02830nam 2200649 450 991079692860332120230126212734.00-7391-7759-1(CKB)3710000000371561(OCoLC)905855661(CaPaEBR)ebrary11030077(SSID)ssj0001439761(PQKBManifestationID)12602356(PQKBTitleCode)TC0001439761(PQKBWorkID)11383180(PQKB)11377531(MiAaPQ)EBC1982049(EXLCZ)99371000000037156120150319h20152015 uy 0engurcnu||||||||txtccrAnthropological research framing for archaeological geophysics material signatures of past human behavior /Jason Randall ThompsonLanham, Maryland :Rowman & Littlefield,2015.©20151 online resource (153 p.) Bibliographic Level Mode of Issuance: Monograph0-7391-7758-3 1-336-10073-7 Includes bibliographical references and index.Geophysical technology commonly applied in archaeology -- Bridging gaps -- The nature of a problem -- Towards using AGP anthropologically in archaeology -- Introduction to research frames : relations between research procedures and research goals -- Success at Verberie -- Failure at 13DB674 in Iowa or redefinition of success? -- Framing testable humanistic hypotheses for AGP -- Ideas for how to do this."Anthropological Research Framing for Archaeological Geophysics addresses the gap between humanistic anthropological archaeology and geophysical archaeology. It initiates and invites professional dialogue toward providing archaeological geophysics with anthropological premises"--Provided by publisher.Geophysics in archaeologyResearchPrehistoric peoplesResearchAntiquities, PrehistoricResearchSocial archaeologyResearchEthnoarchaeologyResearchArchaeologyMethodologyAnthropologyMethodologyGeophysics in archaeologyResearch.Prehistoric peoplesResearch.Antiquities, PrehistoricResearch.Social archaeologyResearch.EthnoarchaeologyResearch.ArchaeologyMethodology.AnthropologyMethodology.930.1028Thompson Jason Randall1969-1481449MiAaPQMiAaPQMiAaPQBOOK9910796928603321Anthropological research framing for archaeological geophysics3698404UNINA04740nam 22007095 450 991048423170332120200630011643.0981-13-8969-110.1007/978-981-13-8969-6(CKB)4100000009451823(DE-He213)978-981-13-8969-6(MiAaPQ)EBC5887798(PPN)243766513(EXLCZ)99410000000945182320190828d2020 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierAdvanced Computing and Systems for Security Volume Ten /edited by Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki1st ed. 2020.Singapore :Springer Singapore :Imprint: Springer,2020.1 online resource (X, 167 p. 65 illus., 29 illus. in color.) Advances in Intelligent Systems and Computing,2194-5357 ;996981-13-8968-3 Part 1: Security Systems -- Chapter 1. A Lightweight Security Protocol for IoT using Merkle Hash Tree and Chaotic Cryptography -- Chapter 2. A Quantitative Methodology for Business Process-based Data Privacy Risk Computation -- Chapter 3. Architectural Design Based Compliance Verification for IoT Enabled Secure Advanced Metering Infrastructure in Smart Grid -- Chapter 4. A Novel Approach to Human Recognition Based on Finger Geometry -- Chapter 5. Biometric Fusion System Using Face and Voice Recognition -- Part 2: Pattern Recognition and Imaging -- Chapter 6. A Multi-Class Image Classifier for Assisting in Tumor Detection of Brain Using Deep Convolution Neural Network -- Chapter 7. Determining Perceptual Similarity Among Readers Based on Eyegaze Dynamics -- Part 3: High Performance Computing -- Chapter 8. 2D Qubit Placement of Quantum Circuits Using LONGPATH -- Chapter 9. Debugging Errors in Microfluidic Executions -- Chapter 10. Effect of Volumetric Split-Errors on Reactant-Concentration During Sample Preparation with Microfluidic Biochips.This book features extended versions of selected papers that were presented and discussed at the 6th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2019) held in Kolkata, India on 12–13 March, 2019. Organized by the Departments of Computer Science & Engineering and A. K. Choudhury School of Information Technology, both from the University of Calcutta, the symposium’s international partners were Ca' Foscari University of Venice, Italy and Bialystok University of Technology, Poland. The chapters cover topics such as biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems, reflecting the various symposium sessions.Advances in Intelligent Systems and Computing,2194-5357 ;996Computational intelligenceSignal processingImage processingSpeech processing systemsComputer securityOptical data processingBig dataComputational Intelligencehttps://scigraph.springernature.com/ontologies/product-market-codes/T11014Signal, Image and Speech Processinghttps://scigraph.springernature.com/ontologies/product-market-codes/T24051Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Computer Imaging, Vision, Pattern Recognition and Graphicshttps://scigraph.springernature.com/ontologies/product-market-codes/I22005Big Datahttps://scigraph.springernature.com/ontologies/product-market-codes/I29120Computational intelligence.Signal processing.Image processing.Speech processing systems.Computer security.Optical data processing.Big data.Computational Intelligence.Signal, Image and Speech Processing.Systems and Data Security.Computer Imaging, Vision, Pattern Recognition and Graphics.Big Data.006.3Chaki Rituparnaedthttp://id.loc.gov/vocabulary/relators/edtCortesi Agostinoedthttp://id.loc.gov/vocabulary/relators/edtSaeed Khalidedthttp://id.loc.gov/vocabulary/relators/edtChaki Nabenduedthttp://id.loc.gov/vocabulary/relators/edtBOOK9910484231703321Advanced Computing and Systems for Security1539984UNINA