Browse Items (3682 total)

41qtMkv4xaL._SX346_BO1,204,203,200_.jpg
Medicine is undergoing a sector-wide transformation thanks to the advances in computing and networking technologies. Healthcare is changing from reactive and hospital-centered to preventive and personalized, from disease focused to well-being…

978-3-031-10071-0.jpg
This Open Access proceedings presents a good overview of the current research landscape of assembly, handling and industrial robotics.


The objective of MHI Colloquium is the successful networking at both academic and management level. Thereby,…

Diagnostic_Prognostic_and_Predictive_Biological_Markers_in_Bladder_Cancer__Illumination_of_a_Vision.jpg
This Special Issue has been introduced with the aim of offering the possibility to publish new research results from old and new pioneers in the field of bladder cancer basic research. While editing this Special Issue we learned that an enormous…

978-3-031-04536-3.jpg
This is an open access book.

In this third edition of Engineering Haptic Devices the software part was rewritten from scratch and now includes even more details on tactile and texture interaction modalities. The kinematics section was improved to…

978-3-031-41344-5.pdf.jpg
This open access book examines places on the margins and the dynamics through which a marginal position of a place is created. Specifically, it explores how places, mostly in sparsely populated areas, often perceived as immobile and frozen in time,…

book.pdf.jpg
For centuries, law was used to subordinate women and exclude them from the public sphere, so it cannot be expected to become a source of equality instantaneously or without resistance from benchmark men—that is, those who are white, heterosexual,…

Tags:

The Works and Times.jpg
The lifetime of Johan Huizinga (1872–1945) was marked by dramatic transformations in Europe. Cityscapes, aesthetic codes, social orders, political cultures, international travel and means of warfare developed beyond recognition; entire catalogues of…

Chapter Risk Assessment and Automated.jpg
Risk-based security is a concept introduced in order to provide security checks without inconveniencing travelers that are being checked with unqualified scrutiny checks while maintaining the same level of security with current check point practices…

Multilateral Banks and the Development Process.jpg
A chain is only as strong as its weakest link. When the links in the chain represent development projects, if individual projects fail to achieve their purpose, the development program's effectiveness is compromised. When the chain's links are strong…

multilateral.jpg
A chain is only as strong as its weakest link. When the links in the chain represent development projects, if individual projects fail to achieve their purpose, the development program's effectiveness is compromised. When the chain's links are strong…
Output Formats

atom, csv, dcmes-xml, json, omeka-xml, rss2