Even though ozone has been applied for a long time for disinfection and oxidation in water treatment, there is lack of critical information related to transformation of organic compounds. This has become more important in recent years, because there is considerable concern about the formation of potentially harmful degradation products as well as oxidation products from the reaction with the ma…
From Attali's "cold social silence" to Baudrillard's hallucinatory reality, reproduced music has long been the target of critical attack. In Bytes and Backbeats, however, Steve Savage deploys an innovative combination of designed recording projects, ethnographic studies of contemporary music practice, and critical analysis to challenge many of these traditional attitudes about the creation and …
A free open access ebook is available upon publication. Learn more at www.luminosoa.org. Discourse about water and power in the modern era have largely focused on human power over water: who gets to own and control a limited resource that has incredible economic potential. As a result, discussion of water, even in the humanities, has traditionally focused on fresh water for human use. Today, cl…
This book shares insights into the various ways technology can be used for educational purposes, utilizing an approach suitable for both novice and advanced practitioners in this niche area. It features selected papers presented at the International Conference on e-Learning 2015 (ICeL 2015), where professionals discussed how technology can not only serve as a tool in the classroom, but as the c…
Triticale crop species has received substantial research support since the mid-20th century making it a commercial success in many countries, in diverse value propositions. However, no recent book captures the new knowledge and progresses made in more than 2 decades. The purpose of this work is to review and collate the new knowledge of triticale plant biology and agronomy, while considering th…
This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. Chapters…
This book, the second of two volumes on the Gentianaceae, is devoted to aspects of biotechnology and their applications. It consists of 18 chapters and covers micropropagation by means of organogenesis or somatic embryogenesis, and single cell manipulation of various species belonging to the horticultural genera Blakstonia, Centaurium, Gentiana, Gentianalla and Swertia. Furthermore, the applica…
This book explores emerging pedagogical perspectives based on the design of new learning spaces supported by digital technologies and brings together some of the best research in this field. The book is divided into three themes: foundations of emerging pedagogies, learning designs for emerging pedagogies and, adaptive and personalized learning. The chapters provide up-to-date information about…
Twenty-five years ago there was increasing optimism in policy, curriculum and research about the contribution that technology education might make to increased technological literacy in schools and the wider population. That optimism continues, although the status of technology as a learning area remains fragile in many places. This edited book is offered as a platform from which to continue…
The Magnitude 9 Great East Japan Earthquake on March 11, 2011, followed by a massive tsunami struck TEPCO’s Fukushima Daiichi Nuclear Power Station and triggered an unprecedented core melt/severe accident in Units 1 – 3. The radioactivity release led to the evacuation of local residents, many of whom still have not been able to return to their homes. As a group of nuclear experts, the A…