In Through My Eyes, Vicky Zhou shares her experiences as a young Chinese woman living in Canada and the racial dynamics during the Covid-19 pandemic. Take a closer and compassionate look at the Asian immigrant experience and history, rethink our "differences", unlearn the harmful stereotypes, and be a part of the positive change for racial justice and social justice. You will hear stories relating to stereotypes and topics like: "Bad English" Sexualized racism and racist sexism The "hidden" history between the indigenous peoples and Asian community Through My Eyes gives the reader a vulnerable and real view into a young woman's experiences in Canada, as well as the resilience and history of Asian cultures. Zhou gives us a book that offers the reader an understanding of diversity, love for peace, and our need for compassion and allyship.
This book explains China's new common prosperity policies—their significance, connotations, and goals—and explains the economic logic behind these often misunderstood policies. First, the authors explain the theory behind common prosperity. Why is the Chinese government changing its economic policies now, and what is its objectives and metrics? The authors then go on to explain how the new policies are being designed, what the test cases are across the country, and how the government, businesses, families, and individuals are working together to promote common prosperity. An important book that will help scholars around the world understand China's new economic bottom line. This book will be of interest to economists, sociologists, and sinologists.
The true measure of any society is how it treats its children, who are in turn that society’s future. Making use of data from the longitudinal Chinese Family Panel Studies survey, the authors of this timely study provide a multi-faceted description and analysis of China’s younger generations. They assess the economic, physical, and social-emotional well-being as well as the cognitive performance and educational attainment of China's children and youth. They pay special attention to the significance of family and community contexts, including the impact of parental absence on millions of left-behind children. Throughout the volume, the authors delineate various forms of disparities, especially the structural inequalities maintained by the Chinese Party-state and the vulnerabilities of children and youth in fragile families and communities. They also analyze the social attitudes and values of Chinese youth. Having grown up in a period of sustained prosperity and greater individual choice, the younger Chinese cohorts are more independent in spirit, more open-minded socially, and significantly less deferential to authority than older cohorts. There is growing recognition in China of the importance of investing in children’s future and of helping the less advantaged. Substantial improvements in child and youth well-being have been achieved in a time of growing economic prosperity. Strong political commitment is needed to sustain existing efforts and to overcome the many obstacles that remain. This book will be of considerable interest to researchers of Chinese society and development.
This book aims to provide readers with adequate knowledge for clinical application of Chinese medicine, which is in line with the fundamental principle of correspondence of Chinese medicinals and patterns. It contains a brief introduction to relative theories, divides these medicinals by actions into categories such as exterior-releasing, heat-clearing, purgative, dampness-dispelling, fluid retention-disinhibiting, interior-warming, qi-regulating, blood-invigorating, blood-stanching, food accumulation-relieving, phlegm, cough- and wheezing-arresting, mind-tranquilizing, liver-calming, orifices-opening, tonifying, astringing, and worm-dispelling, and elaborates each herb in terms of its actions, quality, indications, usage, and dosage. Furthermore, mnemonics and simple and effective formulas are included to help readers effectively grasp the concepts behind practical applications, and precautions and daily practices are specifically designed to support readers in easily understanding and retaining the information.
This book has been written with the support of Huawei's large accumulation of technical knowledge and experience in the WLAN field, as well as its understanding of customer service requirements. First, the book covers service challenges facing enterprise wireless networks, along with detailing the latest evolution of Wi-Fi standards, air interface performance, and methods for improving user experience in enterprise scenarios. Furthermore, it illustrates typical networking, planning, and scenario-specific design for enterprise WLANs, and provides readers with a comprehensive understanding of enterprise WLAN planning, design, and technical implementation, as well as suggestions for deployment. This is a practical and easy-to-understand guide to WLAN design, and is written for WLAN technical support and planning engineers, network administrators, and enthusiasts of network technology. Authors Rihai Wu is Chief Architect of Huawei's campus network WLAN solution with 16 years of experience in wireless communications product design and a wealth of expertise in network design and product development. He previously served as a designer and developer of products for Wideband Code Division Multiple Access (WCDMA), LTE indoor small cells, and WLAN. Xun Yang is a WLAN standard expert from Huawei. He has nine years of experience in formulating WLAN standards, and previously served as 802.11ac Secretary, 802.11ah PHY Ad-hoc Co-chair, and 802.11ax MU Ad Hoc Sub Group Co-chair. Mr. Yang oversees technical research, the promotion of standards, and industrialization in the WLAN field, and has filed more than 100 patents. Xia Zhou is a documentation engineer of Huawei's campus network WLAN solution. She has 10 years of experience in creating documents for campus network products. Ms. Zhou was previously in charge of writing manuals for Huawei data center switches, WLAN products, and campus network solutions. She is also the author of Campus Network Solution Deployment Guide and was a co-sponsor of technical sessions such as WLAN from Basics to Proficiency. Yibo Wang is a documentation engineer of Huawei's campus network WLAN solution. He has nine years of experience in creating documents for campus network products. Mr. Wang was previously in charge of writing manuals for Huawei switches, WLAN products, and routers. He was also a co-sponsor of technical sessions such as WLAN from Basics to Proficiency and HCIA-WLAN certification training courses.
A critical challenge in deep learning is the vulnerability of deep learning networks to security attacks from intelligent cyber adversaries. Even innocuous perturbations to the training data can be used to manipulate the behaviour of deep networks in unintended ways. In this book, we review the latest developments in adversarial attack technologies in computer vision; natural language processing; and cybersecurity with regard to multidimensional, textual and image data, sequence data, and temporal data. In turn, we assess the robustness properties of deep learning networks to produce a taxonomy of adversarial examples that characterises the security of learning systems using game theoretical adversarial deep learning algorithms. The state-of-the-art in adversarial perturbation-based privacy protection mechanisms is also reviewed. We propose new adversary types for game theoretical objectives in non-stationary computational learning environments. Proper quantification of the hypothesis set in the decision problems of our research leads to various functional problems, oracular problems, sampling tasks, and optimization problems. We also address the defence mechanisms currently available for deep learning models deployed in real-world environments. The learning theories used in these defence mechanisms concern data representations, feature manipulations, misclassifications costs, sensitivity landscapes, distributional robustness, and complexity classes of the adversarial deep learning algorithms and their applications. In closing, we propose future research directions in adversarial deep learning applications for resilient learning system design and review formalized learning assumptions concerning the attack surfaces and robustness characteristics of artificial intelligence applications so as to deconstruct the contemporary adversarial deep learning designs. Given its scope, the book will be of interest to Adversarial Machine Learning practitioners and Adversarial Artificial Intelligence researchers whose work involves the design and application of Adversarial Deep Learning.
This is an English translation of a Chinese textbook that has been designated a national planned university textbook, the highest award given to scientific textbooks in China. The book provides a complete overview of mechanical properties and fracture mechanics in materials science, mechanics, and physics. It details the macro- and micro-mechanical properties of metal structural materials, nonmetal structural materials, and various functional materials. It also discusses the macro and micro failure mechanism under different loadings and contains research results on thin film mechanics, smart material mechanics, and more.
Behaviour of Building Structures Subjected to Progressive Collapse gives in-depth and up-to-date quantitative and numerical analysis of building structures against progressive collapse. It does so at various levels, including bare steel joints, composite joints and sub-assemblages and frames under quasi-static loading conditions. The book provides analysis of the force transfer mechanisms of composite structures and reinforced concrete structures, along with detailed numerical models that shed light on the effects of critical parameters on progressive collapse resistances. It includes direct design methods that take into account various collapse-resisting mechanisms. The collapse of the World Trade Center in New York has spurred extensive experimental study and numerical analysis of the structural behavior of buildings under progressive collapse scenarios. Although design guidelines have been published by governments, most are missing up-to-date numerical and experimental results, quantitative accounts of force transfer mechanisms, and numerical guidelines. Offers in-depth analysis and numerical modeling for building structures against progressive collapse Provides analysis of the force-transfer mechanisms of composite and reinforced concrete structures Gives detailed numerical models that shed light on the effects of critical parameters on progressive resistances Includes direct design methods that take into account various collapse resisting mechanisms Offers a comprehensive reference for progressive collapse analysis and the design of building structures
This book highlights the failure theories and evaluation techniques of thermal barrier coatings, covering the thermal-mechanical–chemical coupling theories, performance and damage characterization techniques, and related evaluations. Thermal barrier coatings are the key thermal protection materials for high-temperature components in advanced aeroengines. Coating spallation is a major technical bottleneck faced by researchers. The extremely complex microstructure, diverse service environments, and failure behaviors bring challenges to the spallation analysis in terms of the selective use of mechanical theories, experimental methods, and testing platforms. In the book, the authors provide a systematic summary of the latest research and technological advances and present their insights and findings in the past couple of decades. This book is not only suitable for researchers and engineers in thermal barrier coatings and related fields but also a good reference for upper-undergraduate and postgraduate students of materials science and mechanics majors.
This book is a comprehensive and intensive monograph for scientists, engineers and applied mathematicians, as well as graduate students in fluid dynamics. It starts with a brief review of fundamentals of fluid dynamics, with an innovative emphasis on the intrinsic orthogonal decomposition of fluid dynamic process, by which one naturally identifies the content and scope of vorticity and vortex dynamics. This is followed by a detailed presentation of vorticity dynamics as the basis of later development. In vortex dynamics part the book deals with the formation, motion, interaction, stability, and breakdown of various vortices. Typical vortex structures are analyzed in laminar, transitional, and turbulent flows, including stratified and rotational fluids. Physical understanding of vertical flow phenomena and mechanisms is the first priority throughout the book. To make the book self-contained, some mathematical background is briefly presented in the main text, but major prerequisites are systematically given in appendices. Material usually not seen in books on vortex dynamics is included, such as geophysical vortex dynamics, aerodynamic vortical flow diagnostics and management.
This book introduces readers to the main theories of phytoremediation and its application to arsenic-contaminated soils in China. The hyperaccumulation theories are introduced, including the use of hyperaccumulators to remove large amounts of arsenic without producing toxic symptoms. The use of synchrotron-based X-ray absorption fine structure radiation to disclose the hyperaccumulation mechanism – a method that makes it possible to detect the elements in plant tissues without destroying the sample – is introduced in detail. This book also includes practical application cases of phytoremediation, which are rarely found in the literature. Allowing readers to gain a thorough understanding of phytoremediation technology, and demonstrating its efficiency in cleaning arsenic-contaminated soils, the book offers a valuable asset for graduate students, lecturers, researchers and engineers in the field of soil remediation.
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book. In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world. The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks. This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.
Mobile Edge Artificial Intelligence: Opportunities and Challenges presents recent advances in wireless technologies and nonconvex optimization techniques for designing efficient edge AI systems. The book includes comprehensive coverage on modeling, algorithm design and theoretical analysis. Through typical examples, the powerfulness of this set of systems and algorithms is demonstrated, along with their abilities to make low-latency, reliable and private intelligent decisions at network edge. With the availability of massive datasets, high performance computing platforms, sophisticated algorithms and software toolkits, AI has achieved remarkable success in many application domains. As such, intelligent wireless networks will be designed to leverage advanced wireless communications and mobile computing technologies to support AI-enabled applications at various edge mobile devices with limited communication, computation, hardware and energy resources. Presents advanced key enabling techniques, including model compression, wireless MapReduce and wireless cooperative transmission Provides advanced 6G wireless techniques, including over-the-air computation and reconfigurable intelligent surface Includes principles for designing communication-efficient edge inference systems, communication-efficient training systems, and communication-efficient optimization algorithms for edge machine learning
This book review and rearrange the research data of Triticeae published over hundreds of years, applying a modern scientific approach. Triticeae is an important tribe in the grass family (Peaceae). It includes the major cereal crops, such as wheat, barley and rye, in addition to many valuable forage crops found in different genera, such as Elymus, Agropyron, Pasthyrostachys, and Leymus. The knowledge of appropriate Triticeae taxonomy and biosystematics will serve as genetic breeding of wheat, barley, rye and forage grass. The authors attempted to remain the truth and remove the false for deriving a more natural biosystematics of Triticeae. This book covers taxonomy, cytogenetics, and molecular phylogeny. It summarizes the biosystematics of Triticeae with comprehensive and updated data. This book is divided into five volumes (Volumes 1- 5), and includes 30 genera, 2 subgenera, 464 species, 9 subspecies, and 186 varieties in Triticeae. Volume 5 introduces nine perennial genera in Triticeae: Campeiostachys, Elymus, Pascopyrum, Lophopyrum, Trichopyrum, Hordelymus, Festucopsis, Peridictyon, and Psammopyrum. Elymus (StH), Campeiostachys (StYH), Lophopyrum (E), and Trichopyrum (ESt)are polymorphic genus. They show similar morphological characters, and it is difficult to distinguish them based merely on morphological variation. Pascopyrum (StHNsXm), Hordelymus (XoXr), Festucopsis (L), Peridictyon (Xp), and Psammopyrum (EL) are small genera, mostly monotypic genera. This book can serve as highly qualified, valuable, and convenient handbooks for audiences who are interested in Triticeae. This book also includes many illustrations, in addition to the description, to help the audience understand, morphological features of the concerned taxa, which makes the explanation more precise and obvious. It is a useful tool to understand the relationship among species in Triticeae.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.