/home/adminoer/public_html/lib/SearchEngine/DefaultEngine.php:615 "Search Engine Debug 🔎 🪲"
Engine Type ⚙️: "SLiMS\SearchEngine\DefaultEngine"
SQL ⚙️: array:2 [ "count" => "select count(distinct b.biblio_id) from biblio as b left join mst_publisher as mp on b.publisher_id=mp.publisher_id left join mst_place as mpl on b.publish_place_id=mpl.place_id where b.opac_hide=0 and (b.biblio_id in(select bt.biblio_id from biblio_topic as bt left join mst_topic as mt on bt.topic_id=mt.topic_id where mt.topic like ?))" "query" => "select b.biblio_id, b.title, b.image, b.isbn_issn, b.publish_year, mp.publisher_name as `publisher`, mpl.place_name as `publish_place`, b.labels, b.input_date, b.edition, b.collation, b.series_title, b.call_number from biblio as b left join mst_publisher as mp on b.publisher_id=mp.publisher_id left join mst_place as mpl on b.publish_place_id=mpl.place_id where b.opac_hide=0 and (b.biblio_id in(select bt.biblio_id from biblio_topic as bt left join mst_topic as mt on bt.topic_id=mt.topic_id where mt.topic like ?)) order by b.last_update desc limit 20 offset 0" ]
Bind Value ⚒️: array:1 [ 0 => "%Financial Economics%" ]
This open access handbook, Ten Crises systematically traces the economic history of China from 1949 to 2020, unravelling the complex domestic and global factors leading to the cyclical crises identified by WEN and his research team, and examining the corresponding counteracting policies and measures by the government to resolve or defer the crises. The book offers profound insights into China…
This open access book addresses four standard business school subjects: microeconomics, macroeconomics, finance and information systems as they relate to trading, liquidity, and market structure. It provides a detailed examination of the impact of trading costs and other impediments of trading that the authors call “frictions”. It also presents an interactive simulation model of equity mark…
The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LW…