LEADER 04429nam 2200757 450 001 9910455951103321 005 20200520144314.0 010 $a1-282-03384-0 010 $a9786612033841 010 $a1-4426-7998-0 024 7 $a10.3138/9781442679986 035 $a(CKB)2420000000004363 035 $a(EBL)4671964 035 $a(SSID)ssj0000309568 035 $a(PQKBManifestationID)11207106 035 $a(PQKBTitleCode)TC0000309568 035 $a(PQKBWorkID)10283355 035 $a(PQKB)10954923 035 $a(CaBNvSL)thg00600714 035 $a(MiAaPQ)EBC3255511 035 $a(MiAaPQ)EBC4671964 035 $a(DE-B1597)464876 035 $a(OCoLC)1013939028 035 $a(OCoLC)944177540 035 $a(DE-B1597)9781442679986 035 $a(Au-PeEL)EBL4671964 035 $a(CaPaEBR)ebr11257652 035 $a(CaONFJC)MIL203384 035 $a(OCoLC)958581255 035 $a(EXLCZ)992420000000004363 100 $a20160922h20012001 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSit down and drink your beer $eregulating Vancouver's beer parlours, 1925-1954 /$fRobert A. Campbell 210 1$aToronto, [Ontario] ;$aBuffalo, [New York] ;$aLondon, [England] :$cUniversity of Toronto Press,$d2001. 210 4$d©2001 215 $a1 online resource (216 p.) 225 1 $aStudies in Gender and History 300 $aDescription based upon print version of record. 311 $a0-8020-8377-3 311 $a0-8020-4854-4 320 $aIncludes bibliographical references and index. 327 $tFrontmatter -- $tContents -- $tAcknowledgments -- $tAbbreviations -- $tIntroduction. Regulating Public Drinking -- $tChapter One. The Genesis of the Beer Parlou -- $tChapter Two. Operators and Workers: The Ties That Bind -- $tChapter Three. Ladies and Escorts: Regulating and Negotiating Gender and Sexuality -- $tChapter Four. Appearance and Performance: Creating and Regulating the Unwanted -- $tChapter Five. Reconfiguring Decency in the 1950s: The Politics of Regulation -- $tConclusion. Managing the Marginal -- $tNotes -- $tReferences -- $tIllustration Credits -- $tIndex -- $tBackmatter 330 $aWhen public drinking returned to much of Canada with the end of Prohibition, former hotel saloons were transformed into closely regulated beer parlours, where beer was served in glasses and only to seated patrons. No entertainment was allowed, not even singing, and eventually there were separate entrances and seating for women. The parlours catered to a working-class clientele, and class, gender and sexuality, race, age, and decency were regulated as well as alcohol.Campbell argues that the regulation of the environment of the classic beer parlour, rather than being an example of social control, is best understood as moral regulation and part of a process of normalization. He focuses on the beer parlours of Vancouver from the end of Prohibition in 1925 to the liberalization of liquor laws in 1954 and the creation of new venues, such as cocktail lounges, for the public consumption of alcohol. Approaching his subject not only through the state power exercised by the Liquor Control Board, but also through day-to-day regulation by parlour operators, workers, and patrons, Campbell has compiled an accessible work of crisp and original scholarship that will appeal to social historians as well as anyone interested in the history of alcohol and the regulation of leisure. 410 0$aStudies in gender and history. 606 $aDrinking of alcoholic beverages$zBritish Columbia$zVancouver$xHistory$y20th century 606 $aBars (Drinking establishments)$zBritish Columbia$zVancouver$xHistory$y20th century 606 $aDrinking customs$zBritish Columbia$zVancouver$xHistory$y20th century 606 $aLiquor laws$zBritish Columbia$zVancouver$xHistory$y20th century 608 $aElectronic books. 615 0$aDrinking of alcoholic beverages$xHistory 615 0$aBars (Drinking establishments)$xHistory 615 0$aDrinking customs$xHistory 615 0$aLiquor laws$xHistory 676 $a363.4/1/0971133 700 $aCampbell$b Robert A.$f1952-$01028255 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910455951103321 996 $aSit down and drink your beer$92444199 997 $aUNINA LEADER 11046nam 2200493 450 001 996503562403316 005 20231110221405.0 010 $a3-031-21750-0 035 $a(MiAaPQ)EBC7166072 035 $a(Au-PeEL)EBL7166072 035 $a(CKB)25913961400041 035 $a(PPN)267813821 035 $a(EXLCZ)9925913961400041 100 $a20230504d2022 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aComputing, communication and learning $efirst international conference, CoCoLe 2022, Warangal, India, October 27-29, 2022, proceedings /$fedited by Sanjaya Kumar Panda [and five others] 210 1$aCham, Switzerland :$cSpringer,$d[2022] 210 4$d©2022 215 $a1 online resource (323 pages) 225 1 $aCommunications in Computer and Information Science ;$vv.1729 311 08$aPrint version: Panda, Sanjaya Kumar Computing, Communication and Learning Cham : Springer,c2023 9783031217494 320 $aIncludes bibliographical references and index. 327 $aIntro -- Preface -- Organization -- Contents -- Computing -- A Lightweight Block Cipher for Cloud-Based Healthcare Systems -- 1 Introduction -- 2 Related Work -- 3 Proposed System for Secure Healthcare System -- 4 Software Implementation -- 5 Results and Findings -- 5.1 Statistical Analysis -- 5.2 Accuracy -- 5.3 Key Analysis -- 6 Conclusion -- References -- Developing a Cloud Intrusion Detection System with Filter-Based Features Selection Techniques and SVM Classifier -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Pre-processing -- 3.2 Feature Selection -- 3.3 Classification Approach -- 4 Implementation and Result Analysis -- 4.1 Dataset -- 4.2 Evaluation Criteria -- 4.3 Result Analysis -- 5 Conclusion -- References -- A Study on Effect of Learning Rates Using Adam Optimizer in LSTM Deep Intelligent Model for Detection of DDoS Attack to Support Fog Based IoT Systems -- 1 Introduction -- 2 Related Work -- 3 Optimizers -- 3.1 Gradient Descent (GD) -- 3.2 Stochastic Gradient Descent (SGD) -- 3.3 SGD+Momentum -- 3.4 Adagrad -- 3.5 RMSProp -- 3.6 Addelta -- 3.7 Adam -- 4 DDoS Attack Model -- 5 Overview of Dataset -- 6 Results and Discussion -- 7 Conclusion -- References -- Comparative Study of Workflow Modeling Services Based on Activity Complexity -- 1 Introduction -- 2 Motivation -- 3 Related Work -- 4 Serverless Workflow Modeling Concepts -- 4.1 Serverless Computing -- 4.2 Function as a Service -- 4.3 Serverless Application as Workflow Model -- 5 Feature Comparison of Serverless Workflow Services -- 6 Experiments and Results -- 6.1 Experimental Setup and Dataset Preparation -- 6.2 Evaluation Parameters -- 6.3 Results and Discussion -- 7 Conclusion -- References -- Granular Access Control of Smart Contract Using Hyperledger Framework -- 1 Introduction -- 2 Literature Review -- 2.1 Findings -- 2.2 Gap Analysis -- 2.3 Problem Definition. 327 $a3 Methodology -- 3.1 Proposed Solutions -- 3.2 Discussion and Analysis -- 4 Conclusion -- References -- Cyclomatic Complexity Analysis for Smart Contract Using Control Flow Graph -- 1 Introduction -- 2 Related Work -- 3 Problem Approach -- 3.1 Creation of CFG -- 3.2 Cyclomatic Complexity with the Help of Control Flow Graph -- 4 Experimental Studies -- 5 Conclusion and Future Work -- References -- An Improved GWO Algorithm for Data Clustering -- 1 Introduction -- 2 Literature Work -- 2.1 Partitional Clustering Algorithms -- 2.2 Grey Wolf Optimization -- 2.3 JAYA Algorithm -- 3 Methodology -- 3.1 Proposed Clustering Methods Using Meta-heuristic Approaches -- 4 Experimental Setup and Result Analysis -- 4.1 Dataset Description -- 4.2 Result Analysis Using Individual Dataset -- 4.3 Analysis Using Non-parametric Test -- 5 Conclusion -- References -- Anticipation of Heart Disease Using Improved Optimization Techniques -- 1 Introduction -- 1.1 Problem Statement -- 2 Literature Review -- 3 Research Question -- 4 Proposed Model -- 4.1 Data Collection -- 4.2 Manual Exploration -- 4.3 Data Preprocessing -- 4.4 Feature Selection -- 4.5 Optimization Algorithms -- 4.6 Performance Measure -- 5 Results and Discussion -- 6 Conclusion -- References -- Decentralized Energy Management in Smart Cities Using Blockchain Technology -- 1 Introduction -- 1.1 Bockchain Technology -- 1.2 Motivation -- 1.3 Scope -- 1.4 Objectives of the Paper -- 1.5 The Significance of Paper -- 2 Literature Survey -- 3 Proposed Scheme -- 3.1 Smart Meters and Cloud Server -- 3.2 Cloud Server and Blockchain -- 4 Implementation -- 4.1 Limitations of the Proposed System -- 5 Results and Comparisons -- 5.1 Traditional Bill Payment Process: -- 5.2 E-Bill Payment System ch9CASINO201955,ch9https:spsspsdoi.orgsps10.1002spser.7927 -- 5.3 System Security Analysis: -- 6 Conclusion and Future Works. 327 $a6.1 Conclusion -- 6.2 Future Scope -- References -- Design and FPGA Realization of an Energy Efficient Artificial Neural Modular Exponentiation Architecture -- 1 Introduction -- 2 Designs of Various Full Adders -- 2.1 RTL Full Adder -- 2.2 SLC Full Adder -- 2.3 RLG Full Adder -- 2.4 ANN Full Adder -- 3 Design of Modular Exponentiation (ME) Architecture -- 3.1 Introduction -- 3.2 Estimation of Average Switching Activity of ME Circuit Designs -- 4 Simulation and Performance Results -- 4.1 Simulation Results -- 4.2 Synthesis Results -- 4.3 Performance Metrics Evaluation -- References -- Comparative Analysis of Power Management System for Microbial Fuel Cell -- 1 Introduction -- 2 Electrical Equivalent Model of MFC -- 3 Analysis of PMS for MFC -- 4 Conclusion -- References -- Communication -- Localized Hop-Count Based Routing (LHR) Protocol for Underwater Acoustic Sensor Networks -- 1 Introduction -- 2 Related Work -- 3 Design of Localized Hop-Count Based Routing (LHR) Protocol -- 3.1 Phase-I: Initial Network Setup -- 3.2 Phase-II: Localized Hop-Count Updation and Next-Hop Selection -- 4 Implementation of LHR in UnetStack -- 4.1 UnetStack -- 4.2 User-Defined Agents in LHR -- 5 Results and Analysis -- 6 Conclusion -- References -- Underwater Acoustic Sensor Networks' Performance Evaluation Tool (UASN-PET) for UnetStack -- 1 Introduction -- 2 Introduction to UnetStack and Its Simulation Output -- 2.1 Output Files of a Simulation in UnetStack -- 3 Design of UASN-PET -- 3.1 Approach Taken -- 3.2 Architecture of UnetStack Trace Analyzer -- 3.3 Layers Are Described Briefly Below -- 4 Implementation of UASN-PET -- 4.1 Tracing a Data Packet on Multi-hop Communication -- 5 Result and Analysis of UASN-PET -- 5.1 Result Analysis on Network Topology -- 5.2 Prerequisites for the Tool -- 6 Conclusions and Future Work -- References. 327 $aZero Watermarking Scheme Based on Polar Harmonic Fourier Moments -- 1 Introduction -- 2 Literature Survey -- 2.1 Related Work -- 2.2 Existing Problem -- 3 Proposed Methodology -- 3.1 Embedding -- 3.2 Extraction Process -- 4 Experimental Results -- 4.1 Experimental Result on Reconstruction of PHFMS -- 5 Conclusion and Future Scope -- References -- Dual Image Watermarking Technique Using IWT-SVD and Diffie Hellman Key Exchange Algorithm -- 1 Introduction -- 2 Related Works -- 3 Contribution of Our Work -- 4 Fundamental Concepts -- 4.1 IWT -- 4.2 SVD -- 4.3 DHKE -- 5 Proposed Method -- 5.1 Embedding Algorithm -- 5.2 Extraction Algorithm -- 6 Simulation Result and Analysis -- 7 Conclusion -- References -- A Communication-Efficient Federated Learning: A Probabilistic Approach -- 1 Introduction -- 2 Related Work -- 3 Communication-Efficient FL -- 3.1 Basic Concepts of FL -- 3.2 Probability Based Gadget Selection Method -- 4 Simulation Results -- 5 Conclusion and Future Scope -- References -- Learning -- Pavement Distress Detection Using Deep Learning Based Methods: A Survey on Role, Challenges and Opportunities -- 1 Introduction -- 2 Basic Concepts and Terminologies -- 2.1 Deep Learning -- 2.2 Convolutional Neural Networks -- 2.3 Object Detection Algorithms -- 3 Literature Review -- 4 Challenges in This Domain and Contributions of Our Study -- 5 Conclusion and Future Scope -- References -- Performance Enhancement of Animal Species Classification Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Data Preparation -- 3.1 Dataset Used -- 3.2 Image Augmentation and Pre-processing -- 3.3 Artificial Neural Network (ANN) -- 3.4 Convolutional Neural Network (CNN) -- 3.5 Transfer Learning -- 3.6 Software and Hardware Used -- 4 Experimentation and Results -- 4.1 Experiments and Analysis -- 4.2 Results of Selected Model -- 5 Conclusion and Future Work. 327 $aReferences -- Intelligent Intrusion Detection System Using Deep Learning Technique -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Dataset Pre-processing -- 3.2 RNN-GRU (Recurrent Neural Network-Gated Recurrent Unit) -- 4 Experiments and Results -- 5 Conclusion -- References -- Rice Leaf Disease Detection and Classification Using a Deep Neural Network -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Rice Disease Type and Dataset Description -- 4.1 Bacterial Blight -- 4.2 Blast -- 4.3 Brown Spot -- 4.4 Tungro -- 5 Implementation -- 5.1 Simulation Environment -- 5.2 Image Acquisition -- 5.3 Image Preprocessing and Augmentation -- 5.4 Deep Neural Network Model Training -- 6 Result Analysis -- 6.1 Simulation Environment -- 6.2 Error Analysis -- 7 Conclusion and Future Scope -- References -- Training Scheme for Stereo Audio Generation -- 1 Introduction -- 2 Literature Review -- 2.1 Audio Generative Model -- 2.2 Multi-channel Audio -- 3 Proposed Method -- 3.1 Training Scheme -- 3.2 Custom Dataset -- 4 Experiments -- 4.1 Representation for Stereo Audio -- 4.2 Evaluation Metrics -- 4.3 Experimental Results -- 5 Conclusion -- References -- A Machine Learning Approach for Classification of Lemon Leaf Diseases -- 1 Introduction -- 2 Related Works -- 3 Proposed Method for Classification of Lemon Leaf Disease -- 3.1 Image Pre-processing -- 3.2 Image Segmentation -- 3.3 Feature Extraction -- 3.4 Classification -- 4 Results and Analysis -- 5 Conclusion -- References -- Optimization of Random Forest Hyperparameter Using Improved PSO for Handwritten Digits Classification -- 1 Introduction -- 2 Related Work -- 3 Hyperparameter Optimization -- 3.1 Random Forest -- 3.2 Improved Particle Swarm Optimization (PSO) -- 3.3 Proposed Model Using Improved PSO Optimizer -- 4 Result and Analysis -- 5 Conclusion -- References. 327 $aRisk Identification Using Quantum Machine Learning for Fleet Insurance Premium. 410 0$aCommunications in Computer and Information Science 606 $aComputer science 615 0$aComputer science. 676 $a929.605 702 $aPanda$b Sanjaya Kumar 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996503562403316 996 $aComputing, communication and learning$93363111 997 $aUNISA