Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
This book is open access under a CC BY license. This book explores if and how Russian policies towards the Far East region of the country - and East Asia more broadly - have changed since the onset of the Ukraine crisis and Russia's annexation of Crimea.
The book applies to the study of the collapse of the Roman Near East techniques taken from the historiography of the fall of the Roman West. It presents a fresh approach to the century that witnessed the end of the ancient world, appealing to students of Roman and medieval history, Islamic Studies, and advanced scholars alike.
Following up on Donna Starr-Deelen's previous book Presidential Policies on Terrorism: From Ronald Reagan to Barack Obama (Palgrave, 2014), this book compares and contrasts the approach of the Obama administration with the Trump administration regarding national security and counter-terrorism.
Milcent examines the medication market in China against the global picture of healthcare organization, and how public healthcare insurance plans have been implemented in recent years, as well as reforms to tackle hospital inefficiency.
Presenting a scientific exploration of personal branding and digital communication, this ground-breaking book aims to fill a gap between theory and practice. Describing how social media can increase brand profiles online, it explains basic terms before investigating the cultural context for online personal branding.
These results add richness, nuance, and complexity to our perception of the public's understanding of nanotechnology, its support for regulation, and effective practices of science communication in the context of nanotechnology and other emerging technologies.
The seemingly unlimited technological potential of nanotechnology brings with it new practices of governance, networking, and exercising power and agency.
This book offers a critical-constructive study of Korean women's self-esteem from a feminist practical theological perspective.
This textbook provides an introduction to the Catalan numbers and their remarkable properties, along with their various applications in combinatorics.
The book belongs to the collection Between Mechanics and Architecture, born in 1995 from the collaboration of several renowned scholars, including Edoardo Benvenuto (P. Benvenuto (eds.), Entre Mecanique et Architecture / Between Mechanics and Architecture, Birkhauser, Basel 1995).
This volume consists of contributions spanning a wide spectrum of harmonic analysis and its applications written by speakers at the February Fourier Talks from 2002 - 2013.
This contributed volume contains a collection of articles on state-of-the-art developments on the construction of theoretical integral techniques and their application to specific problems in science and engineering.
This text provides a review of the current knowledge in both the mechanics of nourishing the critically ill and the metabolic and immunological roles nutrients play.
This book presents new insights into Leibniz's research on planetary theory and his system of pre-established harmony. It also provides an in-depth discussion of Kepler's influence on Leibniz's planetary theory and more generally, on Leibniz's concept of pre-established harmony.
Self-Oscillations in Dynamic Systems
Through the innovative practice of 'mesearch', in which the author is both theoriser and theorised, this study delivers a personal, creative narration, combining reflections and emotions in relation to self and performance.
In late 2015, against a background of growing populist opposition to international trade agreements, the European Commission announced its willingness to negotiate a comprehensive bilateral investment agreement with Taiwan.
This text provides a comprehensive, state-of-the art review of this field, and will serve as a valuable resource for students, clinicians, and researchers with an interest in hepatitis B.
Percutaneous left atrial appendage (LAA) closure is an emerging technology for thromboembolic prevention in patients with atrial fibrillation (AF). The first human implantation of an LAA device occurred in 2001, and since then four devices have received CE mark approval.
Topics discussed at the conference included spectral theory, operator theory, optimization, numerical analysis, ordinary and partial differential equations, dynamical systems, control theory, probability, and statistics.
This book focuses on data describing the roles of free radicals and related reactive species, and antioxidants, in the causes and treatments of diseases, examining both clinical and pre-clinical trials, as well as basic research.
Other examples include the equations of elasticity, heat equations, the equations of thermoelasticity, Schroedinger equations, Klein-Gordon equations, Maxwell equations and plate equations.
Particular attention is paid to fractional integrals and derivatives, singular, hypersingular and potential operators in variable exponent spaces, pseudodifferential operators in various modern function and distribution spaces, as well as related applications, to mention but a few.
These include random matrix theory, nonparametric statistics, empirical process theory, statistical learning theory, concentration of measure phenomena, strong and weak approximations, distribution function estimation in high dimensions, combinatorial optimization, and random graph theory.
The chief purpose of the book is to present, in detail, a compilation of proofs of the Cantor-Bernstein Theorem (CBT) published through the years since the 1870's. Over thirty such proofs are surveyed.The book comprises five parts. In the first part the discussion covers the role of CBT and related notions in the writings of Cantor and Dedekind. New views are presented, especially regarding the general proof of CBT obtained by Cantor, his proof of the Comparability Theorem, the ruptures in the Cantor-Dedekind correspondence and the origin of Dedekind's proof of CBT.The second part covers the first CBT proofs published (1896-1901). The works of the following mathematicians is considered in detail: Schroder, Bernstein, Bore, Schoenflies and Zermelo. Here a subtheme of the book is launched; it concerns the research project following Bernstein's Division Theorem (BDT).In its third part the book covers proofs that emerged during the period when the logicist movement was developed (1902-1912). It covers the works of Russell and Whitehead, Jourdain, Harward, Poincare, J. Konig, D. Konig (his results in graph theory), Peano, Zermelo, Korselt. Also Hausdorff's paradox is discussed linking it to BDT.In the fourth part of the book are discussed the developments of CBT and BDT (including the inequality-BDT) in the hands of the mathematicians of the Polish School of Logic, including Sierpinski, Banach, Tarski, Lindenbaum, Kuratowski, Sikorski, Knaster, the British Whittaker, and Reichbach.Finally, in the fifth part, the main discussion concentrates on the attempts to port CBT to intuitionist mathematics (with results by Brouwer, Myhill, van Dalen and Troelstra) and to Category Theory (by Trnkova and Koubek).The second purpose of the book is to develop a methodology for the comparison of proofs. The core idea of this methodology is that a proof can be described by two descriptors, called gestalt and metaphor. It is by comparison of their descriptors that the comparison of proofs is obtained. The process by which proof descriptors are extracted from a proof is named 'proof-processing', and it is conjectured that mathematicians perform proof-processing habitually, in the study of proofs.
This book offers a self-contained introduction to the theory of Lyapunov exponents and its applications, mainly in connection with hyperbolicity, ergodic theory and multifractal analysis. With the exception of a few basic results from ergodic theory and the thermodynamic formalism, all the results presented include detailed proofs.
This book describes the problems of intelligence sharing among peacekeeping partners, mainly due to security concerns and a lack of policies and resources.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.