This issue of MRI Clinics of North America focuses on Imaging of the PET/MR Imaging, and articles will include: Principles of PET/MR Imaging; Attenuation Correction of PET/MR Imaging; MR-Derived Improvements in PET Imaging; Neurological Applications of PET/MR; Oncological Applications of PET/MR Imaging on the Head and Neck; Oncological Applications of PET/MR Imaging on GYN/GU; PET/MR Imaging of Multiple Myeloma; Pediatric Nuances of PET/MR Imaging; Cardiac Applications of PET/MR Imaging; Logistics and Practical Considerations of MR Coils for PET/MR; Integration of PET/MR Hybrid Imaging into Radiation Therapy Treatment; Practical Clinical Considerations of PET/MR; Incremental value of FDG PET/MR in Assessment of Rectal Cancer, and more!
The students who came to the United States in the early twentieth century to become modern Chinese by studying at American universities played pivotal roles in Chinese intellectual, economic, and diplomatic life upon their return to China. These former students exemplified key aspects of Chinese "modernity," introducing new social customs, new kinds of interpersonal relationships, new ways of associating in groups, and a new way of life in general. Although there have been books about a few especially well-known persons among them, this is the first book in either English or Chinese to study the group as a whole. The collapse of the traditional examination system and the need to earn a living outside the bureaucracy meant that although this was not the first generation of Chinese to break with traditional ways of thinking, these students were the first generation of Chinese to live differently. Based on student publications, memoirs, and other writings found in this country and in China, the author describes their multifaceted experience of life in a foreign, modern environment, involving student associations, professional activities, racial discrimination, new forms of recreation and cultural expression, and, in the case of women students, the unique challenges they faced as females in two changing societies.
In a conversational style and in chronological sequence, Ye Weili and Ma Xiaodong recount their earlier lives in China from the 1950s to the 1980s, a particularly eventful period that included the catastrophic Cultural Revolution. Using their own stories as two case studies, they examine the making of a significant yet barely understood generation in recent Chinese history. They also reflect upon the mixed legacy of the early decades of the People's Republic of China (PRC). In doing so, the book strives for a balance between critical scrutiny of a complex era and the sweeping rejection of that era that recent victim literature embraces. Ultimately Ye and Ma intend to reconnect themselves to a piece of land and a period of history that have given them a sense of who they are. Their stories contain intertwining layers of personal, generational, and historical experiences. Unlike other memoirs that were written soon after the events of the Cultural Revolution, Ye and Ma's narratives have been put together some twenty years later, allowing for more critical distance. The passage of time has allowed them to consider important issues that other accounts omit, such as the impact of gender during this period of radical change in Chinese women's lives.
This book sheds light on state-of-the-art theories for more challenging outfit compatibility modeling scenarios. In particular, this book presents several cutting-edge graph learning techniques that can be used for outfit compatibility modeling. Due to its remarkable economic value, fashion compatibility modeling has gained increasing research attention in recent years. Although great efforts have been dedicated to this research area, previous studies mainly focused on fashion compatibility modeling for outfits that only involved two items and overlooked the fact that each outfit may be composed of a variable number of items. This book develops a series of graph-learning based outfit compatibility modeling schemes, all of which have been proven to be effective over several public real-world datasets. This systematic approach benefits readers by introducing the techniques for compatibility modeling of outfits that involve a variable number of composing items. To deal with the challenging task of outfit compatibility modeling, this book provides comprehensive solutions, including correlation-oriented graph learning, modality-oriented graph learning, unsupervised disentangled graph learning, partially supervised disentangled graph learning, and metapath-guided heterogeneous graph learning. Moreover, this book sheds light on research frontiers that can inspire future research directions for scientists and researchers.
With a focus on the role of discourse and language in education, this book examines China’s educational reform from an original perspective that avoids mapping on Westernized educational sensibilities to a Chinese environment. Zhao untangles the tradition-modernity division expressed in China’s educational language about the body and teacher-student difference. Exploring the historical and cultural implications of the ways China’s schooling is talked about and acted upon, Zhao argues that Chinese notion "wind" (feng) is a defining aspect of Chinese teaching and learning. Incorporating Western and Chinese literature, this book explores the language of education, curriculum, and knowledge on a cross-cultural landscape and as cultural inscriptions.
This book systemically presents key concepts of multi-modal hashing technology, recent advances on large-scale efficient multimedia search and recommendation, and recent achievements in multimedia indexing technology. With the explosive growth of multimedia contents, multimedia retrieval is currently facing unprecedented challenges in both storage cost and retrieval speed. The multi-modal hashing technique can project high-dimensional data into compact binary hash codes. With it, the most time-consuming semantic similarity computation during the multimedia retrieval process can be significantly accelerated with fast Hamming distance computation, and meanwhile the storage cost can be reduced greatly by the binary embedding. The authors introduce the categorization of existing multi-modal hashing methods according to various metrics and datasets. The authors also collect recent multi-modal hashing techniques and describe the motivation, objective formulations, and optimization steps for context-aware hashing methods based on the tag-semantics transfer.
This book will serve as a reference, presenting state-of-the-art research on theoretical aspects of optimal sensor coverage problems. Readers will find it a useful tool for furthering developments on theory and applications of optimal coverage; much of the content can serve as material for advanced topics courses at the graduate level. The book is well versed with the hottest research topics such as Lifetime of Coverage, Weighted Sensor Cover, k-Coverage, Heterogeneous Sensors, Barrier, Sweep and Partial Coverage, Mobile Sensors, Camera Sensors and Energy-Harvesting Sensors, and more. Topics are introduced in a natural order from simple covers to connected covers, to the lifetime problem. Later, the book begins revisiting earlier problems ranging from the introduction of weights to coverage by k sensors and partial coverage, and from sensor heterogeneity to novel problems such as the barrier coverage problem. The book ends with coverage of mobile sensors, camera sensors, energy-harvesting sensors, underwater sensors, and crowdsensing.
This book provides an introduction to the mathematical theory of optimization. It emphasizes the convergence theory of nonlinear optimization algorithms and applications of nonlinear optimization to combinatorial optimization. Mathematical Theory of Optimization includes recent developments in global convergence, the Powell conjecture, semidefinite programming, and relaxation techniques for designs of approximation solutions of combinatorial optimization problems.
Introductory courses in combinatorial optimization are popular at the upper undergraduate/graduate levels in computer science, industrial engineering, and business management/OR, owed to its wide applications in these fields. There are several published textbooks that treat this course and the authors have used many of them in their own teaching experiences. This present text fills a gap and is organized with a stress on methodology and relevant content, providing a step-by-step approach for the student to become proficient in solving combinatorial optimization problems. Applications and problems are considered via recent technology developments including wireless communication, cloud computing, social networks, and machine learning, to name several, and the reader is led to the frontiers of combinatorial optimization. Each chapter presents common problems, such as minimum spanning tree, shortest path, maximum matching, network flow, set-cover, as well as key algorithms, such as greedy algorithm, dynamic programming, augmenting path, and divide-and-conquer. Historical notes, ample exercises in every chapter, strategically placed graphics, and an extensive bibliography are amongst the gems of this textbook.
With the rapid increase of world population, the global water shortage is set to be the major crises of the twenty-first century; that is, population dynamics (growth, age distribution, urbanization and migration) create pressures on freshwater resources due to the increased water demands and pollution. Moreover, water resources management faces a new uncertainty- i.e. the potential for longer-term and more persistent climate change nowadays, which, in coming years, may significantly affect the availability of supply and patterns of water demand. This book mainly focuses on the impact of climate change and human activities on water quality and water resources in Asia Countries. It begins by describing the characteristics of water related disasters in the world. Then, the book analyzes the changes of floods and associated socio-economic damages for whole China over the last century, and assesses water quality and pollution source for the Yangtze River Basin, suggesting water-related disasters would become more intense, longer lasting, and/or more frequent in a future warmer climate. Then, after investigating spatiotemporal trends and causes of water quality and water quality incidents (Chapter 4) and precipitation extreme events (Chapter 5) in Japan, subsequent two chapters mainly evaluate the climate and human impacts on precipitation variations, water quality and water resources in the Hokkaido area. The final chapter comprehensively analyzes climate change impacts on water resources in the Aral Sea Basin, and then estimate the water requirements and water deficits for irrigation, future agricultural yields of seven major crops, and land and water productivity in four provinces of Turkmenistan considering climate change, population growth, and three socio-economic development scenarios. All results obtained from this book may provide a means to reduce water quality incidents and mitigate future negative impacts by adapting water management. Furthermore, the improved methods for water quality modeling in data scarce regions are transferable to other study areas and applicable in future research.
This self-contained book describes social influence from a computational point of view, with a focus on recent and practical applications, models, algorithms and open topics for future research. Researchers, scholars, postgraduates and developers interested in research on social networking and the social influence related issues will find this book useful and motivating. The latest research on social computing is presented along with and illustrations on how to understand and manipulate social influence for knowledge discovery by applying various data mining techniques in real world scenarios. Experimental reports, survey papers, models and algorithms with specific optimization problems are depicted. The main topics covered in this book are: chrematistics of social networks, modeling of social influence propagation, popular research problems in social influence analysis such as influence maximization, rumor blocking, rumor source detection, and multiple social influence competing.
This book provides complete coverage of the slitting method. It details new results in analysis, computation, and estimation and discusses different roles of residual stresses from the fracture mechanics perspective. It provides detailed formulations and examples of compliance functions, weighted least squares fit and convergence test in stress estimation, and computer programs to facilitate the implementation of the slitting method.
In a conversational style and in chronological sequence, Ye Weili and Ma Xiaodong recount their earlier lives in China from the 1950s to the 1980s, a particularly eventful period that included the catastrophic Cultural Revolution. Using their own stories as two case studies, they examine the making of a significant yet barely understood generation in recent Chinese history. They also reflect upon the mixed legacy of the early decades of the People's Republic of China (PRC). In doing so, the book strives for a balance between critical scrutiny of a complex era and the sweeping rejection of that era that recent victim literature embraces. Ultimately Ye and Ma intend to reconnect themselves to a piece of land and a period of history that have given them a sense of who they are. Their stories contain intertwining layers of personal, generational, and historical experiences. Unlike other memoirs that were written soon after the events of the Cultural Revolution, Ye and Ma's narratives have been put together some twenty years later, allowing for more critical distance. The passage of time has allowed them to consider important issues that other accounts omit, such as the impact of gender during this period of radical change in Chinese women's lives.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.