This book highlights cutting-edge research into emergency early warning management and decision-making for severe accidents. Using toxic gas leakages as examples, it puts forward new design methods for emergency early warning systems, as well as a systematic description of emergency early warning information communication mechanisms and characteristics of regional evacuation, based on a wide range of theories, including safety engineering, information engineering, communication, behaviorology and others. The book applies a range of methods, such as case analysis, questionnaire interviews, and multi-objective optimization modeling. Drawing on this basis, it subsequently proposes a multi-objective optimization modeling and algorithm for emergency path selection, together with an evacuation risk assessment method. Divided into six chapters prepared by an international team of researchers, the book addresses the design of early warning systems, communication and dissemination mechanisms of early warning information, characteristics of regional evacuation, multi-objective optimization of emergency paths, and evacuation risk assessment. The book offers an essential reference guide for engineering technicians and researchers in a wide range of fields, including emergency management, safety science and engineering, disaster relief engineering, and transportation optimization, as well as graduate students in related majors at colleges and universities.
With the end of Dennard scaling and Moore’s law, IC chips, especially large-scale ones, now face more reliability challenges, and reliability has become one of the mainstay merits of VLSI designs. In this context, this book presents a built-in on-chip fault-tolerant computing paradigm that seeks to combine fault detection, fault diagnosis, and error recovery in large-scale VLSI design in a unified manner so as to minimize resource overhead and performance penalties. Following this computing paradigm, we propose a holistic solution based on three key components: self-test, self-diagnosis and self-repair, or “3S” for short. We then explore the use of 3S for general IC designs, general-purpose processors, network-on-chip (NoC) and deep learning accelerators, and present prototypes to demonstrate how 3S responds to in-field silicon degradation and recovery under various runtime faults caused by aging, process variations, or radical particles. Moreover, we demonstrate that 3S not only offers a powerful backbone for various on-chip fault-tolerant designs and implementations, but also has farther-reaching implications such as maintaining graceful performance degradation, mitigating the impact of verification blind spots, and improving chip yield. This book is the outcome of extensive fault-tolerant computing research pursued at the State Key Lab of Processors, Institute of Computing Technology, Chinese Academy of Sciences over the past decade. The proposed built-in on-chip fault-tolerant computing paradigm has been verified in a broad range of scenarios, from small processors in satellite computers to large processors in HPCs. Hopefully, it will provide an alternative yet effective solution to the growing reliability challenges for large-scale VLSI designs.
In The Martial Arts Cinema of the Chinese Diaspora, Kin-Yan Szeto critically examines three of the most internationally famous martial arts film artists to arise out of the Chinese diaspora and travel far from their homelands to find commercial success in the world at large: Ang Lee, John Woo, and Jackie Chan. Positing the idea that these filmmakers' success is evidence of a "cosmopolitical awareness" arising from their cross-cultural ideological engagements and geopolitical displacements, Szeto demonstrates how this unique perspective allows these three filmmakers to develop and act in the transnational environment of media production, distribution, and consumption. Beginning with a historical retrospective on Chinese martial arts films as a diasporic film genre and the transnational styles and ideologies of the filmmakers themselves, Szeto uses case studies to explore in depth how the forces of colonialism, Chinese nationalism, and Western imperialism shaped the identities and work of Lee, Woo, and Chan. Addressed in the volume is the groundbreaking martial arts swordplay film that achieves global success-Ang Lee's Crouching Tiger, Hidden Dragon- and its revelations about Hollywood representations of Asians, as well as concepts of male and female masculinity in the swordplay film tradition. Also investigated is the invigoration of contemporary gangster, thriller, and war films by John Woo, whose combination of artistic and historical contexts has contributed to his global success. Szeto then dissects Chan's mimetic representation of masculinity in his films, and the influences of his Chinese theater and martial arts training on his work. Szeto outlines the similarities and differences between the three artists' films, especially their treatments of gender, sexuality, and power. She concludes by analyzing their films as metaphors for their working conditions in the Chinese diaspora and Hollywood, and demonstrating how through their works, Lee, Woo, and Chan communicate not only with the rest of the world but also with each other. Far from a book simply about three filmmakers, The Martial Arts Cinema of the Chinese Diaspora investigates the transnational nature of films, the geopolitics of culture and race, and the depths of masculinity and power in movies. Szeto's interdisciplinary approach calls for nothing less than a paradigm shift in the study of Chinese diasporic filmmakers and the embodiment of cosmopolitical perspectives in the martial arts genre.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.