overview of the latest theories of pairwise comparisons in decision making, discussing the pairwise comparison matrix, a fundamental tool for further investigation, as a deterministic matrix with given elements. Subsequent chapters then investigate these matrices under uncertainty, as a matrix with vague elements (fuzzy and/or intuitionistic fuzzy ones), and also as random elements. The second part of the book describes the application of the theoretical results in the three most popular multicriteria decision-making methods: the Analytic Hierarchy Process (AHP), PROMETHEE and TOPSIS. This book appeals to scholars in areas such as decision theory, operations research, optimization theory, algebra, interval analysis and fuzzy sets.
In its 114th year, Billboard remains the world's premier weekly music publication and a diverse digital, events, brand, content and data licensing platform. Billboard publishes the most trusted charts and offers unrivaled reporting about the latest music, video, gaming, media, digital and mobile entertainment issues and trends.
None
This third edition offers comprehensive, up-to-date coverage of all areas of interventional pulmonology, a minimally invasive endoscopic method for diagnosing and treating lung disorders. The text is divided into nine sections on the major areas of interventional pulmonology, including basic bronchoscopy, lung cancer staging, tracheobronchial obstructions, endobronchial treatments for asthma and emphysema, as well as a new section on interventional procedures during the COVID-19 pandemic. Chapters explore specific procedures and techniques, including medical thoracoscopy, flexible and rigid bronchoscopy, endobronchial ultrasound, and electromagnetical navigation with coverage of history, ind...
This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, held in York, UK, in March 2009, in association with ETAPS 2009. The 12 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 27 submissions. The papers feature topics including formal specification, analysis and design of security protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, the modeling of information flow and its application to confidentiality policies, system composition and covert channel analysis.