|
Showing 1 - 21 of
21 matches in All Departments
Is the environmental justice debate solely an economic issue? Is it a social issue as well as a moral, political, or science issue? In Environmental Justice Analysis: Theories, Methods, and Practice author Feng Liu suggests it is all of them. He presents a multi-perspective, multi-disciplinary, and inter-disciplinary approach to analyzing environmental justice issues. Liu demonstrates how cutting-edge technologies and methods such as the Internet, Geographic Information Systems, and modeling tools can contribute to better equity analysis and policy evaluations. He focuses on the various methods of environmental justice research, providing you with an integrated framework for conducting rigorous equity analysis. Environmental Justice has just been placed at the head of the environmental policy agenda. Federal governments have a mandate to analyze the impacts of federal policies, programs, and projects on groups and communities. Carefully and critically examining all aspects of the issue, Environmental Justice Analysis: Theories, Methods, and Practice provides you with a comprehensive and analytical treatment of theories and methods for analyzing and assessing environmental justice and equity issues.
Is the environmental justice debate solely an economic issue? Is it
a social issue as well as a moral, political, or science issue? In
Environmental Justice Analysis: Theories, Methods, and Practice
author Feng Liu suggests it is all of them. He presents a
multi-perspective, multi-disciplinary, and inter-disciplinary
approach to analyzing environmental justice issues. Liu
demonstrates how cutting-edge technologies and methods such as the
Internet, Geographic Information Systems, and modeling tools can
contribute to better equity analysis and policy evaluations. He
focuses on the various methods of environmental justice research,
providing you with an integrated framework for conducting rigorous
equity analysis. Environmental Justice has just been placed at the
head of the environmental policy agenda. Federal governments have a
mandate to analyze the impacts of federal policies, programs, and
projects on groups and communities. Carefully and critically
examining all aspects of the issue, Environmental Justice Analysis:
Theories, Methods, and Practice provides you with a comprehensive
and analytical treatment of theories and methods for analyzing and
assessing environmental justice and equity issues.
Systems and Synthetic Metabolic Engineering provides an overview of
the development of metabolic engineering within medicine that is
fueled by systems and synthetic biology. These newly developed,
successful strategies of metabolic engineering guide the audience
on how to propose and test proper strategies for metabolic
engineering research. In addition to introductory, regulatory and
challenges in the field, the book also covers dynamic control and
autonomous regulation to control cell metabolism, along with
computational modeling and industrial applications. The book is
written by leaders in the field, making it ideal for synthetic
biologists, researchers, students and anyone working in this area.
This book contains papers presented at the 6th Global Workshop on
Digital Soil Mapping, held 11-14 November 2014 at the Institute of
Soil Science, Chinese Academy of Sciences of Nanjing, China.
Digital soil mapping is advancing on different fronts at different
paces throughout the world. The researches and applications on DSM
are moving from method development to realizations in different
scales and regions, serving the generation of national and
continental to global soil grids. Meanwhile, new ideas and insights
on mapping complex soil-landscapes such as flat
plains,anthropogenically altered agriculture and urban spaces are
emerging, with the help of new paradigms and models.The goal of the
sixth workshop was to review and discuss the state of the art in
digital soil mapping, and to explore strategies for bridging
research, production, and environmental applications. This book
provides a very useful and comprehensive overview of the status of
digital soil mapping, in which graduate students, scientists and
specialists working within the field of geography can find the
spatial prediction approaches and related theory.
|
Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers (Paperback, 1st ed. 2018)
Feng Liu, Shouhuai Xu, Moti Yung
|
R1,557
Discovery Miles 15 570
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the First International
Conference on Science of Cyber Security, SciSec 2018, held in
Beijing, China, in August 2018. The 11 full papers and 6 short
papers presented in this volume were carefully reviewed and
selected from 54 submissions. The papers focus on science of
security; cybersecurity dynamics; attacks and defenses; network
security; security metrics and measurements; and performance
enhancements.
This book addresses the fundamental concepts in the theory and
practice of visual cryptography. The design, construction,
analysis, and application of visual cryptography schemes (VCSs) are
discussed in detail. Original, cutting-edge research is presented
on probabilistic, size invariant, threshold, concolorous, and
cheating immune VCS. This updated second edition has also been
expanded with new content on braille and 2D barcode authentication
of visual cryptography shares. Features: contains review exercises
at the end of each chapter, as well as a helpful glossary; examines
various common problems in visual cryptography, including the
alignment, flipping, cheating, distortion, and thin line problems;
reviews a range of VCSs, including XOR-based visual cryptography
and security enriched VCS; describes different methods for
presenting color content using visual cryptographic techniques;
covers such applications of visual cryptography as watermarking,
resolution variant VCS, and multiple resolution VCS.
This book contains papers presented at the 6th Global Workshop on
Digital Soil Mapping, held 11-14 November 2014 at the Institute of
Soil Science, Chinese Academy of Sciences of Nanjing, China.
Digital soil mapping is advancing on different fronts at different
paces throughout the world. The researches and applications on DSM
are moving from method development to realizations in different
scales and regions, serving the generation of national and
continental to global soil grids. Meanwhile, new ideas and insights
on mapping complex soil-landscapes such as flat
plains,anthropogenically altered agriculture and urban spaces are
emerging, with the help of new paradigms and models.The goal of the
sixth workshop was to review and discuss the state of the art in
digital soil mapping, and to explore strategies for bridging
research, production, and environmental applications. This book
provides a very useful and comprehensive overview of the status of
digital soil mapping, in which graduate students, scientists and
specialists working within the field of geography can find the
spatial prediction approaches and related theory.
This book addresses the fundamental concepts in the theory and
practice of visual cryptography. The design, construction,
analysis, and application of visual cryptography schemes (VCSs) are
discussed in detail. Original, cutting-edge research is presented
on probabilistic, size invariant, threshold, concolorous, and
cheating immune VCS. This updated second edition has also been
expanded with new content on braille and 2D barcode authentication
of visual cryptography shares. Features: contains review exercises
at the end of each chapter, as well as a helpful glossary; examines
various common problems in visual cryptography, including the
alignment, flipping, cheating, distortion, and thin line problems;
reviews a range of VCSs, including XOR-based visual cryptography
and security enriched VCS; describes different methods for
presenting color content using visual cryptographic techniques;
covers such applications of visual cryptography as watermarking,
resolution variant VCS, and multiple resolution VCS.
Since the mid 1990s, data hiding has been proposed as an enabling
technology for securing multimedia communication and is now used in
various applications including broadcast monitoring, movie
fingerprinting, steganography, video indexing and retrieval and
image authentication. Data hiding and cryptographic techniques are
often combined to complement each other, thus triggering the
development of a new research field of multimedia security.
Besides, two related disciplines, steganalysis and data forensics,
are increasingly attracting researchers and becoming another new
research field of multimedia security. This journal, LNCS
Transactions on Data Hiding and Multimedia Security, aims to be a
forum for all researchers in these emerging fields, publishing both
original and archival research results. The seven papers included
in this special issue were carefully reviewed and selected from 21
submissions. They address the challenges faced by the emerging area
of visual cryptography and provide the readers with an overview of
the state of the art in this field of research.
Civil engineering structures such as buildings, bridges,
stadiums, and offshore structures play an import role in our daily
life. However, constructing these structures requires lots of
budget. Thus, how to cost-efficiently design structures satisfying
all required design constraints is an important factor to
structural engineers. Traditionally, mathematical gradient-based
optimal techniques have been applied to the design of optimal
structures. While, many practical engineering optimal problems are
very complex and hard to solve by traditional method. In the past
few decades, swarm intelligence algorithms, which were inspired by
the social behaviour of natural animals such as fish schooling and
bird flocking, were developed because they do not require
conventional mathematical assumptions and thus possess better
global search abilities than the traditional optimization
algorithms and have attracted more and more attention. These
intelligent based algorithms are very suitable for continuous and
discrete design variable problems such as ready-made structural
members and have been vigorously applied to various structural
design problems and obtained good results. This book gathers the
authors' latest research work related with particle swarm optimizer
algorithm and group search optimizer algorithm as well as their
application to structural optimal design. The readers can
understand the full spectrum of the algorithms and apply the
algorithms to their own research problems.
"
Urbanization and growing wealth in developing countries portend a
large increase of demand for modern energy services in residential,
commercial and public-service buildings in the coming decades.
Pursuing energy efficiency in buildings is vital to energy security
in developing countries and is identified by the Intergovernment
Panel on Climate Change as having the greatest potential for
cost-effective reduction of CO2 emissions by 2030 among all
energy-consuming sectors. Building energy efficiency codes (BEECs),
along with energy efficiency standards for major appliances and
equipment, are broadly recognized as a necessary government
intervention to overcome persistent market barriers to capturing
the economic potential of energy efficiency gains in the
residential, commercial and public-service sectors. Implementation
of BEECs help prevent costly energy wastes over the lifecycles of
buildings in space heating, air conditioning, lighting, and other
energy service requirements. Nonetheless, achieving the full
potential of energy savings afforded by more energy-efficient
buildings requires holding people who live or work in buildings
accountable for the cost of energy services. Compliance enforcement
has been the biggest challenge to implementing BEECs. This report
summarizes the findings of an extensive literature survey of the
experiences of implementing BEECs in developed countries, as well
as those from case studies of China, Egypt, India, and Mexico. It
also serves as a primer on the basic features and contents of BEECs
and the commonly adopted compliance and enforcement approaches.
This report highlights the key challenges to improving compliance
enforcement in developing countries, including government
commitment to energy efficiency, the effectiveness of government
oversight of the construction sector, the compliance capacity of
building supply chain, and financing constraints. The report notes
that the process of transforming a country s building supply chain
toward delivering increasingly more energy-efficient buildings
takes time and requires persistent government intervention through
uniformly enforced and regularly updated BEECs. The report
recommends increased international support in strengthening the
enforcement infrastructure for BEECs in middle-income developing
countries. For low- and lower-middle-income countries, there is an
urgent need to assist in improving the effectiveness of government
oversight system for building construction, laying the foundation
for the system to also cover BEECs."
Civil engineering structures such as buildings, bridges,
stadiums, and offshore structures play an import role in our daily
life. However, constructing these structures requires lots of
budget. Thus, how to cost-efficiently design structures satisfying
all required design constraints is an important factor to
structural engineers. Traditionally, mathematical gradient-based
optimal techniques have been applied to the design of optimal
structures. While, many practical engineering optimal problems are
very complex and hard to solve by traditional method. In the past
few decades, swarm intelligence algorithms, which were inspired by
the social behaviour of natural animals such as fish schooling and
bird flocking, were developed because they do not require
conventional mathematical assumptions and thus possess better
global search abilities than the traditional optimization
algorithms and have attracted more and more attention. These
intelligent based algorithms are very suitable for continuous and
discrete design variable problems such as ready-made structural
members and have been vigorously applied to various structural
design problems and obtained good results. This book gathers the
authors' latest research work related with particle swarm optimizer
algorithm and group search optimizer algorithm as well as their
application to structural optimal design. The readers can
understand the full spectrum of the algorithms and apply the
algorithms to their own research problems.
"
In modern wireless communication systems, multiuser detection (MUD)
is a good approach to achieve the highly reliable data
transmissions. In the area of error control coding, the Chase
algorithm, which takes advantage of the different reliabilities of
the received symbols and focuses on correcting the error in the
weakest symbols, can achieve a near maximum-likelihood (ML)
performance and with significant complexity reduction. This book
discusses the applications of the Chase algorithm in multiuser
detection and proposes some novel detetors for the single-input
single-output (SISO) and multiple-input multiple-output (MIMO) code
division multiple access (CDMA) systems. In the SISO-CDMA systems,
the proposed multiuser detector is developed from the multistage
parallel interference cancellation (PIC) detector. In the MIMO-CDMA
systems, the proposed detector is based on the layered space-time
multiuser detector (LAST-MUD). Both of them can achieve higher
performance and lower complexity compared to the previous developed
multiuser detectors. This book can be used as a reference for
engineers, researchers and students working in the field of
wireless communications.
|
Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers (Paperback, 1st ed. 2022)
Chunhua Su, Kouichi Sakurai, Feng Liu
|
R1,649
Discovery Miles 16 490
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the 4th International
Conference on Science of Cyber Security, SciSec 2022, held in
Matsu, Japan in August 2022. The 36 full papers presented in this
volume were carefully reviewed and selected from 88 submissions.
The papers are organized in the following topical sections:
blockchain and applications; cryptography and applications; network
security; cyber-physical system; malware; mobile system security;
system and web security; security in financial industry; social
engineering and personalized security; privacy and anonymity.
|
Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers (Paperback, 1st ed. 2021)
Wenlian Lu, Kun Sun, Moti Yung, Feng Liu
|
R1,935
Discovery Miles 19 350
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the Third International
Conference on Science of Cyber Security, SciSec 2021, held in
Shanghai, China, in August 2021.The 17 full papers and 5 short
papers presented in this volume were carefully reviewed and
selected from 50 submissions. These papers cover the following
subjects: Cyber Security, Detection, Machine Learning and much
more.
|
Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers (Paperback, 1st ed. 2019)
Feng Liu, Jia Xu, Shouhuai Xu, Moti Yung
|
R1,589
Discovery Miles 15 890
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the Second International
Conference on Science of Cyber Security, SciSec 2019, held in
Nanjing, China, in August 2019. The 20 full papers and 8 short
papers presented in this volume were carefully reviewed and
selected from 62 submissions. These papers cover the following
subjects: Artificial Intelligence for Cybersecurity, Machine
Learning for Cybersecurity, and Mechanisms for Solving Actual
Cybersecurity Problems (e.g., Blockchain, Attack and Defense;
Encryptions with Cybersecurity Applications).
|
Digital Forensics and Watermarking - 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers (Paperback, 1st ed. 2017)
Yun Qing Shi, Hyoung Joong Kim, Fernando Perez-Gonzalez, Feng Liu
|
R3,471
Discovery Miles 34 710
|
Ships in 10 - 15 working days
|
This book constitutes the revised post-conference proceedings of
the 15th International Workshop on Digital Forensics and
Watermarking, IWDW 2016, held in Beijing, China, in September 2016.
The 45 papers presented in this volume were carefully reviewed and
selected from 70 submissions. The contributions are organized in
topical sections on digital forensics, visual cryptography,
reversible data hiding, and steganography and steganalysis.
To reduce the risk of climate change impacts it is necessary for
the world to lower the carbon intensity of economic development.
'Low-Carbon Development for Mexico' estimates the net costs,
greenhouse gas (GHG) emission reductions, and investment that would
be needed to achieve a low-carbon scenario in Mexico to the year
2030. Among the key findings of the study are the following: Energy
efficiency. Improving energy end-use efficiency in the industrial,
residential, and public sectors is the least-cost option for
reducing carbon emissions and can be achieved by accelerating
current Mexican programs and policies. Supply efficiency and
renewable energy. Mexico can lower the carbon intensity of the
economy by improving the efficiency of energy supply in the
electric power and petroleum industries, and by expanding the
adoption of renewable energy technologies such as wind, biomass,
small hydro, and geothermal. Public transport and vehicle fleet
efficiency. Transport is the largest and fastest growing
contributor of GHG emissions in Mexico, the majority of which comes
from road transport. The greatest potential for reducing transport
emissions lies with improving the quality and efficiency of urban
transport, including more efficient vehicles and the design and
organization of cities and public transport systems. Forestry
significant potential with large co-benefits. Measures to reduce
emissions from deforestation and forest degradation (REDD), along
with afforestation and commercial plantations, are among the
largest GHG mitigation options in Mexico, and could provide
numerous social and environmental benefits in rural areas. By
undertaking a limited number of low-carbon interventions that are
technologically and financially viable today, Mexico could hold
carbon emissions relatively constant over the coming two decades
while maintaining a vigorous rate of economic and social
development. The costs of such a program would be relatively
modest, but would require a range of regulatory and institutional
changes to achieve, especially in the energy and transport
sectors."
|
|