This handbook gathers, reviews and concisely presents the core principles and varied technology involved in processing ferroalloys. Background content in thermodynamics, kinetics, heat and mass ...transfer is accompanied by an overview of electrical furnaces theory and practice as well as sustainability issues. The work includes detailed coverage of the major technologies of ferrosilicon, ferronickel, ferromolybdenum, ferrotungsten, ferrovanadium, ferromanganese and lesser known minor ferroalloys. Distilling the results of many years' experience in ferroalloys, Michael Gasik has assembled contributions from the worlds' foremost experts. The work is therefore a unique source for scientists, engineers and university students, exploring in depth an area which is one of the most versatile and increasingly used fields within modern metallurgy. * All-in-one source for the major ferroalloys and their metallurgical processing technologies, cutting research time otherwise spent digging through old handbooks or review articles. * In-depth discussion of the C, Si, Al-reduction, groups II-VIII of the periodic table, supporting analysis of metallurgical processing. * Contemporary coverage includes environment and energy saving issues.
Products and services based on advanced technologies such as artificial intelligence and blockchain are normally considered to be for rich consumers in advanced countries. Fourth Revolution and the ...Bottom Four Billion demonstrates how marginalized and vulnerable groups with limited resources can also benefit from these technologies. Nir Kshetri suggests that the falling costs and the increased ease of developing and deploying applications based on these technologies are making them more accessible. He illustrates how key emerging technologies are transforming major industries and application areas such as healthcare and pandemic preparedness, agriculture, finance, banking, and insurance. The book also looks at how these transformations are affecting the lives of low-income people in low- and middle-income countries and highlights the areas needing regulatory attention to adequately protect marginalized and vulnerable groups from the abuse and misuse of these technologies. Kshetri discusses how various barriers such as the lack of data, low resource languages, underdeveloped technology infrastructures, lack of computing power and shortage of skill and talent have hindered the adoption of these technologies among marginalized and vulnerable groups. Fourth Revolution and the Bottom Four Billion suggests that it is the responsibility of diverse stakeholders—governments, NGOs, international development organizations, academic institutions, the private sector, and others—to ensure that marginal groups also benefit from these transformative innovations.
In this engaging volume, Jon Dron views education, learning, and teaching through a technological lens that focuses on the parts we play in technologies, from language and pedagogies to computers and ...regulations. He proposes a new theory of education whereby individuals are not just users but co-participants in technologies—technologies that are intrinsic parts of our cognition, of which we form intrinsic parts, through which we are entangled with one another and the world around us. Dron reframes popular families of educational theory (objectivist, subjectivist, and complexivist) and explains a variety of educational phenomena, including the failure of learning style theories, the nature of literacies, systemic weaknesses in learning management systems, the prevalence of cheating in educational institutions, and the fundamental differences between online and in-person learning. Ultimately, How Education Works articulates how practitioners in education can usefully understand technology, education, and their relationship to improve teaching practice.
Blockchain technology (BT) is expected to bring a revolutionary paradigm shift in the manner the transactions are carried in the supply chains. BT provides better visibility and transparency by ...removing the disadvantages of trust related issues in a supply chain. In this paper, we advance the literature on BT and its adoption in the supply chain by developing, and statistically validating a model for understanding the user perceptions on BT adoption. The model is based on the integration of three adoption theories- technology acceptance model (TAM), technology readiness index (TRI) and the theory of planned behaviour (TPB). Based on a survey of 181 supply chain practitioners in India the proposed model was tested using structural equation modelling. The study found that the TRI constructs- Insecurity and discomfort have an insignificant effect on the perceived ease of use and usefulness. Perceived usefulness, attitude, and perceived behavioural control affect the behavioural intention. Subjective norm has a negligible impact on behavioural intention. This is one of the preliminary studies on BT adoption in supply chain and the findings imply that the supply chain practitioners perceive BT adoption free of efforts and would help them to derive maximum benefits for improving the supply chain effectiveness.
Transfer of technologies (TT) takes place among various kinds of players, takes on various kinds of modalities and is done for various motivations. Its literature is very disjoint and disparate. It ...transcends several academic disciplines and professions. This paper presents a taxonomy defining the field in its entirety and delineating all of its facets in a manner that is parsimonious yet discriminating. Many potential uses for the taxonomy are identified. These include more effective teaching of TT subject matter.
"This book investigates how we should form ourselves in a world saturated with technologies that are profoundly intruding in the very fabric of our selfhood. New and emerging technologies, such as ...smart technological environments, imaging technologies and smart drugs, are increasingly shaping who and what we are and influencing who we ought to be. How should we adequately understand, evaluate and appreciate this development? Tackling this question requires going beyond the persistent and stubborn inside-outside dualism and recognizing that what we consider our ""inside"" self is to a great extent shaped by our ""outside"" world. Inspired by various philosophers – especially Nietzsche, Peirce and Lacan –this book shows how the values, goals and ideals that humans encounter in their environments not only shape their identities but also enable them to critically relate to their present state. The author argues against understanding technological self-formation in terms of making ourselves better, stronger and smarter. Rather, we should conceive it in terms of technological sublimation, which redefines the very notion of human enhancement. In this respect the author introduces an alternative, more suitable theory, namely Technological Sublimation Theory (TST). Extimate Technology will be of interest to scholars and advanced students working in philosophy of technology, philosophy of the self, phenomenology, pragmatism, and history of philosophy."
This book is open access. This book undertakes a multifaceted and integrated examination of biometric identification, including the current state of the technology, how it is being used, the key ...ethical issues, and the implications for law and regulation. The five chapters examine the main forms of contemporary biometrics–fingerprint recognition, facial recognition and DNA identification– as well the integration of biometric data with other forms of personal data, analyses key ethical concepts in play, including privacy, individual autonomy, collective responsibility, and joint ownership rights, and proposes a raft of principles to guide the regulation of biometrics in liberal democracies. Biometric identification technology is developing rapidly and being implemented more widely, along with other forms of information technology. As products, services and communication moves online, digital identity and security is becoming more important. Biometric identification facilitates this transition. Citizens now use biometrics to access a smartphone or obtain a passport; law enforcement agencies use biometrics in association with CCTV to identify a terrorist in a crowd, or identify a suspect via their fingerprints or DNA; and companies use biometrics to identify their customers and employees. In some cases the use of biometrics is governed by law, in others the technology has developed and been implemented so quickly that, perhaps because it has been viewed as a valuable security enhancement, laws regulating its use have often not been updated to reflect new applications. However, the technology associated with biometrics raises significant ethical problems, including in relation to individual privacy, ownership of biometric data, dual use and, more generally, as is illustrated by the increasing use of biometrics in authoritarian states such as China, the potential for unregulated biometrics to undermine fundamental principles of liberal democracy. Resolving these ethical problems is a vital step towards more effective regulation.