Browse Results

Showing 11,851 through 11,875 of 18,816 results

Propaganda: The Formation of Men's Attitudes

by Jacques Ellul

This seminal study and critique of propaganda from one of the greatest French philosophers of the 20th century is as relevant today as when it was first published in 1962. Taking not only a psychological approach, but a sociological approach as well, Ellul&’s book outlines the taxonomy for propaganda, and ultimately, it&’s destructive nature towards democracy. Drawing from his own experiences fighting for the French resistance against the Vichy regime, Ellul offers a unique insight into the propaganda machine.

Propagation Characterization and Channel Modeling for UAV Communications (Wireless Networks)

by Xiang Cheng Ziwei Huang Lu Bai

This book focuses on the propagation characterization and channel modeling of Unmanned Aerial Vehicle (UAV) communications. Currently, there are no books that cover this specific topic. The authors fill in this void by elaborating accurate yet easy-to-use UAV channel models. The authors also present such topics as propagation characteristics of UAV communications, a time stationary regular-shaped geometry-based stochastic model (RS-GBSM) for UAV narrowband channels. It also introduces a time non-stationary RS-GBSM for UAV narrowband channels, a time non-stationary RS-GBSM for UAV wideband channels, a time-space non-stationary irregular-shaped geometry-based stochastic model (IS-GBSM) for UAV wideband channels and more. Finally, this book closes up with some promising directions, hoping to promote future research outcomes in the field of UAV channel modeling. As the UAV technology matures rapidly, UAV communications are shifting from military development to civilian and commercial sectors. The UAV communication is widely considered as a significant and indispensable component of wireless communications. It is well known that an accurate yet easy-to-use UAV channel model is the foundation of designing a proper UAV communication system and evaluating its performance. This book also provides valuable suggestions for the design of UAV communication systems by adequately presenting the UAV propagation characterization and channel modeling. This book is mainly written for researchers and professionals working in wireless communications. Advanced-level students majoring in computer science or electrical engineering may also find the content useful as a secondary textbook.

Propagation Engineering in Radio Links Design

by Farshid Ghasemi Abdollah Ghasemi Ali Abedi

This book addresses propagation phenomena in satellite, radar, broadcasting, short range , trans-horizon and several recent modes of communications in radio links. Also, it includes some topics on antennas , radio noises and improvement techniques. The book provides the necessary basic matters, as well as experimental results and calculation procedures for radio link design.

Propagation Engineering in Wireless Communications

by Farshid Ghasemi Abdollah Ghasemi Ali Abedi

Propagation Engineering in Wireless Communications covers the basic principles needed for understanding of radiowaves propagation for common frequency bands used in radio-communications. This book includes descriptions of new achievements and new developements in propagation models for wireless communication. The book is intended to bridge the gap between the theoretical calculations and approaches to the applied procedures needed for radio links design in a proper manner. The authors intention is to emphasize propagation engineering by giving sufficient fundamental information and then going on to explain the use of basic principles together with technical achievements in this field.

Propagation Handbook for Wireless Communication System Design (Electrical Engineering & Applied Signal Processing Series)

by Robert K. Crane

Data and models for better systems designAtmospheric gases, building materials, the weather � The propagation of wireless communications signals depends upon a whole range of factors, any or all of which can have a significant impact on the quality of a signal. Data generated by careful measurement of signals propagating under various envir

Proposal Writing for Business Research Projects (Routledge Focus on Business and Management)

by Peter Samuels

This book helps students with the initial phases of their business research project, offering a clear step-by-step approach from defining aims and research questions through to conducting literature reviews and writing a methodology. Features to aid learning include chapter objectives, plentiful real-life examples to demonstrate good practice, exercises to apply the concepts and further reading for proactive investigation. A self-contained guide to every stage of writing an effective business research proposal, this text should be recommended reading for all advanced undergraduate and postgraduate students studying Business Research Methods and embarking on a research project of their own.

Propose, Prepare, Present: How to become a successful, effective, and popular speaker at industry conferences

by Alistair Croll

Every year, tens of thousands of companies—from industry giants to aspiring upstarts—apply to speak at conferences. They pump millions of dollars into these events, hoping to find new customers, strengthen their brand, and meet new partners. Sadly, for most of them, things don’t go that way. Submitted topics aren’t chosen; when they are, they come across as tone-deaf sales pitches.What does it take to be chosen to speak—and to rock the mic when given the chance? This book takes you behind-the-scenes of the conference process, showing you how to submit, plan, and deliver a talk that matters. Event organizer Alistair Croll provides many examples based on his experience with a wide range of conferences, including O’Reilly’s Strata, Velocity, Web2Expo, and TOC Conferences.Learn 11 items that help your submission stand out—and 11 items that will get it tossedExplore the hurdles your proposal has to clear before it’s acceptedTailor your talk to a conference’s topics and themesDiscover why images work better than words in your slide deckAchieve your business goals by engaging the audience before, during, and after your talk"We’ve been running successful events worldwide for over a decade, and the simple truth is that the people who get chosen, and give great presentations, follow the rules in this book."--Gina Blaber, VP Conferences, O’Reilly Media

Pros and Cons: A Debaters Handbook

by Debbie Newman Ben Woolgar

Pros and Cons: A Debaters Handbook offers a unique and invaluable guide to the arguments both for and against over 140 current controversies and global issues. Since it was first published in 1896 the handbook has been regularly updated and this nineteenth edition includes new entries on topics such as the right to possess nuclear weapons, the bailing out of failing industries, the protection of indigenous languages and the torture of suspected terrorists. <P><P> Equal coverage is given to both sides of each debate in a dual column format which allows for easy comparison. Each entry also includes a list of related topics and suggestions for possible motions. <P><P> The introductory essay describes debating technique, covering the rules, structure and type of debate, and offering tips on how to become a successful speaker. The book is then divided into eight thematic sections, where specific subjects are covered individually.

Prosodic Phonology of the Fuzhou Dialect: Domains and Rule Application (Routledge Studies in Chinese Linguistics)

by Shuxiang You

Prosodic Phonology of the Fuzhou Dialect: Domains and Rule Application is the first attempt to conduct a comprehensive analysis of the Fuzhou phonological system from the perspective of prosodic phonology. It addresses the following issues: What prosodic constituents exist in the Fuzhou dialect and what kinds of roles they play in the Fuzhou phonological system; how to define the domain formation of these prosodic constituents in the Fuzhou dialect; what kinds of Fuzhou phonological phenomena make crucial reference to these prosodic constituents as the domain of application; and what implications does the study of the Fuzhou phonological system have for the prosodic phonology theory. This book is a valuable text for students and scholars in the field of Chinese dialectology, Min dialects, prosodic phonology, and phonology-morphosyntax interface.

Prosodic Studies: Challenges and Prospects (Routledge Studies in Chinese Linguistics)

by Youyong Qian Hongming Zhang

Prosody is one of the core components of language and speech, indicating information about syntax, turn-taking in conversation, types of utterances, such as questions or statements, as well as speakers' attitudes and feelings. This edited volume takes studies in prosody on Asian languages as well as examples from other languages. It brings together the most recent research in the field and also charts the influence on such diverse fields as multimedia communication and SLA. Intended for a wide audience of linguists that includes neighbouring disciplines such as computational sciences, psycholinguists, and specialists in language acquisition, Prosodic Studies is also ideal for scholars and researchers working in intonation who want a complement of information on specifics.

Protecting Children Online?: Cyberbullying Policies of Social Media Companies (The Information Society Series)

by Tijana Milosevic

A critical examination of efforts by social media companies—including Facebook, Twitter, Snapchat, and Instagram—to rein in cyberbullying by young users.High-profile cyberbullying cases often trigger exaggerated public concern about children's use of social media. Large companies like Facebook respond by pointing to their existing anti-bullying mechanisms or coordinate with nongovernmental organizations to organize anti-cyberbullying efforts. Do these attempts at self-regulation work? In this book, Tijana Milosevic examines the effectiveness of efforts by social media companies—including Facebook, Twitter, YouTube, Snapchat, and Instagram—to rein in cyberbullying by young users. Milosevic analyzes the anti-bullying policies of fourteen major social media companies, as recorded in companies' corporate documents, draws on interviews with company representatives and e-safety experts, and details the roles of nongovernmental organizations examining their ability to provide critical independent advice. She draws attention to lack of transparency in how companies handle bullying cases, emphasizing the need for a continuous independent evaluation of effectiveness of companies' mechanisms, especially from children's perspective. Milosevic argues that cyberbullying should be viewed in the context of children's rights and as part of the larger social problem of the culture of humiliation.Milosevic looks into five digital bullying cases related to suicides, examining the pressures on the social media companies involved, the nature of the public discussion, and subsequent government regulation that did not necessarily address the problem in a way that benefits children. She emphasizes the need not only for protection but also for participation and empowerment—for finding a way to protect the vulnerable while ensuring the child's right to participate in digital spaces.

Protecting Mobile Networks and Devices: Challenges and Solutions (Series in Security, Privacy and Trust)

by Steven Furnell Jianying Zhou Xiapu Luo Weizhi Meng

This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking worlds, as well as other pertinent security issues. The many attack samples present the severity of this problem, while the delivered methodologies and countermeasures show how to build a truly secure mobile computing environment.

Protecting National Security: A History of British Communications Investigation Regulation

by Phil Glover

This book contends that modern concerns surrounding the UK State’s investigation of communications (and, more recently, data), whether at rest or in transit, are in fact nothing new. It evidences how, whether using common law, the Royal Prerogative, or statutes to provide a lawful basis for a state practice traceable to at least 1324, the underlying policy rationale has always been that first publicly articulated in Cromwell’s initial Postage Act 1657, namely the protection of British ‘national security’, broadly construed. It further illustrates how developments in communications technology led to Executive assumptions of relevant investigatory powers, administered in conditions of relative secrecy. In demonstrating the key role played throughout history by communications service providers, the book also charts how the evolution of the UK Intelligence Community, entry into the ‘UKUSA’ communications intelligence-sharing agreement 1946, and intelligence community advocacy all significantly influenced the era of arguably disingenuous statutory governance of communications investigation between 1984 and 2016. The book illustrates how the 2013 ‘Intelligence Shock’ triggered by publication of Edward Snowden’s unauthorized disclosures impelled a transition from Executive secrecy and statutory disingenuousness to a more consultative, candid Executive and a policy of ‘transparent secrecy’, now reflected in the Investigatory Powers Act 2016. What the book ultimately demonstrates is that this latest comprehensive statute, whilst welcome for its candour, represents only the latest manifestation of the British state’s policy of ensuring protection of national security by granting powers enabling investigative access to communications and data, in transit or at rest, irrespective of location.

Protecting the Dharma through Calligraphy in Tang China: A Study of the Ji Wang shengjiao xu 集王聖教序 The Preface to the Buddhist Scriptures Engraved on Stone in Wang Xizhi’s Collated Characters (Monumenta Serica Monograph Series)

by Pietro De Laurentis

This is a study of the earliest and finest collated inscription in the history of Chinese calligraphy, the Ji Wang shengjiao xu 集王聖教序 (Preface to the Sacred Teaching Scriptures Translated by Xuanzang in Wang Xizhi’s Collated Characters), which was erected on January 1, 673. The stele records the two texts written by the Tang emperors Taizong (599–649) and Gaozong (628–683) in honor of the monk Xuanzang (d. 664) and the Buddhist scripture Xin jing (Heart Sutra), collated in the semi-cursive characters of the great master of Chinese calligraphy, Wang Xizhi (303–361). It is thus a Buddhist inscription that combines Buddhist authority, political power, and artistic charm in one single monument. The present book reconstructs the multifaceted context in which the stele was devised, aiming at highlighting the specific role calligraphy played in the propagation and protection of Buddhism in medieval China.

Protest Nation: Words That Inspired a Century of American Radicalism

by Timothy Patrick McCarthy and John McMillian

Historic writings by socialists, LGBT activists, environmentalists, and more: &“An extraordinary collection of the voices of American dissidents.&” —Howard Zinn Protest Nation is a guide to the speeches, letters, broadsides, essays, and manifestos that form the backbone of the American radical tradition in the twentieth century. With examples from socialists, feminists, union organizers, civil-rights workers, gay and lesbian activists, and environmentalists that have served as beacons for millions, the volume also includes brief introductory essays by the editors that provide a rich biographical and historical context for each selection. Included are: *a fiery speech by socialist Eugene V. Debs *an astonishing treatise on animal liberation by Peter Singer *an excerpt from Silent Spring by Rachel Carson *Harvey Milk&’s &“The Hope Speech&” *the original Black Panther Party Platform *Peter Singer&’s astonishing treatise on animal liberation *plus writings from Upton Sinclair, Charlotte Perkins Gilman, Betty Friedan, Malcolm X, César Chávez, and more

Protest Public Relations: Communicating dissent and activism (Routledge New Directions in PR & Communication Research)

by Ana Adi

Global movements and protests from the Arab Spring to the Occupy Movement have been attributed to growing access to social media, while without it, local causes like #bringbackourgirls and the ice bucket challenge may have otherwise remained unheard and unseen. Regardless of their nature – advocacy, activism, protest or dissent – and beyond the technological ability of digital and social media to connect support, these major events have all been the results of excellent communication and public relations. But PR remains seen only as the defender of corporate and capitalist interests, and therefore resistant to outside voices such as activists, NGOs, union members, protesters and whistle-blowers. Drawing on contributions from around the world to examine the concepts and practice of "activist," "protest" and "dissent" public relations, this book challenges this view. Using a range of international examples, it explores the changing nature of protest and its relationship with PR and provides a radical analysis of the communication strategies and tactics of social movements and activist groups and their campaigns. This thought-provoking collection will be of interest to researchers and advanced students of public relations, strategic communication, political science, politics, journalism, marketing, and advertising, and also to PR professionals in think tanks and NGOs.

Protest on the Page

by James L. Baughman Jennifer Ratner-Rosenhagen James P. Danky

The use of print to challenge prevailing ideas and conventions has a long history in American public life. As dissenters in America sought social change, they used print to document, articulate, and disseminate their ideas to others. Protest always begins on the margins, but print is the medium that allows it to reach a larger audience. In Protest on the Page, scholars in multiple disciplines offer ten original essays that examine protest print culture in America since 1865. They explore the surprising range of dissidents who enlisted print in their causes--from vegetarians and anarchists at the advent of the twentieth century, to midcentury evangelicals and tween comic book readers, to GIs and feminists in the 1970s-80s. Together they demonstrate that print has never been a neutral medium, but rather has been instrumental in shaping the substance of protest and its audiences.

Protocol Analysis: Verbal Reports as Data

by K. Anders Ericsson Herbert A. Simon

Verbal data has been used increasingly to study cognitive processes in many areas of psychology, and concurrent and retrospective verbal reports are now generally accepted as important sources of data on subjects' cognitive processes in specific tasks.

Prototyping of User Interfaces for Mobile Applications (T-Labs Series in Telecommunication Services)

by Benjamin Bähr

This book investigates processes for the prototyping of user interfaces for mobile apps, and describes the development of new concepts and tools that can improve the prototype driven app development in the early stages. It presents the development and evaluation of a new requirements catalogue for prototyping mobile app tools that identifies the most important criteria such tools should meet at different prototype-development stages. This catalogue is not just a good point of orientation for designing new prototyping approaches, but also provides a set of metrics for a comparing the performance of alternative prototyping tools. In addition, the book discusses the development of Blended Prototyping, a new approach for prototyping user interfaces for mobile applications in the early and middle development stages, and presents the results of an evaluation of its performance, showing that it provides a tool for teamwork-oriented, creative prototyping of mobile apps in the early design stages.

Proud Highway: Saga of a Desperate Southern Gentleman, 1955-1967

by Hunter S. Thompson Douglas Brinkley William J. Kennedy

Here, for the first time, is the private and most intimate correspondence of one of America's most influential and incisive journalists--Hunter S. Thompson. In letters to a Who's Who of luminaries from Norman Mailer to Charles Kuralt, Tom Wolfe to Lyndon Johnson, William Styron to Joan Baez--not to mention his mother, the NRA, and a chain of newspaper editors--Thompson vividly catches the tenor of the times in 1960s America and channels it all through his own razor-sharp perspective. Passionate in their admiration, merciless in their scorn, and never anything less than fascinating, the dispatches of The Proud Highway offer an unprecedented and penetrating gaze into the evolution of the most outrageous raconteur/provocateur ever to assault a typewriter.

Proust Writing Photography: Fixing the Fugitive in A La Recherche Du Temps Perdu

by Aine Larkin

The importance of vision and visual arts such as painting, theatre, and sculpture in Marcel Proust's A la recherche du temps perdu has long been affirmed; another significant system of visual representation in the novel is photography. Proust appropriated photography as a practice with its own distinctive characteristics which could inform his writing about the processes of perception and memory. Through close textual analysis of scenes where photography is experienced or observed as a practice, and scenes where photography is written into the body of the text, Aine Larkin offers an invigorating new study that sheds genuinely new light on the presence of photographic motifs in Proust's novel, and the subtlety of Proust's engagement with this modern imaging system in his work.

Provable Security

by Man-Ho Au Atsuko Miyaji

This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec 2015, held in Kanazawa, Japan, in November 2015. The 19 full papers and 7 short papers presented together with 3 invited talks were carefully reviewed and selected from 60 submissions. The papers are grouped in topical sections on fundamental, protocol, authenticated encryption and key exchange, encryption and identification, privacy and cloud, leakage-resilient cryptography and lattice cryptography, signature and broadcast encryption.

Provable Security

by Yong Yu Tatsuaki Okamoto Man Ho Au Yannan Li

This book constitutes the refereed proceedings of the 11th International Conference on Provable Security, ProvSec 2017, held in Xi'an, China, in October 2017. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 76 submissions. The papers are grouped in topical sections on secure cloud storage and computing; digital signature and authentication; authenticated encryption and key exchange; security models; lattice and post-quantum cryptography; public key encryption and signcryption; proxy re-encryption and functional encryption; protocols.

Prozesse in der Unternehmenskommunikation optimal gestalten: Status quo und Perspektiven für die interne und externe Kommunikation

by Christoph Kochhan Veline Christin Schroth

Dieses Buch untersucht die aktuellen Kommunikationsprozesse in Unternehmen und leitet daraus praktische Empfehlungen ab. Eine strategische Kommunikation, schlüssig auf die jeweiligen Zielgruppen ausgerichtet, spielt eine zentrale Rolle in Unternehmen: Botschaften müssen ihre Adressaten optimal erreichen und sinnvoll gesteuert werden, um positive Reaktionen zu erzeugen. Erfolgreiche Konzepte basieren auf klaren Kommunikationsstrukturen, die sowohl einen festen Rahmen als auch Flexibilität in den Prozessen ermöglichen. Die Autor*innen präsentieren Kommunikationsansätze und -bedingungen und haben durch leitfadengestützte Interviews den Status quo der Kommunikation in Unternehmen ermittelt. Die qualitativen Befragungen zeigen, welche Prozesse aktuell in der Unternehmenskommunikation unterschiedlicher Branchen angewendet werden, welche Rolle Künstliche Intelligenz dabei spielt und wie ein klar strukturierter Kommunikationsansatz, wie z.B. ein Corporate Newsroom, die Basis dafür bilden kann. Extra: Umfangreiches Interview mit dem Experten für Unternehmenskommunikation Thomas Mickeleit, der Praxistipps und Empfehlungen gibt.

Prudentius’ Psychomachia (Routledge Later Latin Poetry)

by Marc Mastrangelo

This new translation brings to life Prudentius' Psychomachia, one of the most widely read poems in western Europe from Late Antiquity through the Renaissance. With accompanying notes and introduction, this volume provides a fresh exploration of its themes and influence. The Psychomachia of Prudentius (348–c. 405), an allegorical epic poem of nearly 1,000 lines about the battle between the virtues and the vices for possession of the human soul, led early modern scholars to refer to the late antique poet as "the Christian Vergil." Combining depictions of violent, single combats with allusions to pagan epic poetry, biblical scenes, and Christian doctrine, the poem captures the dynamism of the later Roman Empire in which the pagan world was giving way to a new, Christian Europe. In this volume, the introduction sets the historical and literary context and illuminates the Psychomachia’s prominent role in western literary history. Mastrangelo’s translation aims to capture the rhetorical power of the author’s Roman Christian Latin for the 21st-century reader. The notes provide the reader with in-depth information on Prudentius’ Latinity, the Roman epic tradition, and Christian doctrine. This volume is directed at students and scholars across the disciplines of comparative literature, classics, religion, and ancient and medieval studies, as well as any reader interested in the history and development of literature in the West.

Refine Search

Showing 11,851 through 11,875 of 18,816 results