Using the well-honed tools of nanotechnology, this book presents breakthrough results in soft matter research, benefitting from the synergies between the chemistry, physics, biology, materials science, and engineering communities. The team of international authors delves beyond mere structure-making and places the emphasis firmly on imparting functionality to soft nanomaterials with a focus on devices and applications. Alongside reviewing the current level of knowledge, they also put forward novel ideas to foster research and development in such expanding fields as nanobiotechnology and nanomedicine. As such, the book covers DNA-induced nanoparticle assembly, nanostructured substrates for circulating tumor cell capturing, and organic nano field effect transistors, as well as advanced dynamic gels and self-healing electronic nanodevices. With its interdisciplinary approach this book gives readers a complete picture of nanotechnology with soft matter.
This invaluable volume, written by an international group of scientists, presents an overview of the AdoMet-dependent methyltransferases, with special emphasis on structure-function relationships. S-adenosyl-L-methionine (AdoMet) is the second most commonly used enzyme cofactor after ATP. The AdoMet-dependent methyltransferases act on a wide variety of target molecules, including DNA, RNA, protein, polysaccharides, lipids and a range of small molecules. The well-conserved architecture of these enzymes, and the implications of this conservation for their evolutionary history, are major themes of this book. The thirteen chapters describe in detail the structures, enzyme kinetics and biological roles of the AdoMet-dependent methyltransferases from a wide range of cell types: plant, animal, bacterial and archaeal.
Visual Question Answering (VQA) usually combines visual inputs like image and video with a natural language question concerning the input and generates a natural language answer as the output. This is by nature a multi-disciplinary research problem, involving computer vision (CV), natural language processing (NLP), knowledge representation and reasoning (KR), etc. Further, VQA is an ambitious undertaking, as it must overcome the challenges of general image understanding and the question-answering task, as well as the difficulties entailed by using large-scale databases with mixed-quality inputs. However, with the advent of deep learning (DL) and driven by the existence of advanced techniques in both CV and NLP and the availability of relevant large-scale datasets, we have recently seen enormous strides in VQA, with more systems and promising results emerging. This book provides a comprehensive overview of VQA, covering fundamental theories, models, datasets, and promising future directions. Given its scope, it can be used as a textbook on computer vision and natural language processing, especially for researchers and students in the area of visual question answering. It also highlights the key models used in VQA.
This book addresses the sustainability of happiness and well-being in Chinese societies. It starts by introducing the various conceptions of well-being, particularly in the Chinese sociocultural context. The book then proceeds with the examination of the sustainability of well-being by scrutinizing the effects of sociocultural, contextual, and personal factors on well-being. The contextual factors are the aggregates or averages of personal factors at the contextual levels of the regions and colleges in Mainland China, its special administrative region, and Taiwan. These factors cover personality traits, strengths, orientations, beliefs, values, and idolizing. By bringing together empirical studies and theoretical perspectives applied to Chinese societies, this book offers researchers in social science and humanities a valuable reference work on happiness and well-being in Chinese societies.
Key problems and conjectures have played an important role in promoting the development of Ramsey theory, a field where great progress has been made during the past two decades, with some old problems solved and many new problems proposed. The present book will be helpful to readers who wish to learn about interesting problems in Ramsey theory, to see how they are interconnected, and then to study them in depth. This book is the first problem book of such scope in Ramsey theory. Many unsolved problems, conjectures and related partial results in Ramsey theory are presented, in areas such as extremal graph theory, additive number theory, discrete geometry, functional analysis, algorithm design, and in other areas. Most presented problems are easy to understand, but they may be difficult to solve. They can be appreciated on many levels and by a wide readership, ranging from undergraduate students majoring in mathematics to research mathematicians. This collection is an essential reference for mathematicians working in combinatorics and number theory, as well as for computer scientists studying algorithms. Contents Some definitions and notations Ramsey theory Bi-color diagonal classical Ramsey numbers Paley graphs and lower bounds for R(k, k) Bi-color off-diagonal classical Ramsey numbers Multicolor classical Ramsey numbers Generalized Ramsey numbers Folkman numbers The Erdős–Hajnal conjecture Other Ramsey-type problems in graph theory On van der Waerden numbers and Szemeredi’s theorem More problems of Ramsey type in additive number theory Sidon–Ramsey numbers Games in Ramsey theory Local Ramsey theory Set-coloring Ramsey theory Other problems and conjectures
Rural-urban migration within China has transformed and reshaped rural people’s lives during the past few decades, and has been one of the most visible phenomena of the economic reforms enacted since the late 1970s. Whilst Feminist scholars have addressed rural women’s experience of struggle and empowerment in urban China, in contrast, research on rural men’s experience of migration is a neglected area of study. In response, this book seeks to address the absence of male migrant workers as a gendered category within the current literature on rural-urban migration. Examining Chinese male migrant workers’ identity formation, this book explores their experience of rural-urban migration and their status as an emerging sector of a dislocated urban working class. It seeks to understand issues of gender and class through the rural migrant men’s narratives within the context of China’s modernization, and provides an in-depth analysis of how these men make sense of their new lives in the rapidly modernizing, post-Mao China with its emphasis on progress and development. Further, this book uses the men’s own narratives to challenge the elite assumption that rural men’s low status is a result of their failure to adopt a modern urban identity and lifestyle. Drawing on interviews with 28 male rural migrants, Xiaodong Lin unpacks the gender politics of Chinese men and masculinities, and in turn contributes to a greater understanding of global masculinities in an international context. This book will be of great interest to students and scholars working in the fields of Chinese culture and society, gender studies, migration studies, sociology and social anthropology. Shortlisted for this year's BSA Philip Abrams Memorial Prize.
Examining creativity in Chinese societies from both a personal and contextual standpoint, this ground-breaking book offers readers a unique insight into the Chinese mind. It provides a review of the nature, origins, and consequences of creativity, deriving from empirical evidence in the Chinese context. Specifically, the book unravels the conceptualization of creativity and its relationships with various demographic and dispositional factors in Chinese societies. The book proceeds to give readers an understanding of how creativity maintains reciprocal relationships with various forms of well-being. The content of the book brings together empirical evidence and theory grounded on Chinese societies to offer researchers and students a unique realistic view of the nature of creativity there. This book will be a must read for any researcher or practitioner interested in this fascinating topic.
This book addresses psychological studies of humour in Chinese societies. It starts by reviewing how the concept of humour evolves in Chinese history, and how it is perceived by Confucianism, Taoism, and Buddhism respectively. It then compares differences in the Western and the Chinese perceptions of humor and discusses empirical studies that were conducted to examine such differences. It also discusses the cultural origin and empirical evidence of the Chinese ambivalence about humor and presents empirical findings that illustrate its existence. Having done these, it proceeds to discuss psychological studies that examine how humour is related to various demographic, dispositional variables as well as how humour is related to creativity in Chinese societies. It also discusses how humour is related to emotional expressions and mental health in Chinese society as well. It concludes with a discussion on how workplace humor is reflected and developed in Chinese contexts. Taken together, this book attempts to bring together the theoretical propositions, empirical studies, and cultural analyses of humor in Chinese societies.
The post-Mao period has witnessed rapid social and economic transformation in all walks of Chinese life – much of it fuelled by, or reflected in, changes to the country’s education system. This book analyses the development of that system since the abandonment of radical Maoism and the inauguration of ‘Reform and Opening’ in the late 1970s. The principal focus is on formal education in schools and conventional institutions of tertiary education, but there is also some discussion of preschools, vocational training, and learning in non-formal contexts. The book begins with a discussion of the historical and comparative context for evaluating China’s educational ‘achievements’, followed by an extensive discussion of the key transitions in education policymaking during the ‘Reform and Opening’ period. This informs the subsequent examination of changes affecting the different phases of education from preschool to tertiary level. There are also chapters dealing specifically with the financing and administration of schooling, curriculum development, the public examinations system, the teaching profession, the phenomenon of marketisation, and the ‘international dimension’ of Chinese education. The book concludes with an assessment of the social consequences of educational change in the post-Mao era and a critical discussion of the recent fashion in certain Western countries for hailing China as an educational model. The analysis is supported by a wealth of sources – primary and secondary, textual and statistical – and is informed by both authors’ wide-ranging experience of Chinese education. As the first monograph on China's educational development during the forty years of the post-Mao era, this book will be essential reading for all those seeking to understand the world’s largest education system. It will also be crucial reference for educational comparativists, and for scholars from various disciplinary backgrounds researching contemporary Chinese society.
This book introduces readers to using the simple but effective Zhang-gradient (ZG) method to solve tracking-control problems concerning various nonlinear systems, while also highlighting the applications of the ZG method to tracking control for practical systems, e.g. an inverted-pendulum-on-a-cart (IPC) system and a two-wheeled mobile robot (showing its potential applications). In addition to detailed theoretical analyses of ZG controllers, the book presents a wealth of computer simulations to demonstrate the feasibility and efficacy of the controllers discussed (as well as the method itself). More importantly, the superiority of ZG controllers in overcoming the division-by-zero (DBZ) problem is also illustrated. Given its scope and format, the book is well suited for undergraduate and graduate students, as well as academic and industrial researchers in the fields of neural dynamics/neural networks, nonlinear control, computer mathematics, time-varying problem solving, modeling and simulation, analog hardware, and robotics.
Advanced Chassis Control Technology for Steer-by-Wire Vehicles details state-of-the-art drive-by-wire technology, enabling engineers to create safer and smarter steering technology. With applications in Formula 1 driving, this book is an accessible yet ambitious introduction to the technology that is fast becoming the future of road vehicles. Steer-by-wire systems replace conventional mechanical technology with electronic sensors, controllers, and actuators, enhancing functionality when steering. Features such as variable steer ratio, customized road feel, and advanced vehicle dynamics control all ensure that this maximizes safety when driving. The book looks first at the theory behind this technology and compares it to conventional mechanical steering. It discusses control through forward and backward dynamics and a shared steering control concept to improve vehicle handling and performance, relevant to intelligent vehicles. It also explains how to create chassis domain fusion control, four independent wheels steering system and teleoperated control. Using case studies and ISOs, the book is a practical guide to safely designing steer-by-wire systems. The book is an essential guide to all engineers working in the modern automotive industry.
This book provides essential information on emergency management. It is composed of two parts, addressing the basic theory and related methods of emergency management, including risk management, coordination management, crisis management and disaster management. By putting the emphasis on interdisciplinary, systematic perspectives and building a bridge between basic knowledge and further research, it is well suited as an emergency management textbook and offers a valuable guide to prepare readers for their future emergency management careers.
Wireless Communication Systems: Advanced Techniques for Signal Receptionoffers a unified frameworkfor understanding today's newest techniques for signal processing in communication systems - andusing them to design receivers for emerging wireless systems. Two leading researchers cover a fullrange of physical-layer issues, including multipath, dispersion, interference, dynamism, andmultiple-antenna systems. Topics include blind, group-blind, space-time, and turbo multiuserdetection; narrowband interference suppression; Monte Carlo Bayesian signal processing; fast fadingchannels; advanced signal processing in coded OFDM systems, and more.
This book introduces the current state of research on dark energy. It consists of three parts. The first part is for preliminary knowledge, including general relativity, modern cosmology, etc. The second part reviews major theoretical ideas and models of dark energy. The third part reviews some observational and numerical works. The aim of this book is to provide a sufficient level of understanding of dark energy problems, so that the reader can both get familiar with this area quickly and also be prepared to tackle the scientific literature on this subject. It will be useful for graduate students and researchers who are interested in dark energy.
Introductory courses in combinatorial optimization are popular at the upper undergraduate/graduate levels in computer science, industrial engineering, and business management/OR, owed to its wide applications in these fields. There are several published textbooks that treat this course and the authors have used many of them in their own teaching experiences. This present text fills a gap and is organized with a stress on methodology and relevant content, providing a step-by-step approach for the student to become proficient in solving combinatorial optimization problems. Applications and problems are considered via recent technology developments including wireless communication, cloud computing, social networks, and machine learning, to name several, and the reader is led to the frontiers of combinatorial optimization. Each chapter presents common problems, such as minimum spanning tree, shortest path, maximum matching, network flow, set-cover, as well as key algorithms, such as greedy algorithm, dynamic programming, augmenting path, and divide-and-conquer. Historical notes, ample exercises in every chapter, strategically placed graphics, and an extensive bibliography are amongst the gems of this textbook.
This book introduces psychosocial studies of idol worship in Chinese societies. It reviews how idol worship is perceived in Chinese culture, history, and philosophy as well as how it differs from the concept of celebrity worship that is more dominant in Western literature. Using a pioneering hexagonal model of idol worship, this book explains how idol worship is affected by various demographic and dispositional variables as well as the cognitive and social functions of idols and idol worship. Finally, it discusses idol worship from a contemporary Chinese perspective, including emotional, interpersonal, and social learning aspects, and ends with a discussion of moral development perspective.
It is well known that “fuzziness”—informationgranulesand fuzzy sets as one of its formal manifestations— is one of important characteristics of human cognitionandcomprehensionofreality. Fuzzy phenomena existinnature and are encountered quite vividly within human society. The notion of a fuzzy set has been introduced by L. A. , Zadeh in 1965 in order to formalize human concepts, in connection with the representation of human natural language and computing with words. Fuzzy sets and fuzzy logic are used for mod- ing imprecise modes of reasoning that play a pivotal role in the remarkable human abilities to make rational decisions in an environment a?ected by - certainty and imprecision. A growing number of applications of fuzzy sets originated from the “empirical-semantic” approach. From this perspective, we were focused on some practical interpretations of fuzzy sets rather than being oriented towards investigations of the underlying mathematical str- tures of fuzzy sets themselves. For instance, in the context of control theory where fuzzy sets have played an interesting and practically relevant function, the practical facet of fuzzy sets has been stressed quite signi?cantly. However, fuzzy sets can be sought as an abstract concept with all formal underpinnings stemming from this more formal perspective. In the context of applications, it is worth underlying that membership functions do not convey the same meaning at the operational level when being cast in various contexts.
In the modern world of ever smaller devices and nanotechnology, electron crystallography emerges as the most important method capable of determining the structure of minute objects down to the size of individual atoms. Crystals of only a few millionths of a millimetre are studied. This is the first textbook explaining how this is done. Great attention is given to symmetry in crystals and how it manifests itself in electron microscopy and electron diffraction, and how this symmetry can be determined and taken advantage of in achieving improved electron microscopy images and solving crystal structures from electron diffraction patterns. Theory and practice are combined; experimental images, diffraction patterns, formulae and numerical data are discussed in parallel, giving the reader a complete understanding of what goes on inside the "black boxes" of computer programs. This up-to-date textbook contains the newest techniques in electron crystallography, including detailed descriptions and explanations of the recent remarkable successes in determining the very complex structures of zeolites and intermetallics. The controversial issue of whether there is phase information present in electron micrsocopy images or not is also resolved once and for all. The extensive appendices include computer labs which have been used at various courses at Stockholm University and international schools in electron crystallography, with applications to the textbook. Students can download image processing programs and follow these lab instructions to get a hands-on experience of electron crystallography.
This book presents machine learning as a set of pre-requisites, co-requisites, and post-requisites, focusing on mathematical concepts and engineering applications in advanced welding and cutting processes. It describes a number of advanced welding and cutting processes and then assesses the parametrical interdependencies of two entities, namely the data analysis and data visualization techniques, which form the core of machine learning. Subsequently, it discusses supervised learning, highlighting Python libraries such as NumPy, Pandas and Scikit Learn programming. It also includes case studies that employ machine learning for manufacturing processes in the engineering domain. The book not only provides beginners with an introduction to machine learning for applied sciences, enabling them to address global competitiveness and work on real-time technical challenges, it is also a valuable resource for scholars with domain knowledge.
This book addresses a controversial issue regarding SL-TL transfer in the translation process, namely the question as to the dominant route in English-Chinese and Chinese-English professional consecutive interpretations, respectively: the form-based processing route or meaning-based processing route. It presents a corpus-assisted product study, in which the interpreting processing patterns of culture-specific items (CSIs) are analyzed. The study reveals that the dominant route in English vs. Chinese consecutive interpreting varies under different circumstances. Four factors are proposed to account for such differences: linguistic variables (e.g., grammatical complexity of the unit), type of CSI, language direction, and extra-linguistic variables (e.g., multilateral or bilateral settings). In summary, the book systematically introduces a corpus-assisted approach to translation process research, which will benefit all readers who are interested in translation process research but cannot employ neuroscientific measures.
This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues Explores interdisciplinary methods by combining social science, cryptography, and privacy enhancing technique Richly illustrated with detailed designs and results for all approaches used Introduces standardization and industry activities, and government regulation in secure vehicular networking
This book addresses the fundamentals and practical implementations of antennas for Global Navigation Satellite Systems (GNSS) In this book, the authors discuss the various aspects of GNSS antennas, including fundamentals of GNSS, design approaches for the GNSS terminal and satellite antennas, performance enhancement techniques and effects of user’s presence and surrounding environment on these antennas. In addition, the book will provide the reader with an insight into the most important aspects of the GNSS antenna technology and lay the foundations for future advancements. It also includes a number of real case studies describing the ways in which antenna design can be adapted to conform to the design constraints of practical user devices, and also the management of potential adverse interactions between the antenna and its platform. Key Features: Covers the fundamentals and practical implementations of antennas for Global Navigation Satellite Systems (GNSS) Describes technological advancements for GPS, Glonass, Galileo and Compass Aims to address future issues such as multipath interference, in building operation, RF interference in mobile Includes a number of real case studies to illustrate practical implementation of GNSS This book will be an invaluable guide for antenna designers, system engineers, researchers for GNSS systems and postgraduate students (antennas, satellite communication technology). R&D engineers in mobile handset manufacturers, spectrum engineers will also find this book of interest.
This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief.
In a conversational style and in chronological sequence, Ye Weili and Ma Xiaodong recount their earlier lives in China from the 1950s to the 1980s, a particularly eventful period that included the catastrophic Cultural Revolution. Using their own stories as two case studies, they examine the making of a significant yet barely understood generation in recent Chinese history. They also reflect upon the mixed legacy of the early decades of the People's Republic of China (PRC). In doing so, the book strives for a balance between critical scrutiny of a complex era and the sweeping rejection of that era that recent victim literature embraces. Ultimately Ye and Ma intend to reconnect themselves to a piece of land and a period of history that have given them a sense of who they are. Their stories contain intertwining layers of personal, generational, and historical experiences. Unlike other memoirs that were written soon after the events of the Cultural Revolution, Ye and Ma's narratives have been put together some twenty years later, allowing for more critical distance. The passage of time has allowed them to consider important issues that other accounts omit, such as the impact of gender during this period of radical change in Chinese women's lives.
This book is intended to be used as a textbook for graduate students studying theoretical computer science. It can also be used as a reference book for researchers in the area of design and analysis of approximation algorithms. Design and Analysis of Approximation Algorithms is a graduate course in theoretical computer science taught widely in the universities, both in the United States and abroad. There are, however, very few textbooks available for this course. Among those available in the market, most books follow a problem-oriented format; that is, they collected many important combinatorial optimization problems and their approximation algorithms, and organized them based on the types, or applications, of problems, such as geometric-type problems, algebraic-type problems, etc. Such arrangement of materials is perhaps convenient for a researcher to look for the problems and algorithms related to his/her work, but is difficult for a student to capture the ideas underlying the various algorithms. In the new book proposed here, we follow a more structured, technique-oriented presentation. We organize approximation algorithms into different chapters, based on the design techniques for the algorithms, so that the reader can study approximation algorithms of the same nature together. It helps the reader to better understand the design and analysis techniques for approximation algorithms, and also helps the teacher to present the ideas and techniques of approximation algorithms in a more unified way.
This textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning with the basic concepts of computer forensics, each of the book’s 21 chapters focuses on a particular forensic topic composed of two parts: background knowledge and hands-on experience through practice exercises. Each theoretical or background section concludes with a series of review questions, which are prepared to test students’ understanding of the materials, while the practice exercises are intended to afford students the opportunity to apply the concepts introduced in the section on background knowledge. This experience-oriented textbook is meant to assist students in gaining a better understanding of digital forensics through hands-on practice in collecting and preserving digital evidence by completing various exercises. With 20 student-directed, inquiry-based practice exercises, students will better understand digital forensic concepts and learn digital forensic investigation techniques. This textbook is intended for upper undergraduate and graduate-level students who are taking digital-forensic related courses or working in digital forensics research. It can also be used by digital forensics practitioners, IT security analysts, and security engineers working in the IT security industry, particular IT professionals responsible for digital investigation and incident handling or researchers working in these related fields as a reference book.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.