This book details the theory and applications of finite element (FE) modeling of post-tensioned (PT) concrete structures, and provides the updated MATLAB code (as of 2019). The challenge of modeling PT prestressed concrete structures lies in the treatment of the interface between the concrete and prestressing tendons. Using MATLAB, this study develops an innovative nonlinear FE formulation which incorporates contact techniques and engineering elements to considerably reduce the need of computational power. This FE formulation has the ability to simulate different PT frame systems with fully bonded, fully unbonded or partially bonded tendons, as well as actual sliding behavior and frictional effects in the tendons. It also allows for the accurate simulation of anchor seating loss.
The three volume set LNCS 5551/5552/5553 constitutes the refereed proceedings of the 6th International Symposium on Neural Networks, ISNN 2009, held in Wuhan, China in May 2009. The 409 revised papers presented were carefully reviewed and selected from a total of 1.235 submissions. The papers are organized in 20 topical sections on theoretical analysis, stability, time-delay neural networks, machine learning, neural modeling, decision making systems, fuzzy systems and fuzzy neural networks, support vector machines and kernel methods, genetic algorithms, clustering and classification, pattern recognition, intelligent control, optimization, robotics, image processing, signal processing, biomedical applications, fault diagnosis, telecommunication, sensor network and transportation systems, as well as applications.
This self-contained book provides systematic instructive analysis of uncertain systems of the following types: ordinary differential equations, impulsive equations, equations on time scales, singularly perturbed differential equations, and set differential equations. Each chapter contains new conditions of stability of unperturbed motion of the abo
During the past two decades, many communication techniques have been developed to achieve various goals such as higher data rate, more robust link quality,andmoreusercapacityinmorerigorouschannelconditions.Themost well known are, for instance, CDMA, OFDM, MIMO, multiuser OFDM, and UWB systems.All these systems havetheir ownunique superioritywhile they also induce other drawbacks that limit the system performance. Conventional way to overcome the drawback is to impose most of the computational e?ort in the receiver side and let the transmitter design much simpler than receiver. The fact is that, however, by leveraging reasonable computational e?ort to the transmitter, the receiver design can be greatly simpli?ed. For instance, multiaccess interference (MAI) has long been considered to limit the perf- mance of multiuser systems. Popular solutions to mitigate MAI issue include multiuser detection (MUD) or sophisticated signal processing for interference cancellation such as PIC or SIC. However, those solutions impose great b- den in the receiver. In this case, precoding o?er good solutions to achieve simple transceiver designs as we will mention later in this book. This book is intended to provide a comprehensive review of precoding techniques for digital communications systems from a signal processing p- spective. The variety of selected precoding techniques and their applications makes this book quite di?erent from other texts about precoding techniques in digital communication engineering.
The main purpose of developing stability theory is to examine dynamic responses of a system to disturbances as the time approaches infinity. It has been and still is the object of intense investigations due to its intrinsic interest and its relevance to all practical systems in engineering, finance, natural science and social science. This monograph provides some state-of-the-art expositions of major advances in fundamental stability theories and methods for dynamic systems of ODE and DDE types and in limit cycle, normal form and Hopf bifurcation control of nonlinear dynamic systems. - Presents comprehensive theory and methodology of stability analysis - Can be used as textbook for graduate students in applied mathematics, mechanics, control theory, theoretical physics, mathematical biology, information theory, scientific computation - Serves as a comprehensive handbook of stability theory for practicing aerospace, control, mechanical, structural, naval and civil engineers
Devoted to the theory of Lie algebras and algebraic groups, this book includes a large amount of commutative algebra and algebraic geometry so as to make it as self-contained as possible. The aim of the book is to assemble in a single volume the algebraic aspects of the theory, so as to present the foundations of the theory in characteristic zero. Detailed proofs are included, and some recent results are discussed in the final chapters.
Following the recent developments in the field of absolute stability, Prof. Xiaoxin Liao, in conjunction with Prof. Pei Yu, has created a second edition of his seminal work on the subject. Liao begins with an introduction to the Lurie problem and Lurie control system, before moving on to the simple algebraic sufficient conditions for the absolute stability of autonomous and non-autonomous ODE systems, as well as several special classes of Lurie-type systems. The focus of the book then shifts toward the new results and research that have appeared in the decade since the first edition was published. This book is aimed to be used by undergraduates in the areas of applied mathematics, nonlinear control systems, and chaos control and synchronisation, but may also be useful as a reference for researchers and engineers. The book is self-contained, though a basic knowledge of calculus, linear system and matrix theory, and ordinary differential equations is a prerequisite.
In October 2022, the 20th Party Congress of the Chinese Communist Party (CCP) concluded, extending Xi Jinping's leadership indefinitely, which many view as a one-party dictatorship. Exploring Confucian and socialist principles, this book examines the relationship between the citizens and leaders in the Chinese autocracy. By applying a Foucauldian twist to a range of topics - from discussing the politics of love and pandemic nationalism to analysing Xi's personality - it challenges the binary of authoritarianism and democracy. Interdisciplinary in nature, it will appeal to scholars and students working in the fields of politics, international relations, culture studies and critical theory.
Empirical Likelihood Methods in Biomedicine and Health provides a compendium of nonparametric likelihood statistical techniques in the perspective of health research applications. It includes detailed descriptions of the theoretical underpinnings of recently developed empirical likelihood-based methods. The emphasis throughout is on the application of the methods to the health sciences, with worked examples using real data. Provides a systematic overview of novel empirical likelihood techniques. Presents a good balance of theory, methods, and applications. Features detailed worked examples to illustrate the application of the methods. Includes R code for implementation. The book material is attractive and easily understandable to scientists who are new to the research area and may attract statisticians interested in learning more about advanced nonparametric topics including various modern empirical likelihood methods. The book can be used by graduate students majoring in biostatistics, or in a related field, particularly for those who are interested in nonparametric methods with direct applications in Biomedicine.
On a certain day in a certain year, a faint shadow appeared in Mu Si Nan's eyes. Just like that, ten thousand years passed. I remember Shen Congwen saying something, "I know you came back, so I'll wait." That was why Mu Sinnan and the others had come. I remember that I love you only three words, but the hidden meaning is indescribable with words, so Mouseson didn't say it, but she did. Join Collection
This book examines concepts and tools for selecting and modifying a combination of technologies that will be either developed by a technology supply organization, such as a national laboratory or a corporate research center, or adopted by a technology application organization, such as a government administrative office or a corporation management department, to either advance public goals or enhance corporate strategies.
Focusing on the theory of shadowing of approximate trajectories (pseudotrajectories) of dynamical systems, this book surveys recent progress in establishing relations between shadowing and such basic notions from the classical theory of structural stability as hyperbolicity and transversality. Special attention is given to the study of "quantitative" shadowing properties, such as Lipschitz shadowing (it is shown that this property is equivalent to structural stability both for diffeomorphisms and smooth flows), and to the passage to robust shadowing (which is also equivalent to structural stability in the case of diffeomorphisms, while the situation becomes more complicated in the case of flows). Relations between the shadowing property of diffeomorphisms on their chain transitive sets and the hyperbolicity of such sets are also described. The book will allow young researchers in the field of dynamical systems to gain a better understanding of new ideas in the global qualitative theory. It will also be of interest to specialists in dynamical systems and their applications.
She was a top assassin in the 21st century! It was the trash, the Third Young Miss, that the people of Zi Yue despised! He was the master of the Blood Underworld. He was incomparably handsome, talented, cold, domineering, and incomparable to a woman! Everyone in the world had insulted her as a worthless trash. He was the only one who had seen through everything. He treated her like a priceless treasure that he would never abandon! She also vowed to take his hand and experience the world! And let's see how they will step up to the peak of the world step by step and look down on the whole world! A certain woman with a head full of black lines looked behind her, eagerly chasing after her. A certain man with a face full of smiles, the corner of his mouth twitched! Are you sure this is the Lord of Blood Underworld? What about the callousness they said? What happened to not being close to a woman?
Boundary Methods: Elements, Contours, and Nodes presents the results of cutting-edge research in boundary-based mesh-free methods. These methods combine the dimensionality advantage of the boundary element method with the ease of discretization of mesh-free methods, both of which, for some problems, hold distinct advantages over the finite element
This book deals with continuous time dynamic neural networks theory applied to the solution of basic problems in robust control theory, including identification, state space estimation (based on neuro-observers) and trajectory tracking. The plants to be identified and controlled are assumed to be a priori unknown but belonging to a given class containing internal unmodelled dynamics and external perturbations as well. The error stability analysis and the corresponding error bounds for different problems are presented. The effectiveness of the suggested approach is illustrated by its application to various controlled physical systems (robotic, chaotic, chemical, etc.).
One service mathematics has rendered the "Et moi ... si j'a\'ait su comment en revenir, human race. It has put common sense back je n'y scrais point alit: Jules Verne where it belongs, on the topmost shelf next to the dusty canister labc\led 'discarded non The series is divergent; therefore we may be sense'. Eric T. 8c\l able to do something with it. O. Hcaviside Mathematics is a tool for thought. A highly necessary tool in a world where both feedback and non linearities abound. Similarly, all kinds of parts of mathematics serve as tools for other parts and for other sciences. Applying a simple rewriting rule to the quote on the right above one finds such statements as: 'One service topology has rendered mathematical physics .. .'; 'One service logic has rendered com puter science .. .'; 'One service category theory has rendered mathematics .. .'. All arguably true. And all statements obtainable this way form part of the raison d'etre of this series.
Many machine learning tasks involve solving complex optimization problems, such as working on non-differentiable, non-continuous, and non-unique objective functions; in some cases it can prove difficult to even define an explicit objective function. Evolutionary learning applies evolutionary algorithms to address optimization problems in machine learning, and has yielded encouraging outcomes in many applications. However, due to the heuristic nature of evolutionary optimization, most outcomes to date have been empirical and lack theoretical support. This shortcoming has kept evolutionary learning from being well received in the machine learning community, which favors solid theoretical approaches. Recently there have been considerable efforts to address this issue. This book presents a range of those efforts, divided into four parts. Part I briefly introduces readers to evolutionary learning and provides some preliminaries, while Part II presents general theoretical tools for the analysis of running time and approximation performance in evolutionary algorithms. Based on these general tools, Part III presents a number of theoretical findings on major factors in evolutionary optimization, such as recombination, representation, inaccurate fitness evaluation, and population. In closing, Part IV addresses the development of evolutionary learning algorithms with provable theoretical guarantees for several representative tasks, in which evolutionary learning offers excellent performance.
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book. In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world. The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks. This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.
This book gives an account of the necessary background for group algebras and crossed products for actions of a group or a semigroup on a space and reports on some very recently developed techniques with applications to particular examples. Much of the material is available here for the first time in book form. The topics discussed are among the most classical and intensely studied C*-algebras. They are important for applications in fields as diverse as the theory of unitary group representations, index theory, the topology of manifolds or ergodic theory of group actions. Part of the most basic structural information for such a C*-algebra is contained in its K-theory. The determination of the K-groups of C*-algebras constructed from group or semigroup actions is a particularly challenging problem. Paul Baum and Alain Connes proposed a formula for the K-theory of the reduced crossed product for a group action that would permit, in principle, its computation. By work of many hands, the formula has by now been verified for very large classes of groups and this work has led to the development of a host of new techniques. An important ingredient is Kasparov's bivariant K-theory. More recently, also the C*-algebras generated by the regular representation of a semigroup as well as the crossed products for actions of semigroups by endomorphisms have been studied in more detail. Intriguing examples of actions of such semigroups come from ergodic theory as well as from algebraic number theory. The computation of the K-theory of the corresponding crossed products needs new techniques. In cases of interest the K-theory of the algebras reflects ergodic theoretic or number theoretic properties of the action.
INLA stands for Integrated Nested Laplace Approximations, which is a new method for fitting a broad class of Bayesian regression models. No samples of the posterior marginal distributions need to be drawn using INLA, so it is a computationally convenient alternative to Markov chain Monte Carlo (MCMC), the standard tool for Bayesian inference. Bayesian Regression Modeling with INLA covers a wide range of modern regression models and focuses on the INLA technique for building Bayesian models using real-world data and assessing their validity. A key theme throughout the book is that it makes sense to demonstrate the interplay of theory and practice with reproducible studies. Complete R commands are provided for each example, and a supporting website holds all of the data described in the book. An R package including the data and additional functions in the book is available to download. The book is aimed at readers who have a basic knowledge of statistical theory and Bayesian methodology. It gets readers up to date on the latest in Bayesian inference using INLA and prepares them for sophisticated, real-world work. Xiaofeng Wang is Professor of Medicine and Biostatistics at the Cleveland Clinic Lerner College of Medicine of Case Western Reserve University and a Full Staff in the Department of Quantitative Health Sciences at Cleveland Clinic. Yu Ryan Yue is Associate Professor of Statistics in the Paul H. Chook Department of Information Systems and Statistics at Baruch College, The City University of New York. Julian J. Faraway is Professor of Statistics in the Department of Mathematical Sciences at the University of Bath.
This book focuses on forecasting foreign exchange rates via artificial neural networks (ANNs), creating and applying the highly useful computational techniques of Artificial Neural Networks (ANNs) to foreign-exchange rate forecasting. The result is an up-to-date review of the most recent research developments in forecasting foreign exchange rates coupled with a highly useful methodological approach to predicting rate changes in foreign currency exchanges.
This book is a systematic description of the variational theory of splines in Hilbert spaces. All central aspects are discussed in the general form: existence, uniqueness, characterization via reproducing mappings and kernels, convergence, error estimations, vector and tensor hybrids in splines, dimensional reducing (traces of splines onto manifolds), etc. All considerations are illustrated by practical examples. In every case the numerical algorithms for the construction of splines are demonstrated.
This book offers a clear and comprehensive introduction to broad learning, one of the novel learning problems studied in data mining and machine learning. Broad learning aims at fusing multiple large-scale information sources of diverse varieties together, and carrying out synergistic data mining tasks across these fused sources in one unified analytic. This book takes online social networks as an application example to introduce the latest alignment and knowledge discovery algorithms. Besides the overview of broad learning, machine learning and social network basics, specific topics covered in this book include network alignment, link prediction, community detection, information diffusion, viral marketing, and network embedding.
1. The ?rst edition of this book was published in 1977. The text has been well received and is still used, although it has been out of print for some time. In the intervening three decades, a lot of interesting things have happened to mathematical logic: (i) Model theory has shown that insights acquired in the study of formal languages could be used fruitfully in solving old problems of conventional mathematics. (ii) Mathematics has been and is moving with growing acceleration from the set-theoretic language of structures to the language and intuition of (higher) categories, leaving behind old concerns about in?nities: a new view of foundations is now emerging. (iii) Computer science, a no-nonsense child of the abstract computability theory, has been creatively dealing with old challenges and providing new ones, such as the P/NP problem. Planning additional chapters for this second edition, I have decided to focus onmodeltheory,the conspicuousabsenceofwhichinthe ?rsteditionwasnoted in several reviews, and the theory of computation, including its categorical and quantum aspects. The whole Part IV: Model Theory, is new. I am very grateful to Boris I. Zilber, who kindly agreed to write it. It may be read directly after Chapter II. The contents of the ?rst edition are basically reproduced here as Chapters I–VIII. Section IV.7, on the cardinality of the continuum, is completed by Section IV.7.3, discussing H. Woodin’s discovery.
This book provides new insights on the study of global environmental changes using the ecoinformatics tools and the adaptive-evolutionary technology of geoinformation monitoring. The main advantage of this book is that it gathers and presents extensive interdisciplinary expertise in the parameterization of global biogeochemical cycles and other environmental processes in the context of globalization and sustainable development. In this regard, the crucial global problems concerning the dynamics of the nature-society system are considered and the key problems of ensuring the system’s sustainable development are studied. A new approach to the numerical modeling of the nature-society system is proposed and results are provided on modeling the dynamics of the system’s characteristics with regard to scenarios of anthropogenic impacts on biogeochemical cycles, land ecosystems and oceans. The main purpose of this book is to develop a universal guide to information-modeling technologies for assessing the function of environmental subsystems under various climatic and anthropogenic conditions.
For Ning Xianyu, her husband meant that they lived together under the same roof. Other than the fact that they occasionally loved each other in front of their elders and outsiders, they were like strangers that she was most familiar with. However... During the menstrual period, her husband bought 'bread' for her, boiled brown sugar water for her as a warm stove. Wandering in a luxury store was looked down by others, and her husband directly drove her out of A-City. He even let her enter the largest plaza of luxury goods, so she could choose from among them. Not an arranged marriage? Didn't they say that he couldn't be humane in a car accident? Who was the man in her bed, demanding too much from her? "If there is one, there is two. If there is one, there is two. If there is one, there is three..." Hubby Xie smiled charmingly and pressed over. Just when Ning Xianyu thought that such a marriage wasn't bad, he suddenly turned into the main culprit behind all of this. "Divorce! Divorce immediately! " She clenched her fists, unable to accept that all of this was a scam.
Electrical motor products reviews the energy efficiency management laws for electrical motor products in United States, European Union (EU) and China. The energy efficiency certification requirements for the electrical motor products vary from country to country and are summarised here. International standards, testing methods and certification requirements for specific electrical motor products are discussed, including electric motors, pumps and fans. Finally, methods for improving energy efficiency are examined. - Reviews the energy efficiency management laws for electrical motor products in United States, European Union (EU) and China - Highlights the importance of energy efficiency for electrical motor products - Documents energy efficiency certification requirements for electrical motor products and how they vary from country to country
The explosion caused two people to move towards the north and south.Chen had spent three years recovering his health, but Xi had forgotten everything.Returning once again, she felt that this time, there was nothing that could stop the two of them from being together.Who knew that Xi Shuangzhe had lost his memory and became someone else's husband ...The man who had once been deeply in love with her had pushed her against the corner of the wall at the wedding. He had lifted her chin with his finger, and his eyes sparkled as he said, "We feel pretty good together. How about you treat me as your mistress?"Chen Xi Wu's eyes widened as she looked at his red lips, at a loss of what to do.— —It took her three months to get used to her new identity — Xi's aunt.Watching him hug others tenderly every day, his heart could no longer bear the torment.On summer afternoons he was kissed by her with a rose in his hand: "I tell you! I'm not your aunt. I don't want to be your aunt in this life! "I am..."She swallowed the rest of her words.Who is she? He couldn't even remember.
The main purpose of this book is to show how ideas from combinatorial group theory have spread to two other areas of mathematics: the theory of Lie algebras and affine algebraic geometry. Some of these ideas, in turn, came to combinatorial group theory from low-dimensional topology in the beginning of the 20th Century. This book is divided into three fairly independent parts. Part I provides a brief exposition of several classical techniques in combinatorial group theory, namely, methods of Nielsen, Whitehead, and Tietze. Part II contains the main focus of the book. Here the authors show how the aforementioned techniques of combinatorial group theory found their way into affine algebraic geometry, a fascinating area of mathematics that studies polynomials and polynomial mappings. Part III illustrates how ideas from combinatorial group theory contributed to the theory of free algebras. The focus here is on Schreier varieties of algebras (a variety of algebras is said to be Schreier if any subalgebra of a free algebra of this variety is free in the same variety of algebras).
“Computational Plasticity with Emphasis on the Application of the Unified Strength Theory” explores a new and important branch of computational mechanics and is the third book in a plasticity series published by Springer. The other two are: Generalized Plasticity, Springer: Berlin, 2006; and Structural Plasticity, Springer and Zhejiang University Press: Hangzhou, 2009. This monograph describes the unified strength theory and associated flow rule, the implementation of these basic theories in computational programs, and shows how a series of results can be obtained by using them. The unified strength theory has been implemented in several special nonlinear finite-element programs and commercial Finite Element Codes by individual users and corporations. Many new and interesting findings for beams, plates, underground caves, excavations, strip foundations, circular foundations, slop, underground structures of hydraulic power stations, pumped-storage power stations, underground mining, high-velocity penetration of concrete structures, ancient structures, and rocket components, along with relevant computational results, are presented. This book is intended for graduate students, researchers and engineers working in solid mechanics, engineering and materials science. The theories and methods provided in this book can also be used for other computer codes and different structures. More results can be obtained, which put the potential strength of the material to better use, thus offering material-saving and energy-saving solutions. Mao-Hong Yu is a professor at the Department of Civil Engineering at Xi'an Jiaotong University, Xi'an, China.
A Reflection of Reality is an anthology of modern Chinese short stories designed as an advanced-level textbook for students who have completed at least three years of college-level Chinese. While many advanced-level Chinese language textbooks stress only practical communication, this textbook uses stories from well-known Chinese authors not only to enhance students' language proficiency, but also to expose students to the literature, history, and evolution of modern Chinese society. The twelve stories selected for this textbook are written by such contemporary authors as Yu Hua, Wang Anyi, and Gao Xingjian, and have appeared in various newspapers and magazines in China. Each story is filled with useful sentence structures, vocabulary, and cultural information, and is followed by an extensive vocabulary list, numerous sentence structure examples, grammar exercises, and discussion questions. The textbook also includes a comprehensive pinyin index. A Reflection of Reality will effectively improve students' Chinese language skills and their understanding of today's China. Advanced-level Chinese language textbook Selected short stories reflect contemporary Chinese society and culture Extensive vocabulary lists, sentence structure examples, grammar exercises, and discussion questions Comprehensive pinyin index
China’s development momentum will last for 200 more years. This book focused on China’s Economic System Reform and Opening-up to the Outside World, and answered the why, when, who, where, and how? The author used his observation and analysis to break down the Reform step by step. The story started from China’s national situation, followed by the kick-off, the operation, the policy, the little-known side of the senior decision-making process, and the organizational behaviors of the Communist Party of China. The Destiny of Chinese Nation and the development strategy are the unique achievements in China Studies. In 2009, the author presided over the program “The Planning of Economic and Cultural Industries Development of Xuanwu District, Beijing, 2009–2015.” He anticipated that the population of the Beijing metropolitan area shall be 70–100 million, and pointed out the necessity to build one more international airport in South Beijing. He also concluded the program “World Metropolis, Humanistic Beijing, and the Planning of the Cultural Finance during 2010–2015” by the same inferences. In 2014, the construction of Xiong An New District began. The Beijing Economic Circle has brought the prediction of 100-million population close to reality. On September 25, 2019, Beijing Da Xing International Airport was officially opened to traffic.
Proceedings of the 4th International Conference on Measurement Technology, Disaster Prevention and Mitigation (MTDPM 2023), Nanjing, China, 26-28 May 2023
Proceedings of the 4th International Conference on Measurement Technology, Disaster Prevention and Mitigation (MTDPM 2023), Nanjing, China, 26-28 May 2023
Advances in Measurement Technology and Disaster Prevention focuses on research of measurement technology and the development of disaster prevention and mitigation. The topics include: Measurement in Civil Engineering Disaster Prevention and Mitigation Hydraulic Engineering and Surveying Applications Protection Engineering The book will be of interest to professionals and academics in the above-mentioned areas.
This book constitutes the refereed proceedings of the Second International Conference on Web-Age Information Management, WAIM 2001, held in Xi'an, China, in July 2001. The 21 revised full papers and 12 short papers presented together with 4 research experience papers were carefully reviewed and selected for inclusion in the proceedings. The papers are organized in topical sections on multimedia databases and high-dimensional indexing, information retrieval and text indexing, data mining, semistructured data management, data warehousing and federated databases, Web information management and e-commerce, spatio-temporal and high-dimensional information management, data mining and constraint management, data integration and filtering, and workflow and adaptive systems.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.