This book presents fused deposition modeling (FDM) which is an additive manufacturing (AM) process to fabricate 3D parts from a build-up of 2D layers. The chapters present an experimental analysis of fatigue characteristics of FDM-processed PLA samples. The results indicate that the concentric build orientation provides highest cycles of fatigue, ultimate strength, and impact energy. The effect of layer orientation on the fatigue behavior of 3D-printed PLA samples is investigated in this case study.
This title discusses phase selective and morphology controllable processing of titania (TiO2) nanocrystals and their enhanced functionality via doping for photo-catalytic, luminescent, and magnetic applications.
Using the well-honed tools of nanotechnology, this book presents breakthrough results in soft matter research, benefitting from the synergies between the chemistry, physics, biology, materials science, and engineering communities. The team of international authors delves beyond mere structure-making and places the emphasis firmly on imparting functionality to soft nanomaterials with a focus on devices and applications. Alongside reviewing the current level of knowledge, they also put forward novel ideas to foster research and development in such expanding fields as nanobiotechnology and nanomedicine. As such, the book covers DNA-induced nanoparticle assembly, nanostructured substrates for circulating tumor cell capturing, and organic nano field effect transistors, as well as advanced dynamic gels and self-healing electronic nanodevices. With its interdisciplinary approach this book gives readers a complete picture of nanotechnology with soft matter.
The post-Mao period has witnessed rapid social and economic transformation in all walks of Chinese life – much of it fuelled by, or reflected in, changes to the country’s education system. This book analyses the development of that system since the abandonment of radical Maoism and the inauguration of ‘Reform and Opening’ in the late 1970s. The principal focus is on formal education in schools and conventional institutions of tertiary education, but there is also some discussion of preschools, vocational training, and learning in non-formal contexts. The book begins with a discussion of the historical and comparative context for evaluating China’s educational ‘achievements’, followed by an extensive discussion of the key transitions in education policymaking during the ‘Reform and Opening’ period. This informs the subsequent examination of changes affecting the different phases of education from preschool to tertiary level. There are also chapters dealing specifically with the financing and administration of schooling, curriculum development, the public examinations system, the teaching profession, the phenomenon of marketisation, and the ‘international dimension’ of Chinese education. The book concludes with an assessment of the social consequences of educational change in the post-Mao era and a critical discussion of the recent fashion in certain Western countries for hailing China as an educational model. The analysis is supported by a wealth of sources – primary and secondary, textual and statistical – and is informed by both authors’ wide-ranging experience of Chinese education. As the first monograph on China's educational development during the forty years of the post-Mao era, this book will be essential reading for all those seeking to understand the world’s largest education system. It will also be crucial reference for educational comparativists, and for scholars from various disciplinary backgrounds researching contemporary Chinese society.
This textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning with the basic concepts of computer forensics, each of the book’s 21 chapters focuses on a particular forensic topic composed of two parts: background knowledge and hands-on experience through practice exercises. Each theoretical or background section concludes with a series of review questions, which are prepared to test students’ understanding of the materials, while the practice exercises are intended to afford students the opportunity to apply the concepts introduced in the section on background knowledge. This experience-oriented textbook is meant to assist students in gaining a better understanding of digital forensics through hands-on practice in collecting and preserving digital evidence by completing various exercises. With 20 student-directed, inquiry-based practice exercises, students will better understand digital forensic concepts and learn digital forensic investigation techniques. This textbook is intended for upper undergraduate and graduate-level students who are taking digital-forensic related courses or working in digital forensics research. It can also be used by digital forensics practitioners, IT security analysts, and security engineers working in the IT security industry, particular IT professionals responsible for digital investigation and incident handling or researchers working in these related fields as a reference book.
Visual Question Answering (VQA) usually combines visual inputs like image and video with a natural language question concerning the input and generates a natural language answer as the output. This is by nature a multi-disciplinary research problem, involving computer vision (CV), natural language processing (NLP), knowledge representation and reasoning (KR), etc. Further, VQA is an ambitious undertaking, as it must overcome the challenges of general image understanding and the question-answering task, as well as the difficulties entailed by using large-scale databases with mixed-quality inputs. However, with the advent of deep learning (DL) and driven by the existence of advanced techniques in both CV and NLP and the availability of relevant large-scale datasets, we have recently seen enormous strides in VQA, with more systems and promising results emerging. This book provides a comprehensive overview of VQA, covering fundamental theories, models, datasets, and promising future directions. Given its scope, it can be used as a textbook on computer vision and natural language processing, especially for researchers and students in the area of visual question answering. It also highlights the key models used in VQA.
This book addresses psychological studies of humour in Chinese societies. It starts by reviewing how the concept of humour evolves in Chinese history, and how it is perceived by Confucianism, Taoism, and Buddhism respectively. It then compares differences in the Western and the Chinese perceptions of humor and discusses empirical studies that were conducted to examine such differences. It also discusses the cultural origin and empirical evidence of the Chinese ambivalence about humor and presents empirical findings that illustrate its existence. Having done these, it proceeds to discuss psychological studies that examine how humour is related to various demographic, dispositional variables as well as how humour is related to creativity in Chinese societies. It also discusses how humour is related to emotional expressions and mental health in Chinese society as well. It concludes with a discussion on how workplace humor is reflected and developed in Chinese contexts. Taken together, this book attempts to bring together the theoretical propositions, empirical studies, and cultural analyses of humor in Chinese societies.
Examining creativity in Chinese societies from both a personal and contextual standpoint, this ground-breaking book offers readers a unique insight into the Chinese mind. It provides a review of the nature, origins, and consequences of creativity, deriving from empirical evidence in the Chinese context. Specifically, the book unravels the conceptualization of creativity and its relationships with various demographic and dispositional factors in Chinese societies. The book proceeds to give readers an understanding of how creativity maintains reciprocal relationships with various forms of well-being. The content of the book brings together empirical evidence and theory grounded on Chinese societies to offer researchers and students a unique realistic view of the nature of creativity there. This book will be a must read for any researcher or practitioner interested in this fascinating topic.
In a conversational style and in chronological sequence, Ye Weili and Ma Xiaodong recount their earlier lives in China from the 1950s to the 1980s, a particularly eventful period that included the catastrophic Cultural Revolution. Using their own stories as two case studies, they examine the making of a significant yet barely understood generation in recent Chinese history. They also reflect upon the mixed legacy of the early decades of the People's Republic of China (PRC). In doing so, the book strives for a balance between critical scrutiny of a complex era and the sweeping rejection of that era that recent victim literature embraces. Ultimately Ye and Ma intend to reconnect themselves to a piece of land and a period of history that have given them a sense of who they are. Their stories contain intertwining layers of personal, generational, and historical experiences. Unlike other memoirs that were written soon after the events of the Cultural Revolution, Ye and Ma's narratives have been put together some twenty years later, allowing for more critical distance. The passage of time has allowed them to consider important issues that other accounts omit, such as the impact of gender during this period of radical change in Chinese women's lives.
In the modern world of ever smaller devices and nanotechnology, electron crystallography emerges as the most important method capable of determining the structure of minute objects down to the size of individual atoms. Crystals of only a few millionths of a millimetre are studied. This is the first textbook explaining how this is done. Great attention is given to symmetry in crystals and how it manifests itself in electron microscopy and electron diffraction, and how this symmetry can be determined and taken advantage of in achieving improved electron microscopy images and solving crystal structures from electron diffraction patterns. Theory and practice are combined; experimental images, diffraction patterns, formulae and numerical data are discussed in parallel, giving the reader a complete understanding of what goes on inside the "black boxes" of computer programs. This up-to-date textbook contains the newest techniques in electron crystallography, including detailed descriptions and explanations of the recent remarkable successes in determining the very complex structures of zeolites and intermetallics. The controversial issue of whether there is phase information present in electron micrsocopy images or not is also resolved once and for all. The extensive appendices include computer labs which have been used at various courses at Stockholm University and international schools in electron crystallography, with applications to the textbook. Students can download image processing programs and follow these lab instructions to get a hands-on experience of electron crystallography.
This book addresses the sustainability of happiness and well-being in Chinese societies. It starts by introducing the various conceptions of well-being, particularly in the Chinese sociocultural context. The book then proceeds with the examination of the sustainability of well-being by scrutinizing the effects of sociocultural, contextual, and personal factors on well-being. The contextual factors are the aggregates or averages of personal factors at the contextual levels of the regions and colleges in Mainland China, its special administrative region, and Taiwan. These factors cover personality traits, strengths, orientations, beliefs, values, and idolizing. By bringing together empirical studies and theoretical perspectives applied to Chinese societies, this book offers researchers in social science and humanities a valuable reference work on happiness and well-being in Chinese societies.
This book focuses on the computational and theoretical approaches to the coupling of fluid mechanics and solids mechanics. In particular, nonlinear dynamical systems are introduced to the handling of complex fluid-solid interaction systems, For the past few decades, many terminologies have been introduced to this field, namely, flow-induced vibration, aeroelasticity, hydroelasticity, fluid-structure interaction, fluid-solid interaction, and more recently multi-physics problems. Moreover, engineering applications are distributed within different disciplines, such as nuclear, civil, aerospace, ocean, chemical, electrical, and mechanical engineering. Regrettably, while each particular subject is by itself very extensive, it has been difficult for a single book to cover in a reasonable depth and in the mean time to connect various topics. In light of the current multidisciplinary research need in nanotechnology and bioengineering, there is an urgent need for books to provide such a linkage and to lay a foundation for more specialized fields. Interdisciplinary across all types of engineering Comprehensive study of fluid-solid interaction Discusses complex system dynamics derived from interactive systems Provides mathematic modeling of biological systems
Rural-urban migration within China has transformed and reshaped rural people’s lives during the past few decades, and has been one of the most visible phenomena of the economic reforms enacted since the late 1970s. Whilst Feminist scholars have addressed rural women’s experience of struggle and empowerment in urban China, in contrast, research on rural men’s experience of migration is a neglected area of study. In response, this book seeks to address the absence of male migrant workers as a gendered category within the current literature on rural-urban migration. Examining Chinese male migrant workers’ identity formation, this book explores their experience of rural-urban migration and their status as an emerging sector of a dislocated urban working class. It seeks to understand issues of gender and class through the rural migrant men’s narratives within the context of China’s modernization, and provides an in-depth analysis of how these men make sense of their new lives in the rapidly modernizing, post-Mao China with its emphasis on progress and development. Further, this book uses the men’s own narratives to challenge the elite assumption that rural men’s low status is a result of their failure to adopt a modern urban identity and lifestyle. Drawing on interviews with 28 male rural migrants, Xiaodong Lin unpacks the gender politics of Chinese men and masculinities, and in turn contributes to a greater understanding of global masculinities in an international context. This book will be of great interest to students and scholars working in the fields of Chinese culture and society, gender studies, migration studies, sociology and social anthropology. Shortlisted for this year's BSA Philip Abrams Memorial Prize.
Evolutionary Topology Optimization of Continuum Structures treads new ground with a comprehensive study on the techniques and applications of evolutionary structural optimization (ESO) and its later version bi-directional ESO (BESO) methods. Since the ESO method was first introduced by Xie and Steven in 1992 and the publication of their well-known book Evolutionary Structural Optimization in 1997, there have been significant improvements in the techniques as well as important practical applications. The authors present these developments, illustrated by numerous interesting and detailed examples. They clearly demonstrate that the evolutionary structural optimization method is an effective approach capable of solving a wide range of topology optimization problems, including structures with geometrical and material nonlinearities, energy absorbing devices, periodical structures, bridges and buildings. Presents latest developments and applications in this increasingly popular & maturing optimization approach for engineers and architects; Authored by leading researchers in the field who have been working in the area of ESO and BESO developments since their conception; Includes a number of test problems for students as well as a chapter of case studies that includes several recent practical projects in which the authors have been involved; Accompanied by a website housing ESO/BESO computer programs at http://www.wiley.com/go/huang and test examples, as well as a chapter within the book giving a description and step-by-step instruction on how to use the software package BESO2D. Evolutionary Topology Optimization of Continuum Structures will appeal to researchers and graduate students working in structural design and optimization, and will also be of interest to civil and structural engineers, architects and mechanical engineers involved in creating innovative and efficient structures.
This report draws lessons to date from recent international experience in applying public financing instruments to unlock commercial financing to scale-up clean energy in East Asia. It addresses the following issues: when to use public financing instruments; which instrument to select; and how to design and implement them most effectively.
Ultrawideband (UWB) technology, positioned as the cutting edge of research and development, paves the way to meet the emerging demands set by broadband wireless applications, such as high-speed data transmission, medical imaging, short-range radars, electromagnetic testing, etc.This breathtaking resource builds upon the basics of UWB technology to provide a complete compilation of figures of merit along with a vital state-of-the-art of the different antenna alternatives that are to be employed according to the specific application. Without excessive recourse to mathematics, this volume emphasizes on the UWB antenna design and equips readers with practical prediction techniques based on simple formulas and models. The big picture of UWB antenna technology would not be complete without addressing its applications, and this will serve to provide consultants with key clues for market gap analysis. Containing over 150 supporting illustrations and figures, this comprehensive overview of UWB technology, antenna design and applications is a vital source of information and reference for R&D organizations, researchers, practitioners, consultants, RF professionals and communication engineers./a
Advanced Chassis Control Technology for Steer-by-Wire Vehicles details state-of-the-art drive-by-wire technology, enabling engineers to create safer and smarter steering technology. With applications in Formula 1 driving, this book is an accessible yet ambitious introduction to the technology that is fast becoming the future of road vehicles. Steer-by-wire systems replace conventional mechanical technology with electronic sensors, controllers, and actuators, enhancing functionality when steering. Features such as variable steer ratio, customized road feel, and advanced vehicle dynamics control all ensure that this maximizes safety when driving. The book looks first at the theory behind this technology and compares it to conventional mechanical steering. It discusses control through forward and backward dynamics and a shared steering control concept to improve vehicle handling and performance, relevant to intelligent vehicles. It also explains how to create chassis domain fusion control, four independent wheels steering system and teleoperated control. Using case studies and ISOs, the book is a practical guide to safely designing steer-by-wire systems. The book is an essential guide to all engineers working in the modern automotive industry.
Key problems and conjectures have played an important role in promoting the development of Ramsey theory, a field where great progress has been made during the past two decades, with some old problems solved and many new problems proposed. The present book will be helpful to readers who wish to learn about interesting problems in Ramsey theory, to see how they are interconnected, and then to study them in depth. This book is the first problem book of such scope in Ramsey theory. Many unsolved problems, conjectures and related partial results in Ramsey theory are presented, in areas such as extremal graph theory, additive number theory, discrete geometry, functional analysis, algorithm design, and in other areas. Most presented problems are easy to understand, but they may be difficult to solve. They can be appreciated on many levels and by a wide readership, ranging from undergraduate students majoring in mathematics to research mathematicians. This collection is an essential reference for mathematicians working in combinatorics and number theory, as well as for computer scientists studying algorithms. Contents Some definitions and notations Ramsey theory Bi-color diagonal classical Ramsey numbers Paley graphs and lower bounds for R(k, k) Bi-color off-diagonal classical Ramsey numbers Multicolor classical Ramsey numbers Generalized Ramsey numbers Folkman numbers The Erdős–Hajnal conjecture Other Ramsey-type problems in graph theory On van der Waerden numbers and Szemeredi’s theorem More problems of Ramsey type in additive number theory Sidon–Ramsey numbers Games in Ramsey theory Local Ramsey theory Set-coloring Ramsey theory Other problems and conjectures
This book introduces readers to using the simple but effective Zhang-gradient (ZG) method to solve tracking-control problems concerning various nonlinear systems, while also highlighting the applications of the ZG method to tracking control for practical systems, e.g. an inverted-pendulum-on-a-cart (IPC) system and a two-wheeled mobile robot (showing its potential applications). In addition to detailed theoretical analyses of ZG controllers, the book presents a wealth of computer simulations to demonstrate the feasibility and efficacy of the controllers discussed (as well as the method itself). More importantly, the superiority of ZG controllers in overcoming the division-by-zero (DBZ) problem is also illustrated. Given its scope and format, the book is well suited for undergraduate and graduate students, as well as academic and industrial researchers in the fields of neural dynamics/neural networks, nonlinear control, computer mathematics, time-varying problem solving, modeling and simulation, analog hardware, and robotics.
This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues Explores interdisciplinary methods by combining social science, cryptography, and privacy enhancing technique Richly illustrated with detailed designs and results for all approaches used Introduces standardization and industry activities, and government regulation in secure vehicular networking
This book provides essential information on emergency management. It is composed of two parts, addressing the basic theory and related methods of emergency management, including risk management, coordination management, crisis management and disaster management. By putting the emphasis on interdisciplinary, systematic perspectives and building a bridge between basic knowledge and further research, it is well suited as an emergency management textbook and offers a valuable guide to prepare readers for their future emergency management careers.
This book explores the intelligent autonomous control problems for spacecraft with multiple constraints, such as pointing/path constraints, linear/angular velocity constraints, performance constraints, etc. It provides an almost self-contained presentation of dynamics modeling, controller design and analysis, as well as simulation studies. The book aims to offer a valuable guide for researchers and aerospace engineers to address the theoretical and technical difficulties in different applications, ranging from spacecraft attitude reorientation and tracking to spacecraft proximity operations, and is mainly intended for technical and engineering staff engaged in spacecraft dyanmics and control areas.
This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief.
This book covers exploration and evaluation practices for various types of complex reservoirs, and summarizes a series of practical and effective techniques and methods. For example, it shows how, by integrating multiple types of new logging technology, complex reservoir petrophysics evaluation can be performed using high-precision core experiment data and quantitative logging interpretation; and demonstrates how the technology of sporopollen assemblage and palynofacies analysis can improve the time precision of sequence stratigraphy and the quantitative study level of sedimentary facies, respectively. It discusses how reservoir lateral prediction and vertical resolution can be substantially improved by integrating fracture prediction and geostatistical inversion; and presents innovative log interpretation charts for the lithological identification of metamorphic rocks, e.g. GR-DEN crossplot and Impedance-Resistivity crossplot. To support the main content, the book features a wealth of high-resolution, thin- section images, quantitative illustrations of palynofacies composition, multi-property overlapping map set and quantitative tables. It offers an essential reference guide for researchers in geological exploration and evaluation, and will also appeal to a broad readership, from engineering technicians to advanced graduate students in related areas.
This book introduces psychosocial studies of idol worship in Chinese societies. It reviews how idol worship is perceived in Chinese culture, history, and philosophy as well as how it differs from the concept of celebrity worship that is more dominant in Western literature. Using a pioneering hexagonal model of idol worship, this book explains how idol worship is affected by various demographic and dispositional variables as well as the cognitive and social functions of idols and idol worship. Finally, it discusses idol worship from a contemporary Chinese perspective, including emotional, interpersonal, and social learning aspects, and ends with a discussion of moral development perspective.
The Steiner tree problem is one of the most important combinatorial optimization problems. It has a long history that can be traced back to the famous mathematician Fermat (1601-1665). This book studies three significant breakthroughs on the Steiner tree problem that were achieved in the 1990s, and some important applications of Steiner tree problems in computer communication networks researched in the past fifteen years. It not only covers some of the most recent developments in Steiner tree problems, but also discusses various combinatorial optimization methods, thus providing a balance between theory and practice.
This book introduces the current state of research on dark energy. It consists of three parts. The first part is for preliminary knowledge, including general relativity, modern cosmology, etc. The second part reviews major theoretical ideas and models of dark energy. The third part reviews some observational and numerical works. The aim of this book is to provide a sufficient level of understanding of dark energy problems, so that the reader can both get familiar with this area quickly and also be prepared to tackle the scientific literature on this subject. It will be useful for graduate students and researchers who are interested in dark energy.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.