This book provides a systematic overview of watermarking and steganography methods for triangle meshes related to computer graphics and security. The significance of this research has been well recognized by the growing body of work on watermarking, steganography and steganalysis of 3D meshes. With the evolution of the CAD industry and real-world end-user applications such as virtual reality (VR) and 3D printing, 3D meshes have attracted world-wide attention. Besides, the flexible data structure of 3D geometry provides enough space to embed secret information, making it ideal for applications such as copyright protection and covert communication. Our goal of the book is to allow readers to systematically understand 3D mesh information hiding technology and its applications as a whole. The book outlines comprehensive techniques, including handcrafted and deep learning-based techniques, digital and physical techniques in the literature and provides standard evaluation metrics for triangle meshes. The up-to-date geometrical deep learning and 3D printing-related algorithms are also covered. Offering a rich blend of ideas and algorithms, the book is up-to-date and self-contained. It is an excellent reference resource for users who are seeking 3D mesh watermarking and steganography algorithms, as well as for graduate students and researchers wanting to grasp the frontiers of triangular mesh processing on data hiding.
This book constitutes the refereed proceedings of the 11th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2007, held in Nanjing, China, May 2007. It covers new ideas, original research results and practical development experiences from all KDD-related areas including data mining, machine learning, data warehousing, data visualization, automatic scientific discovery, knowledge acquisition and knowledge-based systems.
Drawing on the sun, moon, dragon, phoenix, Nuwa, Yandi, Huangdi and other widely circulated cultural elements as examples, this book addresses the development and evolution of the most representative Chinese creation myths regarding nature, totems, ancestors and saints. The book not only interprets key creation myths, but also elaborates on the connection between the myths and some of the core values and concepts in Chinese civilization. For example, the long and jade culture is rooted in the Yellow Emperor’s revered jade weapon. Further, the book reveals the kernels of truth in the myths by presenting new research findings and research methods.
This dissertation consists of three chapters concerning both empirical studies and estimation mythologies of the discrete choice models in the area of demand estimation. The first chapter is a pure empirical study of estimating Chinese outbound tourism demand under a discrete choice model framework. The second chapter considers a mixture discrete choice model in which consumers have unobservable and heterogeneous choice sets and proposes a corresponding two-step mixture estimation approach. The third chapter contains a set of simulation studies regarding the two-step mixture approach proposed in the second chapter. More specifically, the first chapter implements a discrete choice approach to estimate the determinants of Chinese outbound tourism demand after year 2004, since when Chinese citizens could travel to most major overseas destinations without political restrictions. Starting from travelers' utility specifications, this chapter implements basic linear regressions to estimate Chinese tourists' sensitivity to the cost of travel and other characteristics of the destinations. The price and income elasticities are estimated as well. This chapter also proposes a strategy to quantify the welfare gains of Chinese tourists from the opening of Taiwan (to mainland China) as a new destination. The second chapter proposes a two-step mixture approach to estimate discrete choice models when consumers' choice sets are unobservable and heterogeneous. Different choice sets are viewed as different consumer types. Each type of consumers has distinct criteria on the attributes of products according to which their choice sets are formatted. After assuming the choice set formation process, the choice sets distribution and preference parameters can be jointly estimated by a two-step mixture approach. A key insight is that the approach can be applied to store level data. While having individual level data is not a must, it can provide guidance on the formation of choice sets. The effectiveness of the proposed mixture approach is demonstrated via a set of Monte Carlo simulations and three empirical applications on markets of milk, potato chips and hot-dogs using the IRI marketing data. The third chapter is a follow-up of Chapter 2 and is based on more simulation studies. In this chapter I review the data generation process (DGP) of my mixture model, discuss the failure of another estimation method which depends on the BLP-type inversion under my DGP setup, and then conduct Monte Carlo simulation experiments to examine the validity of the two-step mixture approach and demonstrate its superiority over other traditional estimation methods under various scenarios.
As a country moving to a transitional economy, China has suffered from the constraints of its old market system and infrastructure. In recent years, The China Development Bank has implemented a system of developmental finance that allows government goals to unite with market mechanisms. This three-volume series is the product of a joint research project between the China Development Bank and Renmin University of China
Examines international context in which North Vietnamese leaders pursued the war & American intervention ended, taking readers from marshy swamps of the Mekong Delta to corridors of power in Hanoi & the Nixon White House; from peace negotiations in Paris to high-level meetings in Beijing & Moscow, all to reveal peace never had a chance in Vietnam.
This book details cutting-edge research into human-like driving technology, utilising game theory to better suit a human and machine hybrid driving environment. Covering feature identification and modelling of human driving behaviours, the book explains how to design an algorithm for decision making and control of autonomous vehicles in complex scenarios. Beginning with a review of current research in the field, the book uses this as a springboard from which to present a new theory of human-like driving framework for autonomous vehicles. Chapters cover system models of decision making and control, driving safety, riding comfort and travel efficiency. Throughout the book, game theory is applied to human-like decision making, enabling the autonomous vehicle and the human driver interaction to be modelled using noncooperative game theory approach. It also uses game theory to model collaborative decision making between connected autonomous vehicles. This framework enables human-like decision making and control of autonomous vehicles, which leads to safer and more efficient driving in complicated traffic scenarios. The book will be of interest to students and professionals alike, in the field of automotive engineering, computer engineering and control engineering.
Embedded Courts is laden with tension. Chinese courts are organized as a singular and unified system yet grassroots courts in urban and rural regions differ greatly in the way they use the law and are as diverse as the populations they serve. Based on extensive fieldwork and in-depth interviews, this book offers a penetrating discussion of the operation of Chinese courts. It explains how Chinese judges rule and how the law is not the only script they follow - political, administrative, social and economic factors all influence verdicts. This landmark work will revise our understanding of the role of law in China - one that cannot be easily understood through the standard lens of judicial independence and separation of powers. Ng and He make clear the struggle facing frontline judges as they bridge the gap between a rule-based application of law and an instrumentalist view that prioritizes stability maintenance.
Drawing on the sun, moon, dragon, phoenix, Nuwa, Yandi, Huangdi and other widely circulated cultural elements as examples, this book addresses the development and evolution of the most representative Chinese creation myths regarding nature, totems, ancestors and saints. The book not only interprets key creation myths, but also elaborates on the connection between the myths and some of the core values and concepts in Chinese civilization. For example, the long and jade culture is rooted in the Yellow Emperor’s revered jade weapon. Further, the book reveals the kernels of truth in the myths by presenting new research findings and research methods.
Examining the production of 'people's literature' in China, this study provides a new interpretive framework with which to understand socialist literature and presents a sympathetic understanding of culture from a period in China's history in which people's lives were greatly and obviously affected by political events.
The Zheng family of merchants and militarists emerged from the tumultuous seventeenth century amid a severe economic depression, a harrowing dynastic transition from the ethnic Chinese Ming to the Manchu Qing, and the first wave of European expansion into East Asia. Under four generations of leaders over six decades, the Zheng had come to dominate trade across the China Seas. Their average annual earnings matched, and at times exceeded, those of their fiercest rivals: the Dutch East India Company. Although nominally loyal to the Ming in its doomed struggle against the Manchus, the Zheng eventually forged an autonomous territorial state based on Taiwan with the potential to encompass the family's entire economic sphere of influence. Through the story of the Zheng, Xing Hang provides a fresh perspective on the economic divergence of early modern China from western Europe, its twenty-first-century resurgence, and the meaning of a Chinese identity outside China.
This book presents the up-to-date research developments and novel methodologies on multi-sensor filtering fusion (MSFF) for a class of complex systems subject to censored data under a constrained network environment. The contents of this book are divided into two parts covering centralized and distributed MSFF design methodologies. The work provides a framework of optimal centralized/distributed filter design and stability and performance analysis for the considered systems along with designed filters. Simulations presented in this book are implemented using MATLAB. Features: Includes concepts, backgrounds and models on censored data, filtering fusion and communication constraints. Reviews case studies to provide clear engineering insights into the developed fusion theories and techniques. Provides theoretic values and engineering insights of the censored data and constrained network. Discusses performance evaluation of the presented multi-sensor fusion algorithms. Explores promising research directions on future multi-sensor fusion. This book is aimed at graduate students and researchers in networked control, sensor networks, and data fusion.
The earliest book-length treatise in Chinese literary criticism, the Wenxin diaolong is of central importance in the Chinese tradition. The work was compiled in the sixth century, one of the most fertile and original periods in Chinese critical thinking. Its author, Liu Xie, was a Buddhist monk as well as a Confucian scholar, and so represented the main persuasions of China. The Wenxin diaolong first came to be noted in the seventeenth century, when it was studied by scholars and edited by Mei Qingsheng. When the study of literary criticism became an independent discipline early in the twentieth century, it developed into a cynosure that was widely discussed and provided with learned annotations. This volume presents a fresh translation of the Wenxin diaolong that is at once authoritative and elegant. It may well be regarded as a standard reference by students of sinology and comparative literature.
This book provides comprehensive coverage on the concepts, frameworks, and underpinning technologies in most aspects of the Internet of Things (IoT), and presents them as the foundation on which more advanced topics, such as 5G and mMTC/M2M, Edge/cloud computing and the modalities of Tactile IoT, Industrial IoT (IIoT)/Industry 4.0, Satellite IoT, and Digital Twins (DT), could be built upon.A key feature of the book is the chapter that focuses on security and privacy for individuals and IoT/ Industry 4.0 are discussed.This book is a good reference guide for researchers, developers, integrators and stakeholders working on research in or development of IoT, particularly where open-source software are deployed.
Recently, a great deal of effort has been dedicated to capitalising on advances in mathematical control theory in conjunction with tried-and-tested classical control structures particularly with regard to the enhanced robustness and tighter control of modern PID controllers. Much of the research in this field and that of the operational autonomy of PID controllers has already been translated into useful new functions for industrial controllers. This book covers the important knowledge relating to the background, application, and design of, and advances in PID controllers in a unified and comprehensive treatment including: Evolution and components of PID controllers Classical and Modern PID controller design Automatic Tuning Multi-loop Control Practical issues concerned with PID control The book is intended to be useful to a wide spectrum of readers interested in PID control ranging from practising technicians and engineers to graduate and undergraduate students.
This book provides a comprehensive overview on emergent bursty patterns in the dynamics of human behaviour. It presents common and alternative understanding of the investigated phenomena, and points out open questions worthy of further investigations. The book is structured as follows. In the introduction the authors discuss the motivation of the field, describe bursty phenomena in case of human behaviour, and relate it to other disciplines. The second chapter addresses the measures commonly used to characterise heterogeneous signals, bursty human dynamics, temporal paths, and correlated behaviour. These definitions are first introduced to set the basis for the discussion of the third chapter about the observations of bursty human patterns in the dynamics of individuals, dyadic interactions, and collective behaviour. The subsequent fourth chapter discusses the models of bursty human dynamics. Various mechanisms have been proposed about the source of the heterogeneities in human dynamics, which leads to the introduction of conceptually different modelling approaches. The authors address all of these perspectives objectively, highlight their strengths and shortcomings, and mention possible extensions to them. The fifth chapter addresses the effect of individual heterogeneous behaviour on collective dynamics. This question in particular has been investigated in various systems including spreading phenomena, random walks, and opinion formation dynamics. Here the main issues are whether burstiness speeds up or slows down the co-evolving processes, and how burstiness modifies time-dependent paths in the system that determine the spreading patterns of any kind of information or influence. Finally in the sixth chapter the authors end the review with a discussion and future perspectives. It is an ideal book for researchers and students who wish to enter the field of bursty human dynamics or want to expand their knowledge on such phenomena.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.