![]() |
![]() |
Your cart is empty |
||
Showing 1 - 25 of 205 matches in All Departments
In this issue of Otolaryngologic Clinics, guest editors Drs. Romaine F. Johnson and Elton M. Lambert bring their considerable expertise to the topic of Pediatric Otolaryngology. Top experts in the field cover key topics such as single-sided deafness, eustachian tube dysfunction, drug-induced sleep endoscopy; drooling and aspiration; pediatric tracheostomy teams; 3-D printing in otolaryngology; and more. Contains 15 relevant, practice-oriented topics including enhanced recovery after surgery; aerodigestive approaches to chronic cough; slide tracheoplasty: tracheal rings and beyond; COVID-19 and pediatric otolaryngology; and more. Provides in-depth clinical reviews on pediatric otolaryngology, offering actionable insights for clinical practice. Presents the latest information on this timely, focused topic under the leadership of experienced editors in the field. Authors synthesize and distill the latest research and practice guidelines to create clinically significant, topic-based reviews.
Product information not available.
This multidisciplinary guide to the literature and research about the physical and psychological aspects of successful, normal, and productive aging is designed for students, teachers, and practitioners who deal with the elderly. The introduction discusses perceptions of aging well. The 500 entries are arranged alphabetically by author under nine topics: physical aging, psychological aging, social aging, family, living arrangements, work and economics, education and leisure, politics, and religion. An appendix covers sources dealing with the measurement of aging well. The careful author and subject indexes make this annotated bibliography easy-to-use for researchers in the fields of history, economics, psychology, sociology, law, theology, demography, public health, political science, home economics, family studies, women's studies, pharmacy, and health administration, among others.
The critically acclaimed laboratory standard for more than forty
years, Methods in Enzymology is one of the most highly respected
publications in the field of biochemistry. Since 1955, each volume
has been eagerly awaited, frequently consulted, and praised by
researchers and reviewers alike. Now with more than 300 volumes
(all of them still in print), the series contains much material
still relevant today--truly an essential publication for
researchers in all fields of life sciences.
This book offers critical readings of issues in education and technology and demonstrates how researchers can use critical perspectives from sociology, digital media, cultural studies, and other fields to broaden the "ed-tech" research imagination, open up new topics, ask new questions, develop theory, and articulate an agenda for informed action.
As microarray technology has matured, data analysis methods have advanced as well. Methods Of Microarray Data Analysis III is the third book in this pioneering series dedicated to the existing new field of microarrays. While initial techniques focused on classification exercises (volume I of this series), and later on pattern extraction (volume II of this series), this volume focuses on data quality issues. Problems such as background noise determination, analysis of variance, and errors in data handling are highlighted. Three tutorial papers are presented to assist with a basic understanding of underlying principles in microarray data analysis, and twelve new papers are highlighted analyzing the same CAMDA'02 datasets: the Project Normal data set or the Affymetrix Latin Square data set. A comparative study of these analytical methodologies brings to light problems, solutions and new ideas. This book is an excellent reference for academic and industrial researchers who want to keep abreast of the state of art of microarray data analysis.
Microarray technology is a major experimental tool for functional genomic explorations, and will continue to be a major tool throughout this decade and beyond. The recent explosion of this technology threatens to overwhelm the scientific community with massive quantities of data. Because microarray data analysis is an emerging field, very few analytical models currently exist. Methods of Microarray Data Analysis is one of the first books dedicated to this exciting new field. In a single reference, readers can learn about the most up-to-date methods ranging from data normalization, feature selection and discriminative analysis to machine learning techniques. Currently, there are no standard procedures for the design and analysis of microarray experiments. Methods of Microarray Data Analysis focuses on two well-known data sets, using a different method of analysis in each chapter. Real examples expose the strengths and weaknesses of each method for a given situation, aimed at helping readers choose appropriate protocols and utilize them for their own data set. In addition, web links are provided to the programs and tools discussed in several chapters. This book is an excellent reference not only for academic and industrial researchers, but also for core bioinformatics/genomics courses in undergraduate and graduate programs.
Johnson addresses ethical issues in aging in a variety of contexts--the social cultural environment, physical health care, mental health care, social health care, legal care, and spiritual care. Because long-term aging has created a new generation of older adults, some new issues are emerging which need to be addressed from an ethical perspective--elder abuse, physician assisted suicide, dementia, intergenerational equity, guardianship, and living wills. A wide range of experts including physicians, philosophers, lawyers, social workers, nurses, sociologists, public health persons, theologians, historians, and ethicists share their insights on the ethical issues and dilemmas older adults in American society are facing or are likely to face over the life course. Of interest to undergraduate and graduate faculty and students in sociology, social work and social services practitioners, policymakers, and academic and professional libraries.
This is a handbook of detailed step-by-step information, examples, and suggestions for directing a school theatre program.
Eine grosse Anzahl heterocyclischer Naturstoffe leitet sich vom Ring- system des Piperidins (1) ab. Als Substituenten einfach oder mehrfach substituierter Piperidinbasen finden sich Methyl-, Carboxyl-, Hydroxyl- und Aminogruppen sowie aliphatische Seitenketten unterschiedlicher Lange. Die Substitution erfolgt bevorzugt an den C-Atomen 2, 3 und 6 sowie am Heteroatom. In zahlreichen Fallen ist der Piperidinring in a- oder ss-Stellung direkt oder uber eine C-Brucke mit einem weiteren Heterocyclus verbunden, z. B. einem Piperidin-, Piperidein-, Pyridin-, Indol-, Chinolizidin- oder Furanrest. Daruber hinaus kann der Piperidin- ring zum 2,6-Dioxopiperidin (Glutarimid) oxydiert oder zum Pipendein dehydriert sein. Wahrend Naturstoffe mit Pyridinstruktur im Tier- und Pflanzenreich weit verbreitet sind und einzelnen von ihnen wie NAD oder Pyridoxal- phosphat als Coenzymen des Primarstoffwechsels besondere Bedeutung zukommt, handelt es sich bei den naturlichen Piperidinverbindungen im allgemeinen um sekundare Pflanzenstoffe (vgl. I8, I9I). Dabei sind einige wie z. B. die Pipecolinsaure (7) sporadisch auf verschiedene Pflanzen- familien verteilt. Andere Piperidinbasen wie die Conium- oder Piper- Alkaloide weisen dagegen eine ausgesprochene Artspezifitat auf. Im Gegensatz zu den meisten Pyridinalkaloiden finden sich die Piperidin- basen oft mit strukturell andersartig gebauten Alkaloiden vom Chino- lizidin- oder Trepantyp vergesellschaftet, was in den meisten Fallen durch eine enge biogenetische Verwandtschaft bedingt sein durfte.
Microarray technology is a major experimental tool for functional genomic explorations, and will continue to be a major tool throughout this decade and beyond. The recent explosion of this technology threatens to overwhelm the scientific community with massive quantities of data. Because microarray data analysis is an emerging field, very few analytical models currently exist. Methods of Microarray Data Analysis II is the second book in this pioneering series dedicated to this exciting new field. In a single reference, readers can learn about the most up-to-date methods, ranging from data normalization, feature selection, and discriminative analysis to machine learning techniques. Currently, there are no standard procedures for the design and analysis of microarray experiments. Methods of Microarray Data Analysis II focuses on a single data set, using a different method of analysis in each chapter. Real examples expose the strengths and weaknesses of each method for a given situation, aimed at helping readers choose appropriate protocols and utilize them for their own data set. In addition, web links are provided to the programs and tools discussed in several chapters. This book is an excellent reference not only for academic and industrial researchers, but also for core bioinformatics/genomics courses in undergraduate and graduate programs.
This book draws from the successes of award-winning schools, teachers, students, and parents to help leaders understand how they can positively change the educational experience of Black students. When Black Students Excel offers real-life examples of outstanding elementary, middle, and high schools where teachers and school leaders have rejected policies and practices built upon deficit perceptions about the capacity of Black students. Chapters highlight leadership implications and offer specific suggestions for educators who are seeking to transform their schools in ways that advance the success of Black students. This practical guide includes questions to ask students and their parents, self-assessment tools, and an array of leadership and teaching practices that are effective to empower Black students, elevate school attendance and academic engagement, and improve other important outcomes. Unpacking important themes that influence the success of Black students, this book is a useful tool for educators who are seeking to understand how they can change programs, procedures, and practices in ways that engage and empower Black students.
This book takes a fresh look at understanding how financial markets behave. Using recent ideas from the highly-topical science of complexity and complex systems, the book provides the basis for a unified theoretical description of how today's markets really work. Since financial markets are an excellent example of a complex system, the book also doubles as a science textbook.
Mistreatment of the elderly became recognized as a serious and growing problem in the late 1970s, as a result of governmental investigations and research in the public and private sectors. Although in most states elder mistreatment is handled by social service agencies, other professionals are also needed to broaden the identification team and help alleviate the risk to the older adults. This book is designed for human services professionals who are not necessarily adult protective services specialists, but who provide direct ongoing services to elder adults. Its purpose is to offer guidelines for detecting elder mistreatment, so that assistance can be given to the vulnerable older adults to preserve their particular quality of life. The book is arranged into seven chapters. The first discusses why elder-serving human services professionals should become involved in mistreatment identification, while chapter two focuses on the various starting points in the definition of elder mistreatment. Chapters three and four review research on risk factors in elder mistreatment and detail varieties of mistreatment measures and methods for distinguishing between them. A review of risk instruments used in adult protective services and non-adult protective services settings forms the basis of chapter five, and chapter six outlines a proposed risk assessment model, specially designed for elder-serving human service professionals. The final chapter offers some prospects for the future of elder mistreatment risk assessments. The work concludes with a set of four appendices, covering contact persons in lead agencies, report-receiving authorities within jurisdictions, health status risk assessment, and prevention strategies. This volume will be a useful tool for human services professionals, mental health care providers, and social health care and legal services professionals, as well as a useful addition to reference collections in public, academic, and medical libraries.
This book draws from the successes of award-winning schools, teachers, students, and parents to help leaders understand how they can positively change the educational experience of Black students. When Black Students Excel offers real-life examples of outstanding elementary, middle, and high schools where teachers and school leaders have rejected policies and practices built upon deficit perceptions about the capacity of Black students. Chapters highlight leadership implications and offer specific suggestions for educators who are seeking to transform their schools in ways that advance the success of Black students. This practical guide includes questions to ask students and their parents, self-assessment tools, and an array of leadership and teaching practices that are effective to empower Black students, elevate school attendance and academic engagement, and improve other important outcomes. Unpacking important themes that influence the success of Black students, this book is a useful tool for educators who are seeking to understand how they can change programs, procedures, and practices in ways that engage and empower Black students.
Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking). Steganography (literally, covered writing) explores methods to hide the existence of hidden messages. These methods include invisible ink, microdot, digital signature, covert channel, and spread spectrum communication. Digital watermarks represent a commercial application of steganography. Watermarks can be used to track the copyright and ownership of electronic media. In this volume, the authors focus on techniques for hiding information in digital media. They analyze the hiding techniques to uncover their limitations. These limitations are employed to devise attacks against hidden information. The goal of these attacks is to expose the existence of a secret message or render a digital watermark unusable. In assessing these attacks, countermeasures are developed to assist in protecting digital watermarking systems. Understanding the limitations of the current methods will lead us to build more robust methods that can survive various manipulation and attacks. The more information that is placed in the public's reach on the Internet, the more owners of such information need to protect themselves from theft and false representation. Systems to analyze techniques for uncovering hidden information and recover seemingly destroyed information will be useful to law enforcement authorities in computer forensics and digital traffic analysis. Information Hiding: Steganography and Watermarking - Attacks and Countermeasures presents the authors' research contributions in three fundamental areas with respect to image-based steganography and watermarking: analysis of data hiding techniques, attacks against hidden information, and countermeasures to attacks against digital watermarks. Information Hiding: Steganography and Watermarking &endash; Attacks and Countermeasures is suitable for a secondary text in a graduate level course, and as a reference for researchers and practitioners in industry.
Examining Curriculum Studies from an international perspective, this book focuses on the relations between the Anglo-Saxon and Latin American educational traditions. Informed by William F. Pinar's conceptualization of curriculum as currere, Johnson-Mardones reconsiders curriculum as an international conversation and advances an intercultural dialogue among educational traditions to put forth a more comprehensive and inclusive theory of curriculum. Moving beyond the Anglo-Saxon space and into the Global South, Johnson-Mardones brings in his own non-Western educational experience to the center of this inquiry, and situates cosmopolitanism as a necessary but complex component of Curriculum Studies.
Making use of the methodology developed in his Origins of Arthurian Romances (McFarland, 2012), the author explores the question of King Arthur's existence in several original approaches to the subject. Examining the extant literature and other evidence, the author searches for the truth of the who, when and where of King Arthur. These explorations are grouped into historicity, geography, and floruit, concluding that Arthur was an historical entity, places him in a specific area, and narrows his period of activity. |
![]() ![]() You may like...
The Scientific & the Divine - Conflict…
James A. Arieti, Patrick A. Wilson
Paperback
R1,242
Discovery Miles 12 420
Forecasting Air Travel Demand - Looking…
Yafei Zheng, Kin Keung Lai, …
Paperback
R1,377
Discovery Miles 13 770
European Air Law Association Volume 13…
P.D. Dagtoglou, G. Jarolim, …
Hardcover
R3,330
Discovery Miles 33 300
Reverse Migration in Contemporary China…
Huiyao Wang, Yue Bao
Hardcover
|