Kirjojen hintavertailu. Mukana 12 390 323 kirjaa ja 12 kauppaa.
Kirjailija
Dinesh Kumar
Kirjat ja teokset yhdessä paikassa: 84 kirjaa, julkaisuja vuosilta 2012-2026, suosituimpien joukossa Professional'naq ätika i preduprezhdenie i likwidaciq posledstwij chrezwychajnyh situacij - Doklad. Vertaile teosten hintoja ja tarkista saatavuus suomalaisista kirjakaupoista.
Le choix du mat riau id al et la conception du tenon et du noyau pour am liorer la r sistance la fracture des dents restaur es par le tenon et le noyau sont tr s controvers s. Une tude a recommand des tenons endodontiques de module lev , tandis qu'une autre tude a soutenu des tenons ayant un module d' lasticit proche de celui de la dentine. On pense que les tenons en carbone et en fibre de verre ont un module d' lasticit transversale proche de celui de la dentine et sont donc moins dommageables pour la structure dentaire restante.Des tudes in vitro ont montr que les tenons lastiques ont moins tendance provoquer des fractures radiculaires que les tenons de plus grande rigidit . Ila t d montr qu'il n'y avait pas de diff rence significative dans la r sistance la fracture entre les dents restaur es avec quatre syst mes de tenons et de noyaux: tenons dent s, c t s parall les, coul s et noyaux; tenons pr fabriqu s en acier inoxydable, dent s et c t s parall les et noyaux en r sine composite; tenons pr fabriqu s en fibre de carbone et noyaux en r sine composite; et tenons en c ramiqueet noyaux en r sine composite.
Es besteht eine erhebliche Kontroverse ber die ideale Materialwahl und das Design von Stift und Kern zur Verbesserung der Frakturresistenz bei post-core-restaurierten Z hnen. Eine Studie empfahl endodontische Stifte mit hohem Modul, w hrend eine andere Studie Stifte mit einem Elastizit tsmodul nahe dem des Dentins bef rwortete. Es wird angenommen, dass Carbon- und Glasfaserstifte einen transversalen Elastizit tsmodul haben, der dem des Dentins nahe kommt und daher die verbleibende Zahnsubstanz weniger sch digt.In-vitro-Studien haben gezeigt, dass elastische Stifte eine geringere Neigung zu Wurzelfrakturen haben als Stifte mit h herer Steifigkeit. Nichtsdestotrotz macht der Verst rkungseffekt nach der Zementierung einer kompletten Krone mit Zwinge den Unterschied zwischen steifen und elastischen Stiften weniger offensichtlich. Eswurdegezeigt, dass es keinen signifikanten Unterschied in der Bruchfestigkeit zwischen Z hnen gab, die mit vier Stift- und Kernsystemen restauriert wurden: gezackte, parallelseitige, gegossene Stifte und Kerne; pr fabrizierte, rostfreie, gezackte und parallelseitige Stifte und Harzkompositkerne; pr fabrizierte Kohlefaserstifte und Harzkompositkerne; und Keramikstifte und Harzkompositkerne.
Existe uma consider vel controv rsia em rela o escolha ideal de material e desenho de poste e n cleo para melhorar a resist ncia fratura em dentes p s-coroados. Um estudo recomendou postes endod nticos de alto m dulo, enquanto outro estudo apoiou postes com um m dulo de elasticidade pr ximo ao da dentina. Acredita-se que os postes de carbono e fibra de vidro t m um m dulo de elasticidade transversal pr ximo ao da dentina e, portanto, s o menos prejudiciais estrutura dent ria remanescente.Estudos in vitro demonstraram que os postes el sticos t m uma menor tend ncia a causar fratura radicular do que os postes de maior rigidez.Foi demonstrado que n o houve diferen a significativa na resist ncia fratura entre os dentes restaurados com quatro sistemas de pilares e n cleos: pilares serrilhados, de lado paralelo, fundidos e n cleos; pilares pr -fabricados, de a o inoxid vel, serrilhados e de lado paralelo, e n cleos de resina-composta; pilares pr -fabricados de fibra de carbono e n cleos de resina-composta; e pilares cer micos e n cleos de resina-composta.
Istnieją znaczne kontrowersje dotyczące idealnego doboru materialu oraz konstrukcji wkladu i rdzenia w celu zwiększenia odporności na zlamania w odbudowanych wt rnie zębach. W jednym z badań zalecano stosowanie wklad w endodontycznych o wysokim module sprężystości, podczas gdy w innym zalecano stosowanie wklad w o module sprężystości zbliżonym do zębiny. Uważa się, że wklady z wl kna węglowego i szklanego mają poprzeczny modul sprężystości zbliżony do zębiny i dlatego są mniej szkodliwe dla pozostalej struktury zęba.Badania in vitro wykazaly, że wklady elastyczne mają mniejszą tendencję do powodowania zlamań korzeni niż wklady o większej sztywności.Wykazano, że nie ma istotnejr żnicywodporności na zlamanie zęb w odbudowanych przy użyciu czterech system w wklad w i rdzeni: wklady i rdzenie ząbkowane, r wnolegloboczne, odlewane, prefabrykowane, ze stali nierdzewnej, ząbkowane i r wnolegloboczne, rdzenie kompozytowe, prefabrykowane wklady z wl kna węglowego i rdzenie kompozytowe, wklady ceramiczne irdzenie kompozytowe.
Considerable controversy exists regarding the ideal choice of material and design of post and core to improve fracture resistance in post-core-restored teeth. One study recommended endodontic posts of high modulus, while another study supported posts having a modulus of elasticity close to that of dentine. It is believed that carbon and glass fiber posts have a transverse elastic modulus that is close to that of dentin and therefore are less damaging to the remaining tooth structure.In vitro studies have shown elastic posts to have a lower tendency to cause root fracture than posts of higher stiffness. Nevertheless, the reinforcement effect after cementation of a complete crown with ferrule effect makes the difference between stiff and elastic posts less obvious. It has been demonstrated that there was no significant difference in fracture resistance between teeth restored with four post and core systems: serrated, parallel-sided, cast posts, and cores; prefabricated, stainless steel, serrated and parallel-sided posts, and resin-composite cores; prefabricated carbon fiber posts and resin-composite cores; and ceramic posts and resin-composite cores.
In this book efforts have been made to discuss the life cycle and certain aspects of feeding and reproductive behaviour of Zygogramma bicolorata. Apart from life attributes, the book emphasizes on how the abiotic factors, like temperature and photoperiod and biological processes, viz. ageing, rhythmicity, multiple matings and interactions amongst species influence the physiological processes of feeding and/or mating behaviour of this beetle. Thus, the present book would not only solve the queries on the feeding and reproductive biology of Z. bicolorata but would also suggest ways and means to facilitate the mass multiplication of this beetle under laboratory conditions for its effective use in the management of Parthenium weed. We are quite hopeful that the present book would cater to the needs of post graduate students and research scholars in particular, and to the teachers, agriculturists and agricultural policy planning committees in general.
The book, while introducing readers to the auction mechanism for resource provisioning in cloud computing, also endeavors to provide structured literature on the subject. Since various models have been proposed, it will help readers to formulate the cloud resource provisioning problem using the auction approach. The book also discusses challenges for resource provisioning in detail, helping to shape future research. The target audience for this book includes computer scientists, economists, industry professionals, research scholars, and postgraduate students. Computer science readers of this book will come to see that economics-based method are quite helpful in computer science, especially for resource provisioning. Readers with a cloud computing background will come to recognize the importance of dynamic pricing, the specific benefits of auctions, and how to formulate auctions for cloud computing. Lastly, readers from the economics community will come to understand their role in cloud computing, as well as where and how they can contribute.
The book "Sakhi Sang Aajeevika: Managing Microfinance" is based on the research study sponsored by the Indian Council of Social Science Research (ICSSR), Ministry of Human Resource Development, Government of India, New Delhi, entitled "Impact of Women Self Help Groups (WSHG) formed under Swarnajayanti Gram Swarojgar Yojana (SGSY) In Himachal Pradesh". The analysis of the role of women self-help groups and micro-finance in women empowerment is important for devising appropriate policy interventions for women empowerment.Swarnajayanti Gram Swarojgar Yojana (SGSY) was a major scheme to bring the assisted rural poor families (swarojgaris) above the poverty line by assisting them to take up income generating economic activities through a mix of bank credit and government subsidy. The Ministry of Rural Development, Government of India has restructured the Swarnajayanti Gram Swarojgar Yojana (SGSY) as National Rural Livelihood Mission (NRLM), subsequently renamed as "Aajeevika".The book attempts an evaluation of the scheme in the Himalayan hill state of Himachal Pradesh on the basis of primary survey conducted during the research study in three districts - Kangra selected as the best performing district, Sirmaur as the poor performing district and Kinnaur as a tribal district.The total sample consisted of 270 women - 180 SGSY Women Self-Help Group (WSHG) members and 60 non-SHG members and 30 ex-members. Besides, 90 spouses of WSHG members were also surveyed. Thus, the total sample consisted of 360 survey respondents.The book builds on the growing body of research on the topic, blends academic and practitioner perspective and experiences, and encourages further exploration and dialogue on the subject. The research has important implications for bank managers, women micro-entrepreneurs and policy makers. There is a view that the microfinance can, at minimum, serve as a quick way to deliver finance in the interim; the idea is to then graduate microfinance clients to formal finance institutions where they can access standard 'individual' loans, possibly on a fully commercial basis. The notion of graduation should be built explicitly into the design of the scheme. The services and products need to be designed appropriately for small clients. Over the longer term, therefore, efforts to promote microfinance should go hand-in-hand with efforts to make the formal sector better at "banking the poor", and the government can play a critical role in this. The SHG movement must aim for involving every woman in rural India and link her to the micro credit and micro enterprise campaigns under SGSY/NRLM scheme.SHGs faced the problem of inadequate loan amount. The loan amounts given to the members of SHGs under SGSY/NRLM are very low. The inability of the small loans to lift people out of poverty has been a key drawback. Enterprise activities require higher outlays that could generate a poverty-alleviating income. Loan amount should be increased to the extent that they can take up an income generating activity sustainably.With the demonetisation and promotion of cashless transactions, the use of technology should be incorporated in the microfinance scheme also. Moreover, the SHGs can also be employed as business correspondents (BCs) and business facilitators (BFs) by the banks to accelerate financial inclusion and to facilitate micro-finance operations in remote areas.Our study tends to concur with other literature on the topic, which suggests that the government policies have been sub-optimal. Rather, the government policies need to be designed and implemented with care through participative development process and in a manner that will ensure that their positive impact will considerably exceed the costs and limit any potential negative side-effect. SHG movement should be recognised a people's movement and the role of government should be only to facilitate and create a supportive environment, rather than manage the movement directly.
Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets.Securing company operations is a board-level discussion. Across all industries, companies are pouring millions of dollars into taming cybercrime and other related security crime. Achieving and Sustaining Secured Business Operations presents a holistic approach looking top down, bottom up, and sideways. The end goal is to achieve and sustain a safe environment to conduct secured business operations while continuously innovating for competitive advantage.What You’ll LearnDiscover why security, specifically secured business operations, needs to be part of business planning and oversight by design and not left to technologists to make the business caseDetermine whatyou can do in your role and in your organization to drive and implement integration and improvements in planning and managing secured business operations in conjunction with other business planning and management activitiesChoose ways in which progress toward achieving and sustaining secured business operations can be measuredUnderstand best practices for organizing, planning, architecting, governing, monitoring, and managing secured business operationsCreate a framework, including methods and tools for operationalizing assessment, planning, and ongoing management of secured business operationsUse cases and potential case studies for various industries and business models Who This Book Is For Chief executive officers and their leadership team; chief operations officers; chief information officers and their leadership team; chief information security officers; business functional middle managers; and enterprise, solution, and information technology architects
A PhD is the start of the research careers, and these students are the backbone of Universities and research institutions. It is the opportunity for youthful energy and creativity to make global impact and train the future researchers to make a difference. However, the candidature can also be the period of confusion and regret because of lack of structure and understanding.Research Methods for Successful PhD is written to help the PhD students and other young researchers navigate their path through this phase that will give them a direction and purpose. It is a candid conversation and developed over the experience of supervising 30 research students and publishing 400 papers over 20 years. The book recognizes that every student is different and has unique circumstances. It teases out the fundamental questions that we forget to ask, the method of relating to the supervisor, discusses methods to improve communication skills and explains the how to get the work published.
Get to know effective ways to improve PostgreSQL's performance and master query optimization, and database monitoring. About This Book • Perform essential database tasks such as benchmarking the database and optimizing the server's memory usage • Learn ways to improve query performance and optimize the PostgreSQL server • Explore a wide range of high availability and replication mechanisms to build robust, highly available, scalable, and fault-tolerant PostgreSQL databases Who This Book Is For If you are a developer or administrator with limited PostgreSQL knowledge and want to develop your skills with this great open source database, then this book is ideal for you. Learning how to enhance the database performance is always an exciting topic to everyone, and this book will show you enough ways to enhance the database performance. What You Will Learn • Build replication strategies for homogeneous and heterogeneous databases • Test and build a powerful machine with multiple bench marking techniques • Get to know a few SQL injection techniques • Find out how to manage the replication using multiple tools • Benchmark the database server using multiple strategies • Work with the query processing algorithms and their internal behaviors • Build a proper plan to upgrade or migrate to PostgreSQL from other databases • See the essential database load balancing techniques and the various partitioning approaches PostgreSQL provides • Learn memory optimization techniques and database server configurations In Detail PostgreSQL is one of the most powerful and easy to use database management systems. It has strong support from the community and is being actively developed with a new release every year. PostgreSQL supports the most advanced features included in SQL standards. It also provides NoSQL capabilities and very rich data types and extensions. All of this makes PostgreSQL a very attractive solution in software systems. If you run a database, you want it to perform well and you want to be able to secure it. As the world's most advanced open source database, PostgreSQL has unique built-in ways to achieve these goals. This book will show you a multitude of ways to enhance your database's performance and give you insights into measuring and optimizing a PostgreSQL database to achieve better performance. This book is your one-stop guide to elevate your PostgreSQL knowledge to the next level. First, you'll get familiarized with essential developer/administrator concepts such as load balancing, connection pooling, and distributing connections to multiple nodes. Next, you will explore memory optimization techniques before exploring the security controls offered by PostgreSQL. Then, you will move on to the essential database/server monitoring and replication strategies with PostgreSQL. Finally, you will learn about query processing algorithms. Style and approach This comprehensive guide is packed with practical administration tasks. Each topic is explained using examples and a step-by-step approach.
The development and application of assistive technology can help those with reduced abilities improve their quality of life and reduce their dependence on others. Written in layman’s terms, Devices for Mobility and Manipulation for People with Reduced Abilities provides research and information on assistive technologies for non-technical people. While it highlights various mobility and manipulative technologies, with the exception of specific examples within the text, it keeps technical terminology, equations, and software details to a minimum. It presents technical material in a digestible way for people with reduced abilities as well as for their caregivers.Each chapter covers a specific technology, and starts with a general introduction of that technology, followed by the technical details and an assessment from the user’s viewpoint. This includes the user benefits and suitability, cost, reliability, and required infrastructure. The chapter also provides illustrations or photographs of the devices, and identifies shortcomings, current research related to the technology, and possible development opportunities. Each chapter provides the range of specifications for the equipment and includes a list of manufacturers.Discusses user advantages and conditionsExamines technologies for robotic wheelchairs and prosthesesHelps a clinician or user understand the different devices that support people with disabilitiesThis book provides clinicians, users, and engineers with the details of different technologies, and also includes a guide to the technology that underpins each of these devices, making it easier for people to understand the devices. References are also included for scientists, designers, and other tech-savvy professionals interested in further information.
The book provides an insight into the advantages and limitations of the use of fractals in biomedical data. It begins with a brief introduction to the concept of fractals and other associated measures and describes applications for biomedical signals and images. Properties of biological data in relations to fractals and entropy, and the association with health and ageing are also covered. The book provides a detailed description of new techniques on physiological signals and images based on the fractal and chaos theory. The aim of this book is to serve as a comprehensive guide for researchers and readers interested in biomedical signal and image processing and feature extraction for disease risk analyses and rehabilitation applications. While it provides the mathematical rigor for those readers interested in such details, it also describes the topic intuitively such that it is suitable for audience who are interested in applying the methods to healthcare and clinical applications. The book is the outcome of years of research by the authors and is comprehensive and includes other reported outcomes.
Traditional marketing faces challenges as never before. The way that people interact with each other and with companies is changing completely in today’s era of 24/7 connectivity. This book explores tectonic changes in buyer behavior and how businesses are responding to those changes. It describes how data is used to track and analyze customers in almost everything they do, and how marketing communications are delivered with precision to individual mobile devices. The connected customer is blurring the line between online and offline sales resulting in an entirely new purchase cycle.The ""always on"" consumer has ushered in an era of customer engagement. In developed countries, online commerce offers limitless ease and variety for customers, while in developing countries e-commerce and e-finance provides access for millions of people to formal banking channels and also to empower them.Companies are merging their online and offline business models. While data is being used to analyze and track customers, at the same time it raises a worrying question—does this constant peering into customers’ lives has limits? Will it result in a consumer utopia or a privacy nightmare?This book helps understand how consumers and companies are changing, leading to profound changes in marketing.