Modern Chinese for Heritage Beginners aims to serve as a stepping-stone for Chinese heritage language learners’ future Chinese learning, inspiring them to reflect on their identities, learn Chinese American history, and embrace their cultural heritage. The book starts with talking about individuals and families and then expands to the Chinese and Asian American communities in the U.S. and eventually to the entire American society, all from the unique perspective of Chinese American students. Taking a macro approach that builds learners’ literacy skills on their initial abilities in speaking and listening, each lesson starts with listening and speaking activities and then moves to reading and writing. The content complexity and language difficulty are balanced to present rich content that matches students’ critical thinking abilities in a language appropriate for their literacy level. Lively and humorous language makes the book a joy to read. Each lesson has a conversation and an essay to expose students to informal and formal registers. Moreover, authentic tasks are designed to facilitate students’ language output, following the three modes of communication promoted by the American Council on Teaching Foreign Languages: interpersonal, interpretive, and presentational. This theme-based Chinese textbook is written for high school and college-level Chinese heritage language learners.
This IBM® Redbooks® publication provides concepts, details, and examples related to the migration process for Business Process Management (BPM) products. It describes three migration patterns for migrating earlier versions (Version 6.0.2, Version 6.1, Version 6.1.2, and Version 6.2) of the following BPM products to IBM WebSphere® Dynamic Process Edition: IBM WebSphere Process Server IBM WebSphere Enterprise Service Bus IBM WebSphere Business Modeler IBM WebSphere Business Monitor IBM WebSphere Business Services Fabric IBM WebSphere Adapters This book includes planning information and leading practices for the migration of these products. It provides information about the steps required to perform the migration, and includes two scenarios that walk you through example migrations on distributed and IBM z/OS® platforms.
While phenomenology and Yogacara Buddhism are both known for their investigations of consciousness, there exists a core tension between them: phenomenology affirms the existence of essence, whereas Yogacara Buddhism argues that everything is empty of essence (svabhava). How is constructive cultural exchange possible when traditions hold such contradictory views? Answering this question and positioning both philosophical traditions in their respective intellectual and linguistic contexts, Jingjing Li argues that what Edmund Husserl means by essence differs from what Chinese Yogacarins mean by svabhava, partly because Husserl problematises the substantialist understanding of essence in European philosophy. Furthermore, she reveals that Chinese Yogacara has developed an account of self-transformation, ethics and social ontology that renders it much more than simply a Buddhist version of Husserlian phenomenology. Detailing the process of finding a middle ground between the two traditions, this book demonstrates how both can thrive together in order to overcome Orientalism.
Relying on unmanned autonomous flight control programs, unmanned aerial vehicles (UAVs) equipped with radio communication devices have been actively developed around the world. Given their low cost, flexible maneuvering and unmanned operation, UAVs have been widely used in both civilian operations and military missions, including environmental monitoring, emergency communications, express distribution, even military surveillance and attacks, for example. Given that a range of standards and protocols used in terrestrial wireless networks are not applicable to UAV networks, and that some practical constraints such as battery power and no-fly zone hinder the maneuverability capability of a single UAV, we need to explore advanced communication and networking theories and methods for the sake of supporting future ultra-reliable and low-latency applications. Typically, the full potential of UAV network’s functionalities can be tapped with the aid of the cooperation of multiple drones relying on their ad hoc networking, in-network communications and coordinated control. Furthermore, some swarm intelligence models and algorithms conceived for dynamic negotiation, path programming, formation flight and task assignment of multiple cooperative drones are also beneficial in terms of extending UAV’s functionalities and coverage, as well as of increasing their efficiency. We call the networking and cooperation of multiple drones as the terminology ‘flying ad hoc network (FANET)’, and there indeed are numerous new challenges to be overcome before the idespread of so-called heterogeneous FANETs. In this book, we examine a range of technical issues in FANETs, from physical-layer channel modeling to MAC-layer resource allocation, while also introducing readers to UAV aided mobile edge computing techniques.
Comprehensive reference covering signal detection for random access in IoT systems from the beginner to expert level With a carefully balanced blend of theoretical elements and applications, IoT Signal Detection is an easy-to-follow presentation on signal detection for IoT in terms of device activity detection, sparse signal detection, collided signal detection, round-trip delay estimation, and backscatter signal division, building progressively from basic concepts and important background material up to an advanced understanding of the subject. Various signal detection and estimation techniques are explained, e.g., variational inference algorithm and compressive sensing reconstruction algorithm, and a number of recent research outcomes are included to provide a review of the state of the art in the field. Written by four highly qualified academics, IoT Signal Detection discusses sample topics such as: ML, ZF, and MMSE detection, Markov chain Monte Carlo-based detection, variational inference-based detection, compressive sensing-based detection Sparse signal detection for multiple access, covering Bayesian compressive sensing algorithm and structured subspace pursuit algorithm Collided signal detection for multiple access using automatic modulation classification algorithm, round-trip delay estimation for collided signals Signal detection for backscatter signals, covering central limited theorem-based detection including detection algorithms, performance analysis, and simulation results Signal design for multi-cluster coordination, covering successive interference cancellation design, device grouping and power control, and constructive interference-aided multi-cluster coordination With seamless coverage of the subject presented in a linear and easy-to-understand way, IoT Signal Detection is an ideal reference for both graduate students and practicing engineers in wireless communications.
This book focuses on various Passive optical networks (PONs) types, including currently deployed Ethernet PON (EPON) and Gigabit PON (GPON) as well as next generation WDM PON and OFDM PON. Also this book examines the integrated optical and wireless access networks. Concentrating on two issues in these networks: media access control (MAC) and resource allocation. These two problems can greatly affect performances of PONs such as network resource utilization and QoS of end users. Finally this book will discuss various solutions to address the MAC and resource allocation issues in various PON networks.
This book systemically presents key concepts of multi-modal hashing technology, recent advances on large-scale efficient multimedia search and recommendation, and recent achievements in multimedia indexing technology. With the explosive growth of multimedia contents, multimedia retrieval is currently facing unprecedented challenges in both storage cost and retrieval speed. The multi-modal hashing technique can project high-dimensional data into compact binary hash codes. With it, the most time-consuming semantic similarity computation during the multimedia retrieval process can be significantly accelerated with fast Hamming distance computation, and meanwhile the storage cost can be reduced greatly by the binary embedding. The authors introduce the categorization of existing multi-modal hashing methods according to various metrics and datasets. The authors also collect recent multi-modal hashing techniques and describe the motivation, objective formulations, and optimization steps for context-aware hashing methods based on the tag-semantics transfer.
Integrating information from several areas of engineering geology, hydrogeology, geotechnical engineering, this book addresses the general field of groundwater from an engineering perspective. It covers geological engineering as well as hydrogeological and environmental geological problems caused by groundwater engineering. It includes 10 chapters, i.e., basic groundwater theory, parameter calculation in hydrogeology, prevention of geological problem caused by groundwater, construction dewatering, wellpoint dewatering methods, dewatering wells and drilling, groundwater dewatering in foundation-pit engineering, groundwater engineering in bedrock areas, numerical simulation in groundwater engineering, groundwater corrosion on concrete and steel. Based on up-to-date literature, it describes recent developments and presents several case studies with examples and problems. It is an essential reference source for industrial and academic researchers working in the groundwater field and can also serve as lecture-based course material providing fundamental information and practical tools for both senior undergraduate and postgraduate students in fields of geology engineering, hydrogeology, geotechnical engineering or to conduct related research.
This book is devoted to the optimum design of the DCT in a hybrid AC/DC microgrid, which takes into account not only the influence of different inductors/capacitors values, but also numerous design goals (i.e., VCG, efficiency, stability and so on). This book examines the DCT's design problem in detail. It begins by reviewing existing DCTs in, the hybrid AC/DC microgrid and their design problems. Following that, this book proposes a family of DCT optimization design approaches to ensure that the designed DCT has good power transmission and voltage regulation ability in the hybrid AC/DC microgrid, even when the actual inductors/capacitors values fluctuate with practical power and temperature. Following that, this book provides a family of multi-objective optimization design methodologies for the DCT to guarantee that it concurrently achieves the requirements of VCG, efficiency, and system stability. This book also covers how to control the DCT in a hybrid AC/DC microgrid optimally and generically.
A power converter is a device used in electrical engineering, power engineering, and the electric power sector to convert electric energy from one form to another, such as converting between AC and DC, changing voltage or frequency, or a combination of these. It is used in a variety of applications, such as industrial drives, power supply, energy generating equipment, consumer goods, electrical vehicles/aeroplanes/ships, smart grids and more.This book will open a door for engineers to design the power converters via the artificial intelligence (AI) method. It begins by reviewing current AI technology in power converters. The book then introduces customized AI algorithms for power converters that take into account the particular characteristics of power converters. The book then presents a set of AI-based design methodologies for power devices, including DC/DC converters, resonant DC/DC converters, bidirectional DC/DC converters, DC/AC inverters, and AC/DC rectifiers. This is the first book to cover all you need to know about using AI to create power converters, including a literature review, algorithm, and circuit design.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.