China is a powerful engine of the global economy and the country's rise is undoubtedly the outcome of its protracted campaign of designing and implementing national development strategies since the founding of the People's Republic of China in 1949. This book reviews the transformation and innovation of China's economic development strategies, especially Deng Xiaoping's Three-Step strategy and Xi Jinping's internal and external strategies. By introducing the concept of strategic paradigm, it analyzes the theoretical basis of myriads of economic development strategies and predicts China's choice. With the evolutionary process and the outstanding problems in national development planning as the main thread, it discusses the improvement of the national planning system, specifically of the national overall planning system, the regional planning system, the interplay and conflict between regional planning. It also studies the reform of city-county planning system, major function-oriented zones (MFOZs) and planning legislation and institutionalization. It also attempts to put forward proposals to coordinate the interests of planning departments and make different types of planning at different administrative levels compatible.
Trees without wind takes place in a remote Shanxi village during the Cultural Revolution. A rare affliction has left the residents physically stunted, and the deformed villagers, echoing the manipulated masses of China, become pawns in the Party's factional infighting."--Book cover.
Confined Fluid Phase Behavior and CO2 Sequestration in Shale Reservoirs delivers the calculation components to understand pore structure and absorption capacity involving unconventional reservoirs. Packed with experimental procedures, step-by-step instructions, and published data, the reference explains measurements for capillary pressure models, absorption behavior in double nano-pore systems, and the modeling of interfacial tension in C02/CH4/brine systems. Rounding out with conclusions and additional literature, this reference gives petroleum engineers and researchers the knowledge to maximize productivity in shale reservoirs. Helps readers gain advanced understanding of methods of adsorption behavior in shale gas Presents theories and calculations for measuring and computing by providing step-by-step instructions, including flash calculation for phase equilibrium Includes advances in shale fluid behavior, along with well-structured experiments and flow charts
Multimodal Perception and Secure State Estimation for Robotic Mobility Platforms Enables readers to understand important new trends in multimodal perception for mobile robotics This book provides a novel perspective on secure state estimation and multimodal perception for robotic mobility platforms such as autonomous vehicles. It thoroughly evaluates filter-based secure dynamic pose estimation approaches for autonomous vehicles over multiple attack signals and shows that they outperform conventional Kalman filtered results. As a modern learning resource, it contains extensive simulative and experimental results that have been successfully implemented on various models and real platforms. To aid in reader comprehension, detailed and illustrative examples on algorithm implementation and performance evaluation are also presented. Written by four qualified authors in the field, sample topics covered in the book include: Secure state estimation that focuses on system robustness under cyber-attacks Multi-sensor fusion that helps improve system performance based on the complementary characteristics of different sensors A geometric pose estimation framework to incorporate measurements and constraints into a unified fusion scheme, which has been validated using public and self-collected data How to achieve real-time road-constrained and heading-assisted pose estimation This book will appeal to graduate-level students and professionals in the fields of ground vehicle pose estimation and perception who are looking for modern and updated insight into key concepts related to the field of robotic mobility platforms.
Li Rui's first novel, Silver City is a gripping family saga based on his father's experience as an underground Communist, and the latter's tragic death in a cadre school.
This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for breaking privacy, and gives intuition on how to design algorithm to counter privacy attacks. Some well-designed differential privacy algorithms are also included in this book. Driven by lower cost, higher reliability, better performance, and faster deployment, data and computing services are increasingly outsourced to clouds. In this computing paradigm, one often has to store privacy sensitive data at parties, that cannot fully trust and perform privacy sensitive computation with parties that again cannot fully trust. For both scenarios, preserving data privacy and computation privacy is extremely important. After the Facebook–Cambridge Analytical data scandal and the implementation of the General Data Protection Regulation by European Union, users are becoming more privacy aware and more concerned with their privacy in this digital world. This book targets database engineers, cloud computing engineers and researchers working in this field. Advanced-level students studying computer science and electrical engineering will also find this book useful as a reference or secondary text.
The authors develop elements of a general dilation theory for operator-valued measures. Hilbert space operator-valued measures are closely related to bounded linear maps on abelian von Neumann algebras, and some of their results include new dilation results for bounded linear maps that are not necessarily completely bounded, and from domain algebras that are not necessarily abelian. In the non-cb case the dilation space often needs to be a Banach space. They give applications to both the discrete and the continuous frame theory. There are natural associations between the theory of frames (including continuous frames and framings), the theory of operator-valued measures on sigma-algebras of sets, and the theory of continuous linear maps between -algebras. In this connection frame theory itself is identified with the special case in which the domain algebra for the maps is an abelian von Neumann algebra and the map is normal (i.e. ultraweakly, or weakly, or w*) continuous.
This book proposes the novel network envisions and framework design principles, in order to systematically expound the next generation vehicular networks, including the modelling, algorithms and practical applications. It focuses on the key enabling technologies to design the next generation vehicular networks with various vehicular services to realize the safe, convenient and comfortable driving. The next generation vehicular networks has emerged to provide services with a high quality of experience (QoE) to vehicles, where both better network maintainability and sustainability can be obtained than before. The framework design principles and related network architecture are also covered in this book. Then, the series of research topics are discussed including the reputation based content centric delivery, the contract based mobile edge caching, the Stackelberg game model based computation offloading, the auction game based secure computation offloading, the bargain game based security protection and the deep learning based autonomous driving. Finally, the investigation, development and future works are also introduced for designing the next generation vehicular networks. The primary audience for this book are researchers, who work in computer science and electronic engineering. Professionals working in the field of mobile networks and communications, as well as engineers and technical staff who work on the development or the standard of computer networks will also find this book useful as a reference.
This book focuses on software fault detection and correction processes, presenting 5 different paired models introduced over the last decade and discussing their applications, in particular to determining software release time. The first work incorporates the testing effort function and the fault introduction process into the paired fault detection and fault correction models. The second work incorporates fault dependency, while the third adopts a Markov approach for studying fault detection and correction processes. The fourth work considers the multi-release property of various software, and models fault detection and correction processes. The last work classifies faults into four types and models the fault-detection and correction processes. Enabling readers to familiarize themselves with how software reliability can be modeled when different factors need to be considered, and how the approaches can be used to analyze other systems, the book is important reference guide for researchers in the field of software reliability engineering and practitioners working on software projects. To gain the most from the book, readers should have a firm grasp of the fundamentals of the stochastic process.
The ideal reference book providing all the information needed to fully understand magnetic communications in a self-contained source, written by experts in the field. This book offers a comprehensive introduction to magnetic communication using easy-to-understand language to explain concepts throughout and introduces the theory step by step with examples. A careful balance of combined theoretical and practical perspective is given throughout the book with interdisciplinary and multidisciplinary considerations for in-depth and diverse understanding. This book covers the background, developments, fundaments, antennas, channels, performance, protocol related to magnetic communications as well as applications that are of current interest, such as IoT, MIMO and wireless power transfer. The figures of merit within magnetic communication system components are included, demonstrating how to both model and analyze them. This book will be of great benefit to graduate students, researchers, and electrical engineers working in the fields of wireless communications and the internet of things.
Nine stories by nine immigrant writers brought together by one concept. Edited and with a foreword by Anna Wang Yuan. Writers include: Allan Cho, Lily Chu, Ma Lan, Lily Liu, Rui Wang, Christina Yao, Yili, Xiaowen Zeng and Jieru Zhou.
The paradigms and schools of economic development strategy -- Development outlook and development strategy from a global perspective -- China's national development concept and economic development strategy -- The national economic development strategy in xi's era -- A historical review of national planning management -- Experiences and lessons in formulating national development plan -- Improving regional planning -- Development planning reform at the county level -- The planning of the major function-oriented zones: Initiation and evolution -- Institutionalization of national development planning -- Improvement and innovation of national development planning system.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.