Browse Results

Showing 15,151 through 15,175 of 68,680 results

Cut Flowers and Foliages (Crop Production Science in Horticulture)

by Raul I Cabrera Elizabeth Cieniewicz Melissa Muñoz Henry Wainwright

The cut flower and foliage industry is a global business with major production locations in North America, South America, Central America, East Africa, Europe, the Middle East, Asia, Australia and New Zealand. Few other horticulture crops are as ubiquitous, yet the production techniques and challenges are universal. This book describes the main international production locations and markets, including current trends and directions. The focus is on production in protected cultivation. The major species - including rose, chrysanthemum, carnation, orchid and gerbera - dominate the global market and these are individually explored in detail. Specialty species and cut foliages are also addressed, as well as significant details of production, including irrigation and fertilization, disease and disease management, and biological control of pests. Finally, the postharvest chapter covers details of harvesting, transporting and delivering high quality flowers that provide an excellent vase life. Highly illustrated with color photos throughout, this is an essential resource for students and researchers in horticulture, growers and producers, and those in the floriculture industry.

Cut to the Bone: A Thriller (Riley And Harris Ser. #1)

by Alex Caan

Ruby Day is a young vlogger, a rising star of YouTube, and a wholesome role-model to millions of teenage girls. And she is missing. Detective Inspector Kate Riley, the head of a new high-powered team of detectives, and Detective Superintendent Zain Harris, the newest member of the team and a poster boy for multiracial policing, are brought in for what they expect to be a routine runaway. Then a video of a wild-eyed Ruby running through the woods and begging for her life is posted online. Amid mounting hysteria and heightened media coverage calling for Ruby’s safe return, Riley and Harris must decode the dark secrets of this seemingly squeaky-clean internet darling. Their hunt leads them to a smug ex-boyfriend who hungers for online fame of his own, a culture of online cyber bullying by anonymous thugs, and a corporation of ruthless advertisers who exploit online celebrities for their network of eager consumers. It becomes increasingly clear that the case is more complicated and nightmarish than Riley and Harris could have imagined. And the videos keep coming . . .This debut novel is a slick, contemporary police procedural that explores the dichotomy of public life and one lived online. For fans of Megan Abbot and Kimberly McCreight, Cut to the Bone provides a harrowing glimpse into the friendships, ambitions, and secrets of the internet generation.

Cutaneous Biometrics

by Howard Maibach Nily Osman

This handbook covers the essential subject areas of cutaneous biometrics, including acne, aging, genetics, eczema, psoriasis, atopic dermatitis, rosacea, wound healing, and more. Erythema of rosacea and the risk of skin ulceration associated with oral nicorandil therapy are covered in detail. Various areas of acne are addressed, including acne severity grading, the assessment of general health and quality of life in patients with acne, and the effect of automated online counseling on clinical outcomes and quality of life among adolescents with acne vulgaris. Other topics include the development and validation of a clinical scale for the evaluation of forearm skin photoaging and a scoring system for mucosal disease severity. This is an ideal reference for biomedical engineering researchers and clinicians working in the field of dermatology interested in a deeper understanding of cutaneous biometrics and how it can be applied to their work. This book also: Broadens reader's understanding of the importance of creating meaningful dermatological patient outcome measurements and the use of the physician global assessment in a clinical setting to measure and track patient outcomes Details the guidelines on the measurement of ultraviolet radiation levels in ultraviolet phototherapy

Cutaneous Haptic Feedback in Robotic Teleoperation (Springer Series on Touch and Haptic Systems #0)

by Claudio Pacchierotti

This work addresses the challenge of providing effective cutaneous haptic feedback in robotic teleoperation, with the objective of achieving the highest degree of transparency whilst guaranteeing the stability of the considered systems. On the one hand, it evaluates teleoperation systems that provide only cutaneous cues to the operator, thus guaranteeing the highest degree of safety. This cutaneous-only approach shows intermediate performance between no force feedback and full haptic feedback provided by a grounded haptic interface, and it is best suitable for those scenarios where the safety of the system is paramount, e. g. , robotic surgery. On the other hand, in order to achieve a higher level of performance, this work also investigates novel robotic teleoperation systems with force reflection able to provide mixed cutaneous and kinesthetic cues to the operator. Cutaneous cues can compensate for the temporary reduction of kinesthetic feedback necessary to satisfy certain stability conditions. This state-of-the-art volume is oriented toward researchers, educators, and students who are interested in force feedback techniques for robotic teleoperation, cutaneous device design, cutaneous rendering methods and perception studies, as well as readers from different disciplines who are interested in applying cutaneous haptic technologies and methods to their field of interest.

Cuteness Engineering: Designing Adorable Products and Services (Springer Series on Cultural Computing)

by Aaron Marcus Xiaojuan Ma Masaaki Kurosu Ayako Hashizume

This state of the art monograph presents a unique introduction to thinking about cuteness and its incorporation into modern, especially computer-based, products and services. Cuteness is defined and explored in relation to user-centered design concepts and methods, in addition to considering the history of cuteness and cuteness in other cultures, especially in relation to eastern Asia. The authors provide detailed analyses and histories of cuteness in Japan and in China, the rise of Kawaii and Moe cultural artifacts, and their relation to social, psychological, and design issues. They also attempt an initial taxonomy of cuteness. Finally, detailed interviews with leading designers of cute products and services, such as Hello Kitty, provide an understanding of the philosophy and decision-making process of designers of cuteness. Cuteness Engineering: Designing Adorable Products and Services will be of interest and use to a wide range of professionals, researchers, academics, and students who are interested in exploring the world of cuteness in fresh new ways and gaining insights useful for their work and studies.

Cutoffs for Dams (ICOLD Bulletins Series #150)

by Cigb Icold

ICOLD Bulletin 150, Cutoffs for Dams, discusses foundation treatment methods using cutoff-type barriers. High emphasis is given to alluvial deposits throughout this document; however, different materials may require cutoff. The construction of cutoffs has made significant advances mainly through the development of more powerful machinery for drilling and excavation, but also through the introduction of new concepts and techniques, such as jet grouting and deep soil mixing. The following types of cutoffs are presented in this Bulletin: - Diaphragm walls- Vib walls- Pile walls- Superimposed concreted galleries- Jet grouting- Deep mixing These methods are described, and the practical application of each method is illustrated by selected case histories. These case histories also demonstrate how certain difficulties specific to a particular dam site have been dealt with. The performance of cutoffs should be monitored so that their efficiency in reducing flow and piezometric head can be evaluated. Piezometers installed in the foundation upstream and downstream of the cutoff are needed to meet this objective.

The Cutting Edge: A Half Century of U. S. Fighter Aircraft R and D

by Hugh P. Levaux Jennifer Gross Erik Moller Elizabeth Giddens Mark A. Lorell

The proposition that innovation is critical in the cost-effective design and development of successful military aircraft is still subject to some debate. RAND research indicates that innovation is promoted by intense competition among three or more industry competitors. Given the critical policy importance of this issue in the current environment of drastic consolidation of the aerospace defense industry, the authors here examine the history of the major prime contractors in developing jet fighters since World War II. They make use of an extensive RAND database that includes nearly all jet fighters, fighter-attack aircraft, and bombers developed and flown by U.S. industry since 1945, as well as all related prototypes, modifications, upgrades, etc. The report concludes that (1) experience matters, because of the tendency to specialize and thus to develop system-specific expertise; (2) yet the most dramatic innovations and breakthroughs came from secondary or marginal players trying to compete with the industry leaders; and (3) dedicated military R&D conducted or directly funded by the U.S. government has been critical in the development of new higher-performance fighters and bombers.

Cutting Edge Applications of Computational Intelligence Tools and Techniques (Studies in Computational Intelligence #1118)

by Kevin Daimi Abeer Alsadoon Luis Coelho

The book delivers an excellent professional development resource for educators and practitioners on the cutting-edge computational intelligence techniques and applications. It covers many areas and topics of computational intelligence techniques and applications proposed by computational intelligence experts and researchers and furthers the enhancement of the community outreach and engagement component of computational intelligence techniques and applications. Furthermore, it presents a rich collection of manuscripts in highly regarded computational intelligence techniques and applications topics that have been creatively compiled. Computers are capable of learning from data and observations and providing solutions to real-life complex problems, following the same reasoning approach of human experts in various fields. This book endows a rich collection of applications in widespread areas. Among the areas addressed in this book are Computational Intelligence Principles and Techniques; CI in Manufacturing, Engineering, and Industry; CI in Recognition and Processing; CI in Robotics and Automation; CI in Communications and Networking; CI in Traditional Vehicles, Electric Vehicles, and Autonomous Vehicles; CI in Smart Cities and Smart Energy Systems; and CI in Finance, Business, Economics, and Education. These areas span many topics including repetitive manufacturing, discrete manufacturing, process manufacturing, electronic systems, speech recognition, pattern recognition, signal processing, image processing, industrial monitoring, vision systems for automation and robotics, cooperative and network robotics, perception, planning, control, urban traffic networks control, vehicle-to-roadside communications, smart buildings, smart urbanism, smart infrastructure, smart connected communities, smart energy, security, arts, and music.

Cutting-Edge Business Technologies in the Big Data Era: Proceedings of the 18th SICB “Sustainability and Cutting-Edge Business Technologies” Volume 2 (Studies in Big Data #136)

by Saad G. Yaseen

This book highlights applied artificial intelligence techniques, tools, and systems to drive strategic advantages, improve operational efficiency, and create added value. The focus is very much on practical applications and how to maximize the value of these technologies. They are being applied across businesses to enhance innovation, improve performance, increase profit, support critical thinking, and ultimately create customer-added value. Whether you are a researcher, manager, or decision-maker, this book provides valuable insights to help you harness the power of AI and big data analytics in your organization. This book attempts to provide answers to the most important questions: Quo Vadis applied artificial intelligence? Quo Vadis cutting-edge business technologies?

Cutting-Edge Business Technologies in the Big Data Era: Proceedings of the 18th SICB “Sustainability and Cutting-Edge Business Technologies” Volume 1 (Studies in Big Data #135)

by Saad G. Yaseen

This book highlights applied artificial intelligence techniques, tools, and systems to drive strategic advantages, improve operational efficiency, and create added value. The focus is very much on practical applications and how to maximize the value of these technologies. They are being applied across businesses to enhance innovation, improve performance, increase profit, support critical thinking, and ultimately create customer-added value. Whether you are a researcher, manager, or decision-maker, this book provides valuable insights to help you harness the power of AI and big data analytics in your organization. This book attempts to provide answers to the most important questions: Quo Vadis applied artificial intelligence? Quo Vadis cutting-edge business technologies?

Cutting-Edge Enabling Technologies for Regenerative Medicine (Advances in Experimental Medicine and Biology #1078)

by Heung Jae Chun Chan Hum Park Il Keun Kwon Gilson Khang

This book explores in depth the latest enabling technologies for regenerative medicine. The opening section examines advances in 3D bioprinting and the fabrication of electrospun and electrosprayed scaffolds. The potential applications of intelligent nanocomposites are then considered, covering, for example, graphene-based nanocomposites, intrinsically conductive polymer nanocomposites, and smart diagnostic contact lens systems. The third section is devoted to various drug delivery systems and strategies for regenerative medicine. Finally, a wide range of future enabling technologies are discussed. Examples include temperature-responsive cell culture surfaces, nanopatterned scaffolds for neural tissue engineering, and process system engineering methodologies for application in tissue development. This is one of two books to be based on contributions from leading experts that were delivered at the 2018 Asia University Symposium on Biomedical Engineering in Seoul, Korea – the companion book examines in depth novel biomaterials for regenerative medicine.

Cutting-edge Technologies in Biological Sensing and Analysis (River Publishers Series in Biomedical Engineering)

by Anh Hung Nguyen Sang Jun Sim Hung Cao

Advanced technologies have been transforming the ways we carry out biological studies as well as deliver healthcare. While micro- and nano-fabrication have provided miniaturized sensors and systems with better sensitivity and selectivity,; innovations in flexible electronics, biomaterials and telecommunications have helped in enabling novel biomedical devices, reducing cost, bringing convenience and establishing mobile-health (m-Health), and personalized- and tele-medicine. Further, the recent rise of the internet of things (IoTs) and machine learning-based approaches has paved the avenue for those biomedical systems to become popular and widely accepted by our society. In this context, we edit this book aiming to cover a broad field of novel technologies used in biological assessment and analysis for humans, animal models and in vitro platforms, in both health monitoring and biological studies. Technical topics discussed in the book include: Biosensing systems and biomedical techniques Imaging techniques and systems Biosignal analysis Animal models used in biological research

Cutting the Cord: The Cell Phone has Transformed Humanity

by Martin Cooper

One of Time Magazine&’s Top 100 Inventors in History shares an insider&’s story of the cellphone, how it changed the world—and a view of where it&’s headed. While at Motorola in the 1970s, wireless communications pioneer Martin Cooper invented the first handheld mobile phone. But the cellphone as we know it today almost didn&’t happen. Now, in Cutting the Cord, Cooper takes readers inside the stunning breakthroughs, devastating failures, and political battles in the quest to revolutionize—and control—how people communicate. It&’s a dramatic tale involving brilliant engineers, government regulators, lobbyists, police, quartz crystals, and a horse. Industry skirmishes sparked a political war in Washington to prevent a monopolistic company from dominating telecommunications. The drama culminated in the first-ever public call made on a handheld, portable telephone—by Cooper himself. The story of the cell phone has much to teach about innovation, strategy, and management. But the story of wireless communications is far from finished. This book also relates Cooper&’s vision of the future. From the way we work and the way children learn to the ways we approach medicine and healthcare, advances in the cellphone will continue to reshape our world for the better.

Cutting the Cost of Cold: Affordable Warmth for Healthier Homes

by Janet Rudge Fergus Nicol

In this book academics and practitioners from a wide range of disciplines provide a survey of research into buildings, epidemiology and medical issues, followed by an assessment of the tools available to the practitioner. The book goes on to provide clear guidance on putting theory into practice.This will be a powerful reference source and a compelling read for a wide range of built environment and health professionals from surveyors to environmental health officers.

Cutting Tools

by null R. Edwards

This concise volume reviews cutting materials in use today and relates them to the workpiece materials which they are used to machine.

CVD Polymers

by Karen K. Gleason

The method of CVD (chemical vapor deposition) is a versatile technique to fabricate high-quality thin films and structured surfaces in the nanometer regime from the vapor phase. Already widely used for the deposition of inorganic materials in the semiconductor industry, CVD has become the method of choice in many applications to process polymers as well. This highly scalable technique allows for synthesizing high-purity, defect-free films and for systematically tuning their chemical, mechanical and physical properties. In addition, vapor phase processing is critical for the deposition of insoluble materials including fluoropolymers, electrically conductive polymers, and highly crosslinked organic networks. Furthermore, CVD enables the coating of substrates which would otherwise dissolve or swell upon exposure to solvents. The scope of the book encompasses CVD polymerization processes which directly translate the chemical mechanisms of traditional polymer synthesis and organic synthesis in homogeneous liquids into heterogeneous processes for the modification of solid surfaces. The book is structured into four parts, complemented by an introductory overview of the diverse process strategies for CVD of polymeric materials. The first part on the fundamentals of CVD polymers is followed by a detailed coverage of the materials chemistry of CVD polymers, including the main synthesis mechanisms and the resultant classes of materials. The third part focuses on the applications of these materials such as membrane modification and device fabrication. The final part discusses the potential for scale-up and commercialization of CVD polymers.

CWNA Certified Wireless Network Administrator Study Guide: Exam CWNA-107

by David A. Westcott David D. Coleman

The bestselling CWNA study guide, updated for the latest exam The CWNA: Certified Wireless Network Administrator Study Guide is the ultimate preparation resource for the CWNA exam. Fully updated to align with the latest version of the exam, this book features expert coverage of all exam objectives to help you internalize essential information. A pre-assessment test reveals what you already know, allowing you to focus your study time on areas in need of review, while hands-on exercises allow you to practice applying CWNA concepts to real-world scenarios. Expert-led discussion breaks complex topics down into easily-digestible chucks to facilitate clearer understanding, and chapter review questions help you gauge your progress along the way. You also get a year of free access to the Sybex online interactive learning environment, which features additional resources and study aids including bonus practice exam questions. The CWNA exam tests your knowledge of regulations and standards, protocols and devices, network implementation, security, and RF site surveying. Thorough preparation gives you your best chance of passing, and this book covers it all with a practical focus that translates to real on-the-job skills. Study 100% of the objectives for Exam CWNA-107 Assess your practical skills with hands-on exercises Test your understanding with challenging chapter tests Access digital flashcards, white papers, bonus practice exams, and more The CWNA certification is a de facto standard for anyone working with wireless technology. It shows employers that you have demonstrated competence in critical areas, and have the knowledge and skills to perform essential duties that keep their wireless technology functioning and safe. The CWNA: Certified Wireless Network Administrator Study Guide gives you everything you need to pass the exam with flying colors.

CWSP: Exam CWSP-205

by Bryan E. Harkins David D. Coleman David A. Westcott

The most detailed, comprehensive coverage of CWSP-205 exam objectives CWSP: Certified Wireless Security Professional Study Guide offers comprehensive preparation for the CWSP-205 exam. Fully updated to align with the new 2015 exam, this guide covers all exam objectives and gives you access to the Sybex interactive online learning system so you can go into the test fully confident in your skills. Coverage includes WLAN discovery, intrusion and attack, 802.11 protocol analysis, wireless intrusion prevention system implementation, Layer 2 and 3 VPN over 802.11 networks, managed endpoint security systems, and more. Content new to this edition features discussions about BYOD and guest access, as well as detailed and insightful guidance on troubleshooting. With more than double the coverage of the "official" exam guide, plus access to interactive learning tools, this book is your ultimate solution for CWSP-205 exam prep. The CWSP is the leading vendor-neutral security certification administered for IT professionals, developed for those working with and securing wireless networks. As an advanced certification, the CWSP requires rigorous preparation -- and this book provides more coverage and expert insight than any other source. Learn the ins and outs of advanced network security Study 100 percent of CWSP-205 objectives Test your understanding with two complete practice exams Gauge your level of preparedness with a pre-test assessment The CWSP is a springboard for more advanced certifications, and the premier qualification employers look for in the field. If you've already earned the CWTS and the CWNA, it's time to take your career to the next level. CWSP: Certified Wireless Security Professional Study Guide is your ideal companion for effective, efficient CWSP-205 preparation.

CWSP: Certified Wireless Security Professional

by David A. Westcott David D. Coleman Bryan E. Harkins Shawn M. Jackman

Sybex is now the official publisher for Certified Wireless Network Professional, the certifying vendor for the CWSP program. This guide covers all exam objectives, including WLAN discovery techniques, intrusion and attack techniques, 802. 11 protocol analysis. Wireless intrusion-prevention systems implementation, layer 2 and 3 VPNs used over 802. 11 networks, and managed endpoint security systems. It also covers enterprise/SMB/SOHO/Public-Network Security design models and security solution implementation, building robust security networks, wireless LAN management systems, and much more.

Cyanide in Water and Soil: Chemistry, Risk, and Management

by David A. Dzombak Rajat S. Ghosh George M. Wong-Chong

Presenting the state-of-the-art in managing cyanide across a wide range of industrial and environmental contexts, this book brings together current knowledge about cyanide release to and behavior in the environment and explores how to control or remediate these releases. No other broad-based examination of this topic exists. The authors address the full range of issues pertaining to cyanide fate, transport, treatment, and toxicity in water and soil as well as approaches currently used in risk assessment and management. They have developed a careful balance of depth and scope of coverage, providing current references that help readers learn more about topics of particular interest.

Cyanobacteria for Bioremediation of Wastewaters

by Inga Zinicovscaia Liliana Cepoi

This book reflects the use of cyanobacteria for the bioremediation of wastewater through different mechanisms and pathways of transformation and transfer of hazardous substances from one medium to another. The application of microorganisms for bioremediation is determined by their ubiquity, small size, high rate of reproduction and large surface-to-volume cell ratio. Mechanisms of interaction of cyanobacteria with inorganic pollutants include biosorption, bioaccumulation with an opportunity to obtain metal nanoparticles both on the cell surface and inside the cells as well as chelation and inclusion of metals in the composition of certain organic structures. Data presented in the book provides specialists in the field with useful information for bioremediation technologies as well as for obtaining valuable preparations using cyanobacteria.

Cyanobacterial Toxins of Drinking Water Supplies

by Ian Robert Falconer

The contamination of both drinking and recreational water supplies by cyanobacteria is increasingly a cause for concern worldwide. While contamination causes livestock deaths with relative frequency, acute poisoning is rare in humans. However, there is growing apprehension over the possible role of cylindrospermopsins and microcystins in gastrointe

Cyber and Digital Forensic Investigations: A Law Enforcement Practitioner’s Perspective (Studies in Big Data #74)

by Nhien-An Le-Khac Kim-Kwang Raymond Choo

Understanding the latest capabilities in the cyber threat landscape as well as the cyber forensic challenges and approaches is the best way users and organizations can prepare for potential negative events. Adopting an experiential learning approach, this book describes how cyber forensics researchers, educators and practitioners can keep pace with technological advances, and acquire the essential knowledge and skills, ranging from IoT forensics, malware analysis, and CCTV and cloud forensics to network forensics and financial investigations. Given the growing importance of incident response and cyber forensics in our digitalized society, this book will be of interest and relevance to researchers, educators and practitioners in the field, as well as students wanting to learn about cyber forensics.

Cyber and Electromagnetic Threats in Modern Relay Protection

by Vladimir Gurevich

Cyber and Electromagnetic Threats in Modern Relay Protection provides a detailed overview of the vulnerabilities of digital protection relays to natural and intentional destructive impacts, including cyber attacks and electromagnetic intrusions. From lightning strikes, electromagnetic fields generated by operating equipment, and issues with control cable shielding to modern technical tools that realize intentional destructive impacts remotely, this first-of-its-kind text covers the latest cyber and electromagnetic threats to digital protection relays. Emphasizing the importance of relay protection to the infrastructure of a country, this book: Explains how technological advances in the power industry, like the smart grid, can create dangerous vulnerabilities Discusses traditional passive means of protection, such as screened cabinets, filters, cables, special materials, and covers Describes advanced protective solutions based on hardware methods Cyber and Electromagnetic Threats in Modern Relay Protection is a valuable reference for engineers involved in the design, development, and use of relay protection. It is also beneficial for scientists, researchers, and students of vocational schools and technical universities.

Cyber Attack Information System: Erfahrungen und Erkenntnisse aus der IKT-Sicherheitsforschung (Xpert.press)

by Florian Skopik Helmut Leopold Thomas Bleier

In den letzten Jahren hat sich das Internet schnell zu einem massiven wirtschaftlichen Betätigungsfeld entwickelt, leider auch für illegale Unternehmungen. Das Ausnutzen von Schwachstellen in IKT-Systemen ist inzwischen ein profitables Geschäftsmodell. Das staatlich geförderte Forschungsprojekt CAIS beschäftigte sich deshalb mit der Implementierung eines Cyber Attack Information Systems auf nationaler Ebene mit dem Ziel, die Widerstandsfähigkeit der heutigen vernetzten Systeme zu stärken und ihre Verfügbarkeit und Vertrauenswürdigkeit zu erhöhen. Hauptziele dieses Projektes waren die Identifizierung der künftigen Cyber-Risiken und -Bedrohungen, die Untersuchung neuartiger Techniken zur Anomalieerkennung, die Entwicklung modularer Infrastrukturmodelle und agentenbasierter Simulationen zur Risiko- und Bedrohungsanalyse, und schließlich die Analyse und mögliche Umsetzung eines nationalen Cyber Attack Information Systems.

Refine Search

Showing 15,151 through 15,175 of 68,680 results