With the rapid development of artificial intelligence and the emergence of various new sensors, autonomous driving has grown in popularity in recent years. The implementation of autonomous driving requires new sources of sensory data, such as cameras, radars, and lidars, and the algorithm processing requires a high degree of parallel computing. In this regard, traditional CPUs have insufficient computing power, while DSPs are good at image processing but lack sufficient performance for deep learning. Although GPUs are good at training, they are too “power-hungry,” which can affect vehicle performance. Therefore, this book looks to the future, arguing that custom ASICs are bound to become mainstream. With the goal of ICs design for autonomous driving, this book discusses the theory and engineering practice of designing future-oriented autonomous driving SoC chips. The content is divided into thirteen chapters, the first chapter mainly introduces readers to the current challenges and research directions in autonomous driving. Chapters 2–6 focus on algorithm design for perception and planning control. Chapters 7–10 address the optimization of deep learning models and the design of deep learning chips, while Chapters 11-12 cover automatic driving software architecture design. Chapter 13 discusses the 5G application on autonomous drving. This book is suitable for all undergraduates, graduate students, and engineering technicians who are interested in autonomous driving.
Surface and Interface Analysis in Pharmaceutical and Biopharmaceutical Fields provides a comprehensive review of the most commonly used interface science techniques in drug research and development (including their capabilities and limitations) and relates them to a specific practical situation. This book outlines sample preparation crucial for a successful outcome and features methods to interpret results that can be combined with other techniques. It provides engineers who work in instrument companies a comprehensive understanding of the specific challenges faced by these techniques in pharmaceutical/biopharmaceutical applications, providing framework for new instruments that can be designed to address the current challenges. For scientists who work in traditional pharmaceutical/biopharmaceutical fields, such as discovery, formulation, packaging, and device, this book provides an introduction to surface/interface techniques. It also contains examples on how these scientists can benefit from these techniques. For scientists and engineers working in the manufacturing fields, the book will supply examples on the application of surface/interface characterization techniques for failure analysis and root-cause investigations of deviations that occur at the manufacturing sites. Provides diagrams of drug development roadmaps Includes snapshots of potential applications of surface and interface characterization at each stage of drug development Summarizes major surface/interface characterization techniques Compares the pros and cons of commonly applied surface/interface characterization techniques Explores working examples from pharmaceutical and biopharmaceutical fields Guides the development of practical strategy for solving real world problems
Untethered Miniature Soft Robots Reference on achieving contactless manipulation of soft robots, detailing high level concepts and perspectives and technical skills of soft robots Untethered Miniature Soft Robots: Materials, Fabrications, and Applications introduces the emerging field of miniature soft robots and summarizes the recent rapid development in the field to date, describing different types of functional materials to build miniature soft robots, such as silicone elastomer, carbon-based materials, hydrogels, liquid crystal polymer, flexible ferrofluid, and liquid metal, and covering the material properties, fabrication strategies, and functionalities in soft robots together with their underlying mechanisms. The book discusses magnetically, thermally, optically, and chemically actuated soft robots in depth, explores the many specific applications of miniature soft robots in biomedical, environmental, and electrical fields and summarizes the development of miniature soft robots based on soft matter, fabrication strategies, locomotion principles, sensing and actuation mechanisms. In closing, the text summarizes the opportunities and challenges faced by miniature soft robots, providing expert insight into the possible futures of this field. Written by four highly qualified academics, Untethered Miniature Soft Robots covers sample topics such as: Soft elastomer-based robots with programmable magnetization profiles and untethered soft robots based on template-aiding Working mechanisms of carbon-based materials, covering light-induced expansion and shrinkage, and humidity-induced deformation Designing microscale building blocks, modular assembly of building blocks based on Denavit-Hartenberg (DH) matrix, and inverse and forward design of modular morphing systems Material designs of magnetic liquid crystal elastomers (LCE) systems, multiple-stimuli responsiveness of magnetic LCE systems, and adaptive locomotion of magnetic LCE-based robots Controllable deformation and motion behaviors, as well as applications of ferrofluids droplet robots (FDRs), including cargo capturing, object sorting, liquid pumping/mixing, and liquid skin. Providing highly detailed and up-to-date coverage of the topic, Untethered Miniature Soft Robots serves as an invaluable and highly comprehensive reference for researchers working in this promising field across a variety of disciplines, including materials scientists, mechanical and electronics engineers, polymer chemists, and biochemists.
This vital work for researchers and graduate students focuses on resilience estimation and control of cyber-physical networked systems using attacker-defender game theory. It presents attack and defense strategies and describes the design and resilience of control systems to withstand cyberattacks. Complex control systems, including cyber-physical and cloud control systems, are in open network environments and are often confronted with threats from cyberspace, physical space and even cloud service. With diversified and intelligent attack patterns and improvements in attack capabilities, non-contact damage can be widespread. In this book, the authors use a formal, mathematical approach to introduce their recent research findings to describe and design attack and defense strategies using game theoretic method. The book is divided into three sections, focusing on strategies for resilience against deception attacks and DoS attacks, and protecting cloud control systems against threats. In these sections, the authors address topics such as secure and distributed filtering, attack detection and disturbance rejection, resilient state estimation, and resilient control, and techniques such as Stackelberg games, hierarchical games, and active eavesdropping. Through this book readers will be able to design effective defense strategies for complex control system to achieve resilience for closed-control cyber physical systems, network and cloud systems. This book is a vital resource for graduate students and academic researchers who are familiar with the concepts related to cyberattack and defense and who have a related research background. To maximize their benefit from this book, readers are recommended to have a strong mathematical foundation as the book takes a mathematical approach to the concepts and strategies described within.
This open access book introduces how to manage important tasks in industrial wireless networks. Important tasks must be completed on time and with guaranteed quality; that is the consensus reached by system designers and users. However, for too long, important tasks have often been given unnecessary urgency, and people intuitively believe that important tasks should be executed first so that their performance can be guaranteed. Actually, in most cases, their performance can be guaranteed even if they are executed later, and the “early” resources can be utilized for other, more urgent tasks. Therefore, confusing importance with urgency hinders the proper use of system resources. In 2007, mixed criticality was proposed to indicate that a system may contain tasks of various importance levels. Since then, system designers and users have distinguished between importance and urgency. In the industrial field, due to the harsh environment they operate in, industrial wireless networks’ quality of service (QoS) has always been a bottleneck restricting their applications. Therefore, this book introduces criticality to label important data, which is then allocated more transmission resources, ensuring that important data’s QoS requirements can be met to the extent possible. To help readers understand how to apply mixed-criticality data to industrial wireless networks, the content is divided into three parts. First, we introduce how to integrate the model of mixed-criticality data into industrial wireless networks. Second, we explain how to analyze the schedulability of mixed-criticality data under existing scheduling algorithms. Third, we present a range of novel scheduling algorithms for mixed-criticality data. If you want to improve the QoS of industrial wireless networks, this book is for you.
It is 1969 and China is in the throes of the Cultural Revolution. The Tao family is banished to the countryside, forced to leave comfortable lives in Nanjing to be reeducated in the true nature of the revolution by the peasants of Sanyu village. The parents face exile with stoicism and teach their son to embrace reeducation wholeheartedly. Is this simple pragmatism, an attempt to protect the boy and ensure his future? Or do the banished cadres really cling to their belief in their leaders and the ideals of the Revolution? These questions remain tantalizingly unanswered in this prize-winning first novel.
Moore's Law predicts that the degree of microprocessor integration of circuits would double every 18 months in DRAM. Although the scaling of microelectronic circuit elements still follows Moore's Law, the unit density of power consumption becomes unacceptable. Therefore, on one hand, people develop continuously the microelectronic technology. On the other, people consider the developing road after Moore's rule is broken. This book introduces theories and experiments of quantum transport and intends to provide foundations of semiconductor micro- and nano electronics for after the Moore age.
Crazy! The one who caught him was his fiancée, and the one who called him a beauty was his old classmate. Even the beautiful landlady who was with him everyday was a pawn planted by someone else! Humph! Playing tricks? It's my forte to play dumb and play the pig to eat the tiger. Competing on courage and insight? Fighting, saving the beauty, that is my specialty! It was a combination of handsome and strong, tyrannical and rogue. This was the most qualified prince consort in the modern city ... [Previous Chapter] [Table of Contents] [Next Chapter]
Crazy! The one who caught him was his fiancée, and the one who called him a beauty was his old classmate. Even the beautiful landlady who was with him everyday was a pawn planted by someone else! Humph! Playing tricks? It's my forte to play dumb and play the pig to eat the tiger. Competing on courage and insight? Fighting, saving the beauty, that is my specialty! It was a combination of handsome and strong, tyrannical and rogue. This was the most qualified prince consort in the modern city ... [Previous Chapter] [Table of Contents] [Next Chapter]
In order to leave the village, the village teacher, Gu Liqing, had abandoned her boyfriend of six years and had quickly married a rich second generation. However, on their wedding night, they discovered that he couldn't do it at all, and what was even worse, a month later, she discovered that she was pregnant ...
Ji Xinqing had been a virgin for six years because her husband said she was impotent. A mysterious text message late at night allowed her to capture the adultery between her husband and Little San. For the sake of her child, she chose to swallow her anger. However, she had endured it in silence. What she had received in return was even more heartless humiliation from her husband! She handed over a piece of divorce paper, then turned and threw herself into the arms of another man. Deep in the man's love for her, she suddenly realized that all of this had long been carefully planned out.
It is 1969 and China is in the throes of the Cultural Revolution. The Tao family is banished to the countryside, forced to leave comfortable lives in Nanjing to be reeducated in the true nature of the revolution by the peasants of Sanyu village. The parents face exile with stoicism and teach their son to embrace reeducation wholeheartedly. Is this simple pragmatism, an attempt to protect the boy and ensure his future? Or do the banished cadres really cling to their belief in their leaders and the ideals of the Revolution? These questions remain tantalizingly unanswered in this prize-winning first novel.
Chi Gong: The Ancient Chinese Way to Health bridges the divide between Chinese and Western science, systems of health care, and spiritual practice. With proven, step-by-step exercises, chi gong instructor Paul Dong and psychiatrist Aristide Esser show how to perform basic and advanced chi gong exercises; increase vitality by maintaining the balance of bodily energies; prevent and cure ulcers, hypertension, heart disease, and other ailments; and achieve a relaxed and therapeutic meditative state, promoting health and longevity. The authors encourage practitioners to augment and strengthen their martial and spiritual disciplines, but also to develop external energy for the benefit of others. More than an instruction manual, Chi Gong functions as a complete survey of this healing art. Dong and Esser discuss chi gong’s history, famous practitioners, applications for health and the martial arts, and the role of chi in exceptional human functioning and mind-body interactions. Combining information from Western scientific investigations as well as personal insights from Paul Dong’s practice, the authors provide a thorough explanation of the concept of chi and its role in traditional Chinese medicine, discuss the groundbreaking use of chi gong in cancer treatments, and take the reader on a visit to one of China’s many chi gong clinics.
This book is a study of knowledge production about China and the Chinese civilization and as such it is a critique of the ways in which knowledge about the Chinese civilization is produced. It is not primarily intended as one that sets out to expose biases and prejudices against China, correct errors and misrepresentations of Chinese civilization, and dispute misperceptions and misinterpretations of Chinese materials, although all these issues do occur in the book. The overall objective is to get behind and beneath all these problems in order to uncover the motivations, mental frameworks, attitudes, and reasons for the abovementioned phenomena, which the author terms "Sinologism".
Environmental Monitoring" is a book designed by InTech - Open Access Publisher in collaboration with scientists and researchers from all over the world. The book is designed to present recent research advances and developments in the field of environmental monitoring to a global audience of scientists, researchers, environmental educators, administrators, managers, technicians, students, environmental enthusiasts and the general public. The book consists of a series of sections and chapters addressing topics like the monitoring of heavy metal contaminants in varied environments, biolgical monitoring/ecotoxicological studies; and the use of wireless sensor networks/Geosensor webs in environmental monitoring.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.