Drawing on the sun, moon, dragon, phoenix, Nuwa, Yandi, Huangdi and other widely circulated cultural elements as examples, this book addresses the development and evolution of the most representative Chinese creation myths regarding nature, totems, ancestors and saints. The book not only interprets key creation myths, but also elaborates on the connection between the myths and some of the core values and concepts in Chinese civilization. For example, the long and jade culture is rooted in the Yellow Emperor’s revered jade weapon. Further, the book reveals the kernels of truth in the myths by presenting new research findings and research methods.
The earliest book-length treatise in Chinese literary criticism, the Wenxin diaolong is of central importance in the Chinese tradition. The work was compiled in the sixth century, one of the most fertile and original periods in Chinese critical thinking. Its author, Liu Xie, was a Buddhist monk as well as a Confucian scholar, and so represented the main persuasions of China. The Wenxin diaolong first came to be noted in the seventeenth century, when it was studied by scholars and edited by Mei Qingsheng. When the study of literary criticism became an independent discipline early in the twentieth century, it developed into a cynosure that was widely discussed and provided with learned annotations. This volume presents a fresh translation of the Wenxin diaolong that is at once authoritative and elegant. It may well be regarded as a standard reference by students of sinology and comparative literature.
Thereare richtheories and designs for generalcontrolsystems,but usually, they will not lead to PID controllers. Noting that the PID controller has been the most popular one in industry for over ?fty years, we will con?ne our discussion hereto PIDcontrolonly. PID controlhasbeenanimportantresearchtopicsince 1950’s, and causes remarkable activities for the last two decades. Most of the existing works have been on the single variable PID control and its theory and design are well established, understood and practically applied. However, most industrial processes are of multivariable nature. It is not rare that the overall multivariable PID control system could fail although each PID loop may work well. Thus,demandforaddressingmultivariableinteractionsishighforsuccessful applicationofPIDcontrolinmultivariableprocessesanditisevidentfrommajor leading control companies who all rankedthe couplings of multivariable systems as the principal common problem in industry. There have been studies on PID control for multivariable processes and they provide some useful design tools for certaincases. But itis notedthat the existing worksaremainlyfor decentralized form of PID control and based on ad hoc methodologies. Obvious, multivariable PID control is much less understood and developed in comparison with the single variable case and actual need for industrial applications. Better theory and design have to be established for multivariable PID control to reach the same maturity and popularity as the single variable case. The present monograph puts together, in a single volume, a fairly comp- hensive, up-to-date and detailed treatment of PID control for multivariable p- cesses, from paring, gain and phase margins, to various design methods and applications.
An extensive update of the classic reference on organic reactions in water Published almost a decade ago, the first edition has served as the guide for research in this burgeoning field. Due to the cost, safety, efficiency, and environmental friendliness of water as a solvent, there are many new applications in industry and academic laboratories. More than forty percent of this extensively updated second edition covers new reactions. For ease of reference, it is organized by functional groups. A core reference, Comprehensive Organic Reactions in Aqueous Media, Second Edition: * Provides the most comprehensive coverage of aqueous organicreactions available * Covers the basic principles and theory and progresses to applications * Includes alkanes, alkenes, aromatics, electrophilic substitutions, carbonyls, alpha, beta-unsaturated carbonyls, carbon-nitrogen bonds, organic halides, pericyclic reactions, photochemical reactions, click chemistry, and multi-step syntheses? * Provides examples of applications in industry This is the premier reference for chemists and chemical engineers in industry or research, as well as for students in advanced-level courses.
The Zheng family of merchants and militarists emerged from the tumultuous seventeenth century amid a severe economic depression, a harrowing dynastic transition from the ethnic Chinese Ming to the Manchu Qing, and the first wave of European expansion into East Asia. Under four generations of leaders over six decades, the Zheng had come to dominate trade across the China Seas. Their average annual earnings matched, and at times exceeded, those of their fiercest rivals: the Dutch East India Company. Although nominally loyal to the Ming in its doomed struggle against the Manchus, the Zheng eventually forged an autonomous territorial state based on Taiwan with the potential to encompass the family's entire economic sphere of influence. Through the story of the Zheng, Xing Hang provides a fresh perspective on the economic divergence of early modern China from western Europe, its twenty-first-century resurgence, and the meaning of a Chinese identity outside China.
The editorials collected in this book date from 1975 to 1984 when the signing of the Joint Declaration between Britain and China, and Hong Kong lead to intense debates about this incongruous scenario. Dr. Lam's editorials and conjectures provided a focal point for discussing Hong Kong's future. His views on housing, assimilating immigrants, the collusion of politics and business still inform.
Focusing on the hybrid maritime world of Hong Kong, Pearl River Delta and West River in the last two decades of the late Qing period, this work tells a vivid trading and competition story of previously unknown private Chinese traders and junk masters. This challenges the prevailing view of the domination of China’s maritime trade by modern foreign steamships. Making use of unpublished Kowloon Maritime Customs and British diplomatic records in the late 19th and early 20th century, Henry Sze Hang Choi convincingly shows how these private Chinese traders flexibly adopted to the foreign-dominated maritime customs agencies and treaty port system in defending their Chinese homeland stronghold against the invasion of foreign economic power.
This book uses Pierre Bourdieu’s cultural capital model as a theoretical framework for exploring how students in Beijing and Hong Kong perceive parental influences—their parents’ cultural capital and support—on their participation in musical activities. By studying students’ perceptions of their parents’ cultural capital and support for their musical activities, this book revisits the applicability of Bourdieu’s cultural capital model in the contemporary Chinese context and reveals how inequality in terms of parental cultural capital governs parents’ support and influences the intergenerational transmission of cultural capital, which in turn contributes to inequality in terms of students’ cultural capital.
Nightfall turned around and cast the Three Steps Charms: Black and White Impermanence, The Door of the Underworld's Hundred Ghost Worry. At first, I didn't know why my mother had named me that, but it wasn't until I was besieged by the beauty of the world and struck by a hundred disasters that I finally found out the source of all the secrets of the Zhong Family — the Jade Blood Pill Heart.
This book details cutting-edge research into human-like driving technology, utilising game theory to better suit a human and machine hybrid driving environment. Covering feature identification and modelling of human driving behaviours, the book explains how to design an algorithm for decision making and control of autonomous vehicles in complex scenarios. Beginning with a review of current research in the field, the book uses this as a springboard from which to present a new theory of human-like driving framework for autonomous vehicles. Chapters cover system models of decision making and control, driving safety, riding comfort and travel efficiency. Throughout the book, game theory is applied to human-like decision making, enabling the autonomous vehicle and the human driver interaction to be modelled using noncooperative game theory approach. It also uses game theory to model collaborative decision making between connected autonomous vehicles. This framework enables human-like decision making and control of autonomous vehicles, which leads to safer and more efficient driving in complicated traffic scenarios. The book will be of interest to students and professionals alike, in the field of automotive engineering, computer engineering and control engineering.
This book presents the up-to-date research developments and novel methodologies on multi-sensor filtering fusion (MSFF) for a class of complex systems subject to censored data under a constrained network environment. The contents of this book are divided into two parts covering centralized and distributed MSFF design methodologies. The work provides a framework of optimal centralized/distributed filter design and stability and performance analysis for the considered systems along with designed filters. Simulations presented in this book are implemented using MATLAB. Features: Includes concepts, backgrounds and models on censored data, filtering fusion and communication constraints. Reviews case studies to provide clear engineering insights into the developed fusion theories and techniques. Provides theoretic values and engineering insights of the censored data and constrained network. Discusses performance evaluation of the presented multi-sensor fusion algorithms. Explores promising research directions on future multi-sensor fusion. This book is aimed at graduate students and researchers in networked control, sensor networks, and data fusion.
Hong Kong is one of the very few places in the world where the common law can be practiced in a language other than English. Introduced into the courtroom over a decade ago, Cantonese has significantly altered the everyday working of the common law in China's most Westernized city. In The Common Law in Two Voices, Ng explores how English and Cantonese respectively reinforce and undermine the practice of legal formalism. This first-ever ethnographic study of Hong Kong's unique legal system in the midst of social and political transition, this book provides important insights into the social nature of language and the work of institutions. Ng contends that the dilemma of legal bilingualism in Hong Kong is emblematic of the inherent tensions of postcolonial Hong Kong. Through the legal dramas presented in the book, readers will get a fresh look at the former British colony that is now searching for its identity within a powerful China.
This book provides a comprehensive introduction to the fundamentals of Chinese linguistics, including the core components of phonetics and phonology, morphology, syntax, writing system, and social cultural aspects of the language. It also discusses key features of Chinese language acquisition in each of these areas, highlighting common difficulties and obstacles adult learners encounter as revealed in language acquisition research. The integration of basic linguistic knowledge with language acquisition findings provides valuable resources for both current and aspiring Chinese language teachers, and serious learners of Chinese as a second language. Exercise questions included in each chapter serve to reinforce the concepts of Chinese linguistics. The book is designed to not only enhance Chinese learners’ linguistic awareness but also provide language teachers with pedagogical preparation and assistance. While this book can be used as a textbook for an introductory Chinese linguistics course, it is also beneficial to the broader range of readers who are interested in Chinese linguistics.
This book provides a systematic overview of watermarking and steganography methods for triangle meshes related to computer graphics and security. The significance of this research has been well recognized by the growing body of work on watermarking, steganography and steganalysis of 3D meshes. With the evolution of the CAD industry and real-world end-user applications such as virtual reality (VR) and 3D printing, 3D meshes have attracted world-wide attention. Besides, the flexible data structure of 3D geometry provides enough space to embed secret information, making it ideal for applications such as copyright protection and covert communication. Our goal of the book is to allow readers to systematically understand 3D mesh information hiding technology and its applications as a whole. The book outlines comprehensive techniques, including handcrafted and deep learning-based techniques, digital and physical techniques in the literature and provides standard evaluation metrics for triangle meshes. The up-to-date geometrical deep learning and 3D printing-related algorithms are also covered. Offering a rich blend of ideas and algorithms, the book is up-to-date and self-contained. It is an excellent reference resource for users who are seeking 3D mesh watermarking and steganography algorithms, as well as for graduate students and researchers wanting to grasp the frontiers of triangular mesh processing on data hiding.
This book presents an overview of the development of China-Europe express train in the broader context of BRI. It analyzes the benefits to the regions along the route from the safe, smooth and stable operation of the train in recent years, involving the strong impetus for building a new pattern of dual cycle development and driving the recovery of the economy in the post-pandemic era. Based on in-depth case studies of the operations in many regions, this book proposes measures in order to promote the high-quality development of China-Europe train: to improve infrastructure and enhance port capacity; to unify international standards and improve the efficiency of train customs clearance; to open up the European market and actively organize the return source of goods; to standardize government administrative intervention according to market orientation; to strengthen the construction of digital infrastructure with the focus on connectivity; to cultivate international logistics talents and build a high-quality China-Europe express train talent team.
Recent years have seen a rapid development of neural network control tech niques and their successful applications. Numerous simulation studies and actual industrial implementations show that artificial neural network is a good candidate for function approximation and control system design in solving the control problems of complex nonlinear systems in the presence of different kinds of uncertainties. Many control approaches/methods, reporting inventions and control applications within the fields of adaptive control, neural control and fuzzy systems, have been published in various books, journals and conference proceedings. In spite of these remarkable advances in neural control field, due to the complexity of nonlinear systems, the present research on adaptive neural control is still focused on the development of fundamental methodologies. From a theoretical viewpoint, there is, in general, lack of a firmly mathematical basis in stability, robustness, and performance analysis of neural network adaptive control systems. This book is motivated by the need for systematic design approaches for stable adaptive control using approximation-based techniques. The main objec tives of the book are to develop stable adaptive neural control strategies, and to perform transient performance analysis of the resulted neural control systems analytically. Other linear-in-the-parameter function approximators can replace the linear-in-the-parameter neural networks in the controllers presented in the book without any difficulty, which include polynomials, splines, fuzzy systems, wavelet networks, among others. Stability is one of the most important issues being concerned if an adaptive neural network controller is to be used in practical applications.
This book raises the question of why Korean people, and Korean Protestant Christians in particular, pay so little attention (in theory or practice) to ecological issues. The author argues that there is an important connection (or elective affinity) between this lack of attention and the otherworldly eschatology that is so dominant within Korean Protestant Christianity. Dispensational premillennialism, originally imported by American missionaries, resonated with traditional religious beliefs in Korea and soon came to dominate much of Korean Protestantism. This book argues that this, of all forms of millennialism, is the most damaging to ecological concerns. It also suggests how Korean churches may effectively respond to the ecological challenge.
Examining the production of 'people's literature' in China, this study provides a new interpretive framework with which to understand socialist literature and presents a sympathetic understanding of culture from a period in China's history in which people's lives were greatly and obviously affected by political events.
Integrating brain science, cognitive psychology, education and information technology, the books studies how technology has promoted deeper learning on mathematics in Chinese primary schools. After introducing the theoretical basis, connotation and mechanism of deeper learning, the author fully explains its practice, including the composition of deeper learning teaching content, the development of digital resources, classroom teaching technology and teachers' professional development of deeper learning. He especially adopts multiple and interdisciplinary research methods, such as deeper learning "triangle evidence" paradigm, learning brain observation, education big data analysis, artificial intelligence education analysis, education action, and qualitative and quantitative research. On one hand, the book will give researchers of learning theory and pedagogy an in-depth understanding of what deeper learning is and why it provides a systematic theoretical system; on the other hand, it will also provide school practitioners with operational methods and cases to learn from.
Learning to rank refers to machine learning techniques for training a model in a ranking task. Learning to rank is useful for many applications in information retrieval, natural language processing, and data mining. Intensive studies have been conducted on its problems recently, and significant progress has been made. This lecture gives an introduction to the area including the fundamental problems, major approaches, theories, applications, and future work. The author begins by showing that various ranking problems in information retrieval and natural language processing can be formalized as two basic ranking tasks, namely ranking creation (or simply ranking) and ranking aggregation. In ranking creation, given a request, one wants to generate a ranking list of offerings based on the features derived from the request and the offerings. In ranking aggregation, given a request, as well as a number of ranking lists of offerings, one wants to generate a new ranking list of the offerings. Ranking creation (or ranking) is the major problem in learning to rank. It is usually formalized as a supervised learning task. The author gives detailed explanations on learning for ranking creation and ranking aggregation, including training and testing, evaluation, feature creation, and major approaches. Many methods have been proposed for ranking creation. The methods can be categorized as the pointwise, pairwise, and listwise approaches according to the loss functions they employ. They can also be categorized according to the techniques they employ, such as the SVM based, Boosting based, and Neural Network based approaches. The author also introduces some popular learning to rank methods in details. These include: PRank, OC SVM, McRank, Ranking SVM, IR SVM, GBRank, RankNet, ListNet & ListMLE, AdaRank, SVM MAP, SoftRank, LambdaRank, LambdaMART, Borda Count, Markov Chain, and CRanking. The author explains several example applications of learning to rank including web search, collaborative filtering, definition search, keyphrase extraction, query dependent summarization, and re-ranking in machine translation. A formulation of learning for ranking creation is given in the statistical learning framework. Ongoing and future research directions for learning to rank are also discussed. Table of Contents: Learning to Rank / Learning for Ranking Creation / Learning for Ranking Aggregation / Methods of Learning to Rank / Applications of Learning to Rank / Theory of Learning to Rank / Ongoing and Future Work
Recently, a great deal of effort has been dedicated to capitalising on advances in mathematical control theory in conjunction with tried-and-tested classical control structures particularly with regard to the enhanced robustness and tighter control of modern PID controllers. Much of the research in this field and that of the operational autonomy of PID controllers has already been translated into useful new functions for industrial controllers. This book covers the important knowledge relating to the background, application, and design of, and advances in PID controllers in a unified and comprehensive treatment including: Evolution and components of PID controllers Classical and Modern PID controller design Automatic Tuning Multi-loop Control Practical issues concerned with PID control The book is intended to be useful to a wide spectrum of readers interested in PID control ranging from practising technicians and engineers to graduate and undergraduate students.
This book investigates the analytical framework and hybrid precoding scheme in millimeter-wave networks. Millimeter-wave communication is a frontier technology for supporting ultra-high data rate transmissions in future wireless networks due to larger bandwidth and higher spectral efficiency. However, the involved interference characterization and increased energy consumption are two dominant limitations in millimeter-wave network evolution. In this monograph, we develop a unified analytical framework for large-scale millimeter-wave communication networks, which leads to abundant network design insights and guidelines. Under this framework, we design low-complexity hybrid precoding algorithms for millimeter-wave systems, which greatly reduce energy consumption without obvious performance degradation. We would like to highlight that we develop a unified analytical framework and low-complexity hybrid precoding mechanisms for millimeter-wave communication networks, where a variety of millimeter-wave properties and hardware constraints are incorporated. The developed mechanisms can provide abundant insights and guidelines for the hybrid precoding design and analysis in millimeter-wave communication networks. Graduate students, researchers, and engineers in the field of communication networks can benefit from the book.
This book provides a comprehensive and systematic introduction to the principal machine learning methods, covering both supervised and unsupervised learning methods. It discusses essential methods of classification and regression in supervised learning, such as decision trees, perceptrons, support vector machines, maximum entropy models, logistic regression models and multiclass classification, as well as methods applied in supervised learning, like the hidden Markov model and conditional random fields. In the context of unsupervised learning, it examines clustering and other problems as well as methods such as singular value decomposition, principal component analysis and latent semantic analysis. As a fundamental book on machine learning, it addresses the needs of researchers and students who apply machine learning as an important tool in their research, especially those in fields such as information retrieval, natural language processing and text data mining. In order to understand the concepts and methods discussed, readers are expected to have an elementary knowledge of advanced mathematics, linear algebra and probability statistics. The detailed explanations of basic principles, underlying concepts and algorithms enable readers to grasp basic techniques, while the rigorous mathematical derivations and specific examples included offer valuable insights into machine learning.
At last researchers have an inexpensive library of Java-based numeric procedures for use in scientific computation. The first and only book of its kind, A Numeric Library in Java for Scientists and Engineers is a translation into Java of the library NUMAL (NUMerical procedures in ALgol 60). This groundbreaking text presents procedural descr
Learning to rank refers to machine learning techniques for training the model in a ranking task. Learning to rank is useful for many applications in information retrieval, natural language processing, and data mining. Intensive studies have been conducted on the problem recently and significant progress has been made. This lecture gives an introduction to the area including the fundamental problems, existing approaches, theories, applications, and future work. The author begins by showing that various ranking problems in information retrieval and natural language processing can be formalized as two basic ranking tasks, namely ranking creation (or simply ranking) and ranking aggregation. In ranking creation, given a request, one wants to generate a ranking list of offerings based on the features derived from the request and the offerings. In ranking aggregation, given a request, as well as a number of ranking lists of offerings, one wants to generate a new ranking list of the offerings. Ranking creation (or ranking) is the major problem in learning to rank. It is usually formalized as a supervised learning task. The author gives detailed explanations on learning for ranking creation and ranking aggregation, including training and testing, evaluation, feature creation, and major approaches. Many methods have been proposed for ranking creation. The methods can be categorized as the pointwise, pairwise, and listwise approaches according to the loss functions they employ. They can also be categorized according to the techniques they employ, such as the SVM based, Boosting SVM, Neural Network based approaches. The author also introduces some popular learning to rank methods in details. These include PRank, OC SVM, Ranking SVM, IR SVM, GBRank, RankNet, LambdaRank, ListNet & ListMLE, AdaRank, SVM MAP, SoftRank, Borda Count, Markov Chain, and CRanking. The author explains several example applications of learning to rank including web search, collaborative filtering, definition search, keyphrase extraction, query dependent summarization, and re-ranking in machine translation. A formulation of learning for ranking creation is given in the statistical learning framework. Ongoing and future research directions for learning to rank are also discussed. Table of Contents: Introduction / Learning for Ranking Creation / Learning for Ranking Aggregation / Methods of Learning to Rank / Applications of Learning to Rank / Theory of Learning to Rank / Ongoing and Future Work
More than 1,100 TEM images illustrate the science of ULSI The natural outgrowth of VLSI (Very Large Scale Integration), Ultra Large Scale Integration (ULSI) refers to semiconductor chips with more than 10 million devices per chip. Written by three renowned pioneers in their field, ULSI Semiconductor Technology Atlas uses examples and TEM (Transmission Electron Microscopy) micrographs to explain and illustrate ULSI process technologies and their associated problems. The first book available on the subject to be illustrated using TEM images, ULSI Semiconductor Technology Atlas is logically divided into four parts: * Part I includes basic introductions to the ULSI process, device construction analysis, and TEM sample preparation * Part II focuses on key ULSI modules--ion implantation and defects, dielectrics and isolation structures, silicides/salicides, and metallization * Part III examines integrated devices, including complete planar DRAM, stacked cell DRAM, and trench cell DRAM, as well as SRAM as examples for process integration and development * Part IV emphasizes special applications, including TEM in advanced failure analysis, TEM in advanced packaging development and UBM (Under Bump Metallization) studies, and high-resolution TEM in microelectronics This innovative guide also provides engineers and managers in the microelectronics industry, as well as graduate students, with: * More than 1,100 TEM images to illustrate the science of ULSI * A historical introduction to the technology as well as coverage of the evolution of basic ULSI process problems and issues * Discussion of TEM in other advanced microelectronics devices and materials, such as flash memories, SOI, SiGe devices, MEMS, and CD-ROMs
This book provides comprehensive coverage on the concepts, frameworks, and underpinning technologies in most aspects of the Internet of Things (IoT), and presents them as the foundation on which more advanced topics, such as 5G and mMTC/M2M, Edge/cloud computing and the modalities of Tactile IoT, Industrial IoT (IIoT)/Industry 4.0, Satellite IoT, and Digital Twins (DT), could be built upon.A key feature of the book is the chapter that focuses on security and privacy for individuals and IoT/ Industry 4.0 are discussed.This book is a good reference guide for researchers, developers, integrators and stakeholders working on research in or development of IoT, particularly where open-source software are deployed.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.