This book presents machine learning as a set of pre-requisites, co-requisites, and post-requisites, focusing on mathematical concepts and engineering applications in advanced welding and cutting processes. It describes a number of advanced welding and cutting processes and then assesses the parametrical interdependencies of two entities, namely the data analysis and data visualization techniques, which form the core of machine learning. Subsequently, it discusses supervised learning, highlighting Python libraries such as NumPy, Pandas and Scikit Learn programming. It also includes case studies that employ machine learning for manufacturing processes in the engineering domain. The book not only provides beginners with an introduction to machine learning for applied sciences, enabling them to address global competitiveness and work on real-time technical challenges, it is also a valuable resource for scholars with domain knowledge.
Examining creativity in Chinese societies from both a personal and contextual standpoint, this ground-breaking book offers readers a unique insight into the Chinese mind. It provides a review of the nature, origins, and consequences of creativity, deriving from empirical evidence in the Chinese context. Specifically, the book unravels the conceptualization of creativity and its relationships with various demographic and dispositional factors in Chinese societies. The book proceeds to give readers an understanding of how creativity maintains reciprocal relationships with various forms of well-being. The content of the book brings together empirical evidence and theory grounded on Chinese societies to offer researchers and students a unique realistic view of the nature of creativity there. This book will be a must read for any researcher or practitioner interested in this fascinating topic.
This book covers exploration and evaluation practices for various types of complex reservoirs, and summarizes a series of practical and effective techniques and methods. For example, it shows how, by integrating multiple types of new logging technology, complex reservoir petrophysics evaluation can be performed using high-precision core experiment data and quantitative logging interpretation; and demonstrates how the technology of sporopollen assemblage and palynofacies analysis can improve the time precision of sequence stratigraphy and the quantitative study level of sedimentary facies, respectively. It discusses how reservoir lateral prediction and vertical resolution can be substantially improved by integrating fracture prediction and geostatistical inversion; and presents innovative log interpretation charts for the lithological identification of metamorphic rocks, e.g. GR-DEN crossplot and Impedance-Resistivity crossplot. To support the main content, the book features a wealth of high-resolution, thin- section images, quantitative illustrations of palynofacies composition, multi-property overlapping map set and quantitative tables. It offers an essential reference guide for researchers in geological exploration and evaluation, and will also appeal to a broad readership, from engineering technicians to advanced graduate students in related areas.
This book addresses psychological studies of humour in Chinese societies. It starts by reviewing how the concept of humour evolves in Chinese history, and how it is perceived by Confucianism, Taoism, and Buddhism respectively. It then compares differences in the Western and the Chinese perceptions of humor and discusses empirical studies that were conducted to examine such differences. It also discusses the cultural origin and empirical evidence of the Chinese ambivalence about humor and presents empirical findings that illustrate its existence. Having done these, it proceeds to discuss psychological studies that examine how humour is related to various demographic, dispositional variables as well as how humour is related to creativity in Chinese societies. It also discusses how humour is related to emotional expressions and mental health in Chinese society as well. It concludes with a discussion on how workplace humor is reflected and developed in Chinese contexts. Taken together, this book attempts to bring together the theoretical propositions, empirical studies, and cultural analyses of humor in Chinese societies.
This book introduces psychosocial studies of idol worship in Chinese societies. It reviews how idol worship is perceived in Chinese culture, history, and philosophy as well as how it differs from the concept of celebrity worship that is more dominant in Western literature. Using a pioneering hexagonal model of idol worship, this book explains how idol worship is affected by various demographic and dispositional variables as well as the cognitive and social functions of idols and idol worship. Finally, it discusses idol worship from a contemporary Chinese perspective, including emotional, interpersonal, and social learning aspects, and ends with a discussion of moral development perspective.
This book addresses the sustainability of happiness and well-being in Chinese societies. It starts by introducing the various conceptions of well-being, particularly in the Chinese sociocultural context. The book then proceeds with the examination of the sustainability of well-being by scrutinizing the effects of sociocultural, contextual, and personal factors on well-being. The contextual factors are the aggregates or averages of personal factors at the contextual levels of the regions and colleges in Mainland China, its special administrative region, and Taiwan. These factors cover personality traits, strengths, orientations, beliefs, values, and idolizing. By bringing together empirical studies and theoretical perspectives applied to Chinese societies, this book offers researchers in social science and humanities a valuable reference work on happiness and well-being in Chinese societies.
Visual Question Answering (VQA) usually combines visual inputs like image and video with a natural language question concerning the input and generates a natural language answer as the output. This is by nature a multi-disciplinary research problem, involving computer vision (CV), natural language processing (NLP), knowledge representation and reasoning (KR), etc. Further, VQA is an ambitious undertaking, as it must overcome the challenges of general image understanding and the question-answering task, as well as the difficulties entailed by using large-scale databases with mixed-quality inputs. However, with the advent of deep learning (DL) and driven by the existence of advanced techniques in both CV and NLP and the availability of relevant large-scale datasets, we have recently seen enormous strides in VQA, with more systems and promising results emerging. This book provides a comprehensive overview of VQA, covering fundamental theories, models, datasets, and promising future directions. Given its scope, it can be used as a textbook on computer vision and natural language processing, especially for researchers and students in the area of visual question answering. It also highlights the key models used in VQA.
Using the well-honed tools of nanotechnology, this book presents breakthrough results in soft matter research, benefitting from the synergies between the chemistry, physics, biology, materials science, and engineering communities. The team of international authors delves beyond mere structure-making and places the emphasis firmly on imparting functionality to soft nanomaterials with a focus on devices and applications. Alongside reviewing the current level of knowledge, they also put forward novel ideas to foster research and development in such expanding fields as nanobiotechnology and nanomedicine. As such, the book covers DNA-induced nanoparticle assembly, nanostructured substrates for circulating tumor cell capturing, and organic nano field effect transistors, as well as advanced dynamic gels and self-healing electronic nanodevices. With its interdisciplinary approach this book gives readers a complete picture of nanotechnology with soft matter.
This book explores the intelligent autonomous control problems for spacecraft with multiple constraints, such as pointing/path constraints, linear/angular velocity constraints, performance constraints, etc. It provides an almost self-contained presentation of dynamics modeling, controller design and analysis, as well as simulation studies. The book aims to offer a valuable guide for researchers and aerospace engineers to address the theoretical and technical difficulties in different applications, ranging from spacecraft attitude reorientation and tracking to spacecraft proximity operations, and is mainly intended for technical and engineering staff engaged in spacecraft dyanmics and control areas.
This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief.
This book presents machine learning as a set of pre-requisites, co-requisites, and post-requisites, focusing on mathematical concepts and engineering applications in advanced welding and cutting processes. It describes a number of advanced welding and cutting processes and then assesses the parametrical interdependencies of two entities, namely the data analysis and data visualization techniques, which form the core of machine learning. Subsequently, it discusses supervised learning, highlighting Python libraries such as NumPy, Pandas and Scikit Learn programming. It also includes case studies that employ machine learning for manufacturing processes in the engineering domain. The book not only provides beginners with an introduction to machine learning for applied sciences, enabling them to address global competitiveness and work on real-time technical challenges, it is also a valuable resource for scholars with domain knowledge.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.