This book presents the latest multi-pollutant (mainly NOx, SOx, particulate matter, heavy metals) control technologies for flue gases and the applications in coal-fired power plants. Pollutant control by catalytic, electric, and absorption methods, the multi-pollutant removal system and its performance evaluation are systematically introduced. This book is a valuable reference for researchers and practitioners in environmental science & engineering, energy power engineering, and chemical science & engineering, etc.
Dr. Gao finds the best provisions and practices in respect of the fraud rule in the United States, the United Kingdom, Canada, and Australia, and applies these standards to the reformulation of the fraud rule in the PRC. In the process be surveys the entire field of the fraud rule in the law of letters of credit in its substantive aspects, thus going deeper than mere banking law analyses and revealing, for the benefit of jurists everywhere, the fundamental legal issues that must underlie all sound judicial reasoning in the area. In more practical terms, this approach also allows judges to meet their essential responsibility - that of giving an answer when a case is put before them - with the widest and best possible degree of discernment."--BOOK JACKET.
The book is the first thorough study of the role of phosphorus chemistry in the origin of life. This book starts with depiction of the phosphorus role in life creation and evolution. Then it outlines in vital processes how different phosphorus-containing compounds participate as biomarker in life evolution. Written by renowned scientists, it is suitable for researchers and students in organic phosphorus chemistry, biochemistry and etc.
This book focuses specifically on the environmental issues related to the air pollution control and design. It is divided into four parts: (1) Fundamentals of air pollution control, (2) fundamentals of energy utilization, (3) gaseous control and design, and (4) particulate control and design, each consisting of four to six chapters. The topics covered in this book not only introduce the basic concepts of air pollution control and design but also address the fundamentals of energy utilization in the context of good engineering practice and policy instruments. It also features several innovative technologies and integrated methodologies relating to gaseous and particulate matter control and design. To facilitate technology integration and meet the need for comprehensive information on sustainable development, the book discusses a wide range of areas concerning the principles, applications, and assessment of air pollution control and design and thermodynamics, heat transfer, advanced combustion and renewable energy for energy utilization. It also features regulations and policy instruments adopted around the globe as well as several case studies. Presenting the emerging challenges, new concepts, innovative methodologies, and resolving strategies, as well as illustrative and inspiring case studies, it appeals to a wide range of readers, such as researchers, graduate students, engineers, policy makers, and entrepreneurs.
This book offers a systematic and comprehensive introduction to the visual simultaneous localization and mapping (vSLAM) technology, which is a fundamental and essential component for many applications in robotics, wearable devices, and autonomous driving vehicles. The book starts from very basic mathematic background knowledge such as 3D rigid body geometry, the pinhole camera projection model, and nonlinear optimization techniques, before introducing readers to traditional computer vision topics like feature matching, optical flow, and bundle adjustment. The book employs a light writing style, instead of the rigorous yet dry approach that is common in academic literature. In addition, it includes a wealth of executable source code with increasing difficulty to help readers understand and use the practical techniques. The book can be used as a textbook for senior undergraduate or graduate students, or as reference material for researchers and engineers in related areas.
This book proposes promising mmWave solutions to promoting safe and reliable vehicular communications. The authors include topics such as channel estimation, multi-user transceiver design, and advanced index modulation. For channel estimation, unique channel properties and hybrid structures are first introduced, followed by the development of a doubly-sparse doubly-selective channel estimator. For multi-user transceiver design, the concept of hybrid block diagonalization (HBD) is first introduced, followed by a generic HBD-based transceiver design to maximize the system capacity. For advanced index modulation, the generalized beamspace modulation for uplink multi-user scenarios are first introduced, followed by the precoded beamspace modulation for the downlink. Finally, this book discusses open problems and future research directions to inspire further studies in the field of mmWave vehicular communications.
With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing.
In the world of internet, wide adoption of computing devices dramatically reduces storage costs with easy access to huge amount of data, thus posing benefits and challenges to e-business amongst organizations.This unique compendium covers current status and practices of e-business among organizations, their challenges and future directions. It also includes studies of different perspectives and markets of e-business.The must-have volume will be a good reference text for professionals and organizations who are updating their e-business knowledge/skills and planning their e-business initiatives.
This book aims to sort out the clear logic of the development of machine learning-driven privacy preservation in IoTs, including the advantages and disadvantages, as well as the future directions in this under-explored domain. In big data era, an increasingly massive volume of data is generated and transmitted in Internet of Things (IoTs), which poses great threats to privacy protection. Motivated by this, an emerging research topic, machine learning-driven privacy preservation, is fast booming to address various and diverse demands of IoTs. However, there is no existing literature discussion on this topic in a systematically manner. The issues of existing privacy protection methods (differential privacy, clustering, anonymity, etc.) for IoTs, such as low data utility, high communication overload, and unbalanced trade-off, are identified to the necessity of machine learning-driven privacy preservation. Besides, the leading and emerging attacks pose further threats to privacy protection in this scenario. To mitigate the negative impact, machine learning-driven privacy preservation methods for IoTs are discussed in detail on both the advantages and flaws, which is followed by potentially promising research directions. Readers may trace timely contributions on machine learning-driven privacy preservation in IoTs. The advances cover different applications, such as cyber-physical systems, fog computing, and location-based services. This book will be of interest to forthcoming scientists, policymakers, researchers, and postgraduates.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.