Ian Donald’S Practical Obstetrics Problems
✍ Scribed by Misra R.
- Publisher
- Lww Rs Np
- Year
- 2020
- Tongue
- English
- Leaves
- 670
- Category
- Library
No coin nor oath required. For personal study only.
✦ Table of Contents
Welcome Message of EIDWT-2024 International Conference Organizers
EIDWT-2024 Organizing Committee
EIDWT-2024 Keynote Talks
Empowering Education: Leveraging AI and Ethical Advancements in Online Learning
Validation and Verification of Smart Contracts in IoT Applications
Contents
Few Shot NER on Augmented Unstructured Text from Cardiology Records
1 Introduction
2 Background
2.1 Named-Entity Recognition (NER)
2.2 Data Augmentation
2.3 Reinforcement Learning in Healthcare
3 Active Learning
3.1 Policy-Based Active Learning
4 Methodology
4.1 PAL Framework
5 Experimental Protocol
5.1 Dataset, Metrics and Baseline
5.2 Results
6 Conclusions and Future Work
References
The Influence of Financial Literacy and Financial Technology on SMEs’ Sustainability
1 Introduction
2 Financial Literacy
3 Financial Technology
4 SMEs Sustainability
5 Conclusions
References
The Effect of Digital and Human Capital Transformation on SME Performance with Accounting Information Systems as an Intervening Variable
1 Introduction
2 Digital Transformation
3 Human Capital
4 Accounting Information System
4.1 The Effect of Digital Transformation on SME Performance
4.2 The Influence of Human Capital on SME Performance
5 SME Performance
6 Conclusions
References
OpenVSLAM-Based Development Framework for Web-Based VR Tours Using 360VR Videos and Its Extensions
1 Introduction
2 Related Work
3 Previous Work
3.1 360VR Cameras and Their Dedicated Software
3.2 Development Framework for VR Tours of 360VR Images/Videos
3.3 OpenVSLAM Based Development Framework for Web-Based VR Tours Using Portable 360VR Camera
4 Extensions of Development Framework
4.1 Keyword Search
4.2 Multi-language Subtitles
5 Conclusions
References
Implementation of a Fuzzy-Based System for Assessment of Logical Trust Considering Reliability as a New Parameter
1 Introduction
2 Trust Computing
3 FL Overview
4 Proposed Fuzzy-Based System
5 Simulation Results
6 Conclusions and Future Work
References
Source Code Vulnerability Detection Based on Graph Structure Representation and Attention Mechanisms
1 Introduction
2 Related Work
2.1 Source Code Vulnerability Detection Techniques
2.2 Application of Graph Structure Representation in Vulnerability Detection
2.3 Attention Mechanism
3 Proposed Method
3.1 Conversion Method from Source Code to Graph Structure
3.2 Graph Node Representations
3.3 Model Training and Optimization Methods
4 Experimental Setup
4.1 Evaluation Dataset
4.2 Competitive Approaches
4.3 Implementation
4.4 Evaluation Methodology
5 Experimental Results
5.1 Selection of Model Parameters and Graph Structure
5.2 Evaluation on SARD and NVD
5.3 Evaluation on GitHub
6 Conclusions and Future Work
References
An Efficient Vulnerability Detection Method for 5G NAS Protocol Based on Combinatorial Testing
1 Introduction
2 Related Work
3 Background
3.1 Architecture of 5G System
3.2 NAS Protocol
3.3 Combinatorial Testing
4 Proposed Approach
4.1 Testing Requirements Extraction and Testing Templates Generation
4.2 Input Space Minimization Based on Constraints
4.3 Testing Cases Generation Based on Combinatorial Testing Algorithm
4.4 Testing Cases Execution
5 Experiment
5.1 Environment
5.2 Vulnerabilities
5.3 Comparison Analysis
6 Conclusion
References
Graph-Based Detection of Encrypted Malicious Traffic with Spatio-Temporal Features
1 Introduction
2 Related Work
2.1 Payload-Based Detection
2.2 Feature Engineering-Based Detection
2.3 Raw Traffic-Based Detection
3 Methodology
3.1 Overview
3.2 Traffic Parsing
3.3 Feature Extraction
3.4 HIG Construction
3.5 Generate Embedding Through GraphSAGE
3.6 Detection
4 Experiment
4.1 Dataset
4.2 Baselines
4.3 Experimental Setup
4.4 Evaluation Results
5 Conclusion
References
Fuzzing IoT Devices via Android App Interfaces with Large Language Model
1 Introduction
2 Related Work
2.1 Fuzzing for IoT Devices
2.2 Taint Analysis
2.3 LLM-Assisted Vulnerability Detection
3 Proposed Approach
3.1 Network Message Source Extraction
3.2 NetworkSender Extraction
3.3 NetworkSender Extraction
3.4 Fuzzing
4 Experiment and Result
4.1 Experiment
4.2 Result Evaluation
5 Conclusion and Future Work
References
Towards the Automated Population of Thesauri Using BERT: A Use Case on the Cybersecurity Domain
1 Introduction
2 Related Works
3 Materials and Methods
3.1 The OCS Thesaurus
3.2 Neural Language Model
4 Experimental Assessment
5 Conclusion and Future Works
References
Network Scanning Detection Based on Spatiotemporal Behavior
1 Introduction
2 Related Work
3 Model Methodology
3.1 Data Preprocessing
3.2 Model Design
4 Experiment Design and Results
4.1 Data Collection and Processing
4.2 Experimental Results
5 Conclusion
References
IoTaint: An Optimized Static Taint Analysis Method in Embedded Firmware
1 Introduction
2 Related Work
3 Methodology
3.1 Overview
3.2 Firmware Extracting
3.3 Target File Filtering
3.4 Optimized Taint Analysis
4 Evaluation
5 Conclusion
References
An Innovative Approach to Real-Time Concept Drift Detection in Network Security
1 Introduction
2 Related Work
3 Overview of the Proposed Approach
3.1 Static Concept Drift Detection
3.2 Real-Time Concept Drift Detection
4 Proposed Novel Methodology for Concept Drift Detection
4.1 Dataset Description
4.2 Performance Metrics
4.3 Drift Detection Techniques
5 Experimental Results
6 Discussion
7 Conclusion
References
Formal Analysis of 5G EAP-TLS 1.3
1 Introduction
2 Related Work
3 5G Authentication Protocol
3.1 Architecture
3.2 Authentication Protocol
4 Security Goals
4.1 Authentication Properties
4.2 Confidentiality Properties
4.3 Privacy Properties
5 Formal Models
6 Security Analysis
7 Conclusions
References
Perceiving Human Psychological Consistency: Attack Detection Against Advanced Persistent Social Engineering
1 Introduction
2 Prerequisite Knowledge
2.1 Current Mainstream of Social Engineering
2.2 Generative AI and XR Technologies
2.3 BMI Technology
2.4 Lifestyle Authentication
2.5 Big Five
2.6 Personality Insights
3 APSE Attacks and Countermeasures
3.1 Advanced Persistent Social Engineering
3.2 Countermeasures
3.3 APSE Attack Detection Based on Personality Consistency Checks
3.4 Related Research
4 PoC System Based on Personality Insights
4.1 Implementation of Personality Consistency Testing
4.2 Discussions
4.3 Limitations
5 Conclusion
References
Design of Secure Fair Bidding Scheme Based on Threshold Elliptic Curve ElGamal Cryptography
1 Introduction
2 Related Theoretical Basis and Algorithm
2.1 Elliptic Curve Cryptography
2.2 EC ElGamal
2.3 Threshold Decryption
2.4 Plaintext Encoding Method
2.5 Digital Signature Algorithm
3 Bidding Scheme Design
3.1 Scheme Overview
3.2 Quotation Number Grouping Processing
3.3 Two-Digit Integer Minimum Calculation Protocol Based on Threshold Decryption
3.4 Calculate the Lowest Bidder
4 Security and Performance Analysis
4.1 Security Analysis
4.2 Efficiency Analysis
5 Conclusion
References
Monitoring Power Usage Effectiveness to Detect Cooling Systems Attacks and Failures in Cloud Data Centers
1 Introduction
2 Related Work
3 The Methodology
3.1 Power Usage Effectiveness (PUE)
3.2 Effect of Energy Attacks on PUE Curve
4 Simulation Environment
4.1 GreeenCloud Simulator
4.2 PUE Calculation and Data Center Design
5 The Example Scenario
6 Conclusions and Future Work
References
A Method for Estimating the Number of Diseases in J-MID Database: Application to CT Report
1 Introduction
2 Materials and Methods
2.1 Computed Tomography Image Reports
2.2 Data Preprocessing and Computational Environment
2.3 Predicate Extraction
2.4 Estimation of Number of Diseases
2.5 Extraction Performance Test
3 Evaluation Results
3.1 Number of Extracted Disease Names from CT Report
3.2 Popular Predicates
3.3 Extracted Disease Names
3.4 Results of Extraction Test
4 Discussions
5 Conclusions
References
Text Mining with Finite State Automata via Compound Words Ontologies
1 Introduction
2 Text Mining
3 AUTOMETA
3.1 Ontologies System
3.2 System Functionality
4 AUTOMETA Performances
4.1 Algorithm Performances
4.2 Running System Requirements and Performances
4.3 Comparison with Other Methods
5 A Sample of AUTOMETA Text Mining
6 Conclusions and Future Research Perspectives
References
Binary Firmware Static Vulnerability Mining Based on Semantic Attributes and Graph Embedding Network
1 Introduction
2 Background
3 System Overview
4 System Design
4.1 Preprocessing
4.2 Slice Processing Based on Multiple Information Flow Graphs
4.3 Semantic-Based Feature Extraction
4.4 Feature Vector Generation Based on Graph Embedding
5 Experiments
5.1 Datasets
5.2 Experiment Results and Analysis
6 Conclusions
References
Probing Cross-lingual Transfer of XLM Multi-language Model
1 Introduction
2 Related Work
3 Methodology
3.1 Neural Language Model
3.2 Structural Probe
4 Experiments
4.1 Dataset
4.2 Metric
4.3 Results and Discussion
5 Conclusions and Future Work
References
Rev Gadget: A Java Deserialization Gadget Chains Discover Tool Based on Reverse Semantics and Taint Analysis
1 Introduction
2 Related Work
2.1 Taint Analysis
2.2 Fuzz
3 Gadget Chains Discovering Algorithm
3.1 Method Predicate Analysis
3.2 Reverse Semantic Analysis
3.3 Taint Analysis Screening
4 Experiment
5 Conclusion
References
A Method for Calculating Degree of Deviation of Posts on Social Media for Public Opinion in Flaming Prediction
1 Introduction
2 Related Work
3 Proposed Method
4 Pseudo Dataset of Public Opinion
5 Experiments
5.1 Experiment 1
5.2 Experiment 2
6 Conclusions
References
Systematic Review of Eye-Tracking Studies
1 Introduction
2 Research Methodology
3 Analysis and Results
3.1 RQ1: Can the Usage of Eye-Tracking Data Provide Improvements in the Existing Model for Automatic Text Processing?
3.2 RQ2: Is There a Necessity to Build Multilingual Corpuses for Eye-Tracking Purposes?
4 Conclusions and Future Work
References
TPLUG: An Efficient Framework Through Token Pair Linking and Undirected Graph for Chinese Event Extraction
1 Introduction
2 Methodology
2.1 Encoder Layer
2.2 Tagging Layer
2.3 Decoder Layer
2.4 Partitioning Layer
3 Experiments Settings
3.1 Dataset
3.2 Evaluation Metrics
3.3 Implementation Details
3.4 Baselines
4 Experimental Results
4.1 Main Results
4.2 Comparison on Speed and Parameter Number
4.3 Effects of the Modules
4.4 Effects of Dataset Size
5 Conclusion
References
Usability and Effectiveness of a Developed IoT-Based Smart Beverage Dispenser
1 Introduction
2 Purpose of the Paper
3 System Overview
4 Methodology
4.1 Participants
4.2 Context of Use
4.3 Design of Usability Test
4.4 Data Analysis
5 Discussion of Results
5.1 Pre-task Survey
5.2 Task Performance
5.3 Post-Task Survey
6 Summary, Conclusions and Recommendations
References
An Algorithm to Change the TBFC Model to Reduce the Energy Consumption of the IoT
1 Introduction
2 The TBFC Model
3 An Energy Consumption Model
4 A Homogeneous Estimation Model
5 Formulas to Estimate Energy Consumption
6 An Algorithm to Change a Tree
7 Evaluation
8 Concluding Remarks
References
An Efficient Cross-Contract Vulnerability Detection Model Integrating Machine Learning and Fuzz Testing
1 Introduction
2 Related Work
3 Model's Structure and Principles
3.1 Model's Structure
3.2 The Principle of Model
4 Results and Discussion
4.1 Evaluation Metrics
4.2 Results and Analysis
5 Conclusions
References
XRLFuzz: Fuzzing Binaries Guided by Format Information Based on Deep Reinforcement Learning
1 Introduction
2 Related Work
2.1 Coverage-Based Grey Box Fuzzing
2.2 Format-Constraint-Based Fuzzing
2.3 Machine-Learning-Based Fuzzing
3 Technology Program
3.1 Lightweight Format Division Technique Based on Coverage Variation
3.2 Keyword Extraction Technique Based on Ineffective Mutation Reuse
3.3 Deep Reinforcement Learning
4 Experiments and Evaluation
4.1 Programs and Environment
4.2 Results
5 Conclusions
References
Implementation of a Fuzzy-Based Testbed for Selection of Radio Access Technologies in 5G Wireless Networks and Its Performance Evaluation
1 Introduction
2 Software-Defined Networking (SDN)
3 5G Network Slicing
4 Fuzzy-Based System and Implemented Testbed
5 Testbed Results
6 Conclusions and Future Work
References
A Fuzzy-Based System for Assessment of Recognition Error in VANETs Considering Inattentive Driving as New Parameter
1 Introduction
2 Overview of VANETs
3 Network Technological Advancement in VANETs
4 Proposed Fuzzy-Based System
5 Simulation Results
6 Conclusions
References
Performance Evaluation of BLX- Crossover Method for Different Instances of WMNs Considering FC-RDVM Router Replacement Method and Subway Distribution of Mesh Clients
1 Introduction
2 Intelligent Algorithms: PSO, HC and DGA
2.1 PSO Algorithm
2.2 HC Algorithm
2.3 Genetic Algorithm
3 Structure of WMN-PSOHCDGA System
4 Simulation Results
5 Conclusions
References
A Measurement System for Improving Riding Comfortability of Omnidirectional Wheelchair Robot
1 Introduction
2 Proposed Omnidirectional Wheelchair Robot
3 Proposed Measurement System for Riding Comfort of Omnidirectional Wheelchair Robot
4 Experimental Results
5 Conclusions and Future Work
References
A Comparative Study of Four YOLO-Based Models for Distracted Driving Detection
1 Introduction
2 DNNs and Evolution of YOLO Algorithms
3 AI-Enhanced Driver Assistance System
3.1 System Architecture and Design
3.2 Categorization of Driving Behaviors
3.3 Dataset Compilation and Model Training for Behavior Detection
4 Evaluation Results
4.1 Classification Results and PR Curves
4.2 Comparative Study of Detected Cases for Four Models
5 Conclusions
References
An Intelligent System Based on CCM, SA and FDTD for Sensor Node Placement Optimization in Wireless Visual Sensor Networks
1 Introduction
2 Proposed Intelligent System
2.1 CCM
2.2 CCM-Based SA
2.3 Average Electric Field Strength Expansion Method
3 Simulation Results
4 Conclusions
References
Performance Evaluation of a Cuckoo Search Based System for Node Placement Problem in Wireless Mesh Networks: Evaluation Results for Computation Time and Different Numbers of Nests
1 Introduction
2 Related Work
3 Node Placement Problem in WMNs
4 Cuckoo Search Algorithm
4.1 Outline of Cuckoo Search
4.2 Lévy Flight
5 WMN-CS Simulation System
6 Simulation Results
7 Conclusions
References
Research and Implementation of TFTP Encrypted Traffic Analysis and Attack Technology Based on 4G Man-in-the-Middle
1 Introduction
2 Background
3 System View
4 System Design
4.1 Fake Base Station Design
4.2 Fake UE Design
4.3 TFTP Analyzer Design
5 Experiments
5.1 Experiment Environment
5.2 Experimental Steps
5.3 Experimental Results
6 Conclusion and Discussion
References
4G Access Network Protection and Compliance Detection Based on Man-in-the-Middle Model
1 Introduction
2 Related Work
3 Access Network Protection Based on the MITM Model
3.1 Analysis of the Access Network MITM Model
3.2 Design of Access Network Protection Based on MITM Model
4 Access Network Compliance Detection Based on MITM Model
5 Experimental Results and Evaluation
5.1 Experiment Environment
5.2 Experiment of Access Network Protection Based on MITM Model
5.3 Experiment of MITM Model Access Network Compliance Detection
6 Conclusions
References
Energy Sharing System Among Vehicles on a Vehicular Network
1 Introduction
2 Related Work
3 The Idea Behind the Energy Sharing
4 Development Environment
4.1 Enhanced Vehicle Status Dynamics
5 Refined System Structure
6 Enhanced Algorithmic Approach
6.1 Enhanced Normal-Sharing
6.2 Advanced Emergency-Sharing
7 Case Study: Implementing an Advanced VANET-Based Energy Sharing System in an Urban Environment
7.1 Scenario Overview
7.2 Dynamic Energy Management During Peak Hours
7.3 Emergency Energy Sharing in Critical Situations
8 Economic Structuring of the Energy Exchange System
9 Future Uses
References
Proposal of Indoor AR Navigation System Using SLAM for Location Search
1 Introduction
2 AR Technology
2.1 Outdoor AR Navigation
2.2 Indoor AR Navigation
2.3 Challenges of Indoor AR Navigation
3 SLAM
3.1 Examples of SLAM Applications
4 Related Works
4.1 Indoor Location Estimation Method
4.2 Indoor AR Navigation
5 Design
5.1 Assumed Environment
5.2 System Configuration
6 Implementation
6.1 Function for Saving Environment Map
6.2 Function for Loading Environment Map
6.3 Function for Recognizing AR Markers
6.4 Function of Presenting Guided Routes
7 Conclusion
References
A Fuzzy-Based System for Real-Time Volume Control of Electric Bass Guitars
1 Introduction
2 Proposed System
3 Experimental Results
4 Conclusions
References
Implementation of a Low-Cost and Intelligent Driver Monitoring System for Engine Locking in the Presence of Alcohol Detection or Drowsiness in Drivers
1 Introduction
2 Related Work
3 Proposed System
4 Experimental Evaluation and Discussion
5 Conclusions
References
An Accident Detection System for Private Lavatories Using Fuzzy Control and Thermal Camera
1 Introduction
2 Proposed System
3 Evaluation Results
4 Conclusions
References
A Fuzzy-Based System for Decision of Compressed Image Degree Using Cluster Load Level
1 Introduction
2 Proposed System
3 Experimental Results
4 Conclusions
References
A Fuzzy Control Based Method for Imaging Position Decision and Its Performance Evaluation
1 Introduction
2 Proposed System
2.1 3D Measurement Method Using 2DLiDAR
2.2 Fuzzy Control Based Method for Imaging Position Decision
3 Experimental Results
4 Conclusions
References
Comparative Analysis of 1D-CNN and 2D-CNN for Network Intrusion Detection in Software Defined Networks
1 Introduction
2 Related Work
3 Methodology
3.1 1D-CNN Architecture
3.2 2D-CNN Architecture
3.3 Evaluation Criteria
4 Dataset
4.1 Dataset Pre-processing Steps
5 Simulation Results and Analysis
5.1 Classification Performance
5.2 Computational Time
5.3 Receiver Operating Characteristic (ROC)
5.4 Confusion Matrix
6 Discussion
7 Conclusions
References
Analysis and Development of a New Method for Defining Path Reliability in WebGIS Based on Fuzzy Logic and Dispersion Indices
1 Introduction
2 Background
2.1 Related Work
2.2 The Key Role of Variance for Reliability
3 Proposed Solution
3.1 Path Reliability Estimation Algorithm
4 Evaluation
5 Future Works
6 Conclusions
References
Object Detection and Speech Recognition Based Motion Analysis System for Pointing and Calling
1 Introduction
2 Proposed System
3 Experimental Results
4 Conclusions
References
Trust Zone Model with the Mandatory Access Control Model
1 Introduction
2 System Model
2.1 TZ (Trust Zone) Model
2.2 MAC (Mandatory Access Control) Model
3 TZMAC (Trust Zone with Mandatory Access Control) Model
4 Example
5 Concluding Remarks
References
A DPI-Based Network Traffic Feature Vector Optimization Model
1 Introduction
2 Related Work
3 Methodology
3.1 Overview
3.2 Feature Extraction Based on DPI
3.3 Bagging for Features
4 Experiment
4.1 Datasets
4.2 Feature Extraction
4.3 Feature Selection
4.4 Results
5 Conclusion
References
A Hill Climbing System for Optimizing Component Selection of Multirotor UAVs
1 Introduction
2 Component Configuration of Multirotor UAV
3 Proposed System
4 Simulation Results
5 Conclusions
References
Optimization of Deer Repellent Devices Placement Based on Hill Climbing and Acoustic Ray Tracing
1 Introduction
2 Proposed System
2.1 Hill Climbing Based Deer Repellent Device Placement Optimization
2.2 Acoustic Ray Tracing Based Deer Repellent Device Placement Optimization
3 Simulation Results
4 Conclusions
References
Real-Time Detection of Network Exploration Behavior: A Method Based on Feature Extraction and Half-Space Trees Algorithm
1 Introduction
2 Related Work
3 Modeling with Feature-Based Half-Space Trees
3.1 DataWasher
3.2 FeatureGenerator
3.3 AnomalyDetector
4 Experiments on LanL Dataset
5 Conclusions
References
Star Point Target Extraction with High Noise Background Based on Morphology
1 Introduction
2 Point Target Extraction Algorithm Based on Morphology
2.1 Basic Operations of Morphology
2.2 Background Estimation Filtering Based on Top-Hat and Star-Point Target Extraction
2.3 Calculation of Star Brightness
2.4 Threshold Processing
2.5 Centroid Extraction
3 Test Results and Analysis
4 Conclusion
References
Toward Detection of Fake News Using Sentiment Analysis for Albanian News Articles
1 Introduction
2 Literature Review
3 Methodology
4 Results
4.1 Phase I: Training of Sentiment Analysis Models
4.2 Phase II: Sentiment Analysis in Fake News Dataset
5 Discussion and Limitation
6 Conclusion
References
Proposal of My Hazard Map System for Disaster Prevention Education
1 Introduction
2 Related Works
3 Research Objective
4 My Hazard Map System Configuration and Architecture
5 My Hazard Map System
5.1 Dangerous Place Information Registration Screen
5.2 Map Screen After Registering Dangerous Place Information
5.3 Registration Information Viewing Screen (List Format)
5.4 Map Auxiliary Function (Superimposed Display of Overlapping Hazard Maps)
6 Conclusion
References
Automated Storytelling Technologies for Cultural Heritage
1 Introduction
2 Models
2.1 Models Based on Large Language Models
2.2 Chatbot
2.3 Semantic and Process-Based Models
3 Tools for Automated Storytelling
3.1 Story Composition Tools
3.2 Automatic Writing Tools
4 Conclusion and Future Works
References
Support for Automated Story Telling Using Natural Language Processing Techniques Aimed at Recognizing Narrative Elements
1 Introduction
2 State of the Art
2.1 Storytelling
2.2 Natural Language Processing
3 Objective
4 Methodology
5 Implementation and Testing
6 Validation
7 Conclusion
References
Travel Air IQ: A Tool for Air Quality-Aware Tourists
1 Introduction
2 State of Art
3 Travel Air IQ: Tool Design
4 Results and Discussion
5 Conclusion and Future Research
References
Advanced IT Technologies Applied to Archaeological Park of Norba (Latium, Italy)
1 Introduction
2 The Archaeological Park of Norba
3 Visit Itineraries
4 Content Delivery and Interactive Storytelling
5 Conclusion
References
XR Theater: An Experience
1 Motivations and Background
2 Related Works
3 XR Theater: Requirements
3.1 Use Case: Augmented Reality Performative Action Composition
3.2 Use Case: Augmented Reality Performative Action
3.3 Sequence Diagram: Play Script Composition for Script Writer
3.4 Sequence Diagram: Virtual Environment Creation for Content Creator
3.5 Sequence Diagram: Customize Play Script
3.6 Sequence Diagram: Perform Augmented Reality Performative Action
4 Conclusions and Future Developments
References
Author Index
📜 SIMILAR VOLUMES
This book provides the best practices in clinical obstetrics. Each chapter has been updated to provide the most recent guidance in diagnosis and management, with a focus on practical tips and advice to deal with routine as well as urgent scenarios. It is a must read for budding obstetricians pursuin
Source: InternetArchive.org Donor Library: Friends Of The San Francisco Public Library
<p>Ideal for residents, fellows in training, and obstetric practitioners who need a quick review in practice, <i>Gabbe’s Obstetrics Essentials</i> is a <b>portable, high-yield reference </b>designed to put must-know obstetric information at your fingertips. Taken from Gabbe’s <i>Obstetrics: Normal a
Highly readable, well-illustrated, and easy to understand, Gabbe’s Obstetrics: Normal and Problem Pregnancies is an ideal day-to-day reference or study tool for residents and clinicians. This 8th Edition of this bestselling text offers fast access to evidence-based, comprehensive information, now fu