Lu Xun (Lu Hsun) is arguably the greatest writer of modern China, and is considered by many to be the founder of modern Chinese literature. Lu Xun's stories both indict outdated Chinese traditions and embrace China's cultural richness and individuality. This volume presents brand-new translations by Julia Lovell of all of Lu Xun's stories, including 'The Real Story of Ah-Q', 'Diary of a Madman', 'A Comedy of Ducks', 'The Divorce' and 'A Public Example', among others. With an afterword by Yiyun Li.
Selected Stories of Lu Hsun - The True Story of Ah Q is an episodic novella written by Lu Xun, first published as a serial between December 4, 1921 and February 12, 1922. It was later placed in his first short story collection Call to Arms in 1923 and is the longest of the stories in the collection. The piece is generally held to be a masterpiece of modern Chinese literature, since it is considered the first piece of work fully to use Vernacular Chinese after the 1919 May 4th Movement in China. Lu Xun or Lu Hsun (Wade-Giles), was the pen name of Zhou Shuren (September 25, 1881 – October 19, 1936), a leading figure of modern Chinese literature. Writing in Vernacular Chinese as well as Classical Chinese, Lu Xun was a novelist, editor, translator, literary critic, essayist, and poet. In the 1930s he became the titular head of the League of Left-Wing Writers in Shanghai. Lu Xun's works exerted a substantial influence after the May Fourth Movement that began around 1916. He was highly acclaimed by the Communist regime after 1949, and Mao Zedong himself was a lifelong admirer of Lu Xun's works. Though sympathetic to communist ideas, Lu Xun never actually joined the Chinese Communist Party. Like many leaders of the May Fourth Movement, he was primarily a leftist and liberal.
This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is presented in an instructional and practical style, with concrete examples to enhance the reader's understanding. This volume achieves a balance between the theoretical and the practical components of modern information security. Readers will learn key principles of homomorphic encryption as well as their application in solving real world problems.
This monograph provides a comprehensive and rigorous exposition of the basic concepts and most important modern research results concerning blockchain and its applications. The book includes the required cryptographic fundamentals underpinning the blockchain technology, since understanding of the concepts of cryptography involved in the design of blockchain is necessary for mastering the security guarantees furnished by blockchain. It also contains an introduction to cryptographic primitives, and separate chapters on bitcoin, ethereum and smart contracts, public blockchain, private blockchain, cryptocurrencies, and blockchain applications.This volume is of great interest to active researchers who are keen to develop novel applications of blockchain in the field of their investigatio. Further, it is also beneficial for industry practitioners as well as undergraduate students in computing and information technology.
Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems Cyber-attacks on SCADA systems the control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process supervisory management can lead to costly financial consequences or even result in loss of life. Minimizing potential risks and responding to malicious actions requires innovative approaches for monitoring SCADA systems and protecting them from targeted attacks. SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention is designed to help security and networking professionals develop and deploy accurate and effective Intrusion Detection Systems (IDS) for SCADA systems that leverage autonomous machine learning. Providing expert insights, practical advice, and up-to-date coverage of developments in SCADA security, this authoritative guide presents a new approach for efficient unsupervised IDS driven by SCADA-specific data. Organized into eight in-depth chapters, the text first discusses how traditional IT attacks can also be possible against SCADA, and describes essential SCADA concepts, systems, architectures, and main components. Following chapters introduce various SCADA security frameworks and approaches, including evaluating security with virtualization-based SCADAVT, using SDAD to extract proximity-based detection, finding a global and efficient anomaly threshold with GATUD, and more. This important book: Provides diverse perspectives on establishing an efficient IDS approach that can be implemented in SCADA systems Describes the relationship between main components and three generations of SCADA systems Explains the classification of a SCADA IDS based on its architecture and implementation Surveys the current literature in the field and suggests possible directions for future research SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention is a must-read for all SCADA security and networking researchers, engineers, system architects, developers, managers, lecturers, and other SCADA security industry practitioners.
This authored book investigates network traffic classification solutions by proposing transport-layer methods to achieve better run and operated enterprise-scale networks.
This book is the first monograph in the field of uniqueness theory of meromorphic functions dealing with conditions under which there is the unique function satisfying given hypotheses. Developed by R. Nevanlinna, a Finnish mathematician, early in the 1920's, research in the field has developed rapidly over the past three decades with a great deal of fruitful results. This book systematically summarizes the most important results in the field, including many of the authors' own previously unpublished results. In addition, useful skills and simple proofs are introduced. This book is suitable for higher level and graduate students who have a basic grounding in complex analysis, but will also appeal to researchers in mathematics.
Some of these stories, I am sure, will be read as long as the Chinese language exists."—Ha Jin "When I was young I, too, had many dreams. Most of them came to be forgotten, but I see nothing in this to regret. For although recalling the past may make you happy, it may sometimes also make you lonely, and there is no point in clinging in spirit to lonely bygone days. However, my trouble is that I cannot forget completely, and these stories have resulted from what I have been unable to erase from memory."—Lu Hsun Living during a time of dramatic change in China, Lu Hsun had a career that was as varied as his writing. As a young man he studied medicine in Japan but left it for the life of an activist intellectual, eventually returning to China to teach. Though he supported the aims of the Communist revolution, he did not become a member of the party nor did he live to see the Communists take control of China. Ambitious to reach a large Chinese audience, Lu Hsun wrote his first published story, "A Madman's Diary," in the vernacular, a pioneering move in Chinese literature at the time. "The True Story of Ah Q," a biting portrait of feudal China, gained him popularity in the West. This collection of eighteen stories shows the variety of his style and subjects throughout his career. In a new introduction, Ha Jin, the author of Waiting (National Book Award winner), The Bridegroom, and other works, places Lu Hsun's life and work in the context of Chinese history and literature.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.