Keep sensitive user data safe and secure without sacrificing the performance and accuracy of your machine learning models. In Privacy Preserving Machine Learning, you will learn: Privacy considerations in machine learning Differential privacy techniques for machine learning Privacy-preserving synthetic data generation Privacy-enhancing technologies for data mining and database applications Compressive privacy for machine learning Privacy-Preserving Machine Learning is a comprehensive guide to avoiding data breaches in your machine learning projects. You’ll get to grips with modern privacy-enhancing techniques such as differential privacy, compressive privacy, and synthetic data generation. Based on years of DARPA-funded cybersecurity research, ML engineers of all skill levels will benefit from incorporating these privacy-preserving practices into their model development. By the time you’re done reading, you’ll be able to create machine learning systems that preserve user privacy without sacrificing data quality and model performance. About the Technology Machine learning applications need massive amounts of data. It’s up to you to keep the sensitive information in those data sets private and secure. Privacy preservation happens at every point in the ML process, from data collection and ingestion to model development and deployment. This practical book teaches you the skills you’ll need to secure your data pipelines end to end. About the Book Privacy-Preserving Machine Learning explores privacy preservation techniques through real-world use cases in facial recognition, cloud data storage, and more. You’ll learn about practical implementations you can deploy now, future privacy challenges, and how to adapt existing technologies to your needs. Your new skills build towards a complete security data platform project you’ll develop in the final chapter. What’s Inside Differential and compressive privacy techniques Privacy for frequency or mean estimation, naive Bayes classifier, and deep learning Privacy-preserving synthetic data generation Enhanced privacy for data mining and database applications About the Reader For machine learning engineers and developers. Examples in Python and Java. About the Author J. Morris Chang is a professor at the University of South Florida. His research projects have been funded by DARPA and the DoD. Di Zhuang is a security engineer at Snap Inc. Dumindu Samaraweera is an assistant research professor at the University of South Florida. The technical editor for this book, Wilko Henecka, is a senior software engineer at Ambiata where he builds privacy-preserving software. Table of Contents PART 1 - BASICS OF PRIVACY-PRESERVING MACHINE LEARNING WITH DIFFERENTIAL PRIVACY 1 Privacy considerations in machine learning 2 Differential privacy for machine learning 3 Advanced concepts of differential privacy for machine learning PART 2 - LOCAL DIFFERENTIAL PRIVACY AND SYNTHETIC DATA GENERATION 4 Local differential privacy for machine learning 5 Advanced LDP mechanisms for machine learning 6 Privacy-preserving synthetic data generation PART 3 - BUILDING PRIVACY-ASSURED MACHINE LEARNING APPLICATIONS 7 Privacy-preserving data mining techniques 8 Privacy-preserving data management and operations 9 Compressive privacy for machine learning 10 Putting it all together: Designing a privacy-enhanced platform (DataHub)
Keep sensitive user data safe and secure without sacrificing the performance and accuracy of your machine learning models. In Privacy Preserving Machine Learning, you will learn: Privacy considerations in machine learning Differential privacy techniques for machine learning Privacy-preserving synthetic data generation Privacy-enhancing technologies for data mining and database applications Compressive privacy for machine learning Privacy-Preserving Machine Learning is a comprehensive guide to avoiding data breaches in your machine learning projects. You’ll get to grips with modern privacy-enhancing techniques such as differential privacy, compressive privacy, and synthetic data generation. Based on years of DARPA-funded cybersecurity research, ML engineers of all skill levels will benefit from incorporating these privacy-preserving practices into their model development. By the time you’re done reading, you’ll be able to create machine learning systems that preserve user privacy without sacrificing data quality and model performance. About the Technology Machine learning applications need massive amounts of data. It’s up to you to keep the sensitive information in those data sets private and secure. Privacy preservation happens at every point in the ML process, from data collection and ingestion to model development and deployment. This practical book teaches you the skills you’ll need to secure your data pipelines end to end. About the Book Privacy-Preserving Machine Learning explores privacy preservation techniques through real-world use cases in facial recognition, cloud data storage, and more. You’ll learn about practical implementations you can deploy now, future privacy challenges, and how to adapt existing technologies to your needs. Your new skills build towards a complete security data platform project you’ll develop in the final chapter. What’s Inside Differential and compressive privacy techniques Privacy for frequency or mean estimation, naive Bayes classifier, and deep learning Privacy-preserving synthetic data generation Enhanced privacy for data mining and database applications About the Reader For machine learning engineers and developers. Examples in Python and Java. About the Author J. Morris Chang is a professor at the University of South Florida. His research projects have been funded by DARPA and the DoD. Di Zhuang is a security engineer at Snap Inc. Dumindu Samaraweera is an assistant research professor at the University of South Florida. The technical editor for this book, Wilko Henecka, is a senior software engineer at Ambiata where he builds privacy-preserving software. Table of Contents PART 1 - BASICS OF PRIVACY-PRESERVING MACHINE LEARNING WITH DIFFERENTIAL PRIVACY 1 Privacy considerations in machine learning 2 Differential privacy for machine learning 3 Advanced concepts of differential privacy for machine learning PART 2 - LOCAL DIFFERENTIAL PRIVACY AND SYNTHETIC DATA GENERATION 4 Local differential privacy for machine learning 5 Advanced LDP mechanisms for machine learning 6 Privacy-preserving synthetic data generation PART 3 - BUILDING PRIVACY-ASSURED MACHINE LEARNING APPLICATIONS 7 Privacy-preserving data mining techniques 8 Privacy-preserving data management and operations 9 Compressive privacy for machine learning 10 Putting it all together: Designing a privacy-enhanced platform (DataHub)
What? Even immortals play Taobao? Thus, Chen Yu disguised himself as a deity to roam the Immortal World! Sick? Don't worry, Old Lord Taishang's celestial pills will guarantee your safety! You want to see the style of a beauty's underwear? The Fiery Eyes of Truth will satisfy your wish! Low martial arts value? The strongest cultivation method, the Eight-Nine Arcane Art ... you are worthy of it! The premise was that he had enough celestial coins. With celestial coins in his possession, he could have anything he wanted!
The only female emperor in China, in troubled times. The outstanding talents of the martial arts world rose together as a rain of blood and gore. Was there someone who would end this endless slaughter and redeem the billowing evil? Was there someone who would join her in vowing to the heavens and pacifying the surging feelings of her children? Did the Luoyang in your heart collapse with the smoke into a ruin? Did the light ever transform into neon on the streets? Is the Luoyang in your heart the banner of the great Han Dynasty? But the beacon lit by Cao Wei Xiao Xiong? Or perhaps, Magnificent Tang ... Golden Age, Ranger, Red Dust ... Whose figure would this sword reflect? Would anyone listen to that song? Everything is in the Tang Dynasty [put away]
Following the theoretical framework Nida had developed over decades of work on translation and semiotics, the two authors offer an easily comprehensible analysis of the complex problems involved in translation. After a critical review of the historical development of translation theory in the light of modern information theory, they elucidate the most fundamental principles of translation in accordance with the concept of dynamic equivalence. The treatment is closely related to actual translation practice, and the principles elucidated are applicable to all types of translation, though most of the examples analyzed are taken from translations between Chinese and English. This new and expanded edition has two main parts. Part I is the complete text of the original work as published in the early 1980s. Part II consists of six of Professor Jin’s more recent essays, which provide further insights into the principle of equivalent effect and its applications in literary translation. Particular attention is paid to practical procedures and the extremely complex relationship between creative translation and real fidelity. Published by City University of Hong Kong Press. 香港城市大學出版社出版。
Intelligent Support for Computer Science Education presents the authors’ research journey into the effectiveness of human tutoring, with the goal of developing educational technology that can be used to improve introductory Computer Science education at the undergraduate level. Nowadays, Computer Science education is central to the concerns of society, as attested by the penetration of information technology in all aspects of our lives; consequently, in the last few years interest in Computer Science at all levels of schooling, especially at the college level, has been flourishing. However, introductory concepts in Computer Science such as data structures and recursion are difficult for novices to grasp. Key Features: Includes a comprehensive and succinct overview of the Computer Science education landscape at all levels of education. Provides in-depth analysis of one-on-one human tutoring dialogues in introductory Computer Science at college level. Describes a scalable, plug-in based Intelligent Tutoring System architecture, portable to different topics and pedagogical strategies. Presents systematic, controlled evaluation of different versions of the system in ecologically valid settings (18 actual classes and their laboratory sessions). Provides a time-series analysis of student behavior when interacting with the system. This book will be of special interest to the Computer Science education community, specifically instructors of introductory courses at the college level, and Advanced Placement (AP) courses at the high school level. Additionally, all the authors’ work is relevant to the Educational Technology community, especially to those working in Intelligent Tutoring Systems, their interfaces, and Educational Data Mining, in particular as applied to human-human pedagogical interactions and to user interaction with educational software.
The evolution of Si-based optoelectronics has been extremely fast in the last few years and it is predicted that this growth will still continue in the near future. The aim of the volume is to present different Si-based luminescing materials as porous silicon, rare-earth doped silicon, Si nanocrystals, silicides, Si-based multilayers and silicon-germanium alloy or superlattice structures. The different devices needed for an all-Si-based optoelectronics are treated, ranging from light sources to waveguides, from amplifiers and modulators to detectors. Both the very basic treatments as well as applications to real prototype devices and integration in an optical integrated circuit are presented. Several issues are highlighted: the problem of electrical transport in low-dimensional Si systems, the possibility of gain in Si-based systems, the low modulation speed of Si-based LEDs. The book gives a fascinating picture of the state-of-the-art in Si microphotonics and a perspective on what one can expect in the near future.
Hepatitis E (HEV) is a viral infectious disease that infects humans and domestic, wild, and synanthropic animals alike. In developing countries, the disease often presents as an epidemic, transmitted primarily through the fecal-oral route. In recent years, sporadic cases have also been documented in industrial countries, including Europe. The identification and characterization of animal strains of HEV from pigs, wild boar, and deer, and the demonstrated ability of cross-species infection by these animal strains raise potential public health concerns for foodborne and zoonotic transmission of the virus. This Brief will provide a thorough overview of HEV. It will discuss the epidemiology and pathogenesis of the virus in both humans and animals, review detection methods, and provide methods for its control and prevention.
Mozi (fifth century B.C.) was an important political and social thinker and formidable rival of the Confucianists. He advocated universal love--his most important doctrine according to which all humankind should be loved and treated as one's kinfolk--honoring and making use of worthy men in government, and identifying with one's superior as a means of establishing uniform moral standards. He also believed in the will of Heaven and in ghosts. He firmly opposed offensive warfare, extravagance--including indulgence in music and allied pleasures--elaborate funerals and mourning, fatalistic beliefs, and Confucianism.
This book explores the dissemination of knowledge around Chinese medicinal substances from the eighteenth to twentieth centuries in a global context. The author presents a microhistory of the caterpillar fungus, a natural, medicinal substance initially used by Tibetans no later than the fifteenth century and later assimilated into Chinese materia medica from the eighteenth century onwards. Tracing the transmission of the caterpillar fungus from China to France, Britain, Russia and Japan, the book investigates the tensions that existed between prevailing Chinese knowledge and new European ideas about the caterpillar fungus. Emerging in eighteenth and nineteenth-century Europe, these ideas eventually reached communities of scientists, physicians and other intellectuals in Japan and China. Seeking to examine why the caterpillar fungus engaged the attention of so many scientific communities across the globe, the author offers a transnational perspective on the making of modern European natural history and Chinese materia medica.
This monograph provides comprehensive coverage of the collection, management, and use of big data obtained from remote sensing. The book begins with an introduction to the basics of big data and remote sensing, laying the groundwork for the more specialized information to follow. The volume then goes on to address a wide variety of topics related to the use and management of remote sensing big data, including hot topics such as analysis through machine learning, cyberinfrastructure, and modeling. Examples on how to use the results of big data analysis of remotely sensed data for concrete decision-making are offered as well. The closing chapters discuss geospatial big data initiatives throughout the world and future challenges and opportunities for remote sensing big data applications. The audience for this book includes researchers at the intersection of geoscience and data science, senior undergraduate and graduate students, and anyone else interested in how large datasets obtained through remote sensing can be best utilized. The book presents a culmination of 30 years of research from renowned spatial scientists Drs. Liping Di and Eugene Yu.
Diazo compounds are versatile substances with diverse transformations in organic synthesis and other fields. Studies of diazo compounds have been ongoing for a very long time but still attract significant attention within the organic chemistry community, with new papers related to diazo compounds appearing at a daily pace. Over the past twenty years, there have been over fifty reviews and accounts related to the reactions of diazo compounds, but most of them cover limited aspects of diazo compounds. In addition to organic synthesis, diazo compounds have found applications in interdisciplinary fields such as material sciences, chemical biology and also polymerization.In this comprehensive book, the authors cover the most recent advances in the fields related to diazo compounds, including the application of donor-acceptor carbenes, carbene-based cross-coupling reactions and polymerizations, as well as the breakthrough in catalytic asymmetric carbene O-H, S-H, and N-H bond insertions. They also cover the application of flow chemistry in diazo reactions. The authors aim to provide a contemporary and comprehensive review for investigators engaged in or with interest in diazo compounds to boost further developments in this fascinating field.
Over the last decade China’s investment in Latin America and the Caribbean (LAC) has increased substantially in volume and become more diversified from natural resources to other industries. Using cross-border mergers and acquisitions data, we demonstrate that since mid-2010s China’s overseas investment has tilted toward sectors where China has a comparative advantage in the global markets, a trend similar to that of other major foreign direct investment (FDI) source countries. Moreover, China’s rising overseas investment can be linked to the rebalancing of Chinese economy, and LAC stands to benefit from its complementarity vis-à-vis China in sectors where the rising Chinese overseas investment can be met with LAC’s own investment gaps. The COVID-19 pandemic could have a long-lasting impact on global value chains and FDI flows, which poses both challenges and opportunities to LAC in attracting FDI, including from China, to support the region’s long-run economic development.
The intertwined trees were so big that one couldn't even see the sunlight. At this moment, Qing Hun, who was an explorer, was extremely regretful. If he had known that he would not be able to get out of this primeval forest, he would not have come by himself. He used the thick branch in his hand to pull at the dense shrubs and weeds growing on the ground as he walked. He had been lost for five days, his cell phone was dead, the compass had been broken in the fight with the Wolf, and his leg had been bitten by the Wolf.
In the seventeenth century the Manchu conquered the whole of China, replacing the Ming dynasty. The original Manchu and Mongol documents selected for the this publication, translated and amply annotated, provide fascinating new information about the relations between Manchus and Mongols before the Manchu conquest of China. They include diplomatic correspondence, military liaisons, legal cases, and records of tribute missions and present a detailed picture of the relative position of the various Mongol tribes vis-à-vis the future emperors of China.
This study examines economic, social, political, and cultural changes as funneled through the teahouses of Chengdu during the first half of the twentieth century.
Providing original insights into Chinese military history, Nicola Di Cosmo gives an annotated translation of the only known military diary in pre-modern Chinese history, providing fresh and extensive information on the inner workings of the Ch'ing army. The personal experience of the author, a young Manchu officer fighting in inhospitable South-Western China, take us close to the 'face of the battle' in seventeenth-century China, and enriches our general knowledge of military history.
In 1939, residents of a rural village near Chengdu watched as Lei Mingyuan, a member of a violent secret society known as the Gowned Brothers, executed his teenage daughter. Six years later, Shen Baoyuan, a sociology student at Yenching University, arrived in the town to conduct fieldwork on the society that once held sway over local matters. She got to know Lei Mingyuan and his family, recording many rare insights about the murder and the Gowned Brothers' inner workings. Using the filicide as a starting point to examine the history, culture, and organization of the Gowned Brothers, Di Wang offers nuanced insights into the structures of local power in 1940s rural Sichuan. Moreover, he examines the influence of Western sociology and anthropology on the way intellectuals in the Republic of China perceived rural communities. By studying the complex relationship between the Gowned Brothers and the Chinese Communist Party, he offers a unique perspective on China's transition to socialism. In so doing, Wang persuasively connects a family in a rural community, with little overt influence on national destiny, to the movements and ideologies that helped shape contemporary China.
This book reports new findings in the fields of nonlinear optics, quantum optics and optical microscopy. It presents the first experimental device able to transform an input Gaussian beam into a non-diffracting Bessel-like beam. The modulation mechanism, i.e. electro-optic effect, allows the device to be fast, miniaturizable and integrable into solid state arrays. Also presented is an extensive study of the superposition of Bessel beams and their propagation in turbid media, with the aim of realizing field that is both localized and non-diffracting. These findings have been implemented in a light-sheet microscope to improve the optical sectioning. From a more theoretical point of view this work also tackles the problem of whether and how a single particle is able to entangle two distant systems. The results obtained introduce fundamental limitations on the use of linear optics for quantum technology. Other chapters are dedicated to a number of experiments carried out on disordered ferroelectrics including negative intrinsic mass dynamics, ferroelectric supercrystals, rogue wave dynamics driven by enhanced disorder and first evidence of spatial optical turbulence.
This book aims to provide a complete overview of the current status of lifestyle and transport changes in China, focusing on the ongoing trends in lifestyle and transport technologies, which are shaping a new lifestyle and transport system. An additional focus is to discuss the mechanism behind the influence of transport on lifestyles, and analyze the influence of transport facilities on lifestyles, which will help to give efficient and effective transport solutions. Using macro statistics and survey data from Beijing and Chinese villages and towns, this book explores the interactive development of lifestyle and transportation in China over the past 40 years. The analyses and findings in this book would enhance our existing knowledge of the relationship lifestyle and transport. The policies discussed in the book would provide fresh evidences for policy-making on updating transport services in order to cope with the changes of people’s lifestyle. This book will be of great interest to scholars and governmental agencies interested in transport development, transport policy, social transition, sustainable transport, urban planning, urban governance, and is relevant to China and other developing countries.
Is it realistic to expect great literature of one language to be re-presented artistically intact in another language? Literary Translation: Quest for Artistic Integrity is a systematic delineation of a practical approach toward that seemingly idealist aim. A summing up of a career devoted to the study of literary translation enriched with the experience of translating between several languages, it offers a clear and thorough exposition of the theory behind Professor Jin's monumental achievement in producing a worthy Chinese Ulysses, illustrated with a profusion of enlightening and instructive examples not only from his own work, but also from that of many others, including some world-famous translators. This makes Literary Translation an invaluable reference to translators of literature between almost any pair of languages, not just Chinese and English. It will also be of considerable interest to teachers and critics of twentieth-century literature in English, to students of Modernism, to researchers in comparative literature and in comparative culture, and to teachers of language.
Transmigration is an abandoned empress, a feudal society where the strong preyed on the weak. Even the weak Emperor couldn't make decisions, and I don't have the slightest bit of dignity to be a empress.The strong prince seized power, and he even married the previous dynasty's empress.
This 1750 text, written by a Catholic missionary in Tonkin, is the earliest known systematic first-hand account of Vietnamese religious practice, including chapters on Confucianism, Buddhism, the worship of spirits, magicians, fortune tellers and diviners, and Christianity in the region. It was recently discovered in a Paris archive and will be of interest to a broad array of scholars. Includes a facsimile of the original manuscript.
The management consulting team headed by Mr. Jian Di has provided strategic management consulting services for over 700 medical institutions and has rendered guidance for more than 100 medical institutions in constructing patient-centric hospital cultures. Studies on Hospital Management Transformation reflects Mr Jian Di's more than 40 years of management experience, including nearly 20 years of experience in hospital management. Condensing Mr Jian's thoughts on patient-centric care in hospital culture, this book introduces a method to systematically evaluate and construct hospital culture using 32 procedures and 500 indicators. Theoretically innovative and easy to operate, the proposed system easily produces the desired effect in constructing patient-centric hospital cultures while defying conventional cultural concepts.Due to the absence of a clear evaluation standard and system, the majority of hospital management personnel in China are uncertain of how to evaluate and construct hospital culture. This book presents a theoretical model, evaluation indicators and improvement objectives of hospital culture. Beyond theories, it also includes substantial systematic approaches and practical construction cases which make this book highly applicable. The theoretical system of the patient-centric hospital culture has been applied in over 100 medical institutions. This book should be taken as an essential guidebook for hospital management.
This book analyzes techniques that use the direct and inverse fuzzy transform for image processing and data analysis. The book is divided into two parts, the first of which describes methods and techniques that use the bi-dimensional fuzzy transform method in image analysis. In turn, the second describes approaches that use the multidimensional fuzzy transform method in data analysis. An F-transform in one variable is defined as an operator which transforms a continuous function f on the real interval [a,b] in an n-dimensional vector by using n-assigned fuzzy sets A1, ... , An which constitute a fuzzy partition of [a,b]. Then, an inverse F-transform is defined in order to convert the n-dimensional vector output in a continuous function that equals f up to an arbitrary quantity ε. We may limit this concept to the finite case by defining the discrete F-transform of a function f in one variable, even if it is not known a priori. A simple extension of this concept to functions in two variables allows it to be used for the coding/decoding and processing of images. Moreover, an extended version with multidimensional functions can be used to address a host of topics in data analysis, including the analysis of large and very large datasets. Over the past decade, many researchers have proposed applications of fuzzy transform techniques for various image processing topics, such as image coding/decoding, image reduction, image segmentation, image watermarking and image fusion; and for such data analysis problems as regression analysis, classification, association rule extraction, time series analysis, forecasting, and spatial data analysis. The robustness, ease of use, and low computational complexity of fuzzy transforms make them a powerful fuzzy approximation tool suitable for many computer science applications. This book presents methods and techniques based on the use of fuzzy transforms in various applications of image processing and data analysis, including image segmentation, image tamper detection, forecasting, and classification, highlighting the benefits they offer compared with traditional methods. Emphasis is placed on applications of fuzzy transforms to innovative problems, such as massive data mining, and image and video security in social networks based on the application of advanced fragile watermarking systems. This book is aimed at researchers, students, computer scientists and IT developers to acquire the knowledge and skills necessary to apply and implement fuzzy transforms-based techniques in image and data analysis applications.
A study of the lively street culture in Chengdu from 1870 to 1930, this book explores the relationship between urban commoners and public space, the role of community and neighborhood in public life, and how the reform movement and Republican revolution transformed everyday life in this inland city.
You see the pear blossom with snow, you see the laughing Nightmare is still clean.Look at that man, he's still waiting for you.I cherish the blooming flowers, I cherish what you said to me, I go from palace maids to court ladies, I still remember you said you love me.You asked me to wait for you for three years, I'm willing.[You are too good. I am not worthy of you. You should be the consort of the princess. I am laughing like I am crying...]
This comprehensive resource presents a highly informative overview of cloud computing security issues. This book focuses on relevant approaches aimed at monitoring and protecting computation and data hosted on heterogeneous computing resources. The most critical security aspects are thoroughly discussed, highlighting the importance of reliable secure computation over remote heterogeneous cloud nodes. This book shows that present cloud computing is inherently insecure therefore advanced execution models have to be developed to prevent unauthorized users from accessing or affecting others' data and computation. The cloud approach enables on-demand scalable services that allow performing large computations without the costs and maintenance/management issues of costly server farms (thus enabling a novel kind of outsourced computing). Essential reading for software and computer engineers as well as data architects and IT professionals to better understand the complexity and heterogeneity of modern cloud- based scenarios.
Sigh, great Gods, it's fine as long as I don't say anything. About that, lend me some aphrodisiac."Yi Yi felt a little unsteady on her feet. The moon was getting stronger and stronger.Many years later, Yi Yi shouted anxiously, "Tianfeng, my daughter was not careful. She sealed mine! Come quickly!" Practice some kind of incantation, and even use her as a test.
Time Series Analysis in Seismology: Practical Applications provides technical assistance and coverage of available methods to professionals working in the field of seismology. Beginning with a thorough review of open problems in geophysics, including tectonic plate dynamics, localization of solitons, and forecasting, the book goes on to describe the various types of time series or punctual processes obtained from those systems. Additionally, the book describes a variety of methods and techniques relating to seismology and includes a discussion of future developments and improvements. Time Series Analysis in Seismology offers a concise presentation of the most recent advances in the analysis of geophysical data, particularly with regard to seismology, making it a valuable tool for researchers and students working in seismology and geophysics. Presents the necessary tools for time series analysis as it relates to seismology in a compact and consistent manner Includes a discussion of technical resources that can be applied to time series data analysis across multiple disciplines Describes the methods and techniques available for solving problems related to the analysis of complex data sets Provides exercises at the end of each chapter to enhance comprehension
The heavens and earth are the army, I am the general, Hong Yu is the official, and I am the king. The Heaven and Earth, the determinant of destiny. A heaven's pride level expert of this era had to bear the blessing of the Five Gods, changing his fate in a way that defied the will of the heavens. In the blink of an eye, the world had been turned upside down. Hot blood is eternal, passion is in all directions, fight with me to the sky! Fight!
By concentrating on one of the key locations of global manufacturing, this volume offers a contribution to contemporary industry studies. The rates of growth that have characterized the southern Guangdong province in the last three decades are unique, even with respect to the more general and often cited Chinese experience. But what role have governments played in these decades of growth? What are the aims and tools of industrial policies promoted in this core location of contemporary manufacturing? And what are the implications of the Guangdong experience of growth for the international debate on contemporary industry? Referencing the international debate on industrial development, specialized Chinese academic literature, official government documents, statistics and in-depth fieldwork this book offers unique view on the complex set of long-term national and local government plans and policies that have gone hand in hand with the last three decades of impressive change in this highly industrialized region. In this framework, local industrial development policy, innovation policy and migration policy are carefully analyzed as three of the main strategic interventions selected by government authorities to promote the desired gradual structural change and technological upgrading in industry. This book will be of interest to students and scholars of Chinese studies, economics and business, development policy and industrial policy. Furthermore, the volume presents stimulating material for both policy makers and entrepreneurs.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.