As part of the Chinese Modern Engineering series, this fine picture book introduces the history of rail transportation and important knowledge about high-speed rail that is making a huge impact on people's lives.
As part of the Chinese Modern Engineering series, this fine picture book introduces the history of tunnels and important knowledge about various kinds of tunnels that are making a huge impact on people's lives.
As part of the Chinese Modern Engineering series, this fine picture book introduces important knowledge about skyscraper construction and some world-famous skyscrapers that are making a huge impact on people's lives.
This book discusses various aspects of text data mining. Unlike other books that focus on machine learning or databases, it approaches text data mining from a natural language processing (NLP) perspective. The book offers a detailed introduction to the fundamental theories and methods of text data mining, ranging from pre-processing (for both Chinese and English texts), text representation and feature selection, to text classification and text clustering. It also presents the predominant applications of text data mining, for example, topic modeling, sentiment analysis and opinion mining, topic detection and tracking, information extraction, and automatic text summarization. Bringing all the related concepts and algorithms together, it offers a comprehensive, authoritative and coherent overview. Written by three leading experts, it is valuable both as a textbook and as a reference resource for students, researchers and practitioners interested in text data mining. It can also be used for classes on text data mining or NLP.
As part of the Chinese Modern Engineering series, this fine picture book introduces important knowledge about modern bridge construction and some famous bridges in China that are making a huge impact on people's lives.
This book introduces the engineering application of the discrete element method (DEM), especially the simulation analysis of the typical equipment (scraper conveyor, coal silos, subsoiler) in the coal and agricultural machinery. In this book, the DEM is applied to build rigid and loose coupling model, and the kinematic effect of the bulk materials, the mechanical effect of the interaction between the bulk materials, and the mechanical equipment in the operation process of the relevant equipment are studied. On this basis, the optimization design strategy of the relevant structure is proposed. This book effectively promotes the application of DEM in engineering, analyzes the operation state, failure mechanism, and operation effect of related equipment in operation, and provides theoretical basis for the optimal design of equipment. The book is intended for undergraduate and graduate students who are interested in mechanical engineering, researchers investigating coal and agricultural machinery, and engineers working on designing related equipments.
Li Xun, a successful university student who had just started his career two years ago, accidentally died and transmigrated to the continent of the Sword Soul. After his rebirth, his luck here was extremely good. There were always all kinds of fortuitous encounters, such as the Illusory Sword Realm, the Sword Spirit Clan's inheritance, the trial of the demon race in the seabed, the compromise of the dragon race, the pursuit of the dark sword clan, and the hope of the descendants of the god race. All sorts of top quality beauties appeared one after another at Li Xun's side. Was it necessary to accept all of the unexpected marriages, Princess Sword Spirit's tens of thousands of years of waiting, cheap fiancées, the people who followed orders to die for him, etc., after seeing each other twice? Close]
This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for breaking privacy, and gives intuition on how to design algorithm to counter privacy attacks. Some well-designed differential privacy algorithms are also included in this book. Driven by lower cost, higher reliability, better performance, and faster deployment, data and computing services are increasingly outsourced to clouds. In this computing paradigm, one often has to store privacy sensitive data at parties, that cannot fully trust and perform privacy sensitive computation with parties that again cannot fully trust. For both scenarios, preserving data privacy and computation privacy is extremely important. After the Facebook–Cambridge Analytical data scandal and the implementation of the General Data Protection Regulation by European Union, users are becoming more privacy aware and more concerned with their privacy in this digital world. This book targets database engineers, cloud computing engineers and researchers working in this field. Advanced-level students studying computer science and electrical engineering will also find this book useful as a reference or secondary text.
Clustering techniques are increasingly being put to use in the analysis of high-throughput biological datasets. Novel computational techniques to analyse high throughput data in the form of sequences, gene and protein expressions, pathways, and images are becoming vital for understanding diseases and future drug discovery. This book details the complete pathway of cluster analysis, from the basics of molecular biology to the generation of biological knowledge. The book also presents the latest clustering methods and clustering validation, thereby offering the reader a comprehensive review of clustering analysis in bioinformatics from the fundamentals through to state-of-the-art techniques and applications. Key Features: Offers a contemporary review of clustering methods and applications in the field of bioinformatics, with particular emphasis on gene expression analysis Provides an excellent introduction to molecular biology with computer scientists and information engineering researchers in mind, laying out the basic biological knowledge behind the application of clustering analysis techniques in bioinformatics Explains the structure and properties of many types of high-throughput datasets commonly found in biological studies Discusses how clustering methods and their possible successors would be used to enhance the pace of biological discoveries in the future Includes a companion website hosting a selected collection of codes and links to publicly available datasets
Once he returned back to his country, Jin Liyong threw his unruly son to him. She wanted him to bring that violent and tyrannical Ruffian? As a financial guild with a high emotional IQ, Qi Yun did not believe that he could not manage this little scoundrel ... This is the story of a black elite being attacked by loyal dogs and tyrannical thugs.
This book presents a detailed analysis of the Chinese pivotal constructions (PVCs) and their diachronic developments from a constructionalist perspective, with the focus on the growth of the constructional hierarchies of these constructions and the changes with respect to both the form and meaning properties over time. The most important enabling factor behind the diachronic developments of the PVCs has been the sanction of the new instances conflicting with the constructions’ specifications. Throughout history the PVCs have grown along the two dimensions, i.e., inclusiveness and multileveledness, leading to a steady increase in the sizes of their constructional hierarchies. The two-dimensional expansion of the PVCs’ constructional hierarchies has been accompanied by the gradual relaxation of the conditions constraining the earliest instances, on multiple schematicity levels. This book will be valuable to scholars working on diachronic construction grammar and language change as well as to those interested in the history of Chinese language.
Appraisal is the way language users express their attitude towards things, people, behaviour or ideas. In the last few decades, significant achievements have been made in Appraisal Theory research, yet little attention has been paid to appraisal in scientific texts, especially in relation to the contrast to how it is applied in English and Chinese. This title examines the similarities and differences of Appraisal systems in English and Chinese scientific research articles. Using a self-constructed corpus of scientific research articles, the authors make cross-linguistic comparisons in terms of the quantity and distribution patterns of categories of appraisals. They creatively categorise articles into theoretical scientific research articles and applied studies and discover that for both languages, each genre can have its own favorite mode of distribution for the realization of appraisal systems. In addition, this research helps appraisal theory systems to become more explicit, specific, and more applicable for the analysis of scientific research articles. Students and scholars of applied linguistics, comparative linguistics and corpus linguistics will find this an essential reference.
This book proposes the novel network envisions and framework design principles, in order to systematically expound the next generation vehicular networks, including the modelling, algorithms and practical applications. It focuses on the key enabling technologies to design the next generation vehicular networks with various vehicular services to realize the safe, convenient and comfortable driving. The next generation vehicular networks has emerged to provide services with a high quality of experience (QoE) to vehicles, where both better network maintainability and sustainability can be obtained than before. The framework design principles and related network architecture are also covered in this book. Then, the series of research topics are discussed including the reputation based content centric delivery, the contract based mobile edge caching, the Stackelberg game model based computation offloading, the auction game based secure computation offloading, the bargain game based security protection and the deep learning based autonomous driving. Finally, the investigation, development and future works are also introduced for designing the next generation vehicular networks. The primary audience for this book are researchers, who work in computer science and electronic engineering. Professionals working in the field of mobile networks and communications, as well as engineers and technical staff who work on the development or the standard of computer networks will also find this book useful as a reference.
This book traces and analyzes the transformation of the public discourse of science and technology in Mao-era China. Based on extensive primary sources such as science dissemination materials and technical handbooks, as well as mass media products of the Great Leap Forward and the Cultural Revolution periods, this book delineates the emergence of a pragmatic approach to knowledge in society. To achieve the goal of fast modernization with limited financial, human, and material resources, the party-state accommodated Western and local, "modern" and "traditional" knowledges in the fields of agricultural mechanization, steel production and Chinese veterinary medicine. The case studies demonstrate that scientific knowledge production in the Mao-era included various social groups and was entangled with political and cultural issues. This reveals and explains the continuity of scientific thinking across the historical divides of 1949 and 1978, which has hitherto been underestimated.
This book, from the perspective of reliability science construction, proposes a new theory called BELIEF RELIABILITY theory on the basis of probability theory, uncertainty theory and chance theory. The main topics include the philosophical basis of reliability science, the principles of reliability science, the criteria of reasonable reliability metrics and the basic theoretical framework and methodology of belief reliability theory. In this book, the belief reliability metric, analysis, design and evaluation methods will provide readers with a brand-new perspective on reliability applications and uncertainty quantification.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.