This is a practical hands-on book with clear instructions and lot of code examples. It takes a simple approach, guiding you through different architectural topics using realistic sample projects
This Ph.D. book develops nanowire-assisted electroporation disinfection technology based on the flow-through porous electrode. The author presents pioneering results on theoretical modeling, experimental realization, and selected applications, showing the novel disinfection mechanism of electroporation guarantees an exceedingly low level of energy consumption. In this regard, three classes of novel dynamic behavior are investigated: (i) The developed nanowire-assisted flow-through electroporation disinfection technology enables great microbial disinfection performance with extremely low voltage (1V), which significantly reduce the formation potential of harmful disinfection by-products during the treatment process. (ii) The nanowire-assisted flow-through electroporation disinfection technology ensures no reactivation/regrowth of inactivated bacteria and meanwhile promotes the gradual death of damaged bacteria during the storage process. (iii) The application of high-frequency AC power supply (106 Hz) ensures the high microbial disinfection efficiency while suppressing the occurrence of electrochemical reactions and extending the electrode lifetime effectively.
This book reflects up-to-date research, fundamental theories, and key techniques of of wireless localization technology and error-controlling techniques. It also presents and discusses the issue of localizability, as well as privacy issues associated with LBS. This book encompasses the significant and quickly growing area of wireless localization technology. It presents comprehensive and up-to-date research in both fundamental theories and key techniques of network localization. In addition to localization approaches, it also is the first book to address the issue of localizability. The privacy issue of LBS technology is also discussed.
This book provides a comprehensive and in-depth understanding of wireless indoor localization for ubiquitous applications. The past decade has witnessed a flourishing of WiFi-based indoor localization, which has become one of the most popular localization solutions and has attracted considerable attention from both the academic and industrial communities. Specifically focusing on WiFi fingerprint based localization via crowdsourcing, the book follows a top-down approach and explores the three most important aspects of wireless indoor localization: deployment, maintenance, and service accuracy. After extensively reviewing the state-of-the-art literature, it highlights the latest advances in crowdsourcing-enabled WiFi localization. It elaborated the ideas, methods and systems for implementing the crowdsourcing approach for fingerprint-based localization. By tackling the problems such as: deployment costs of fingerprint database construction, maintenance overhead of fingerprint database updating, floor plan generation, and location errors, the book offers a valuable reference guide for technicians and practitioners in the field of location-based services. As the first of its kind, introducing readers to WiFi-based localization from a crowdsourcing perspective, it will greatly benefit and appeal to scientists and researchers in mobile and ubiquitous computing and related areas.
This book provides a description of material characterization and mechanisms of secondary batteries during discharge, cycle, and storage process. It also proposes a new intercalation/de-intercalation theory and presents the mechanism of ionic conduction. In addition, through the comparative study of variation laws of battery performance and of fine structure and microstructure parameters, the mechanism of cycle and storage processes and battery performance decay are investigated. Given its scope, the book appeals to a broad readership, particularly professionals at universities and scientific research institutes.
This book mainly addresses the position, function, influence, and values of folk oral literature in the history of Chinese literature. Divided into 14 chapters, it systematically covers central aspects of folklore literature such as ballads, folk songs, Bianwen, Zajuci, Guzici, Zhugongdiao, Sanqu, Baojuan, Tanci, Zidishu, and so on from the Pre-Qin to the late Qing Dynasties, filling several gaps in literary history studies. It is a comprehensive literary work, and many of the materials cited here are rare and difficult to find. In addition, the book proposes some important theories, especially six highly generalized qualities of folk literature, namely that it is: popular, collective, oral, fresh, effusive, and innovative. With detailed, extensive materials, and quotations, the book represents the most systematic and comprehensive work to date on ancient Chinese folk literature. It is mutually complementary with Guowei Wang’s A Textual Research of the Traditional Chinese Opera in the Song and Yuan Dynasties and Xun Lu’s A Brief History of Chinese Fiction; all three works are regarded as the most essential classics for researching the history of Chinese literature.
Perception of human beings has evolved from natural biosensor to powerful sensors and sensor networks. In sensor networks, trillions of devices are interconnected and sense a broad spectrum of contexts for human beings, laying the foundation of Internet of Things (IoT). However, sensor technologies have several limitations relating to deployment cost and usability, which render them unacceptable for practical use. Consequently, the pursuit of convenience in human perception necessitates a wireless, sensorless and contactless sensing paradigm. Recent decades have witnessed rapid developments in wireless sensing technologies, in which sensors detect wireless signals (such as acoustic, light, and radio frequency) originally designed for data transmission or lighting. By analyzing the signal measurements on the receiver end, channel characteristics can be obtained to convey the sensing results. Currently, significant effort is being devoted to employing the ambient Wi-Fi, RFID, Bluetooth, ZigBee, and television signals for smart wireless sensing, eliminating the need for dedicated sensors and promoting the prospect of the Artificial Intelligence of Things (AIoT). This book provides a comprehensive and in-depth discussion of wireless sensing technologies. Specifically, with a particular focus on Wi-Fi-based sensing for understanding human behavior, it adopts a top-down approach to introduce three key topics: human detection, localization, and activity recognition. Presenting the latest advances in smart wireless sensing based on an extensive review of state-of-the-art research, it promotes the further development of this area and also contributes to interdisciplinary research.
Chinese companies have been increasingly active in outbound investment in recent years, with Germany the third largest destination in Europe. Adopting an analytical approach and utilizing case studies and expert interviews, this book examines Chinese mergers and acquisitions (M&As) in Germany, with a focus on the companies’ business growth, particularly the integration process and subsequent growth after acquisition. The authors contend that Chinese investors take a different approach than their western counterparts, by fostering a long-term orientation toward their investments and placing greater emphasis on co-evolution with the acquired firms rather than transfer of knowledge back to China. This book offers readers a behind-the-scenes story of three separate M&A cases, shedding light on the growth models that ensue from mergers and acquisitions, and the endeavors of Chinese and German managers to grow the businesses together.
This book is highly informative and carefully presented, providing scientific insights into the flood resources utilization in the Yangtze River Basin both for scholars and decision-makers. The book is for the purpose of analyzing the potential utilization of flood resources in the Yangtze River Basin and exploring effective ways to put forward the countermeasures against the risks. Major objectives of this book include: (1) revealing the characteristics of the inflow and the sediment variation in the upper reaches of the Yangtze River, quantitatively evaluating the potential utilization of the flood resources in the Yangtze River and demonstrating the feasibility of its utilization in the Basin; (2) proposing the necessity and feasibility of utilizing the flood resources by the Three Gorges Project; (3) shedding new light on the characteristics of the flood resources, presenting different methods of flood resources utilization in different regions over the Basin and raising the overall risk-optimized strategies of the flood resources utilization in the Yangtze River; (4) analyzing the risk of flood resources utilization for the Three Gorges Project regarding flood control, sediment, ecology, etc., and putting forward the risk-optimized countermeasures of flood resources utilization for the Three Gorges Project.
La diversité n'est pas seulement une source potentielle de conflits mais aussi un trésor enrichissant : elle fait découvrir des solutions différentes à un même problème fondamental de l'humanité et permet de connaître les autres cultures mais surtout de reconnaître la sienne propre et d'aller au-delà de celle-ci. Ces débats et discussions entre universitaires et entrepreneurs chinois et français s'attachent aux problèmes observés dans les coopérations interculturelles, le management et l'internationalisation de grands groupes.
The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the world The latest research on this subject is concisely presented within the book, with several figures to support the text. Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI)
Adhering to the combination of theoretical introduction and practical case introduction, this book summarizes the basic concepts and methods in management and big data analysis at home and abroad and introduces a large number of relevant practical cases, especially new cases in the Internet era, to help readers integrate theoretical knowledge into practical applications. The chapters of this book are interrelated and independent of each other, making it easy for the reader to study in pieces or to delve deeper into a particular topic of interest. Covering an array of theories about management and big data at home and abroad, this book lays a solid foundation for being an authentic manager. It is organized into sections on decision-making, organization, leadership, control, innovation, and big data to fully dissect and summarize the basic concepts of these characters in management and to show the basic methods that managers can use to solve problems. Each section contains a large number of examples to demonstrate how entrepreneurs successfully manage their large companies and overcome the difficulties in the business, utilizing the corresponding management functions or big data technology. Further, in order to adapt to the development of the Internet era, this book also absorbs a lot of practice cases of management innovation and big data which have emerged in recent years based on advanced network platform and big data analysis. This book puts great emphasis on the innovative function of management, adding more comprehensive methods and more updated cases related to the Internet.
This book covers a wide range of subjects in applying machine learning approaches for bioinformatics projects. The book succeeds on two key unique features. First, it introduces the most widely used machine learning approaches in bioinformatics and discusses, with evaluations from real case studies, how they are used in individual bioinformatics projects. Second, it introduces state-of-the-art bioinformatics research methods. Furthermore, the book includes R codes and example data sets to help readers develop their own bioinformatics research skills. The theoretical parts and the practical parts are well integrated for readers to follow the existing procedures in individual research. Unlike most of the bioinformatics textbooks on the market, the content coverage is not limited to just one subject. A broad spectrum of relevant topics in bioinformatics including systematic data mining and computational systems biology researches are brought together in this book, thereby offering an efficient and convenient platform for undergraduate/graduate teaching. An essential textbook for both final year undergraduates and graduate students in universities, as well as a comprehensive handbook for new researchers, this book will also serve as a practical guide for software development in relevant bioinformatics projects.
Analysis of Genetic Association Studies is both a graduate level textbook in statistical genetics and genetic epidemiology, and a reference book for the analysis of genetic association studies. Students, researchers, and professionals will find the topics introduced in Analysis of Genetic Association Studies particularly relevant. The book is applicable to the study of statistics, biostatistics, genetics and genetic epidemiology. In addition to providing derivations, the book uses real examples and simulations to illustrate step-by-step applications. Introductory chapters on probability and genetic epidemiology terminology provide the reader with necessary background knowledge. The organization of this work allows for both casual reference and close study.
Professor Yang and Dr. Zheng are two of the passionate young researchers in the field with a lot of hands-on experience. Professor Ni, on the other hand, is a veteran in wireless technologies, 2.5G/3G cellular phones, and embedded systems. The energy, the hands-on experience, and the long-term vision ensure that the book is of highest quality." --From the foreword by Ya-Qin Zhang, Corporate Vice President for Research, Microsoft China The second-generation Smartphone applications are exclusively designed to leverage the advantages of mobility and ubiquitous wireless access. This book provides you with an in-depth look at software development issues and design guidelines, and helps you gain the skills you need to develop your own efficient and feature-rich Smartphone applications that utilize the latest cutting-edge technologies. Complete with code and examples, the book first walks you through the Microsoft Smartphone platform from a software developer's perspective. It next uncovers the .NET Compact Framework as well as the Smartphone programming environment. You'll then find detailed information on Microsoft Smartphone-related application design and programming topics in the domains of the .NET Compact Framework (managed code). Plus, you'll explore advanced development topics such as security and performance considerations that you'll be able to incorporate into your own applications. What you will learn from this book * How to use the programming framework and classes available in Windows Mobile and Smartphone SDK * The fundamentals of .NET Compact Framework 2.0 * Techniques for developing your own robust Smartphone applications * Steps for customizing components and P/Invoke * How to enhance data and communication security * Ways to improve the performance of your applications * Fundamental techniques for supporting world-ready applications Who this book is for This book is for software architects and developers working in the area of mobile application development as well as professionals who want a quick and thorough overview of the Microsoft Smartphone software development platform. Wrox Professional guides are planned and written by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job.
Due to its capability of handling very complex problems and its high flexibility in adapting to different algorithms, the kernel machine plays a crucial role in machine learning.Bio-Kernel Machines and Applications will introduce a new type of kernel machine for the exploration and modeling between the genotypic inherent structures of short protein sequences or nucleic sequences and the phenotypic biological properties or functions of proteins or nucleotides.The book seeks to establish the fundamentals of the bio-kernel machines by presenting the basic principle and theory of the kernel machine and the various formats of kernel machines, such as string kernel machines adapted for biological applications. The book will also introduce several biological applications of the mutation matrices, demonstrating how mutation matrices can enhance the efficiency and biological relevance of machine learning models applied in specific biological problems.Through analyzing current applications of bio-kernel machines, readers will delve into the advantages of the bio-kernel machines and explore how bio-kernel machines can be further enhanced to tackle a wide spectrum of biological challenges and pave the way for future advancements.
E-Commerce Strategy builds awareness and sharpens readers' understanding of the key issues about e-commerce strategies. To link theory of e-commerce strategy with practice in the real world, it brings together theoretical perspectives based on academic research, integrated use of technologies and large amount of cases, especially those of China. With regard to the innovative technical standards and frameworks, it proposes strategic analysis from a technical point of view. The book is intended for postgraduate students in e-commerce and computer science as well as government officials, entrepreneurs and managers. Prof. Zheng Qin is the Director of Software Engineering and Management Research Institute, Tsinghua University, China; Dr. Shundong Li is a Professor at the School of Computer Science, Shaanxi Normal University, China; Dr. Yang Chang and Dr. Fengxiang Li are both Research Assistants at the School of Software, Tsinghua University, China.
This book describes grouping detection and initiation; group initiation algorithm based on geometry center; data association and track continuity; as well as separate-detection and situation cognition for group-target. It specifies the tracking of the target in different quantities and densities. At the same time, it integrates cognition into the application. Group-target Tracking is designed as a book for advanced-level students and researchers in the area of radar systems, information fusion of multi-sensors and electronic countermeasures. It is also a valuable reference resource for professionals working in this field.
Learn to develop for the new Windows Phone 7 platform With a special focus placed on the new Windows Phone 7 (WP7) design guidelines and technologies, this reference helps you extend your knowledge so that you can learn to develop for the new WP7 platform. The team of authors presents topic-by-topic comparisons between WP7 and Android and the iPhone, enabling you to learn the differences and similarities between them. This indispensible coverage prepares you for making the transition from programming for Android and the iPhone to programming for the exciting new WP7. Covers the exciting new technology of Windows Phone 7 (WP7) and serves as ideal reference for Android and iPhone developers who are eager to get started programming for the WP7 Zeroes in on the differences between programming for Android and the iPhone, making it much easier for you to learn and practice Offers various real-world programming scenarios to enhance your comprehension Demonstrates how to set up your development environment, create the User Interface, use local data storage, leverage location and maps, and use system services Discusses how to handle security issues Start programming for the WP7 today with this book by your side.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.