With the proliferation of social network services, more and more social users, such as individuals and organizations, are simultaneously involved in multiple social networks for various purposes. In fact, multiple social networks characterize the same social users from different perspectives, and their contexts are usually consistent or complementary rather than independent. Hence, as compared to using information from a single social network, appropriate aggregation of multiple social networks offers us a better way to comprehensively understand the given social users. Learning across multiple social networks brings opportunities to new services and applications as well as new insights on user online behaviors, yet it raises tough challenges: (1) How can we map different social network accounts to the same social users? (2) How can we complete the item-wise and block-wise missing data? (3) How can we leverage the relatedness among sources to strengthen the learning performance? And (4) How can we jointly model the dual-heterogeneities: multiple tasks exist for the given application and each task has various features from multiple sources? These questions have been largely unexplored to date. We noticed this timely opportunity, and in this book we present some state-of-the-art theories and novel practical applications on aggregation of multiple social networks. In particular, we first introduce multi-source dataset construction. We then introduce how to effectively and efficiently complete the item-wise and block-wise missing data, which are caused by the inactive social users in some social networks. We next detail the proposed multi-source mono-task learning model and its application in volunteerism tendency prediction. As a counterpart, we also present a mono-source multi-task learning model and apply it to user interest inference. We seamlessly unify these models with the so-called multi-source multi-task learning, and demonstrate several application scenarios, such as occupation prediction. Finally, we conclude the book and figure out the future research directions in multiple social network learning, including the privacy issues and source complementarity modeling. This is preliminary research on learning from multiple social networks, and we hope it can inspire more active researchers to work on this exciting area. If we have seen further it is by standing on the shoulders of giants.
Provides the fundamental principles and practical tools needed to design next-generation wireless networks that are both energy- and spectrum-efficient.
This book constitutes the refereed proceedings of the 8th International Conference on Data Warehousing and Knowledge Discovery, DaWak 2007, held in Regensburg, Germany, September 2007. Coverage includes ETL processing, multidimensional design, OLAP and multidimensional model, cubes processing, data warehouse applications, frequent itemsets, ontology-based mining, clustering, association rules, miscellaneous applications, and classification.
Christian dialogic writings flourished in the Catholic missions in late Ming China. This study focuses on the mission work of the Italian Jesuit Giulio Aleni (Ai Rulüe 艾儒略, 1582–1649) in Fujian and the unique text Kouduo richao 口鐸日抄 (Diary of Oral Admonitions, 1630–1640) that records the religious and intellectual conversations among the Jesuits and local converts. By examining the mechanisms of dialogue in Kouduo richao and other Christian works distinguished by a certain dialogue form, the author of the present work aims to reveal the formation of a hybrid Christian–Confucian identity in late Ming Chinese religious experience. By offering the new approach of dialogic hybridization, the book not only treats dialogue as an important yet underestimated genre in late Ming Christian literature, but it also uncovers a self–other identity complex in the dialogic exchanges of the Jesuits and Chinese scholars. Giulio Aleni, Kouduo richao, and Christian–Confucian Dialogism in Late Ming Fujian is a multi-faceted investigation of the religious, philosophical, ethical, scientific, and artistic topics discussed among the Jesuits and late Ming scholars. This comprehensive research echoes what the distinguished Sinologist Erik Zürcher (1928–2008) said about the richness and diversity of Chinese Christian texts produced in the 17th and 18th centuries. Following Zürcher’s careful study and annotated full translation of Kouduo richao (Monumenta Serica Monograph Series, LVI/1-2), the present work features a set of new findings beyond the endeavours of Zürcher and other scholars. With the key concept of Christian-Confucian dialogism, it tells the intriguing story of Aleni’s mission work and the thriving Christian communities in late Ming Fujian.
Gabor and wavelet analyses have found widespread applications in signal analysis, image processing and many other information-related areas. Both deliver representations that are simultaneously local in time and in frequency. Due to their significance and success in practical applications, they formed some of the core topics of the program ?Mathematics and Computation in Imaging Science and Information Processing?, which was held at the Institute for Mathematical Sciences, National University of Singapore, from July to December 2003 and in August 2004. As part of the program, tutorial lectures were conducted by international experts, and they covered a wide spectrum of topics in mathematical image, signal and information processing.This volume includes exposition articles by the tutorial speakers on the foundations of Gabor analysis, subband filters and wavelet algorithms, and operator-theoretic interpolation of wavelets and frames. It also presents research papers on Gabor analysis, written by specialists in their respective areas. The volume takes graduate students and researchers new to the field on a valuable learning journey from introductory Gabor and wavelet analyses to advanced topics of current research.
Cooperative Control of Nonlinear Networked Systems is concerned with the distributed cooperative control of multiple networked nonlinear systems in the presence of unknown non-parametric uncertainties and non-vanishing disturbances under certain communication conditions. It covers stability analysis tools and distributed control methods for analyzing and synthesizing nonlinear networked systems. The book presents various solutions to cooperative control problems of multiple networked nonlinear systems on graphs. The book includes various examples with segments of MATLAB® codes for readers to verify, validate, and replicate the results. The authors present a series of new control results for nonlinear networked systems subject to both non-parametric and non-vanishing uncertainties, including the cooperative uniformly ultimately bounded (CUUB) result, finite-time stability result, and finite-time cooperative uniformly ultimately bounded (FT-CUUB) result. With some mathematical tools, such as algebraic graph theory and certain aspects of matrix analysis theory introduced by the authors, the readers can obtain a deeper understanding of the roles of matrix operators as mathematical machinery for cooperative control design for multi-agent systems. Cooperative Control of Nonlinear Networked Systems is a valuable source of information for researchers and engineers in cooperative adaptive control, as its technical contents are presented with examples in full analytical and numerical detail, and graphically illustrated for easy-to-understand results. Scientists in research institutes and academics in universities working on nonlinear systems, adaptive control and distributed control will find the book of interest, as it contains multi-disciplinary problems and covers different areas of research.
This book provides a coherent and systematic view of the key concepts, principles, and techniques in maritime container transport and logistics chains including all the main segments: international maritime trade and logistics, freight logistics, container logistics, vessel logistics, port and terminal management, and sustainability issues in maritime transport. Container Logistics and Maritime Transport emphasizes analytical methods and current optimization models to tackle challenging issues in maritime transport and logistics. This book takes a holistic approach to cover all the main segments of the container shipping supply chains to achieve an efficient and effective logistics service system across the entire global transport chain. Sustainability issues such as social concern and carbon emissions from shipping and ports are also discussed. Each maritime transport segment is addressed using an approach from qualitative/descriptive analytics to quantitative/prescriptive analytics. Cutting-edge optimization models are presented and explained to tackle various strategic, tactical, and operational planning problems. The book will help readers better understand operations management in global maritime container transport chain. It will also provide practical principles and effective techniques and tools for researchers to push forward the frontiers of knowledge and for practitioners to implement decision support systems. It will be directly relevant to academic courses related to maritime transport, maritime logistics, transport management, international shipping, port management, container shipping, container logistics, shipping supply chain, and international logistics.
This book studies generalized Donaldson-Thomas invariants $\bar{DT}{}^\alpha(\tau)$. They are rational numbers which `count' both $\tau$-stable and $\tau$-semistable coherent sheaves with Chern character $\alpha$ on $X$; strictly $\tau$-semistable sheaves must be counted with complicated rational weights. The $\bar{DT}{}^\alpha(\tau)$ are defined for all classes $\alpha$, and are equal to $DT^\alpha(\tau)$ when it is defined. They are unchanged under deformations of $X$, and transform by a wall-crossing formula under change of stability condition $\tau$. To prove all this, the authors study the local structure of the moduli stack $\mathfrak M$ of coherent sheaves on $X$. They show that an atlas for $\mathfrak M$ may be written locally as $\mathrm{Crit}(f)$ for $f:U\to{\mathbb C}$ holomorphic and $U$ smooth, and use this to deduce identities on the Behrend function $\nu_\mathfrak M$. They compute the invariants $\bar{DT}{}^\alpha(\tau)$ in examples, and make a conjecture about their integrality properties. They also extend the theory to abelian categories $\mathrm{mod}$-$\mathbb{C}Q\backslash I$ of representations of a quiver $Q$ with relations $I$ coming from a superpotential $W$ on $Q$.
This book focuses on the evaluation, coordination, and effects of China’s natural resource utilization. By adopting both quantitative and qualitative analyses, this book objectively evaluates the spatial distribution characteristics and coupling relationship of China’s natural resource utilization based on the status quo and prominent problems during resource utilization. Moreover, the environmental, economic, and price fluctuation effects of China’s natural resource utilization are discussed. Finally, current policy systems for efficient utilization of natural resources in China and abroad are provided, which suggest a way for China to achieve efficient utilization of natural resources through an appropriate policy mechanism. This book aims to seek the balance the utilization of natural resources and sustainable development in China. It puts forward a new paradigm of natural resource utilization by incorporating the efficiency evaluation, coordination measures, and effect mechanisms of different kinds of natural resources. The evaluation system and related research methods for the efficient utilization of natural resources are very mature, laying a foundation for the development of this book’s content. As the conservation of natural resources is widely accepted, this book helps readers understand how to achieve efficient natural resource utilization in China. Meanwhile, the study of resource utilization in China can provide insights for other countries.
This book presents essential research on a class of environmentally friendly alkylphosphonate herbicides. This class of herbicides acted as a competitive inhibitor of the pyruvate dehydrogenase complex (PDHc) to control weeds. The bioreasoning and systematic approach, from basic research to field tests of candidate compounds, are introduced. The basic research covers the molecular design, chemical synthesis, biological activities evaluation, structure-activity relationship analysis and structural optimization. Subsequently, the book reviews the biochemistry of PDHc inhibitors, the selectivity between mammals and plants, and the mechanism of herbicidal activity of novel alkylphosphonates as selective PDHc inhibitors. Field trials for selected alkylphosphonate candidates as herbicides are also included. This book provides a sound basis for the rational design and development of novel herbicides as effective PDHc inhibitors with good enzyme-selective inhibition of plant PDHc between mammals and plants. These studies take full advantages of the low toxicity and low residual impact of selective PHDc inhibitors to design an effective and environmentally friendly herbicide. This book is based on twenty years of research on alkylphosphonates and phosphorus-containing PDHc inhibitors, and demonstrates how to develop these PDHc inhibitors as an effective and “green” herbicide candidate. Hong-Wu He, PhD, is a Professor at the Key Laboratory of Pesticide & Chemical Biology, Ministry of Education of China, and Director of the Institute of Pesticide Chemistry, College of Chemistry, Central China Normal University, China. Hao Peng, PhD, and Xiao-Song Tan are both Associate Professors at the Key Laboratory of Pesticide & Chemical Biology, Ministry of Education of China, College of Chemistry, Central China Normal University, China.
This book systematically presents the most recent progress in stability and control of impulsive systems with delays. Impulsive systems have recently attracted continued high research interests because they provide a natural framework for mathematical modeling of many real-world processes. It focuses not only on impulsive delayed systems, but also impulsive systems with delayed impulses and impulsive systems with event-triggered mechanism, including their Lyapunov stability, finite-time stability and input-to-state stability synthesis. Special attention is paid to the bilateral effects of the delayed impulses, where comprehensive stability properties are discussed in the framework of time-dependent and state-dependent delays. New original work with event-triggered impulsive control and its applications in multi-agent systems and collective dynamics are also provided. This book will be of use to specialists who are interested in the theory of impulsive differential equations and impulsive control theory, as well as high technology specialists who work in the fields of complex networks and applied mathematics. Also, instructors teaching graduate courses and graduate students will find this book a valuable source of nonlinear system theory.
The California Department of Health Services has established a provisional action level of 4 ug/L for perchlorate in drinking water due to its toxicity. There are 14 states in the United States that have thus far confirmed perchlorate in ground or surface waters. Ongoing research is investigating other treatment technologies for perchlorate rejection, including biological degradation, ion exchange, and activated carbon. The major objectives of this project were to: determine the removal/rejection of perchlorate (ClO4-) ion by high pressure membranes, including reverse osmosis (RO), nanofiltration (NF), and tight ultrafiltration (UF); evaluate the effects of water quality parameters, pH, ionic strength (conductivity), and co-ions and counter-ions, on process performance; and study membrane operating conditions (e.g., recovery) on perchlorate rejection and potential scaling. Water quality is a determining factor in applying high pressure membranes to perchlorate rejection. Effective rejection of perchlorate by RO, NF, and tight UF has been demonstrated according to two rejection mechanisms: steric (size) versus electrostatic (charge) exclusion. Based on its size (hydrodynamic radius), perchlorate is selectively rejected over chloride through size exclusion; however, based on charge exclusion, sulfate is selectively rejected over perchlorate. Originally published by AwwaRF for its subscribers in 2003. This publication can also be purchased and downloaded via Pay Per View on Water Intelligence Online
This work details the statistical inference of linear models including parameter estimation, hypothesis testing, confidence intervals, and prediction. The authors discuss the application of statistical theories and methodologies to various linear models such as the linear regression model, the analysis of variance model, the analysis of covariance model, and the variance components model.
This book presents a class of novel, self-learning, optimal control schemes based on adaptive dynamic programming techniques, which quantitatively obtain the optimal control schemes of the systems. It analyzes the properties identified by the programming methods, including the convergence of the iterative value functions and the stability of the system under iterative control laws, helping to guarantee the effectiveness of the methods developed. When the system model is known, self-learning optimal control is designed on the basis of the system model; when the system model is not known, adaptive dynamic programming is implemented according to the system data, effectively making the performance of the system converge to the optimum. With various real-world examples to complement and substantiate the mathematical analysis, the book is a valuable guide for engineers, researchers, and students in control science and engineering.
Defrosting for Air Source Heat Pumps: Research, Analysis and Methods presents a detailed analysis of the methods, processes and problems relating to defrosting, a necessary requirement to maintain the performance of ASHP units. Readers will gain a deeper understanding of control strategies and system design optimization methods that improve the performance and reliability of units. The book discusses the most recent experimental and numerical studies of reverse cycle defrosting and the most widely used defrosting method for ASHP. Techno-economic considerations are also presented, as is the outlook for the future. This book is a valuable resource for research students and academics of thermal energy and mechanical engineering, especially those focusing on defrosting for ASHP, heating, ventilation and energy efficiency, as well as engineers and professionals engaged in the development and management of heat pump machinery. - Includes MATLAB codes that allow the reader to implement the knowledge they have acquired in their own simulations and projects - Discusses experimental and numerical studies to provide a well-rounded analysis of technologies, methods and available systems - Presents techno-economic considerations and a look to the future
Translating Chinese Art and Modern Literature examines issues in cross-cultural dialogue in connection with translation and modern Chinese art and literature from interdisciplinary perspectives. This comprises the text-image dialogue in the context of Chinese modernity, and cross-cultural interaction between modern literature in Chinese and other literatures. This edited collection approaches these issues with discrete foci and approaches, and the ten chapters in this volume are to be divided into two distinct parts. The first part highlights the mutual effects between literary texts and visual images in the media of book, painting, and film, and the second part includes contributions by scholars of literary translation.
Introduces fundamental theory, basic and advanced algorithms, and system design issues. Essential reading for experienced researchers and developers, or for those who are just entering the field.
Suitable for students of all levels, this book provides a general description of the Korean language by highlighting important structural aspects whilst keeping technical details to a minimum. By examining the Korean language in its geographical, historical, social and cultural context the reader is able to gain a good understanding of its speakers and the environment in which it is used. The book covers a range of topics on Korean including its genetic affiliation, historical development, sound patterns, writing systems, vocabulary, grammar and discourse. The text is designed to be accessible, primarily to English-speaking learners of Korean and scholars working in disciplines other than linguistics, as well as serving as a useful introduction for general linguists. The book complements Korean language textbooks used in the classroom and will be welcomed not only by readers with a wider interest in Korean studies, but also by Asian specialists in general.
Emphasizing the inductive nature of statistical thinking, Environmental and Ecological Statistics with R, Second Edition, connects applied statistics to the environmental and ecological fields. Using examples from published works in the ecological and environmental literature, the book explains the approach to solving a statistical problem, covering model specification, parameter estimation, and model evaluation. It includes many examples to illustrate the statistical methods and presents R code for their implementation. The emphasis is on model interpretation and assessment, and using several core examples throughout the book, the author illustrates the iterative nature of statistical inference. The book starts with a description of commonly used statistical assumptions and exploratory data analysis tools for the verification of these assumptions. It then focuses on the process of building suitable statistical models, including linear and nonlinear models, classification and regression trees, generalized linear models, and multilevel models. It also discusses the use of simulation for model checking, and provides tools for a critical assessment of the developed models. The second edition also includes a complete critique of a threshold model. Environmental and Ecological Statistics with R, Second Edition focuses on statistical modeling and data analysis for environmental and ecological problems. By guiding readers through the process of scientific problem solving and statistical model development, it eases the transition from scientific hypothesis to statistical model.
There have been many advances in the diagnosis and treatment of cancer, but it is still a feared disease with a lot of work left to be done. The importance of gastrointestinal cancer as a frequently occurring disease goes without saying. It accounts for half of human cancer cases but differs from other forms of cancer. Complete prevention is possible through proper treatment of precancerous lesions. There is still no comprehensive book about prevention, early diagnosis, and proper treatment of precancerous lesions and new developed diagnostic modality, and treatment such as endoscopic treatment and minimal invasive surgery and chemotherapy and immunotherapy. Also, this book will contain conservative treatment methods for patients suffering from diverse complications. There will be plentiful clinical cases including endoscopic findings, radiologic images, pathology and treatment outcome in this book. For these reasons, this book will give very valuable information to many gastroenterologists, oncologists , surgeons and general physicians.
This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference.
Asynchronous On-Chip Networks and Fault-Tolerant Techniques is the first comprehensive study of fault-tolerance and fault-caused deadlock effects in asynchronous on-chip networks, aiming to overcome these drawbacks and ensure greater reliability of applications. As a promising alternative to the widely used synchronous on-chip networks for multicore processors, asynchronous on-chip networks can be vulnerable to faults even if they can deliver the same performance with much lower energy and area compared with their synchronous counterparts – faults can not only corrupt data transmission but also cause a unique type of deadlock. By adopting a new redundant code along with a dynamic fault detection and recovery scheme, the authors demonstrate that asynchronous on-chip networks can be efficiently hardened to tolerate both transient and permanent faults and overcome fault-caused deadlocks. This book will serve as an essential guide for researchers and students studying interconnection networks, fault-tolerant computing, asynchronous system design, circuit design and on-chip networking, as well as for professionals interested in designing fault-tolerant and high-throughput asynchronous circuits.
This book aims at the tiny machine learning (TinyML) software and hardware synergy for edge intelligence applications. It presents on-device learning techniques covering model-level neural network design, algorithm-level training optimization, and hardware-level instruction acceleration. Analyzing the limitations of conventional in-cloud computing would reveal that on-device learning is a promising research direction to meet the requirements of edge intelligence applications. As to the cutting-edge research of TinyML, implementing a high-efficiency learning framework and enabling system-level acceleration is one of the most fundamental issues. This book presents a comprehensive discussion of the latest research progress and provides system-level insights on designing TinyML frameworks, including neural network design, training algorithm optimization and domain-specific hardware acceleration. It identifies the main challenges when deploying TinyML tasks in the real world and guides the researchers to deploy a reliable learning system. This volume will be of interest to students and scholars in the field of edge intelligence, especially to those with sufficient professional Edge AI skills. It will also be an excellent guide for researchers to implement high-performance TinyML systems.
Emphasizing the inductive nature of statistical thinking, Environmental and Ecological Statistics with R, Second Edition, connects applied statistics to the environmental and ecological fields. Using examples from published works in the ecological and environmental literature, the book explains the approach to solving a statistical problem, covering model specification, parameter estimation, and model evaluation. It includes many examples to illustrate the statistical methods and presents R code for their implementation. The emphasis is on model interpretation and assessment, and using several core examples throughout the book, the author illustrates the iterative nature of statistical inference. The book starts with a description of commonly used statistical assumptions and exploratory data analysis tools for the verification of these assumptions. It then focuses on the process of building suitable statistical models, including linear and nonlinear models, classification and regression trees, generalized linear models, and multilevel models. It also discusses the use of simulation for model checking, and provides tools for a critical assessment of the developed models. The second edition also includes a complete critique of a threshold model. Environmental and Ecological Statistics with R, Second Edition focuses on statistical modeling and data analysis for environmental and ecological problems. By guiding readers through the process of scientific problem solving and statistical model development, it eases the transition from scientific hypothesis to statistical model.
Optimal Observation for Cyber-physical Systems" addresses the challenge, fundamental to the design of wireless sensor networks (WSNs), presented by the obligatory trade-off between precise estimates and system constraints. A unified theoretical framework, based on the well-established theory of optimal experimental design and providing consistent solutions to problems hitherto requiring a variety of approaches, is put forward to solve a large class of optimal observation problems. The Fisher information matrix plays a key role in this framework and makes it feasible to provide analytical solutions to some complex and important questions which could not be answered in the past. Readers with an applied background in WSN implementation will find all the understanding of the key theory of optimal experimental design they need within this book. The use of multiple examples to illustrate the theoretical parts of the book brings the subject into sharper focus than would an abstract theoretical disquisition.
The intelligent vehicle will play a crucial and essential role in the development of the future intelligent transportation system, which is developing toward the connected driving environment, ultimate driving safety, and comforts, as well as green efficiency. While the decision making, planning, and control are extremely vital components of the intelligent vehicle, these modules act as a bridge, connecting the subsystem of the environmental perception and the bottom-level control execution of the vehicle as well. This short book covers various strategies of designing the decision making, trajectory planning, and tracking control, as well as share driving, of the human-automation to adapt to different levels of the automated driving system. More specifically, we introduce an end-to-end decision-making module based on the deep Q-learning, and improved path-planning methods based on artificial potentials and elastic bands which are designed for obstacle avoidance. Then, the optimal method based on the convex optimization and the natural cubic spline is presented. As for the speed planning, planning methods based on the multi-object optimization and high-order polynomials, and a method with convex optimization and natural cubic splines, are proposed for the non-vehicle-following scenario (e.g., free driving, lane change, obstacle avoidance), while the planning method based on vehicle-following kinematics and the model predictive control (MPC) is adopted for the car-following scenario. We introduce two robust tracking methods for the trajectory following. The first one, based on nonlinear vehicle longitudinal or path-preview dynamic systems, utilizes the adaptive sliding mode control (SMC) law which can compensate for uncertainties to follow the speed or path profiles. The second one is based on the five-degrees-of-freedom nonlinear vehicle dynamical system that utilizes the linearized time-varying MPC to track the speed and path profile simultaneously. Toward human-automation cooperative driving systems, we introduce two control strategies to address the control authority and conflict management problems between the human driver and the automated driving systems. Driving safety field and game theory are utilized to propose a game-based strategy, which is used to deal with path conflicts during obstacle avoidance. Driver's driving intention, situation assessment, and performance index are employed for the development of the fuzzy-based strategy. Multiple case studies and demos are included in each chapter to show the effectiveness of the proposed approach. We sincerely hope the contents of this short book provide certain theoretical guidance and technical supports for the development of intelligent vehicle technology.
As networks of video cameras are installed in many applications like security and surveillance, environmental monitoring, disaster response, and assisted living facilities, among others, image understanding in camera networks is becoming an important area of research and technology development. There are many challenges that need to be addressed in the process. Some of them are listed below: - Traditional computer vision challenges in tracking and recognition, robustness to pose, illumination, occlusion, clutter, recognition of objects, and activities; - Aggregating local information for wide area scene understanding, like obtaining stable, long-term tracks of objects; - Positioning of the cameras and dynamic control of pan-tilt-zoom (PTZ) cameras for optimal sensing; - Distributed processing and scene analysis algorithms; - Resource constraints imposed by different applications like security and surveillance, environmental monitoring, disaster response, assisted living facilities, etc. In this book, we focus on the basic research problems in camera networks, review the current state-of-the-art and present a detailed description of some of the recently developed methodologies. The major underlying theme in all the work presented is to take a network-centric view whereby the overall decisions are made at the network level. This is sometimes achieved by accumulating all the data at a central server, while at other times by exchanging decisions made by individual cameras based on their locally sensed data. Chapter One starts with an overview of the problems in camera networks and the major research directions. Some of the currently available experimental testbeds are also discussed here. One of the fundamental tasks in the analysis of dynamic scenes is to track objects. Since camera networks cover a large area, the systems need to be able to track over such wide areas where there could be both overlapping and non-overlapping fields of view of the cameras, as addressed in Chapter Two: Distributed processing is another challenge in camera networks and recent methods have shown how to do tracking, pose estimation and calibration in a distributed environment. Consensus algorithms that enable these tasks are described in Chapter Three. Chapter Four summarizes a few approaches on object and activity recognition in both distributed and centralized camera network environments. All these methods have focused primarily on the analysis side given that images are being obtained by the cameras. Efficient utilization of such networks often calls for active sensing, whereby the acquisition and analysis phases are closely linked. We discuss this issue in detail in Chapter Five and show how collaborative and opportunistic sensing in a camera network can be achieved. Finally, Chapter Six concludes the book by highlighting the major directions for future research. Table of Contents: An Introduction to Camera Networks / Wide-Area Tracking / Distributed Processing in Camera Networks / Object and Activity Recognition / Active Sensing / Future Research Directions
Due to the increased capability, reliability, robustness, and survivability of systems with multiple distributed sensors, multi-source information fusion has become a crucial technique in a growing number of areas-including sensor networks, space technology, air traffic control, military engineering, agriculture and environmental engineering, and i
This book provides readers with a valuable guide to understanding security and the interplay of computer science, microfluidics, and biochemistry in a biochip cyberphysical system (CPS). The authors uncover new, potential threat and trust-issues to address, as this emerging technology is poised to be adapted at a large scale. Readers will learn how to secure biochip CPS by leveraging the available resources in different application contexts, as well as how to ensure intellectual property (IP) is protected against theft and counterfeits. This book enables secure biochip CPS design by helping bridge the knowledge gap at the intersection of the multi-disciplinary technology that drives biochip CPS.
This book is mainly focused on the climate change in Southeast Asia and its adjacent regions. It summarizes results from recent scientific research based on observational analysis, data diagnosis, theoretical analysis, and model simulations. The book covers the following research areas: (1) characteristics and mechanisms of spring–summer atmospheric circulation systems, (2) ocean-atmosphere-land interaction and climate variability, (3) climate effect of the Tibetan Plateau, (4) attribution of regional climate change and feedback/impact of regional climate on the global climate, and (5) seasonal-to-subseasonal climate prediction. It is anticipated that the book provides useful information for enhancing our understanding of the change in climate over Southeast Asia and the adjacent regions.
Extended Finite Element and Meshfree Methods provides an overview of, and investigates, recent developments in extended finite elements with a focus on applications to material failure in statics and dynamics. This class of methods is ideally suited for applications, such as crack propagation, two-phase flow, fluid-structure-interaction, optimization and inverse analysis because they do not require any remeshing. These methods include the original extended finite element method, smoothed extended finite element method (XFEM), phantom node method, extended meshfree methods, numerical manifold method and extended isogeometric analysis. This book also addresses their implementation and provides small MATLAB codes on each sub-topic. Also discussed are the challenges and efficient algorithms for tracking the crack path which plays an important role for complex engineering applications. - Explains all the important theory behind XFEM and meshfree methods - Provides advice on how to implement XFEM for a range of practical purposes, along with helpful MATLAB codes - Draws on the latest research to explore new topics, such as the applications of XFEM to shell formulations, and extended meshfree and extended isogeometric methods - Introduces alternative modeling methods to help readers decide what is most appropriate for their work
To deliver a construction project on time, at cost and of appropriate quality, it is critical to manage the design and construction process effectively... This book provides a comprehensive introduction to the field of process management in design and construction in order to meet the business needs of the construction industry as they change in today’s highly competitive global environment. It identifies the current state of the industry in the process management field, describing trends and developments (including information technology), and demonstrates these through case study evidence. Practical guidance is offered by identifying potential pitfalls, illustrating best practise drawn from construction and appropriate manufacturing applications. The overall approach is a holistic one, based on practical experience gained throughout the past decade both in the academic and industrial environments, including leading a number of research projects on process and IT related topics in construction and manufacturing industries. Process Management in Design and Construction will provide students on construction and project management related courses with a description of the state of process management in design and construction - including current process models – as well as a future vision based on up-to-date research findings and good practice in the construction industry. The book also offers practical guidance to industrial and consultancy organisations on undertaking and implementing process management projects - including re-engineering their customer delivery processes through effective project
This book covers recent developments in correlated data analysis. It utilizes the class of dispersion models as marginal components in the formulation of joint models for correlated data. This enables the book to cover a broader range of data types than the traditional generalized linear models. The reader is provided with a systematic treatment for the topic of estimating functions, and both generalized estimating equations (GEE) and quadratic inference functions (QIF) are studied as special cases. In addition to the discussions on marginal models and mixed-effects models, this book covers new topics on joint regression analysis based on Gaussian copulas.
Hybrid organic-inorganic perovskites (HOIPs) have attracted substantial interest due to their chemical variability, structural diversity and favorable physical properties the past decade. This materials class encompasses other important families such as formates, azides, dicyanamides, cyanides and dicyanometallates. The book summarizes the chemical variability and structural diversity of all known hybrid organic-inorganic perovskites subclasses including halides, azides, formates, dicyanamides, cyanides and dicyanometallates. It also presents a comprehensive account of their intriguing physical properties, including photovoltaic, optoelectronic, dielectric, magnetic, ferroelectric, ferroelastic and multiferroic properties. Moreover, the current challenges and future opportunities in this exciting field are also been discussed. This timely book shows the readers a complete landscape of hybrid organic-inorganic pervoskites and associated multifuctionalities.
The only book to provide a unified view of the interplay between computational number theory and cryptography Computational number theory and modern cryptography are two of the most important and fundamental research fields in information security. In this book, Song Y. Yang combines knowledge of these two critical fields, providing a unified view of the relationships between computational number theory and cryptography. The author takes an innovative approach, presenting mathematical ideas first, thereupon treating cryptography as an immediate application of the mathematical concepts. The book also presents topics from number theory, which are relevant for applications in public-key cryptography, as well as modern topics, such as coding and lattice based cryptography for post-quantum cryptography. The author further covers the current research and applications for common cryptographic algorithms, describing the mathematical problems behind these applications in a manner accessible to computer scientists and engineers. Makes mathematical problems accessible to computer scientists and engineers by showing their immediate application Presents topics from number theory relevant for public-key cryptography applications Covers modern topics such as coding and lattice based cryptography for post-quantum cryptography Starts with the basics, then goes into applications and areas of active research Geared at a global audience; classroom tested in North America, Europe, and Asia Incudes exercises in every chapter Instructor resources available on the book’s Companion Website Computational Number Theory and Modern Cryptography is ideal for graduate and advanced undergraduate students in computer science, communications engineering, cryptography and mathematics. Computer scientists, practicing cryptographers, and other professionals involved in various security schemes will also find this book to be a helpful reference.
The Semantics of Chinese Classifiers and Linguistic Relativity focuses on the semantic structure of Chinese classifiers under the cognitive linguistics framework, and the implications thereof on linguistic relativity and language acquisition. It examines the semantic correlation between a given classifier and its associated nouns. Nouns in Chinese, which are assigned specific classifiers according to their selected characteristics, reflect the process of human categorization. The concrete categories formed by the relationship between nouns and classifiers may serve to explain the conceptual structure of the Chinese language and certain underlying aspects of culture and human cognition. Song Jiang is Assistant Professor of Chinese for the Department of East Asian Languages and Literatures at university of Hawai‘i at Mānoa.
Up-to-date, comprehensive coverage on radiation-processed polymer materials and their applications Offering a unique perspective of the industrial and commercial applications of the radiation processing of polymers, this insightful reference examines the fundamental scientific principles and cutting-edge developments advancing this diverse field. Through a variety of case studies, detailed examples, and economic feasibility analysis, Radiation Processing of Polymer Materials and Its Industrial Applications systematically explains the commercially viable ways to process and use radiation-processed polymeric materials in industrial products. In addition, this one-of-kind text: Covers important chemistry and processing fundamentals, while emphasizing their translation into practical applications of radiation-processed polymers Incorporates new applications in nanotechnology, biomaterials, and recycling Systematically discusses new developments in the field and summarizes past achievements By helping readers—from students to scientists, engineers, technicians, and sales and marketing professionals—understand and solve problems associated with radiation processing of polymers, Radiation Processing of Polymer Materials and Its Industrial Applications serves as an essential reference and fills an important gap in the literature.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.