Deterministic Learning Theory for Identification, Recognition, and Control presents a unified conceptual framework for knowledge acquisition, representation, and knowledge utilization in uncertain dynamic environments. It provides systematic design approaches for identification, recognition, and control of linear uncertain systems. Unlike many books currently available that focus on statistical principles, this book stresses learning through closed-loop neural control, effective representation and recognition of temporal patterns in a deterministic way. A Deterministic View of Learning in Dynamic Environments The authors begin with an introduction to the concepts of deterministic learning theory, followed by a discussion of the persistent excitation property of RBF networks. They describe the elements of deterministic learning, and address dynamical pattern recognition and pattern-based control processes. The results are applicable to areas such as detection and isolation of oscillation faults, ECG/EEG pattern recognition, robot learning and control, and security analysis and control of power systems. A New Model of Information Processing This book elucidates a learning theory which is developed using concepts and tools from the discipline of systems and control. Fundamental knowledge about system dynamics is obtained from dynamical processes, and is then utilized to achieve rapid recognition of dynamical patterns and pattern-based closed-loop control via the so-called internal and dynamical matching of system dynamics. This actually represents a new model of information processing, i.e. a model of dynamical parallel distributed processing (DPDP).
This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality over encrypted data. The book majorly covers: 1) the design and implementation of encrypted search algorithms, data structures, and systems that facilitate various forms of search over always-encrypted databases; 2) different threat models, assumptions, and the related security guarantees, when using searchable encryption in the real-world settings; and 3) latest efforts in building full-fledged encrypted database systems that draw insights from searchable encryption constructions. The book fits in the timely context, where the necessity of safeguarding important and sensitive data has been globally recognized. Traditional security measures, such as storing data behind network firewalls and layers of access control mechanisms to keep attackers out, are no longer sufficient to cope with the expanding landscape of surging cyber threats. There is an urgent call to keep sensitive data always encrypted to protect the data at rest, in transit, and in use. Doing so guarantees data confidentiality for owners, even if the data is out of their hands, e.g., hosted at in-the-cloud databases. The daunting challenge is how to perform computation over encrypted data. As we unfold in this book, searchable encryption, as a specific line of research in this broadly defined area, has received tremendous advancements over the past decades. This book is majorly oriented toward senior undergraduates, graduate students, and researchers, who want to work in the field and need extensive coverage of encrypted database research. It also targets security practitioners who want to make well-informed deployment choices of the latest advancements in searchable encryption for their targeted applications. Hopefully, this book will be beneficial in both regards.
This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability theory, optimization, algorithm and protocol designs. All proposed mechanisms are evaluated by extensive simulations. Wireless Rechargeable Sensor Networks targets professionals and researchers working in networks, wireless communications, energy technology and information technology. Advanced-level students studying electrical engineering and computer science will also find this material useful as a study guide.
As the first volume of a two-volume set on mediation in China, this book examines the legal foundations of Chinese mediation and feasible paths to the institutionalization and professionalization of mediation. Grounded in traditional dispute resolution practices throughout Chinese history, mediation is born out of the Chinese legal tradition and considered to be “Eastern” in nature. The first volume discusses the legal principles that underpin mediation in China, rooted in a legal tradition that pursues the rule of law and morality as well as the concept of harmony in Chinese society. It first revisits traditional notions and models of Chinese mediation and then puts forward approaches to innovating the concept, institutionalization, and mechanism of mediation. The book also discusses how to promote professionalization and special legislation dedicated to mediation in China, thus establishing a mediation system that fits into and is properly tailored for Chinese society. It introduces diverse styles of mediation and social governance in different cultural contexts and demonstrates the effectiveness of China's experience in dealing with a litigious society. This title will serve as a crucial reference for scholars, students and related professionals interested in alternative dispute resolution, civil litigation, and especially China’s dispute resolution policy, law, and practice.
This book features a collection of papers on the issues, intricacies, and challenges relating to energy and environmental science. It offers expert coverage of the various technological aspects of sustainable energy ecosystems, including processes that improve energy efficiency and reduce CO2 and other greenhouse emissions. It also addresses the need for sustainable technologies in extractive metallurgy, materials processing, and manufacturing industries with energy efficient technologies. Some additional contributions examine renewable energy sources such as solar, wind, and biomass.
Bonded Joints and Repairs to Composite Airframe Structures is a single-source reference on the state-of-the-art in this rapidly growing area. It provides a thorough analysis of both internal and external joints and repairs, as well as discussions on damage tolerance, non-destructive inspection, self-healing repairs, and other essential information not only on the joints and repairs themselves, but critically, on how they differ from bonds and repairs to metallic aircraft. Authors Wang and Duong bring a valuable combination of academic research and industry expertise to the book, drawing on their cutting-edge composite technology experience, including analytic and computational leadership of damage and repair planning for the Boeing 787. Intended for graduate students, engineers, and scientists working on the subject in aerospace industry, government agencies, research labs, and academia, the book is an important addition to the limited literature in the field. Offers rare coverage of composite joints and repairs to composite structures, focusing on the state of the art in analysis Combines the academic, government, and industry expertise of the authors, providing research findings in the context of current and future applications Covers internal and external joints and repairs, as well as damage tolerance, non-destructive inspection, and self-healing repairs Ideal for graduate students, engineers, and scientists working in the aerospace industry, government agencies, research labs, and academia
Shield Tunnel Engineering: From Theory to Practice is a key technique that offers one of the most important ways to build tunnels in fast, relatively safe, and ecologically friendly ways. The book presents state-of-the-art solutions for engineers working within the field of shield tunnelling technology for railways. It includes expertise from major projects in shield tunnel construction for high-speed rail, subways and other major projects. In particular, it presents a series of advances in shield muck conditioning technology, slurry treatment, backfill grouting, and environmental impact and control. In this volume, foundational knowledge is combined with the latest advances in shield tunnel engineering. Twelve chapters cover key areas including geological investigation, the types, structures and workings of shield machines, selecting a machine, shield segment design, shield tunnelling parameter control, soil conditioning for earth pressure balance (EPB) shield tunnelling, shield slurry treatment, backfill grouting, environmental impact, and problems in shield tunnel structures and their amelioration. This book presents the essential knowledge needed for shield tunnel engineering, the latest advances in the field, and practical guidance for engineers. Presents the foundational concepts of shield tunnel engineering Gives the latest advances in shield tunnel engineering techniques Considers common problems in shield tunnel structures and their solutions Lays out step-by-step guidance for engineers working with shield tunnelling Assesses environmental impacts and their control in shield tunnel engineering
Do you have the tools to address recent challenges and problems in modern computer networks? Discover a unified view of auction theoretic applications and develop auction models, solution concepts, and algorithms with this multidisciplinary review. Devise distributed, dynamic, and adaptive algorithms for ensuring robust network operation over time-varying and heterogeneous environments, and for optimizing decisions about services, resource allocation, and usage of all network entities. Topics including cloud networking models, MIMO, mmWave communications, 5G, data aggregation, task allocation, user association, interference management, wireless caching, mobile data offloading, and security. Introducing fundamental concepts from an engineering perspective and describing a wide range of state-of-the-art techniques, this is an excellent resource for graduate and senior undergraduate students, network and software engineers, economists, and researchers.
Xiaoping Cong examines the social and cultural significance of Chinese revolutionary legal practice in the construction of marriage and gender relations. Her book is an empirically rich investigation of the ways in which a 1943 legal dispute over an arranged marriage in a Chinese village became a legal, political and cultural exemplar on the national stage. This conceptually groundbreaking study revisits the Chinese Revolution and its impact on women and society by presenting a Chinese experience that cannot and should not be theorized in the framework of Western discourse. Taking a cultural-historical perspective, Cong shows how the Chinese Revolution and its legal practices produced new discourses, neologisms and cultural symbols that contained China's experience in twentieth-century social movements, and how revolutionary practice was sublimated into the concept of 'self-determination', an idea that bridged local experiences with the tendency of the twentieth-century world, and that is a revolutionary legacy for China today.
Educated men in Song-dynasty China (960–1279) traveled frequently in search of scholarly and bureaucratic success. These extensive periods of physical mobility took them away from their families, homes, and native places for long periods of time, preventing them from fulfilling their most sacred domestic duty: filial piety to their parents. In this deeply grounded work, Cong Ellen Zhang locates the tension between worldly ambition and family duty at the heart of elite social and cultural life. Drawing on more than two thousand funerary biographies and other official and private writing, Zhang argues that the predicament in which Song literati found themselves diminished neither the importance of filial piety nor the appeal of participating in examinations and government service. On the contrary, the Northern Song witnessed unprecedented literati activity and state involvement in the bolstering of ancient forms of filial performances and the promotion of new ones. The result was the triumph of a new filial ideal: luyang. By labeling highly coveted honors and privileges attainable solely through scholarly and official accomplishments as the most celebrated filial acts, the luyang rhetoric elevated office-holding men to be the most filial of sons. Consequently, the proper performance of filiality became essential to scholar-official identity and self-representation. Zhang convincingly demonstrates that this reconfiguration of elite male filiality transformed filial piety into a status- and gender-based virtue, a change that had wide implications for elite family life and relationships in the Northern Song. The separation of elite men from their parents and homes also made the idea of “native place” increasingly fluid. This development in turn generated an interest in family preservation as filial performance. Individually initiated, kinship- and native place-based projects flourished and coalesced with the moral and cultural visions of leading scholar-intellectuals, providing the social and familial foundations for the ascendancy of Neo-Confucianism as well as new cultural norms that transformed Chinese society in the Song and beyond.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.