This handbook gathers, reviews and concisely presents the core principles and varied technology involved in processing ferroalloys. Background content in thermodynamics, kinetics, heat and mass ...transfer is accompanied by an overview of electrical furnaces theory and practice as well as sustainability issues. The work includes detailed coverage of the major technologies of ferrosilicon, ferronickel, ferromolybdenum, ferrotungsten, ferrovanadium, ferromanganese and lesser known minor ferroalloys. Distilling the results of many years' experience in ferroalloys, Michael Gasik has assembled contributions from the worlds' foremost experts. The work is therefore a unique source for scientists, engineers and university students, exploring in depth an area which is one of the most versatile and increasingly used fields within modern metallurgy. * All-in-one source for the major ferroalloys and their metallurgical processing technologies, cutting research time otherwise spent digging through old handbooks or review articles. * In-depth discussion of the C, Si, Al-reduction, groups II-VIII of the periodic table, supporting analysis of metallurgical processing. * Contemporary coverage includes environment and energy saving issues.
Products and services based on advanced technologies such as artificial intelligence and blockchain are normally considered to be for rich consumers in advanced countries. Fourth Revolution and the ...Bottom Four Billion demonstrates how marginalized and vulnerable groups with limited resources can also benefit from these technologies. Nir Kshetri suggests that the falling costs and the increased ease of developing and deploying applications based on these technologies are making them more accessible. He illustrates how key emerging technologies are transforming major industries and application areas such as healthcare and pandemic preparedness, agriculture, finance, banking, and insurance. The book also looks at how these transformations are affecting the lives of low-income people in low- and middle-income countries and highlights the areas needing regulatory attention to adequately protect marginalized and vulnerable groups from the abuse and misuse of these technologies. Kshetri discusses how various barriers such as the lack of data, low resource languages, underdeveloped technology infrastructures, lack of computing power and shortage of skill and talent have hindered the adoption of these technologies among marginalized and vulnerable groups. Fourth Revolution and the Bottom Four Billion suggests that it is the responsibility of diverse stakeholders—governments, NGOs, international development organizations, academic institutions, the private sector, and others—to ensure that marginal groups also benefit from these transformative innovations.
In this engaging volume, Jon Dron views education, learning, and teaching through a technological lens that focuses on the parts we play in technologies, from language and pedagogies to computers and ...regulations. He proposes a new theory of education whereby individuals are not just users but co-participants in technologies—technologies that are intrinsic parts of our cognition, of which we form intrinsic parts, through which we are entangled with one another and the world around us. Dron reframes popular families of educational theory (objectivist, subjectivist, and complexivist) and explains a variety of educational phenomena, including the failure of learning style theories, the nature of literacies, systemic weaknesses in learning management systems, the prevalence of cheating in educational institutions, and the fundamental differences between online and in-person learning. Ultimately, How Education Works articulates how practitioners in education can usefully understand technology, education, and their relationship to improve teaching practice.
Blockchain technology (BT) is expected to bring a revolutionary paradigm shift in the manner the transactions are carried in the supply chains. BT provides better visibility and transparency by ...removing the disadvantages of trust related issues in a supply chain. In this paper, we advance the literature on BT and its adoption in the supply chain by developing, and statistically validating a model for understanding the user perceptions on BT adoption. The model is based on the integration of three adoption theories- technology acceptance model (TAM), technology readiness index (TRI) and the theory of planned behaviour (TPB). Based on a survey of 181 supply chain practitioners in India the proposed model was tested using structural equation modelling. The study found that the TRI constructs- Insecurity and discomfort have an insignificant effect on the perceived ease of use and usefulness. Perceived usefulness, attitude, and perceived behavioural control affect the behavioural intention. Subjective norm has a negligible impact on behavioural intention. This is one of the preliminary studies on BT adoption in supply chain and the findings imply that the supply chain practitioners perceive BT adoption free of efforts and would help them to derive maximum benefits for improving the supply chain effectiveness.
Transfer of technologies (TT) takes place among various kinds of players, takes on various kinds of modalities and is done for various motivations. Its literature is very disjoint and disparate. It ...transcends several academic disciplines and professions. This paper presents a taxonomy defining the field in its entirety and delineating all of its facets in a manner that is parsimonious yet discriminating. Many potential uses for the taxonomy are identified. These include more effective teaching of TT subject matter.
"This book investigates how we should form ourselves in a world saturated with technologies that are profoundly intruding in the very fabric of our selfhood. New and emerging technologies, such as ...smart technological environments, imaging technologies and smart drugs, are increasingly shaping who and what we are and influencing who we ought to be. How should we adequately understand, evaluate and appreciate this development? Tackling this question requires going beyond the persistent and stubborn inside-outside dualism and recognizing that what we consider our ""inside"" self is to a great extent shaped by our ""outside"" world. Inspired by various philosophers – especially Nietzsche, Peirce and Lacan –this book shows how the values, goals and ideals that humans encounter in their environments not only shape their identities but also enable them to critically relate to their present state. The author argues against understanding technological self-formation in terms of making ourselves better, stronger and smarter. Rather, we should conceive it in terms of technological sublimation, which redefines the very notion of human enhancement. In this respect the author introduces an alternative, more suitable theory, namely Technological Sublimation Theory (TST). Extimate Technology will be of interest to scholars and advanced students working in philosophy of technology, philosophy of the self, phenomenology, pragmatism, and history of philosophy."
This book is available as open access through the Bloomsbury Open programme and is available on www.bloomsburycollections.com. It is funded by Trinity College Dublin, DARIAH-EU and the European ...Commission. This book explores the challenges society faces with big data, through the lens of culture rather than social, political or economic trends, as demonstrated in the words we use, the values that underpin our interactions, and the biases and assumptions that drive us. Focusing on areas such as data and language, data and sensemaking, data and power, data and invisibility, and big data aggregation, it demonstrates that humanities research, focussing on cultural rather than social, political or economic frames of reference for viewing technology, resists mass datafication for a reason, and that those very reasons can be instructive for the critical observation of big data research and innovation.
Nonvolatile memory technologies in Si-based electronics date back to the 1990s. Ferroelectric field-effect transistor (FeFET) was one of the most promising devices replacing the conventional Flash ...memory facing physical scaling limitations at those times. A variant of charge storage memory referred to as Flash memory is widely used in consumer electronic products such as cell phones and music players while NAND Flash-based solid-state disks (SSDs) are increasingly displacing hard disk drives as the primary storage device in laptops, desktops, and even data centers. The integration limit of Flash memories is approaching, and many new types of memory to replace conventional Flash memories have been proposed. Emerging memory technologies promise new memories to store more data at less cost than the expensive-to-build silicon chips used by popular consumer gadgets including digital cameras, cell phones and portable music players. They are being investigated and lead to the future as potential alternatives to existing memories in future computing systems. Emerging nonvolatile memory technologies such as magnetic random-access memory (MRAM), spin-transfer torque random-access memory (STT-RAM), ferroelectric random-access memory (FeRAM), phase-change memory (PCM), and resistive random-access memory (RRAM) combine the speed of static random-access memory (SRAM), the density of dynamic random-access memory (DRAM), and the nonvolatility of Flash memory and so become very attractive as another possibility for future memory hierarchies. Many other new classes of emerging memory technologies such as transparent and plastic, three-dimensional (3-D), and quantum dot memory technologies have also gained tremendous popularity in recent years. Subsequently, not an exaggeration to say that computer memory could soon earn the ultimate commercial validation for commercial scale-up and production the cheap plastic knockoff. Therefore, this review is devoted to the rapidly developing new class of memory technologies and scaling of scientific procedures based on an investigation of recent progress in advanced Flash memory devices.