This groundbreaking book provides scholars and students in the areas of criminology, criminal justice, sociology, substance abuse and women’s studies with in-depth analysis of 131 female heroin users’ drug use careers in China. The book has important policy implications for both China and the international society in the context of increasing global concern about women’s substance abuse.
This book will guide readers through the history of the flu. In ten chapters, it explains Influenza in a simple way. Influenza always seems to have endless topics. The flu virus, seemingly tiny, has brought on one disaster after another to human beings. 2018 is the 100th anniversary of the outbreak of the '1918 Flu' that swept the world. The flu, a century ago, claimed nearly one-twentieth of human life on the planet. It became the most deadly flu in human history.This book introduces the past and present life of the influenza virus in a light-hearted way, leading the reader to review the past from the history of the flu, the development of the flu, human immunity and health, impacts on society and the country. Through touching stories, illustrations and diagrams, it tells the great discoveries and related advances in science and technology, introduces medical knowledge related to influenza, and reviews the medical effectiveness in preventing influenza, thus displaying the ongoing battle between humans and the flu virus.Looking back at the development of science and technology, humans have relentlessly sought the prevention and control of this infectious disease, constantly guarding the path of life and health, which gradually becomes a quiet past, but only to awaken again and again.
In recent years, there has been a rapid growth of location-based social networking services, such as Foursquare and Facebook Places, which have attracted an increasing number of users and greatly enriched their urban experience. Typical location-based social networking sites allow a user to "check in" at a real-world POI (point of interest, e.g., a hotel, restaurant, theater, etc.), leave tips toward the POI, and share the check-in with their online friends. The check-in action bridges the gap between real world and online social networks, resulting in a new type of social networks, namely location-based social networks (LBSNs). Compared to traditional GPS data, location-based social networks data contains unique properties with abundant heterogeneous information to reveal human mobility, i.e., "when and where a user (who) has been to for what," corresponding to an unprecedented opportunity to better understand human mobility from spatial, temporal, social, and content aspects. The mining and understanding of human mobility can further lead to effective approaches to improve current location-based services from mobile marketing to recommender systems, providing users more convenient life experience than before. This book takes a data mining perspective to offer an overview of studying human mobility in location-based social networks and illuminate a wide range of related computational tasks. It introduces basic concepts, elaborates associated challenges, reviews state-of-the-art algorithms with illustrative examples and real-world LBSN datasets, and discusses effective evaluation methods in mining human mobility. In particular, we illustrate unique characteristics and research opportunities of LBSN data, present representative tasks of mining human mobility on location-based social networks, including capturing user mobility patterns to understand when and where a user commonly goes (location prediction), and exploiting user preferences and location profiles to investigate where and when a user wants to explore (location recommendation), along with studying a user's check-in activity in terms of why a user goes to a certain location.
Social media greatly enables people to participate in online activities and shatters the barrier for online users to create and share information at any place at any time. However, the explosion of user-generated content poses novel challenges for online users to find relevant information, or, in other words, exacerbates the information overload problem. On the other hand, the quality of user-generated content can vary dramatically from excellence to abuse or spam, resulting in a problem of information credibility. The study and understanding of trust can lead to an effective approach to addressing both information overload and credibility problems. Trust refers to a relationship between a trustor (the subject that trusts a target entity) and a trustee (the entity that is trusted). In the context of social media, trust provides evidence about with whom we can trust to share information and from whom we can accept information without additional verification. With trust, we make the mental shortcut by directly seeking information from trustees or trusted entities, which serves a two-fold purpose: without being overwhelmed by excessive information (i.e., mitigated information overload) and with credible information due to the trust placed on the information provider (i.e., increased information credibility). Therefore, trust is crucial in helping social media users collect relevant and reliable information, and trust in social media is a research topic of increasing importance and of practical significance. This book takes a computational perspective to offer an overview of characteristics and elements of trust and illuminate a wide range of computational tasks of trust. It introduces basic concepts, deliberates challenges and opportunities, reviews state-of-the-art algorithms, and elaborates effective evaluation methods in the trust study. In particular, we illustrate properties and representation models of trust, elucidate trust prediction with representative algorithms, and demonstrate real-world applications where trust is explicitly used. As a new dimension of the trust study, we discuss the concept of distrust and its roles in trust computing.
This book explores teachers’ cognitions about the teaching of writing in English as a foreign language (EFL) and their teaching practice, as well as factors influencing the formation and reformation process of their cognition. Taking stock of Bakhtin’s dialogism as the theoretical framework, the authors argue that the formation and reformation of teacher cognition is a dialogic process. A systematic analysis of participating teachers’ cognition formation and re-formation process suggests the highly individual nature of teachers’ cognitions. EFL researchers and teachers, teacher educators, teacher education policymakers, university administrators and EFL textbook writers could draw on the findings of the study to provide better resources to implement the teaching of EFL writing more effectively. The study has adopted a mixed-methods approach, whose quantitative results show the patterns and differences of teacher cognition among teachers of different backgrounds and with different schooling, education and working experiences. The qualitative findings show in detail teachers' cognition formation and reformation processes and the factors contributing to such processes, revealing convergence and divergence of teachers’ stated cognitions, with a focus on the discrepancy between teacher cognition and teaching practice. These are useful lenses through which researchers and teachers will find significant implications for offering EFL writing instruction more effectively.
This book constitutes the refereed proceedings of the First International Symposium on Computational and Information Science, CIS 2004, held in Shanghai, China in December 2004. The 190 revised papers presented were carefully reviewed and selected from 450 submissions. The papers address virtually all computational and algorithmic aspects in various sciences, mathematics, and engineering as well as data and information engineering. The papers are organized in four main parts on high performance computing and algorithms, computational modeling and simulation, bioinformatics and medical informatics, and data engineering and information science.
In Intimate Relationships in China in the Light of Depth Psychology: A Study of Gender and Integrity, Huan Wang presents an overview of Jungian ideas as they apply to gender roles and relationships in contemporary Chinese culture. Moving beyond a Western interpretation of key concepts, Wang attempts to understand and deal with the difficulties of contemporary marriages in a rapidly changing society, investigating how young Chinese couples have been affected by traditional values, Westernisation, and the one-child policy. Wang also discusses how depth psychology has developed and been applied in China, highlighting how it differs in Chinese and Western settings and the problems and achievements Chinese people have faced. She concludes that the Chinese psyche today is experiencing a transition from the compliance of collectivism to the awareness of individuation, and that the rediscovery of the notion of integrity will help Chinese therapists to find their way, make young Chinese people independent individuals, and bring a new approach to their marriages. This is the first time such issues have been profoundly and comprehensively discussed in a Chinese context. It will be an invaluable resource for analytical psychologists, psychotherapists, and marriage and family and couple therapists working in China or with Chinese clients. It will also be of great interest to academics and students of Jungian and post-Jungian studies and to anyone interested in the psyche of contemporary China.
In the past decade, social media has become increasingly popular for news consumption due to its easy access, fast dissemination, and low cost. However, social media also enables the wide propagation of "fake news," i.e., news with intentionally false information. Fake news on social media can have significant negative societal effects. Therefore, fake news detection on social media has recently become an emerging research area that is attracting tremendous attention. This book, from a data mining perspective, introduces the basic concepts and characteristics of fake news across disciplines, reviews representative fake news detection methods in a principled way, and illustrates challenging issues of fake news detection on social media. In particular, we discussed the value of news content and social context, and important extensions to handle early detection, weakly-supervised detection, and explainable detection. The concepts, algorithms, and methods described in this lecture can help harness the power of social media to build effective and intelligent fake news detection systems. This book is an accessible introduction to the study of detecting fake news on social media. It is an essential reading for students, researchers, and practitioners to understand, manage, and excel in this area. This book is supported by additional materials, including lecture slides, the complete set of figures, key references, datasets, tools used in this book, and the source code of representative algorithms. The readers are encouraged to visit the book website for the latest information: http://dmml.asu.edu/dfn/
His life was turned upside down by his sudden acquisition of martial arts skills and clairvoyance. After Li Tianyi's blood accidentally touched a stone, the stone turned into a shining white light and entered his forehead. At this moment, a lot of knowledge about practicing martial arts appeared in Li Tianyi's mind, and at the same time, he also found that his eyes actually had a perspective function! As long as he looks at the plants with his divine eyes, the plants that were seedlings the day before will become fruitful the next day. Some men who were jealous of him in the village succumbed under his mighty force. With excellent martial arts and perspective eyes, Li Tianyi's life in the countryside is flourishing. ☆About the Author☆ Huan Shou Dao, a well-known online novelist, has authored many urban fantasy novels. He has rich imagination and creative skills, which loved by many readers.
This book provides a comprehensive review of functional nanomaterials for electrochemical applications, presenting interesting examples of nanomaterials with different dimensions and their applications in electrochemical energy storage. It also discusses the synthesis of functional nanomaterials, including quantum dots; one-dimensional, two-dimensional and three-dimensional nanostructures; and advanced nanocomposites. Highlighting recent advances in current electrochemical energy storage hotpots: lithium batteries, lithium-ion batteries, sodium-ion batteries, other metal-ion batteries, halogen ion batteries, and metal–gas batteries, this book will appeal to readers in the various fields of chemistry, material science and engineering.
Social media shatters the barrier to communicate anytime anywhere for people of all walks of life. The publicly available, virtually free information in social media poses a new challenge to consumers who have to discern whether a piece of information published in social media is reliable. For example, it can be difficult to understand the motivations behind a statement passed from one user to another, without knowing the person who originated the message. Additionally, false information can be propagated through social media, resulting in embarrassment or irreversible damages. Provenance data associated with a social media statement can help dispel rumors, clarify opinions, and confirm facts. However, provenance data about social media statements is not readily available to users today. Currently, providing this data to users requires changing the social media infrastructure or offering subscription services. Taking advantage of social media features, research in this nascent field spearheads the search for a way to provide provenance data to social media users, thus leveraging social media itself by mining it for the provenance data. Searching for provenance data reveals an interesting problem space requiring the development and application of new metrics in order to provide meaningful provenance data to social media users. This lecture reviews the current research on information provenance, explores exciting research opportunities to address pressing needs, and shows how data mining can enable a social media user to make informed judgements about statements published in social media. Table of Contents: Information Provenance in Social Media / Provenance Attributes / Provenance via Network Information / Provenance Data
This book highlights the use of one-dimensional transition metal oxides and their analogue nanomaterials for battery applications. The respective chapters present examples of one-dimensional nanomaterials with different architectures, as well as a wide range of applications, e.g. as electrode materials for batteries. The book also addresses various means of synthesizing one-dimensional nanomaterials, e.g. electrospinning, the Kirkendall effect, Ostwald ripening, heterogeneous contraction, liquid-phase preparation, the vapor deposition approach and template-assisted synthesis. In closing, the structural design, optimization and promotion of one-dimensional transition metal oxide electrode materials are discussed. The book chiefly focuses on emerging configurable designs, including core-shell architectures, hollow architectures and other intricate architectures. In turn, the applications covered reflect essential recent advances in many modern types of battery. Accordingly, the book offers an informative and appealing resource for a wide readership in various fields of chemical science, materials and engineering.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.