Integrating brain science, cognitive psychology, education and information technology, the books studies how technology has promoted deeper learning on mathematics in Chinese primary schools. After introducing the theoretical basis, connotation and mechanism of deeper learning, the author fully explains its practice, including the composition of deeper learning teaching content, the development of digital resources, classroom teaching technology and teachers' professional development of deeper learning. He especially adopts multiple and interdisciplinary research methods, such as deeper learning "triangle evidence" paradigm, learning brain observation, education big data analysis, artificial intelligence education analysis, education action, and qualitative and quantitative research. On one hand, the book will give researchers of learning theory and pedagogy an in-depth understanding of what deeper learning is and why it provides a systematic theoretical system; on the other hand, it will also provide school practitioners with operational methods and cases to learn from.
Includes chapters that cover the history of the discovery of iron-sulfur clusters in the 1960s to discoveries of their role in the enzyme, aconitase (1980s), and numerous other proteins.
A Korean scholar-official taken prisoner in 1597 by an invading Japanese army ruminates on human behavior and the nature of loyalty during a time of war.
Examining the production of 'people's literature' in China, this study provides a new interpretive framework with which to understand socialist literature and presents a sympathetic understanding of culture from a period in China's history in which people's lives were greatly and obviously affected by political events.
Examining the production of 'people's literature' in China, this study provides a new interpretive framework with which to understand socialist literature and presents a sympathetic understanding of culture from a period in China's history in which people's lives were greatly and obviously affected by political events.
The editorials collected in this book date from 1975 to 1984 when the signing of the Joint Declaration between Britain and China, and Hong Kong lead to intense debates about this incongruous scenario. Dr. Lam's editorials and conjectures provided a focal point for discussing Hong Kong's future. His views on housing, assimilating immigrants, the collusion of politics and business still inform.
This book details cutting-edge research into human-like driving technology, utilising game theory to better suit a human and machine hybrid driving environment. Covering feature identification and modelling of human driving behaviours, the book explains how to design an algorithm for decision making and control of autonomous vehicles in complex scenarios. Beginning with a review of current research in the field, the book uses this as a springboard from which to present a new theory of human-like driving framework for autonomous vehicles. Chapters cover system models of decision making and control, driving safety, riding comfort and travel efficiency. Throughout the book, game theory is applied to human-like decision making, enabling the autonomous vehicle and the human driver interaction to be modelled using noncooperative game theory approach. It also uses game theory to model collaborative decision making between connected autonomous vehicles. This framework enables human-like decision making and control of autonomous vehicles, which leads to safer and more efficient driving in complicated traffic scenarios. The book will be of interest to students and professionals alike, in the field of automotive engineering, computer engineering and control engineering.
This book offers a comprehensive survey of the major parts of speech in Mandarin. Seeking to identify the sets of universal and language-specific categories, it compares the range of categories available in Mandarin and the Indo-European languages and establishes six universal categories – nouns, verbs, adjectives, adverbs, prepositions and conjunctions – and three language-specific ones, namely classifiers, localizers and sentence-final particles. Incorporating insights from recent research findings and the diachronic development of the language, the book sheds new light on the factors that contribute to the long-standing debate on the categorical status of adjectives, prepositions and localizers in the extant literature. Bringing together the earlier general descriptions and the latest advances, it is broadly accessible to non-native and native speakers of the language and offers an ideal reference source for all students and scholars who are interested in studying the parts of speech in Mandarin.
Due to many factors including power control, scheduling, flow routing, and so on, the resource management via optimization is the key to ensure overall end-to-end performance of wireless systems. Data transmission and the service, is one of the most important topics for the future wireless and communication networks. In the past decade, people have witnessed a significant progress in the advance of resource management over wireless systems. It is not only an important research topic, but also emerging as an integral material for graduate-level networking courses for students in Computing Science major. Nevertheless, there are few books available to date that can serve such a purpose. It is because of the cross-disciplines that resource management requires, which cover a broad range of topics, making it especially challenging to develop a specific book to cover them all. For instance, cross-layer resource management has to be specific with different design variables and constraints, hence different networking scenarios have different end-to-end utility goals and service objectives, and different problem formulations to employ different optimization methods. To respond to the need of such a book for graduate/undergraduate students, researchers and engineers, this book try to tackle the difficulties by bringing together the resource management and optimization design in wireless system. This intent is to either serve as a textbook for advanced graduate-level courses on wireless and communication networks, or as a reference book by students and engineers.
An extensive update of the classic reference on organic reactions in water Published almost a decade ago, the first edition has served as the guide for research in this burgeoning field. Due to the cost, safety, efficiency, and environmental friendliness of water as a solvent, there are many new applications in industry and academic laboratories. More than forty percent of this extensively updated second edition covers new reactions. For ease of reference, it is organized by functional groups. A core reference, Comprehensive Organic Reactions in Aqueous Media, Second Edition: * Provides the most comprehensive coverage of aqueous organicreactions available * Covers the basic principles and theory and progresses to applications * Includes alkanes, alkenes, aromatics, electrophilic substitutions, carbonyls, alpha, beta-unsaturated carbonyls, carbon-nitrogen bonds, organic halides, pericyclic reactions, photochemical reactions, click chemistry, and multi-step syntheses? * Provides examples of applications in industry This is the premier reference for chemists and chemical engineers in industry or research, as well as for students in advanced-level courses.
The consecutive-k system was first studied around 1980, and it soon became a very popular subject. The reasons were many-folded, includ ing: 1. The system is simple and natural. So most people can understand it and many can do some analysis. Yet it can grow in many directions and there is no lack of new topics. 2. The system is simple enough to become a prototype for demonstrat ing various ideas related to reliability. For example, the interesting concept of component importance works best with the consecutive-k system. 3. The system is supported by many applications. Twenty years have gone and hundreds of papers have been published on the subject. This seems to be a good time for retrospect and to sort the scattered material into a book. Besides providing our own per spective, the book will also serve as an easy reference to the numerous ramifications of the subject. It is hoped that a summary of work in the current period will become the seed of future break-through.
This book provides a comprehensive overview on emergent bursty patterns in the dynamics of human behaviour. It presents common and alternative understanding of the investigated phenomena, and points out open questions worthy of further investigations. The book is structured as follows. In the introduction the authors discuss the motivation of the field, describe bursty phenomena in case of human behaviour, and relate it to other disciplines. The second chapter addresses the measures commonly used to characterise heterogeneous signals, bursty human dynamics, temporal paths, and correlated behaviour. These definitions are first introduced to set the basis for the discussion of the third chapter about the observations of bursty human patterns in the dynamics of individuals, dyadic interactions, and collective behaviour. The subsequent fourth chapter discusses the models of bursty human dynamics. Various mechanisms have been proposed about the source of the heterogeneities in human dynamics, which leads to the introduction of conceptually different modelling approaches. The authors address all of these perspectives objectively, highlight their strengths and shortcomings, and mention possible extensions to them. The fifth chapter addresses the effect of individual heterogeneous behaviour on collective dynamics. This question in particular has been investigated in various systems including spreading phenomena, random walks, and opinion formation dynamics. Here the main issues are whether burstiness speeds up or slows down the co-evolving processes, and how burstiness modifies time-dependent paths in the system that determine the spreading patterns of any kind of information or influence. Finally in the sixth chapter the authors end the review with a discussion and future perspectives. It is an ideal book for researchers and students who wish to enter the field of bursty human dynamics or want to expand their knowledge on such phenomena.
This textbook presents a comprehensive treatment of touch technologies, explaining current mainstream and new contact/non-contact based human-machine interactivity (HMI) techniques, which are ubiquitous in modern electronic devices and allow machines to exchange information with users in an efficient and reliable manner. The book provides a detailed study of HMI working principles and practical product examples. Haptic, which has become essential for users to gain immersive experience, is also discussed. The book concludes with an overview of novel applications enabled by emerging technologies, such as advanced materials, virtual reality and machine learning, providing a roadmap for possible development trends for touch interactivities. The book can be used as a graduate text for students in display and touch interface technology courses in electrical and computer engineering, and a professional reference for researchers, practicing engineers, and product designers working in broad areas of engineering. Helps students understand the working principles of current touch technologies; Offers design considerations for prototypes and products; Provides seamless connectivity between broad subject areas involved in HMI, including material science, microelectronic circuits, mechanical engineering, and digital signal processing.
Learning to rank refers to machine learning techniques for training the model in a ranking task. Learning to rank is useful for many applications in information retrieval, natural language processing, and data mining. Intensive studies have been conducted on the problem recently and significant progress has been made. This lecture gives an introduction to the area including the fundamental problems, existing approaches, theories, applications, and future work. The author begins by showing that various ranking problems in information retrieval and natural language processing can be formalized as two basic ranking tasks, namely ranking creation (or simply ranking) and ranking aggregation. In ranking creation, given a request, one wants to generate a ranking list of offerings based on the features derived from the request and the offerings. In ranking aggregation, given a request, as well as a number of ranking lists of offerings, one wants to generate a new ranking list of the offerings. Ranking creation (or ranking) is the major problem in learning to rank. It is usually formalized as a supervised learning task. The author gives detailed explanations on learning for ranking creation and ranking aggregation, including training and testing, evaluation, feature creation, and major approaches. Many methods have been proposed for ranking creation. The methods can be categorized as the pointwise, pairwise, and listwise approaches according to the loss functions they employ. They can also be categorized according to the techniques they employ, such as the SVM based, Boosting SVM, Neural Network based approaches. The author also introduces some popular learning to rank methods in details. These include PRank, OC SVM, Ranking SVM, IR SVM, GBRank, RankNet, LambdaRank, ListNet & ListMLE, AdaRank, SVM MAP, SoftRank, Borda Count, Markov Chain, and CRanking. The author explains several example applications of learning to rank including web search, collaborative filtering, definition search, keyphrase extraction, query dependent summarization, and re-ranking in machine translation. A formulation of learning for ranking creation is given in the statistical learning framework. Ongoing and future research directions for learning to rank are also discussed. Table of Contents: Introduction / Learning for Ranking Creation / Learning for Ranking Aggregation / Methods of Learning to Rank / Applications of Learning to Rank / Theory of Learning to Rank / Ongoing and Future Work
Nightfall turned around and cast the Three Steps Charms: Black and White Impermanence, The Door of the Underworld's Hundred Ghost Worry. At first, I didn't know why my mother had named me that, but it wasn't until I was besieged by the beauty of the world and struck by a hundred disasters that I finally found out the source of all the secrets of the Zhong Family — the Jade Blood Pill Heart.
Postwar Journeys: American and Vietnamese Transnational Peace Efforts since 1975 tells the story of the dynamic roles played by ordinary American and Vietnamese citizens in their postwar quest for peace—an effort to transform their lives and their societies. Hang Thi Thu Le-Tormala deepens our understanding of the Vietnam War and its aftermath by taking a closer look at postwar Vietnam and offering a fresh analysis of the effects of the war and what postwar reconstruction meant for ordinary citizens. This thoughtful exploration of US-Vietnam postwar relations through the work of US and Vietnamese civilians expands diplomatic history beyond its rigid conventional emphasis on national interests and political calculations as well as highlights the possibilities of transforming traumatic experiences or hostile attitudes into positive social change. Le-Tormala’s research reveals a wealth of boundary-crossing interactions between US and Vietnamese citizens, even during the times of extremely restricted diplomatic relations between the two nation-states. She brings to center stage citizens’ efforts to solve postwar individual and social problems and bridges a gap in the scholarship on the US-Vietnam relations. Peace efforts are defined in their broadest sense, ranging from searching for missing family members or friends, helping people overcome the ordeals resulting from the war, and meeting or working with former opponents for the betterment of their societies. Le-Tormala’s research reveals how ordinary US and Vietnamese citizens were active historical actors who vigorously developed cultural ties and promoted mutual understanding in imaginative ways, even and especially during periods of governmental hostility. Through nonprofit organizations as well as cultural and academic exchange programs, trailblazers from diverse backgrounds promoted mutual understanding and acted as catalytic forces between the two governments. Postwar Journeys presents the powerful stories of love and compassion among former adversaries; their shared experiences of a brutal war and desire for peace connected strangers, even opponents, of two different worlds, laying the groundwork for US-Vietnam diplomatic normalization.
This book provides a systematic overview of watermarking and steganography methods for triangle meshes related to computer graphics and security. The significance of this research has been well recognized by the growing body of work on watermarking, steganography and steganalysis of 3D meshes. With the evolution of the CAD industry and real-world end-user applications such as virtual reality (VR) and 3D printing, 3D meshes have attracted world-wide attention. Besides, the flexible data structure of 3D geometry provides enough space to embed secret information, making it ideal for applications such as copyright protection and covert communication. Our goal of the book is to allow readers to systematically understand 3D mesh information hiding technology and its applications as a whole. The book outlines comprehensive techniques, including handcrafted and deep learning-based techniques, digital and physical techniques in the literature and provides standard evaluation metrics for triangle meshes. The up-to-date geometrical deep learning and 3D printing-related algorithms are also covered. Offering a rich blend of ideas and algorithms, the book is up-to-date and self-contained. It is an excellent reference resource for users who are seeking 3D mesh watermarking and steganography algorithms, as well as for graduate students and researchers wanting to grasp the frontiers of triangular mesh processing on data hiding.
Focusing on the hybrid maritime world of Hong Kong, Pearl River Delta and West River in the last two decades of the late Qing period, this work tells a vivid trading and competition story of previously unknown private Chinese traders and junk masters. This challenges the prevailing view of the domination of China’s maritime trade by modern foreign steamships. Making use of unpublished Kowloon Maritime Customs and British diplomatic records in the late 19th and early 20th century, Henry Sze Hang Choi convincingly shows how these private Chinese traders flexibly adopted to the foreign-dominated maritime customs agencies and treaty port system in defending their Chinese homeland stronghold against the invasion of foreign economic power.
This book uses Pierre Bourdieu’s cultural capital model as a theoretical framework for exploring how students in Beijing and Hong Kong perceive parental influences—their parents’ cultural capital and support—on their participation in musical activities. By studying students’ perceptions of their parents’ cultural capital and support for their musical activities, this book revisits the applicability of Bourdieu’s cultural capital model in the contemporary Chinese context and reveals how inequality in terms of parental cultural capital governs parents’ support and influences the intergenerational transmission of cultural capital, which in turn contributes to inequality in terms of students’ cultural capital.
This book presents the up-to-date research developments and novel methodologies on multi-sensor filtering fusion (MSFF) for a class of complex systems subject to censored data under a constrained network environment. The contents of this book are divided into two parts covering centralized and distributed MSFF design methodologies. The work provides a framework of optimal centralized/distributed filter design and stability and performance analysis for the considered systems along with designed filters. Simulations presented in this book are implemented using MATLAB. Features: Includes concepts, backgrounds and models on censored data, filtering fusion and communication constraints. Reviews case studies to provide clear engineering insights into the developed fusion theories and techniques. Provides theoretic values and engineering insights of the censored data and constrained network. Discusses performance evaluation of the presented multi-sensor fusion algorithms. Explores promising research directions on future multi-sensor fusion. This book is aimed at graduate students and researchers in networked control, sensor networks, and data fusion.
This book provides comprehensive coverage on the concepts, frameworks, and underpinning technologies in most aspects of the Internet of Things (IoT), and presents them as the foundation on which more advanced topics, such as 5G and mMTC/M2M, Edge/cloud computing and the modalities of Tactile IoT, Industrial IoT (IIoT)/Industry 4.0, Satellite IoT, and Digital Twins (DT), could be built upon.A key feature of the book is the chapter that focuses on security and privacy for individuals and IoT/ Industry 4.0 are discussed.This book is a good reference guide for researchers, developers, integrators and stakeholders working on research in or development of IoT, particularly where open-source software are deployed.
This book shows the various porous structures and supramolecular architectures that result from the cucurbituril-based coordination, hydrogen bonding, ion-dipole interactions, π∙∙∙π stacking and C–H∙∙∙π processes. It includes two chapters presenting essential examples of these cucurbituril-based structures, depending on the types of non covalent interactions and inducer species. It also includes one chapter dealing with the utilization of cucurbiturils as a molecular container in supramolecular chemistry and demonstrating a wide range of potential applications of supramolecular assemblies with cucurbiturils in catalysis, separation, absorption and polymer materials. The book offers an interesting and valuable guide for readers working in the areas of supramolecular chemistry and materials.
More than 1,100 TEM images illustrate the science of ULSI The natural outgrowth of VLSI (Very Large Scale Integration), Ultra Large Scale Integration (ULSI) refers to semiconductor chips with more than 10 million devices per chip. Written by three renowned pioneers in their field, ULSI Semiconductor Technology Atlas uses examples and TEM (Transmission Electron Microscopy) micrographs to explain and illustrate ULSI process technologies and their associated problems. The first book available on the subject to be illustrated using TEM images, ULSI Semiconductor Technology Atlas is logically divided into four parts: * Part I includes basic introductions to the ULSI process, device construction analysis, and TEM sample preparation * Part II focuses on key ULSI modules--ion implantation and defects, dielectrics and isolation structures, silicides/salicides, and metallization * Part III examines integrated devices, including complete planar DRAM, stacked cell DRAM, and trench cell DRAM, as well as SRAM as examples for process integration and development * Part IV emphasizes special applications, including TEM in advanced failure analysis, TEM in advanced packaging development and UBM (Under Bump Metallization) studies, and high-resolution TEM in microelectronics This innovative guide also provides engineers and managers in the microelectronics industry, as well as graduate students, with: * More than 1,100 TEM images to illustrate the science of ULSI * A historical introduction to the technology as well as coverage of the evolution of basic ULSI process problems and issues * Discussion of TEM in other advanced microelectronics devices and materials, such as flash memories, SOI, SiGe devices, MEMS, and CD-ROMs
Recent years have seen a rapid development of neural network control tech niques and their successful applications. Numerous simulation studies and actual industrial implementations show that artificial neural network is a good candidate for function approximation and control system design in solving the control problems of complex nonlinear systems in the presence of different kinds of uncertainties. Many control approaches/methods, reporting inventions and control applications within the fields of adaptive control, neural control and fuzzy systems, have been published in various books, journals and conference proceedings. In spite of these remarkable advances in neural control field, due to the complexity of nonlinear systems, the present research on adaptive neural control is still focused on the development of fundamental methodologies. From a theoretical viewpoint, there is, in general, lack of a firmly mathematical basis in stability, robustness, and performance analysis of neural network adaptive control systems. This book is motivated by the need for systematic design approaches for stable adaptive control using approximation-based techniques. The main objec tives of the book are to develop stable adaptive neural control strategies, and to perform transient performance analysis of the resulted neural control systems analytically. Other linear-in-the-parameter function approximators can replace the linear-in-the-parameter neural networks in the controllers presented in the book without any difficulty, which include polynomials, splines, fuzzy systems, wavelet networks, among others. Stability is one of the most important issues being concerned if an adaptive neural network controller is to be used in practical applications.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.