- Table View
- List View
The Adventures of the Black Girl in Her Search for God (Hesperus Classics Ser.)
by Bernard ShawWhere is God? Taking the maxim 'seek and ye shall find' literally, a recently converted African girl embarks upon her own quest to find God. With only her bible as a guide she plunges into the jungle, where alongside snakes and lions she meets a dazzling array of religious and philosophical figures, from the God of Noah to Jesus, the Prophet and Voltaire, each one seeking to convince her of their claim to truth. So controversial was Shaw's Adventures of the Black Girl in Her Search for God when it first appeared in 1932 that it provoked a public outcry, with Shaw decried as a blasphemer. This brilliantly sardonic allegory showcases some of Shaw's more unorthodox thoughts on race, religion and God, while remaining a fascinating tale of the universal search for truth.
Handbook of Sleep Research (Handbook of Behavioral Neuroscience #Volume 30)
by Hans C. DringenbergHandbook of Sleep Research, Volume 30, provides a comprehensive review of the current status of the neuroscience of sleep research. It begins with an overview of the neural, hormonal and genetic mechanisms of sleep and wake regulation before outlining the various proposed functions of sleep and the role it plays in plasticity, and in learning and memory. Finally, the book discusses disorders of sleep and waking, covering both lifestyle factors that cause disrupted sleep and psychiatric and neurological conditions that contribute to disorders. - Emphasizes a comparative and multidisciplinary approach to the topic of sleep - Covers the neurobiology and physiology of sleep stages, mechanisms of waking, and dreaming - Discusses in detail the proposed functions of sleep, from health and rest, to memory consolidation and synaptic plasticity - Examines the current state of research in mammalian and non-mammalian species, ranging from primates to invertebrates
All the Hearts You Eat
by Hailey PiperA visceral and heartbreaking work of gothic horror about small town mysteries, local folklore and the things we leave behind when we're gone, from the Bram Stoker Award winning author of Queen of Teeth. What really happened to Cabrina Brite? Ivory's life changes irrevocably when she discovers the body of Cabrina Brite on the sands of Cape Morning, along with a mysterious poem. How did she die, and why does it seem she was trying to swim to Ghost Cat Island, the center of so many local mysteries? Desperate to uncover the answers surrounding Cabrina's death, and haunted by her discovery, Ivory begins to see the pale ghost of Cabrina, only to shake it off as a mere hallucination. But Ivory is not alone. Cabrina's closest friends have also seen a similar apparition, and as they toy with occult possibilities, they begin to unravel the truth behind Cabrina's death. Because Cape Morning isn't a ghost town, but a town filled with ghosts, and Ivory is about to discover just what happens when you let one in.
How to Build a Digital Library (The\morgan Kaufmann Series In Multimedia Information And Systems Ser.)
by Ian H. Witten David Bainbridge David M. NicholsHow to Build a Digital Library reviews knowledge and tools to construct and maintain a digital library, regardless of the size or purpose. A resource for individuals, agencies, and institutions wishing to put this powerful tool to work in their burgeoning information treasuries. The Second Edition reflects developments in the field as well as in the Greenstone Digital Library open source software. In Part I, the authors have added an entire new chapter on user groups, user support, collaborative browsing, user contributions, and so on. There is also new material on content-based queries, map-based queries, cross-media queries. There is an increased emphasis placed on multimedia by adding a "digitizing" section to each major media type. A new chapter has also been added on "internationalization," which will address Unicode standards, multi-language interfaces and collections, and issues with non-European languages (Chinese, Hindi, etc.). Part II, the software tools section, has been completely rewritten to reflect the new developments in Greenstone Digital Library Software, an internationally popular open source software tool with a comprehensive graphical facility for creating and maintaining digital libraries. - Outlines the history of libraries on both traditional and digital - Written for both technical and non-technical audiences and covers the entire spectrum of media, including text, images, audio, video, and related XML standards - Web-enhanced with software documentation, color illustrations, full-text index, source code, and more
Handbook of Amygdala Structure and Function (Handbook of Behavioral Neuroscience #Volume 32)
by Janice H. Urban J. Amiel RosenkranzHandbook of Amygdala Structure and Function, Volume 26, provides an updated overview on the functional neuroanatomy of amygdala nuclei, with an emphasis on interconnections (basolateral, central amygdala, medial amygdala) and their integration into related networks/circuits (prefrontal cortex, bed nucleus, nucleus accumbens). The design of this volume builds upon the foundations of functional neural circuits and the corresponding (cellular) electrophysiology important for the homeostatic control of amygdala function. This volume contains a dedicated section on the anatomical organization of the amygdala nuclei, emphasizing the role of neurotransmitters and neuropeptides that integrate signals and regulate behavior. Additional chapters discuss cellular physiology, plasticity and the integration of electrical signals that contribute to neural activity. The final section of the book connects the role of amygdala dysfunction and the development of disorders in human health and disease. - Emphasizes a comparative and multidisciplinary approach on the topic of the amygdala - Discusses, in detail, the role of amygdala dysfunction and the development of disorders in human health and disease - Examines the current state of research in cellular physiology, plasticity and the integration of electrical signals - Includes a dedicated section on neuropeptides, neurotransmitters and cannabinoids that links to behavior control
Central Serous Chorioretinopathy
by Jay ChhablaniCentral Serous Chorioretinopathy discusses the mechanisms, pathogenesis and risk factors of CSCR, findings on various imaging modalities, available treatment options, and translational research into new treatment options for CSCR management. This comprehensive book is written for retina specialists and surgeons, researchers and clinical practitioners in sensory systems (vision), and ophthalmologists. Central Serous Chorioretinopathy (CSCR) is a common disorder across the world with a variable prognosis without any standard of care. Recently, advancements in imaging have led to a better understanding of the pathogenesis and mechanisms of this disease. - Summarizes the clinical understanding of CSCR - Explores pathogenesis, molecular mechanisms and risk factors - Compares angiography, tomography and additional imaging modalities - Identifies the best treatment practices - Discusses new laser, photodynamic and oral medication treatments, along with translational research into potential new treatments
Julian the Apostate (Debates and Documents in Ancient History)
by Shaun TougherThis new study of the last pagan Roman emperor provides remarkable insight into the man and his times.The figure of Julian demands the attention of historians. As the last pagan Roman Emperor, he provides a focus for studying the religious transformations that were taking place in the empire in the fourth century. Further, his secular policies and concerns concentrate attention on other transformations – social and political – within the period.Notably, Julian elicited sharply divided opinion from his contemporaries, which is largely polarised between pagan supporters and Christian opponents. Such division of opinion is also matched by the modern literature on him. Was he the prospective saviour of the Roman Empire, or was he out-of-touch and living in the past? Was he an evangelist for Mithraism, or an altogether more traditional pagan? Was he a shrewd military man, or a rash risk-taker whose luck spectacularly ran out on his Persian expedition? These questions and more are asked and discussed, allowing students to reach their own verdict on this exciting and controversial emperor.Key Features:*Issues of historical significance are identified and discussed*Key passages of text are gathered and accessible in one volume*Modern interpretations of Julian are presented and considered
A Glossary of Corpus Linguistics (Glossaries in Linguistics)
by Paul Baker Andrew Hardie Tony McEneryWritten by a team of experienced academics in the field, this alphabetic guide provides definitions and discussions of key terms used in corpus linguistics.
How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access (How to Cheat)
by Henrik WaltherThe Perfect Reference for the Multitasked System AdministratorsThe new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average system administrator, it will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat will help you get Exchange Server 2007 up and running as quickly and safely as possible.• Understand Exchange 2007 PrerequisitesReview hardware and software requirements, Active Directory requirements, and more.• Manage Recipient FilteringCreate a custom MMC that contains the Exchange 2007 Recipients work center, which can be used, for example, by the helpdesk staff in your organization.• Manage Outlook AnywhereOutlook Anywhere makes it possible for your end users to remotely access their mailboxes from the Internet using their full Outlook clients.• Manage Outlook Web Access 2007See how Outlook Web Access 2007 was completely rewritten in managed code to make it scale even better.• Use the Exchange 2007 Queue ViewerYou can now view information about queues and examine the messages held within them.• Master Powerful Out-of-the-Box Spam ProtectionThe Edge Transport server supports SMTP, provides several antispam filtering agents, and supports antivirus extensibility.• Manage a Single-Copy Cluster-Based SetupSCC-based cluster provides service failover and still has a single point of failure when it comes to the databases.• Recover Mailbox DatabasesUse the improved database portability feature to port and recover a Mailbox database to any server in the Exchange 2007 organization. - Essential information for the multi-tasked System Administrator charged perform everyday tasks - Includes the latest coverage of the major new release of Exchange Server - Emphasizes best-practice security measures for all areas and in particular the area of remote access via Outlook
Model Management and Analytics for Large Scale Systems
by Bedir Tekinerdogan Önder Babur Loek Cleophas Mark van den Brand Mehmet AkşitModel Management and Analytics for Large Scale Systems covers the use of models and related artefacts (such as metamodels and model transformations) as central elements for tackling the complexity of building systems and managing data. With their increased use across diverse settings, the complexity, size, multiplicity and variety of those artefacts has increased. Originally developed for software engineering, these approaches can now be used to simplify the analytics of large-scale models and automate complex data analysis processes. Those in the field of data science will gain novel insights on the topic of model analytics that go beyond both model-based development and data analytics. This book is aimed at both researchers and practitioners who are interested in model-based development and the analytics of large-scale models, ranging from big data management and analytics, to enterprise domains. The book could also be used in graduate courses on model development, data analytics and data management. - Identifies key problems and offers solution approaches and tools that have been developed or are necessary for model management and analytics - Explores basic theory and background, current research topics, related challenges and the research directions for model management and analytics - Provides a complete overview of model management and analytics frameworks, the different types of analytics (descriptive, diagnostics, predictive and prescriptive), the required modelling and method steps, and important future directions
Management of Seizures in Neurosurgical Practice: Elements in Emergency Neurosurgery
by Julie Woodfield Susan DuncanSeizures are a presenting feature of many neurosurgical disorders, and can arise as a result of neurosurgical treatment or its complications. Recognition and effective management of seizures can be life-saving, and will minimise long term seizure induced morbidity. In this Element the authors describe seizure diagnosis, emergency and ongoing management, and considerations in neurosurgical conditions.
Acute Spontaneous Posterior Fossa Haemorrhage: Elements in Emergency Neurosurgery
by Lauren Harris Patrick GroverNon-traumatic posterior fossa haemorrhage accounts for approximately 10% of all intracranial haematomas, and 1.5% of all strokes. In the posterior fossa, a small amount of mass effect can have dramatic effects, due to its small volume. This can be due to immediate transmission of pressure to the brainstem, or via occlusion of the aqueduct of Sylvius or compression of the fourth ventricle, leading to acute obstructive hydrocephalus, with the risk of tonsillar herniation. Timely investigations and management are essential to maximise good outcomes. This Element offers a brief overview of posterior fossa haemorrhage. It looks at the anatomy, aetiology, management, and surgical options, with a review of the available evidence to guide practice.
Neuroprotection in Autism, Schizophrenia and Alzheimer's disease
by Illana Gozes Joseph LevineNeuroprotection in Autism, Schizophrenia and Alzheimer's Disease provides an up-to-date overview on recent clinical studies and the similarities discovered in the most prevalent brain disorders. The book's content will help shed light on basic mechanisms and provide new avenues for early diagnosis toward disease prevention and disease modification. It is written for researchers, clinicians and medical physicians in neuroscience, neurology and psychiatry. Sections discuss the shared pathophysiological mechanisms that underlie autism, schizophrenia/mood disorders and Alzheimer's disease, i.e. neurodevelopmental disorders, neuropsychiatric diseases and neurodegenerative disorders. - Offers an up-to-date overview of basic and clinical studies concerning similarities in the most prevalent brain disorders - Helps the reader become familiar with novel neuroprotective mechanisms and experimental treatment modalities in these difficult to treat disorders - Written for researchers, clinicians and medical physicians in neuroscience, neurology and psychiatry
Behavioral Evidence Analysis: International Forensic Practice and Protocols
by Brent E. Turvey Manuel A. EsparzaThe criminal profiling community can easily be split into two separate groups: those that have written criminalprofiles and those that have not. It is an important distinction, because report writing is one of the mostimportant requirements of good scientific practice. The process of writing up findings helps to reveal flaws inan examiner's logic so that they can be amended or revisited; the final report memorializes findings and theirunderlying basis at a fixed point in time; and as a document a forensic report provides the best mechanism fortransparency and peer review. The problem is that many criminal profilers have not written criminal profiles,and still more prefer that this remain the case, often to conceal their lack of methodology. The contributors to this volume have travelled the world for more than a decade to lecture on the subjects ofcrime scene analysis and criminal profiling. The result has been a steady stream of requests from educationalinstitutions and government agencies alike to teach the application of criminal profiling theory. Everyonehas read the books, everyone has attended the lecture; but few have experience with hands on practice andapplication. In other words, there is a growing number of serious professionals who want to know how to puttheory into practice and then learn what it means to put their findings into written form. Behavioral Evidence Analysis: International Forensic Practice and Protocols has been written as a companiontext to Turvey's Criminal Profiling, now in its fourth edition. It is meant to provide the legion of instructors thatare teaching criminal profiling as a subject with real world examples of case reports. It is also meant to serveas a desk reference for professionals that are writing crime scene analysis and criminal profiling reports, toenable sampling of structure, terminology, and references. - One of a kind desk reference containing actual criminal profiles for student and examiner reference - Contributions prepared by an international group of board-certified criminal profilers - Reports are prepared in relation to both investigative and forensic contexts - Demonstrates the utility of criminal profiling in both teaching and casework - Compliant with practice standards and ethical guidelines published by the International Association of Forensic Criminologists, the Academy of Behavioral Profiling, and the Global Forensic Alliance
Our Wired Nerves: The Human Nerve Connectome
by Douglas W ZochodneThe nervous system is a complex, sophisticated system that regulates and coordinates body activities. It is made up of two major divisions: the central nervous system consisting of the brain and spinal cord and the peripheral nervous system. This consists of all other neural elements, including the peripheral nerves and the autonomic nerves. Peripheral nerves are the essential connections between the brain and spinal cord and the body. Without nerves there is no movement or sensation. Our Wired Nerves: The Human Nerve Connectome, reviews the essential anatomy and physiology of the peripheral nerve. It introduces the reader to what neuropathies are, how pain arises from damaged nerves and how nerves might be regenerated, including new and exciting ideas over how to coax their regrowth. Written by Dr. Douglas Zochodne leading expert in the field, and first book to focus on the Peripheral nerves it will surely be an essential reference for researchers and clinicians alike. - Discusses the barriers to nerve regrowth and new strategies to reverse them - Reviews of disorders of the peripheral nerves - Exams reasons for nerve injuries - Reviews recent discoveries in nerve research
Mild Traumatic Brain Injury Including Concussion: Elements in Emergency Neurosurgery (PDF)
by Thomas D. Parker Colette GriffinMost traumatic brain injury (TBI) cases are considered mild. Precise definitions vary, but typically, loss of consciousness and post-traumatic amnesia duration is brief (e.g. <30 minutes and <24 hours respectively), and standard imaging is normal. Prognosis in mild TBI is generally good, but disabling persistent symptoms such as headaches, dizziness, affective and cognitive issues are common. A focussed assessment tailored to each individual symptom is crucial for management. Advanced MRI and blood-based biomarkers of mild TBI are emerging and are likely to play an increasingly important role in the assessment of patients following a head injury.
Clinical Priority for Common Emergency and Urgent Conditions in Neurosurgery: Elements in Emergency Neurosurgery (PDF)
by Taha Lilo Ioannis FouyasEmergency Neurosurgery is a constantly evolving specialty, resulting in ever increasing challenges posed on the higher specialty trainee. The focus of this Element is to guide the reader on the application of robust and easily applicable management strategies whilst dealing with the most challenging aspects of their professional workload. The authors have categorised the various subgroups of emergency neurosurgical workload, devised a comprehensive management algorithm, included case scenaria related to the most challenging emergency situations and highlighted easily overlooked clinical information. In summary, this Element will provide robust and easily applicable management strategies whilst dealing with the most challenging aspects of the emergency neurosurgical workload.
Service Computing: Concept, Method and Technology (Advanced Topics In Science And Technology In China Ser. #58)
by Zhaohui WuService computing is a cross-disciplinary field that covers science and technology, and represents a promising direction for distributed computing and software development methodologies. It aims to bridge the gap between business services and IT services by supporting the whole lifecycle of services innovation. Over the last ten years applications in industry and academic research have produced considerable progress and success Service Computing: Concept, Method and Technology presents the concept of service computing and a proposed reference architecture for service computing research before proceeding to introduce two underlying technologies: Web services and service-oriented architecture. It also presents the authors' latest research findings on hot topics such as service discovery, recommendation, composition, verification, service trust, dynamic configuration and big data service. Some new models and methods are proposed including three service discovery methods based on semantics and skyline technologies, two service recommendation methods using graph mining and QoS prediction, two service composition methods with graph planning and one service verification method using p calculus and so on. Moreover, this book introduces JTang, an underlying platform supporting service computing, which is a product of the authors' last ten years of research and development. - Systematically reviews all the research on service computing - Introduces state-of-art research works on service computing and provides a road map for future directions - Bridges the gap between service computing theory and practice - Provides guidance for both industry and academia
Phonetics in the Brain: Elements in Phonetics (PDF)
by Pelle SöderströmSpoken language is a rapidly unfolding signal: a complex code that the listener must crack to understand what is being said. From the structures of the inner ear through to higher-order areas of the brain, a hierarchy of interlinked processes transforms the acoustic signal into a linguistic message within fractions of a second. This Element outlines how we perceive speech and explores what the auditory system needs to achieve to make this possible. It traces a path through the system and discusses the mechanisms that enable us to perceive speech as a coherent sequence of words. This is combined with a brief history of research into language and the brain beginning in the nineteenth century, as well as an overview of the state-of-the-art neuroimaging and analysis techniques that are used to investigate phonetics in the brain today.
Security in IoT Social Networks (Intelligent Data-Centric Systems)
by Fadi Al-Turjman B. D. DeebakSecurity in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searching, and mining for corresponding research issues, as well as designing and analyzing models for resolving such challenges. The book will help start-ups grow, providing research directions concerning security mechanisms and protocols for social information networks. The book covers structural analysis of large social information networks, elucidating models and algorithms and their fundamental properties. Moreover, this book includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models. This book is a detailed reference for academicians, professionals, and young researchers. The wide range of topics provides extensive information and data for future research challenges in present-day social information networks. - Provides several characteristics of social, network, and physical security associated with social information networks - Presents the security mechanisms and events related to social information networks - Covers emerging topics, such as network information structures like on-line social networks, heterogeneous and homogeneous information networks, and modern information networks - Includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models
Parallel Computing: Fundamentals And Applications (Advances in Parallel Computing #Volume 12)
by E. H. D'Hollander F. J. Peters G. R. Joubert U. Trottenberg R. VölpelThis volume gives an overview of the state-of-the-art with respect to the development of all types of parallel computers and their application to a wide range of problem areas. The international conference on parallel computing ParCo97 (Parallel Computing 97) was held in Bonn, Germany from 19 to 22 September 1997. The first conference in this biannual series was held in 1983 in Berlin. Further conferences were held in Leiden (The Netherlands), London (UK), Grenoble (France) and Gent (Belgium). From the outset the aim with the ParCo (Parallel Computing) conferences was to promote the application of parallel computers to solve real life problems. In the case of ParCo97 a new milestone was reached in that more than half of the papers and posters presented were concerned with application aspects. This fact reflects the coming of age of parallel computing. Some 200 papers were submitted to the Program Committee by authors from all over the world. The final programme consisted of four invited papers, 71 contributed scientific/industrial papers and 45 posters. In addition a panel discussion on Parallel Computing and the Evolution of Cyberspace was held. During and after the conference all final contributions were refereed. Only those papers and posters accepted during this final screening process are included in this volume. The practical emphasis of the conference was accentuated by an industrial exhibition where companies demonstrated the newest developments in parallel processing equipment and software. Speakers from participating companies presented papers in industrial sessions in which new developments in parallel computing were reported.
Forensic Plant Science
by Jane H Bock David O. NorrisForensic botany is the application of plant science to the resolution of legal questions. A plant's anatomy and its ecological requirements are in some cases species specific and require taxonomic verification; correct interpretation of botanical evidence can give vital information about a crime scene or a suspect or victim. The use of botanical evidence in legal investigations in North America is relatively recent. The first botanical testimony to be heard in a North American court concerned the kidnapping and murder of Charles Lindbergh's baby boy and the conviction of Bruno Hauptmann in 1935. Today, forensic botany encompasses numerous subdisciplines of plant science, such as plant anatomy, taxonomy, ecology, palynology, and diatomology, and interfaces with other disciplines, e.g., molecular biology, limnology and oceanography.Forensic Plant Science presents chapters on plant science evidence, plant anatomy, plant taxonomic evidence, plant ecology, case studies for all of the above, as well as the educational pathways for the future of forensic plant science. - Provides techniques, collection methods, and analysis of digested plant materials - Shows how to identify plants of use for crime scene and associated evidence in criminal cases - The book's companion website: http://booksite.elsevier.com/9780128014752, will host a microscopic atlas of common food plants
Medical Data Sharing, Harmonization and Analytics
by Vasileios Pezoulas Themis Exarchos Dimitrios I FotiadisMedical Data Sharing, Harmonization and Analytics serves as the basis for understanding the rapidly evolving field of medical data harmonization combined with the latest cloud infrastructures for storing the harmonized (shared) data. Chapters cover the latest research and applications on data sharing and protection in the medical domain, cohort integration through the recent advancements in data harmonization, cloud computing for storing and securing the patient data, and data analytics for effectively processing the harmonized data. - Examines the unmet needs in chronic diseases as a part of medical data sharing - Discusses ethical, legal and privacy issues as part of data protection - Combines data harmonization and big data analytics strategies in shared medical data, along with relevant case studies in chronic diseases
A Guide to Clinical Supervision: The Supervision Pyramid
by Loredana-Ileana Viscu Clifton Edward Watkins JrA Guide to Clinical Supervision: The Supervision Pyramid provides a combined view of theory and research-based, step-by-step guidelines for conducting supervision. This book focuses on one main tool, The Supervision Pyramid, a clear and dynamic model covering multifacets of the supervisory process. It provides readers with a system of competencies within the current framework of competency based learning and evaluations within training standards. Case examples, sample forms, questions for reflection and group activities are included throughout the book. Each chapter connects the Supervision Pyramid with practical activities, while also providing a detailed summary at the end of each chapter. - Outlines the standard of competencies for clinical supervisors - Breaks down the teaching strategies used in the Supervision Pyramid - Presents methodologies, results and an analysis of conducted studies
Human Prion Diseases (Handbook of Clinical Neurology #Volume 153)
by Maurizio Pocchiari Jean MansonHuman Prion Diseases, Volume 153 is designed to update the reader on the latest advances and clinical aspects of prion diseases. The book is organized into five sections, including the pathophysiology of prions and a description of animal and human diseases. This is followed by detailed reports on recent advances in diagnosis strategies for the development of novel anti-prion molecules and possible designs of clinical trials in such a rare disease. An introductory chapter gives an extensive historical background of prion research, with a final chapter highlighting recent progress, and more importantly, unsolved problems. - Offers an authoritative overview of prion diseases in humans, detailing the pathogenesis of the disease, clinical investigations, and the diagnosis of both the genetic and acquired forms - Provides clarity and context by presenting prion diseases in relation to other neurodegenerative diseases in humans - Emphasizes the unique properties of prion diseases and consequent problems they can cause, both clinically and in public health terms