This book covers the topic of RFID protocol design and optimization and the authors aim to demystify complicated RFID protocols and explain in depth the principles, techniques, and practices in designing and optimizing them.
This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-prone. This book presents scientifically sound and practically useful methods for designing and analyzing firewall policies. This book is useful to a variety of readers. First, it can be used as a handbook for network/firewall administrators and network security professionals. Second, it can be used as an advanced textbook for graduate students and senior undergraduate students in computer science and engineering. Third, it is also suitable for non-experts in network security who wish to understand more about firewalls. The presentation of the book is detailed enough to capture the interest of curious readers, and complete enough to provide the necessary background material needed to delve further into the subject of firewalls and network security.
This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for breaking privacy, and gives intuition on how to design algorithm to counter privacy attacks. Some well-designed differential privacy algorithms are also included in this book. Driven by lower cost, higher reliability, better performance, and faster deployment, data and computing services are increasingly outsourced to clouds. In this computing paradigm, one often has to store privacy sensitive data at parties, that cannot fully trust and perform privacy sensitive computation with parties that again cannot fully trust. For both scenarios, preserving data privacy and computation privacy is extremely important. After the Facebook–Cambridge Analytical data scandal and the implementation of the General Data Protection Regulation by European Union, users are becoming more privacy aware and more concerned with their privacy in this digital world. This book targets database engineers, cloud computing engineers and researchers working in this field. Advanced-level students studying computer science and electrical engineering will also find this book useful as a reference or secondary text.
This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for breaking privacy, and gives intuition on how to design algorithm to counter privacy attacks. Some well-designed differential privacy algorithms are also included in this book. Driven by lower cost, higher reliability, better performance, and faster deployment, data and computing services are increasingly outsourced to clouds. In this computing paradigm, one often has to store privacy sensitive data at parties, that cannot fully trust and perform privacy sensitive computation with parties that again cannot fully trust. For both scenarios, preserving data privacy and computation privacy is extremely important. After the Facebook–Cambridge Analytical data scandal and the implementation of the General Data Protection Regulation by European Union, users are becoming more privacy aware and more concerned with their privacy in this digital world. This book targets database engineers, cloud computing engineers and researchers working in this field. Advanced-level students studying computer science and electrical engineering will also find this book useful as a reference or secondary text.
Hardware Based Packet Classification for High Speed Internet Routers presents the most recent developments in hardware based packet classification algorithms and architectures. This book describes five methods which reduce the space that classifiers occupy within TCAMs; TCAM Razor, All-Match Redundancy Removal, Bit Weaving, Sequential Decomposition, and Topological Transformations. These methods demonstrate that in most cases a substantial reduction of space is achieved. Case studies and examples are provided throughout this book. About this book: • Presents the only book in the market that exclusively covers hardware based packet classification algorithms and architectures. • Describes five methods which reduce the space that classifiers occupy within TCAMs: TCAM Razor, All-Match Redundancy Removal, Bit Weaving, Sequential Decomposition, and Topological Transformations. • Provides case studies and examples throughout. Hardware Based Packet Classification for High Speed Internet Routers is designed for professionals and researchers who work within the related field of router design. Advanced-level students concentrating on computer science and electrical engineering will also find this book valuable as a text or reference book.
Night of the Living Queers is a YA horror anthology that explores a night when anything is possible, exclusively featuring queer authors of color putting fresh spins on classic horror tropes and tales. No matter its name or occasion, Halloween is more than a Hallmark holiday, it’s a symbol of transformation. NIGHT OF THE LIVING QUEERS is a YA horror anthology that explores how Halloween can be more than just candies and frights, but a night where anything is possible. Each short story is told through the lens of a different BIPOC teen and the Halloween night that changes their lives forever. Creative, creepy, and queer, this collection brings fresh terror, heart, and humor to young adult literature. Contributors include editors Alex Brown and Shelly Page, Kalynn Bayron, Ryan Douglass, Sara Farizan, Maya Gittelman, Kosoko Jackson, Em Liu, Vanessa Montalban, Ayida Shonibar, Tara Sim, Trang Thanh Tran, and Rebecca Kim Wells.
Quantum Wells, Wires and Dots provides all the essential information, both theoretical and computational, to develop an understanding of the electronic, optical and transport properties of these semiconductor nanostructures. The book will lead the reader through comprehensive explanations and mathematical derivations to the point where they can design semiconductor nanostructures with the required electronic and optical properties for exploitation in these technologies. This fully revised and updated 4th edition features new sections that incorporate modern techniques and extensive new material including: Properties of non-parabolic energy bands Matrix solutions of the Poisson and Schrödinger equations Critical thickness of strained materials Carrier scattering by interface roughness, alloy disorder and impurities Density matrix transport modelling Thermal modelling Written by well-known authors in the field of semiconductor nanostructures and quantum optoelectronics, this user-friendly guide is presented in a lucid style with easy to follow steps, illustrative examples and questions and computational problems in each chapter to help the reader build solid foundations of understanding to a level where they can initiate their own theoretical investigations. Suitable for postgraduate students of semiconductor and condensed matter physics, the book is essential to all those researching in academic and industrial laboratories worldwide. Instructors can contact the authors directly (p.harrison@shu.ac.uk / a.valavanis@leeds.ac.uk) for Solutions to the problems.
This unique compendium focuses on the design and implementation of emerging transport protocols and task scheduling mechanisms to mitigate congestion in datacentre networks. Datacenters have become a critical infrastructure for hosting user-facing online services such as web search and social networking.For datacenter transport, this volume highlights the design and implementation details of the state-of-art transport protocols that not only achieves optimal performance in terms of minimizing flow completion times but are also deployment friendly.Moreover, this must-have reference material also discusses the transport protocols for multi-tenant datacentre networks. For datacenter task scheduling, the book introduces an innovative task placement framework that considers network scheduling while making task placement decisions.
This unique compendium focuses on the design and implementation of emerging transport protocols and task scheduling mechanisms to mitigate congestion in datacentre networks. Datacenters have become a critical infrastructure for hosting user-facing online services such as web search and social networking.For datacenter transport, this volume highlights the design and implementation details of the state-of-art transport protocols that not only achieves optimal performance in terms of minimizing flow completion times but are also deployment friendly.Moreover, this must-have reference material also discusses the transport protocols for multi-tenant datacentre networks. For datacenter task scheduling, the book introduces an innovative task placement framework that considers network scheduling while making task placement decisions.
This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-prone. This book presents scientifically sound and practically useful methods for designing and analyzing firewall policies. This book is useful to a variety of readers. First, it can be used as a handbook for network/firewall administrators and network security professionals. Second, it can be used as an advanced textbook for graduate students and senior undergraduate students in computer science and engineering. Third, it is also suitable for non-experts in network security who wish to understand more about firewalls. The presentation of the book is detailed enough to capture the interest of curious readers, and complete enough to provide the necessary background material needed to delve further into the subject of firewalls and network security.
No Way to Treat a Friend is an informative and readable exposé of Complementary and Alternative Veterinary Medicine (CAVM). Written in an accessible style and illustrated with stories and cases from veterinary practice about real animals, this book is a counterweight to the mass of ‘pro’ literature in existence which uncritically promotes CAVM without consideration of whether or not it works or could even be harmful to our animal companions. The book takes a close look at how thinking can go wrong and how animals can appear to respond to treatment even when it is ineffective. Individual alternative practices are examined including homeopathy, acupuncture, raw diets and the anti-vaccination lobby and we find out if their claims stand up to scrutiny. With a thoroughly scientific line, it is not an attack on different belief systems, but a rigorous analysis of the facts, and a consideration of typical CAVM arguments, as well as a helpful explanation for people who may be unfamiliar with what the various therapies entail. Following on from the several successful books questioning the use of complementary therapies in human medicine such as Bad Science, No Way to Treat a Friend looks at their use in veterinary medicine. This is a valuable resource for veterinary practitioners as well as lay people who are interested in popular science, animal topics, animal welfare and medical matters. 5m Books
This book is a description of some of the most recent advances in text classification as part of a concerted effort to achieve computer understanding of human language. In particular, it addresses state-of-the-art developments in the computation of higher-level linguistic features, ranging from etymology to grammar and syntax for the practical task of text classification according to genres, registers and subject domains. Serving as a bridge between computational methods and sophisticated linguistic analysis, this book will be of particular interest to academics and students of computational linguistics as well as professionals in natural language engineering.
Explains how to perform and analyze the results of the latest physicochemical methods With this book as their guide, readers have access to all the current information needed to thoroughly investigate and accurately determine a compound's pharmaceutical properties and their effects on drug absorption. The book emphasizes oral absorption, explaining all the physicochemical methods used today to analyze drug candidates. Moreover, the author provides expert guidance to help readers analyze the results of their studies in order to select the most promising drug candidates. This Second Edition has been thoroughly updated and revised, incorporating all the latest research findings, methods, and resources, including: Descriptions and applications of new PAMPA models, drawing on more than thirty papers published by the author's research group Two new chapters examining permeability and Caco-2/MDCK and permeability and the blood-brain barrier Expanded information and methods to support pKa determination New examples explaining the treatment of practically insoluble test compounds Additional case studies demonstrating the use of the latest physicochemical techniques New, revised, and expanded database tables throughout the book Well over 200 drawings help readers better understand difficult concepts and provide a visual guide to complex procedures. In addition, over 800 references serve as a gateway to the primary literature in the field, facilitating further research into all the topics covered in the book. This Second Edition is recommended as a reference for researchers in pharmaceutical R&D as well as in agrochemical, environmental, and other related areas of research. It is also recommended as a supplemental text for graduate courses in pharmaceutics.
This book explores how structure impacts the dynamics of organic molecules in an extensive and impressive range of femtosecond time-resolved experiments that are combined with state-of-the-art theoretical approaches. It explores an area of molecular dynamics that remains largely uncharted and provides an extraordinary overview, along with novel insights into the concept of the dynamophore – the functional group of ultrafast science. Divided into four parts, this book outlines both experimental and computational studies on the VUV photoinduced dynamics of four cyclic ketones and one linear ketone, the ring-opening and dissociative dynamics of cyclopropane, and the potential ultrafast intersystem crossing in three methylated benzene derivatives. Model systems for the disulfide bond and the peptide bond, both of which are related to the structure of proteins, are also investigated. This highly informative and carefully presented book offers a wealth of scientific insights for all scholars with an interest in molecular dynamics.
Illicit financial flows constitute a global phenomenon of massive but uncertain scale, which erodes government revenues and drives corruption in countries rich and poor. This book offers a critical examination of existing data and methodologies, identifying the most promising avenues for future improvement.
Empathy is a widely used term, but it is also difficult to define. In recent years, the field of cognitive neuroscience has made impressive strides in identifying neural networks in the brain related to or triggered by empathy. Still, what exactly do we mean when we say that someone has—or lacks—empathy? How is empathy distinguished from sympathy or pity? And is society truly suffering from an "empathy deficit," as some experts have charged?? In Assessing Empathy, Elizabeth A. Segal and colleagues marshal years of research to present a comprehensive definition of empathy, one that links neuroscientific evidence to human service practice. The book begins with a discussion of our current understanding of empathy in neurological, biological, and behavioral terms. The authors explain why empathy is important on both the individual and societal levels. They then introduce the concepts of interpersonal empathy and social empathy, and how these processes can interrelate or operate separately. Finally, they examine the weaknesses of extant empathy assessments before introducing three new, validated measures: the Empathy Assessment Index, the Social Empathy Index, and the Interpersonal and Social Empathy Index.
Gallium nitride (GaN) is an emerging technology that promises to displace silicon MOSFETs in the next generation of power transistors. As silicon approaches its performance limits, GaN devices offer superior conductivity and switching characteristics, allowing designers to greatly reduce system power losses, size, weight, and cost. This timely second edition has been substantially expanded to keep students and practicing power conversion engineers ahead of the learning curve in GaN technology advancements. Acknowledging that GaN transistors are not one-to-one replacements for the current MOSFET technology, this book serves as a practical guide for understanding basic GaN transistor construction, characteristics, and applications. Included are discussions on the fundamental physics of these power semiconductors, layout and other circuit design considerations, as well as specific application examples demonstrating design techniques when employing GaN devices. With higher-frequency switching capabilities, GaN devices offer the chance to increase efficiency in existing applications such as DC–DC conversion, while opening possibilities for new applications including wireless power transfer and envelope tracking. This book is an essential learning tool and reference guide to enable power conversion engineers to design energy-efficient, smaller and more cost-effective products using GaN transistors. Key features: Written by leaders in the power semiconductor field and industry pioneers in GaN power transistor technology and applications. Contains useful discussions on device–circuit interactions, which are highly valuable since the new and high performance GaN power transistors require thoughtfully designed drive/control circuits in order to fully achieve their performance potential. Features practical guidance on formulating specific circuit designs when constructing power conversion systems using GaN transistors – see companion website for further details. A valuable learning resource for professional engineers and systems designers needing to fully understand new devices as well as electrical engineering students.
An indispensable resource for all levels, this handbook provides up-to-date, in-depth summaries of the most important theories in criminology. Provides original, cutting-edge, and in-depth summaries of the most important theories in criminology Covers the origins and assumptions behind each theory, explores current debates and research, points out knowledge gaps, and offers directions for future research Encompasses theory, research, policy, and practice, with recommendations for further reading at the end of each essay Features discussions of broad issues and topics related to the field, such as the correlates of crime, testing theory, policy, and prediction Clearly and accessibly written by leading scholars in the field as well as up-and-coming scholars
Healthcare is important to everyone, yet large variations in its quality have been well documented both between and within many countries. With demand and expenditure rising, it’s more crucial than ever to know how well the healthcare system and all its components – from staff member to regional network – are performing. This requires data, which inevitably differ in form and quality. It also requires statistical methods, the output of which needs to be presented so that it can be understood by whoever needs it to make decisions. Statistical Methods for Healthcare Performance Monitoring covers measuring quality, types of data, risk adjustment, defining good and bad performance, statistical monitoring, presenting the results to different audiences and evaluating the monitoring system itself. Using examples from around the world, it brings all the issues and perspectives together in a largely non-technical way for clinicians, managers and methodologists. Statistical Methods for Healthcare Performance Monitoring is aimed at statisticians and researchers who need to know how to measure and compare performance, health service regulators, health service managers with responsibilities for monitoring performance, and quality improvement scientists, including those involved in clinical audits.
Diverse and abundant lipid biomarker assemblages have been reported from a variety of Proterozoic marine environments from the careful analysis of well-preserved rocks and oils. These molecular biosignatures have provided unique insights into the communities and the environmental conditions which characterized the Proterozoic marine biosphere. We summarize some of the major temporal patterns evident in Proterozoic lipid biomarkers found to date, whilst emphasizing the scale of local heterogeneity found within Neoproterozoic oceans from region to region, and their relationship with the evolving ecological, climatic and ocean/atmospheric redox conditions. Short commentaries on a selection of papers published from the last 15 years of biomarker literature are given. The focus here is on key studies, highlighted for further reading, which have helped to better constrain the timing of the ecological expansion of eukaryotes in Proterozoic oceans or which have impacted on our knowledge of the biological sources of Proterozoic biomarkers.
New information and communication technologies have drastically changed public management. Public managers are increasingly dependent on information gathered form complex systems and they need to be able to put in place sound IT and communication structures. This accessible text, aimed specifically at those studying and working in public management, offers readers a comprehensive understanding of ICTs and their implications for public management. It provides aspiring and current public managers a framework for the development of strategic public information management across the full range of public organizations. Written by leading experts in this area, Public Management in an Information Age offers: - A thorough grounding in the latest research - Examples of issues and practices from different contexts and types of organizations around the world - A range of tools and techniques to help readers analyse concrete situations and develop appropriate solutions - Summary boxes on key ICTs in non-technical language This is the ideal text for students on Master of Public Administration, Master of Public Management and Master of Public Policy programmes.
A provocative manifesto that teaches you how to take control of your own health, no matter your age or circumstances—from an innovative doctor and his philosopher daughter “If you care about your health or the well-being of others, read this book.”—Ethan Kross, author of Chatter Dr. Alex Jadad is the creator of the Jadad scale, which has become the world’s most widely used methodology to assess the quality of clinical trials, and his daughter Tamen Jadad-Garcia is a health entrepreneur and philosopher. Here they combine their expertise to uncover the medical system’s unstable foundations, which condemn you to be ill. The Jadads begin this exploration with a simple question: “What is health?” Through engaging stories and case studies, the Jadads expand the understanding of health beyond the medical industrial complex. They show how distant connections in your personal networks can influence key aspects of yourself, like your weight, anxiety, and addictions; how reliance on medications can be reduced by intentionally designing the places where you live, work, and play; and how comparisons with peers can shorten your life. In this practical guide, the meaning of health is redefined, putting you in the driver’s seat and recognizing you as the most effective evaluator. Building on data and experiences from millions of people around the world, the book reveals that a healthy life is possible even with complex chronic conditions or terminal illnesses. The Jadads explain why perceiving yourself as unhealthy might actually be fatal, and how you can monitor your true health and boost it in practically any context, no matter your cultural background or socioeconomic circumstances. With wisdom and empathy, Healthy No Matter What teaches you how your natural gift of adaptability equips you to overcome any obstacle, provides actionable pointers, and shows how and when to use the medical system, so that you can thrive, regardless of the twists and turns life may take.
This brief introduces wireless communications ideas and techniques into the study of networked control systems. It focuses on state estimation problems in which sensor measurements (or related quantities) are transmitted over wireless links to a central observer. Wireless communications techniques are used for energy resource management in order to improve the performance of the estimator when transmission occurs over packet dropping links, taking energy use into account explicitly in Kalman filtering and control. The brief allows a reduction in the conservatism of control designs by taking advantage of the assumed. The brief shows how energy-harvesting-based rechargeable batteries or storage devices can offer significant advantages in the deployment of large-scale wireless sensor and actuator networks by avoiding the cost-prohibitive task of battery replacement and allowing self-sustaining sensor to be operation. In contrast with research on energy harvesting largely focused on resource allocation for wireless communication systems design, this brief optimizes estimation objectives such as minimizing the expected estimation error covariance. The resulting power control problems are often stochastic control problems which take into account both system and channel dynamics. The authors show how to pose and solve such design problems using dynamic programming techniques. Researchers and graduate students studying networked control systems will find this brief a helpful source of new ideas and research approaches.
Presents a detailed study of the major design components that constitute a top-down decision-tree induction algorithm, including aspects such as split criteria, stopping criteria, pruning and the approaches for dealing with missing values. Whereas the strategy still employed nowadays is to use a 'generic' decision-tree induction algorithm regardless of the data, the authors argue on the benefits that a bias-fitting strategy could bring to decision-tree induction, in which the ultimate goal is the automatic generation of a decision-tree induction algorithm tailored to the application domain of interest. For such, they discuss how one can effectively discover the most suitable set of components of decision-tree induction algorithms to deal with a wide variety of applications through the paradigm of evolutionary computation, following the emergence of a novel field called hyper-heuristics. "Automatic Design of Decision-Tree Induction Algorithms" would be highly useful for machine learning and evolutionary computation students and researchers alike.
Innovation offers potential: to cure diseases, to better connect people, and to make the way we live and work more efficient and enjoyable. At the same time, innovation can fuel inequality, decimate livelihoods, and harm mental health. This book contends that inclusive innovation – innovation motivated by environmental and social aims – is able to uplift the benefits of innovation while reducing its harms. The book provides accessible engagement with inclusive innovation happening at the grassroots level through to policy arenas, with a focus on the South-East Asian region. Focusing on fundamental questions underpinning innovation, in terms of how, what and where, it argues that inclusive innovation has social processes and low-tech solutions as essential means of driving innovation, and that environmental concerns must be considered alongside societal aims. The book's understanding of inclusive innovation posits that marginalized or underrepresented innovators are empowered to include themselves by solving a problem that they are experiencing. The first in-depth exploration of efforts underway to assuage inequality from policy, private sector, and grassroots perspectives, this book will interest researchers in the areas of innovation studies, political economy, and development studies. Chapters 1 and 5 of this book are available for free in PDF format as Open Access from the individual product page at www.routledge.com. It has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.
Homogenization is a fairly new, yet deep field of mathematics which is used as a powerful tool for analysis of applied problems which involve multiple scales. Generally, homogenization is utilized as a modeling procedure to describe processes in complex structures. Applications of Homogenization Theory to the Study of Mineralized Tissue functions as an introduction to the theory of homogenization. At the same time, the book explains how to apply the theory to various application problems in biology, physics and engineering. The authors are experts in the field and collaborated to create this book which is a useful research monograph for applied mathematicians, engineers and geophysicists. As for students and instructors, this book is a well-rounded and comprehensive text on the topic of homogenization for graduate level courses or special mathematics classes. Features: Covers applications in both geophysics and biology. Includes recent results not found in classical books on the topic Focuses on evolutionary kinds of problems; there is little overlap with books dealing with variational methods and T-convergence Includes new results where the G-limits have different structures from the initial operators
Now in paperback comes a lively adventure narrative of the first ascent of the southwest face of Shishapangma--a classic which captures details from the historical to the personal. 45 photos.
A must-have companion resource to test knowledge of plastic surgery essentials Essentials of Plastic Surgery: Q&A Companion, Second Edition by renowned plastic surgeons Alex P. Jones and Jeffrey E. Janis mirrors expanded content and new chapters in the parent book, Essentials of Plastic Surgery, Third Edition. The third edition of the parent book includes 127 chapters, which reflects the increased scope, breadth, and depth of plastic surgery since publication of the last edition. The companion book employs the same style and formatting, with select illustrations from the parent book, as well as additional unique images created for this text. The print book is accompanied by a complimentary eBook that is accessible on smartphones and tablets. Key Features More than 1600 questions formatted as multiple-choice questions complement and highlight the content contained in the parent book Questions specifically designed to test the reader on the clinical application of this knowledge Succinct yet detailed answers enhance acquisition and retention of knowledge The conveniently compact format fits in a lab coat pocket and is designed and organized to enable quick and easy reading This is an invaluable, go-to resource for plastic surgeons throughout training and can be used as a refresher and revalidation of knowledge as their careers progress.
Since initiating the journal Social Indicators Research in 1974, Alex C. Michalos has been a pioneer in social indicators and quality-of-life research. This collection of nineteen articles provides an overview of nearly 30 years of work, including papers drawn from diverse sources and papers never published before. The final paper, on multiple discrepancies theory (MDT), is the author's unique contribution to an empirically testable new foundation for theories of utility, satisfaction and happiness.
New Export China provides a materials-focused framework for contemporary Chinese art, taking works in porcelain by international artists Ai Weiwei, Liu Jianhua, Ah Xian, and Sin-ying Ho as case studies for the role of travel and translation in global artistic practice. Porcelain has long been a vehicle for transmitting cultural knowledge, yet little has been written about its relevance for an era when our interconnection is clearer than ever. Taking a thematic approach, this book positions porcelain art within current debates around archival intervention, artistic authenticity, racial and gender identity, global capital and migrant labor, cultural stereotypes, and ownership of heritage"--
In pharmaceutical research, solubility plays a key part in the assessment of pharmacokinetic risks. Poor drug absorption, reduced efficacy, excessive metabolism, and adverse reactions are frequently related to issues of drug solubility. During early discovery research at pharmaceutical companies, many thousands of molecules are considered. Most are rejected due to perceived unfavorable properties. Here the author uses the Wiki-pS0TM database, which forms the backbone of this unique handbook. Also discussed is the emerging class of therapeutically promising research molecules called PROTACs (proteolysis-targeting chimeras), showing a propensity for ‘undruggable’ targets. FEATURES • A comprehensive and unique listing of measured aqueous intrinsic solubility focusing on drug-like and drug-relevant molecules. • The database can be used to predict the solubility of research pharmaceutical molecules. • Includes downloadable files of the database (.csv format). • The mining of the database can result in a better design of solubility assay protocols, leading to better quality of measurements. • Artificial intelligence and Bayesian statistics will likely be key to this subject area in the future. Alex Avdeef has been an American Association of Pharmaceutical Scientists (AAPS) Fellow since 2014, a former visiting senior research fellow at King’s College London, and is the author of Absorption and Drug Development (2nd ed., Wiley, 2012). In 2021, the book was translated into Chinese, by translators affiliated with the China Food and Drug Administration. For nearly 50 years, he has been teaching, researching, and developing methods, instruments, and analysis software for the measurement of ionization constants, solubility, dissolution, and permeability of drugs. His accomplishments in the development of instrumentation include several well-known instruments that are or recently have been manufactured by leading companies in the instrument market, including Thermo Fisher Scientific, Sirius Analytical, and Pion Inc. He has over 200 technical publications in primary scientific journals and book chapters. He has written several comprehensive technical guides and is a co-inventor on six patents. He cofounded Sirius Analytical (UK) in 1989, pION Inc. (USA) in 1996, and founded in–ADME Research (New York City) in 2011. His other positions were at Orion Research, Syracuse University, UC Berkeley, and Caltech.
Since their debut in the late 1920s, particle accelerators have evolved into a backbone for the development of science and technology in modern society. Of about 30,000 accelerators at work in the world today, a majority is for applications in industry (about 20,000 systems worldwide). There are two major categories of industrial applications: materials processing and treatment, and materials analysis. Materials processing and treatment includes ion implantation (semi-conductor materials, metals, ceramics, etc.) and electron beam irradiation (sterilization of medical devices, food pasteurization, treatment of carcasses and tires, cross-linking of polymers, cutting and welding, curing of composites, etc.). Materials analysis covers ion beam analysis (IBA), non-destructive detection using photons and neutrons, as well as accelerator mass spectrometry (AMS). All the products that are processed, treated and inspected using beams from particle accelerators are estimated to have a collective value of US$500 billion per annum worldwide. Accelerators are also applied for environment protection, such as purifying drinking water, treating waste water, disinfecting sewage sludge and removing pollutants from flue gases. Industrial accelerators continue to evolve, in terms of new applications, qualities and capabilities, and reduction of their costs. Breakthroughs are encountered whenever a new product is made, or an existing product becomes more cost effective. Their impact on our society continues to grow with the potential to address key issues in economics or the society of today. This volume contains fourteen articles, all authored by renowned scientists in their respective fields.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.