|
Showing 1 - 25 of
33 matches in All Departments
Plasmonics stems from the surface charge density oscillations at
metal–dielectric interface, leading to extremely strong
light–matter interactions. In the past few decades, plasmonics
has become one of the most favorite fields/techniques in realizing
high-performance photonic devices. For this purpose, different new
concepts, such as exploration of different radiation frequency
regions, two-dimensional materials/heterostructures, and different
types of substrates for the excitation of plasmons have been
investigated for plasmonics-based sensors and detectors. This book
focuses on the recent and advanced works on optical sensors and
detectors utilizing plasmonic techniques for opto-electronic
applications. The book is unique as it describes both sensors and
detectors based on plasmonics and their practical applications in a
single book, a feature not found in any book so far.
*Systematically introducing major components of SPM process. *Novel
hybrid methods (228 hybrids plus numerous variants) of modern
statistical methods or machine learning methods with mathematical
and/or univariate geostatistical methods. *Novel predictive
accuracy-based variable selection techniques for spatial predictive
methods. *Predictive accuracy-based parameter/model optimization.
*Reproducible examples for SPM of various data types in R.
This book provides a thorough overview of the evolution of
privacy-preserving machine learning schemes over the last ten
years, after discussing the importance of privacy-preserving
techniques. In response to the diversity of Internet services, data
services based on machine learning are now available for various
applications, including risk assessment and image recognition. In
light of open access to datasets and not fully trusted
environments, machine learning-based applications face enormous
security and privacy risks. In turn, it presents studies conducted
to address privacy issues and a series of proposed solutions for
ensuring privacy protection in machine learning tasks involving
multiple parties. In closing, the book reviews state-of-the-art
privacy-preserving techniques and examines the security threats
they face.
Western and East Asian people hold fundamentally different beliefs
about learning that influence how they approach child rearing and
education. Reviewing decades of research, Dr Jin Li presents an
important conceptual distinction between the Western mind model and
the East Asian virtue model of learning. The former aims to
cultivate the mind to understand the world, whereas the latter
prioritizes the self to be perfected morally and socially. Tracing
the cultural origins of the two large intellectual traditions, Li
details how each model manifests itself in the psychology of the
learning process, learning affect, regard of one's learning peers,
expression of what one knows and parents' guiding efforts. Despite
today's accelerated cultural exchange, these learning models do not
diminish but endure.
|
Fashion And Politics (Hardcover)
Djurdja Bartlett; Contributions by Serkan Delice, Rhonda Garelick, Erica de Greef, Jin Li Lim, …
|
R1,266
R1,189
Discovery Miles 11 890
Save R77 (6%)
|
Ships in 12 - 17 working days
|
A timely and splendidly illustrated global exploration of the complex
intersections of fashion and politics from the mid-19th century to the
present day
Taking a multifaceted look at a topic of widespread fascination, this
pioneering book presents new research on the intersection of fashion
and politics through incisive essays by the field's leading voices,
including both renowned and emerging fashion scholars. The texts unpack
fashion between the mid-19th century and today as expressions of
nationalism, terrorism, surveillance, and individualism, as well as a
symbol of capitalism.
The first section explores the political potential of fashion despite
its immutable status as a commodity. The second section offers a
historical account of the political nature of dress, such as the
fashion of dissent within Mao's Cultural Revolution and the Black
Panther movement. The ways bodies are defined by dress-the entanglement
of oppression and expression-is the theme of the third section. A
fourth and final section explores contemporary issues in the practice
and theory of dress, from the processes of decolonizing museum
collections to the recent sartorial styles of Europe's political Left.
The book's incisive and beautifully illustrated essays provide a timely
investigation of an underdeveloped topic through a variety of
historical and current formats, including public and personal archives,
fashion magazines, political newspapers, museum displays, art, and
social media.
The characters in this literary exploration of one of the world's
biggest cities are all on a mission. Whether it is responding to
events around them, or following some impulse of their own, they
are defined by their determination - a refusal to lose themselves
in a city that might otherwise leave them anonymous, disconnected,
alone. From the neglected mother whose side-hustle in collecting
sellable waste becomes an obsession, to the schoolboy determined to
end a long-standing feud between his family and another, the
characters in The Book of Shanghai show a defiance that reminds us
why Shanghai - despite its hurtling economic growth -remains an
epicentre for individual creativity.
This unique compendium focuses on the acquisition and analysis of
social media data. The approaches concern both the data-intensive
characteristics and graphical structures of social media. The book
addresses the critical problems in social media analysis, which
representatively cover its lifecycle.The must-have volume is an
excellent reference text for professionals, researchers, academics
and graduate students in AI and databases.
|
Security and Privacy in New Computing Environments - Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13-14, 2019, Proceedings (Paperback, 1st ed. 2019)
Jin Li, Zheli Liu, Hao Peng
|
R1,703
Discovery Miles 17 030
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 2nd EAI
International Conference on Security and Privacy in New Computing
Environments, SPNCE 2019, held in Tianjin, China, in April 2019.
The 62 full papers were selected from 112 submissions and are
grouped into topics on privacy and security analysis, Internet of
Things and cloud computing, system building, scheme, model and
application for data, mechanism and method in new computing.
|
Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part III (Paperback, 1st ed. 2018)
Jaideep Vaidya, Jin Li
|
R1,683
Discovery Miles 16 830
|
Ships in 10 - 15 working days
|
The four-volume set LNCS 11334-11337 constitutes the proceedings of
the 18th International Conference on Algorithms and Architectures
for Parallel Processing, ICA3PP 2018, held in Guangzhou, China, in
November 2018. The 141 full and 50 short papers presented were
carefully reviewed and selected from numerous submissions. The
papers are organized in topical sections on Distributed and
Parallel Computing; High Performance Computing; Big Data and
Information Processing; Internet of Things and Cloud Computing; and
Security and Privacy in Computing.
|
Cloud Computing, Security, Privacy in New Computing Environments - 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25-26, and December 15-16, 2016, Proceedings (Paperback, 1st ed. 2018)
Jiafu Wan, Kai Lin, Delu Zeng, Jin Li, Yang Xiang, …
|
R2,294
Discovery Miles 22 940
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 7th
International Conference on Cloud Computing, Security, Privacy in
New Computing Environments, CloudComp 2016, and the First EAI
International Conference SPNCE 2016, both held in Guangzhou, China,
in November and December 2016.The proceedings contain 10 full
papers selected from 27 submissions and presented at CloudComp 2016
and 12 full papers selected from 69 submissions and presented at
SPNCE 2016. CloudComp 2016 presents recent advances and experiences
in clouds, cloud computing and related ecosystems and business
support. SPNCE 2016 focuses on security and privacy aspects of new
computing environments including mobile computing, big data, cloud
computing and other large-scale environments.
|
Computational Intelligence and Intelligent Systems - 7th International Symposium, ISICA 2015, Guangzhou, China, November 21-22, 2015, Revised Selected Papers (Paperback, 1st ed. 2016)
Kangshun Li, Jin Li, Yong Liu, Aniello Castiglione
|
R1,702
Discovery Miles 17 020
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 7th
International Symposium on Intelligence Computation and
Applications, ISICA 2015, held in Guangzhou, China, in November
2015. The 77 revised full papers presented were carefully reviewed
and selected from 189 submissions. The papers feature the most
up-to-date research in analysis and theory of evolutionary
computation, neural network architectures and learning;
neuro-dynamics and neuro-engineering; fuzzy logic and control;
collective intelligence and hybrid systems; deep learning;
knowledge discovery; learning and reasoning.
People usually read for information. A study shows that readers
usually do search reading in order to find the relevant information
related to their work or study. According to the requirement of
authenticity that testing forms should be in line with students'
real life activities, search reading should be included in
CET(College English Test), which is one the most important tests
for college students in China. How to realize a better validity of
search reading in CET? On the one hand, it is widely believed that
long passages test different reading abilities from short passages;
on the other hand, it is better to test search reading through long
passages due to the nature of search reading. Therefore, a reading
test should include both long passages and short passages. The main
purpose of this research is to find out the proper ratio of long
passages to short passages in a reading test in a paper, which can
best test the participants' reading proficiency. Through the
correlation analysis of the final exam and different combinations
of one long passage and different number of short passages, the
author found out that the proper ratio is 1:2.
Cardiovascular disease has evolved into an epidemic health concern.
During the past decades, considerable effort has been made to
develop novel and safer therapeutic options. Gene therapy has
offered much renewed hope and instigated the present book. For the
treatment of cardiovascular disease gene therapy has risen to an
interesting and important point of view of curing disease. Although
most of the studies are still experimental beneath a well defined
number of clinical studies, more and more studies are designed to
be carried out in humans. Based on a rich compilation of scientific
as well as clinical studies around the world, this book gives
insights into the general principles of gene transfer as well as
therapeutic strategies including stem cell therapy as an
alternative approach to gene therapy.
From the perspectives of theory and experiment, this book
introduces several different micro/nanostructure materials,
including the Mg-based alloy materials, carbon nanotubes and
graphene-based materials, micro-crystals, nanostructured Al-SiC
composites, optomechanical systems, compound containing functional
groups, and biologically active diazoles. Using this book, readers
will be able to understand, derive, and confidently implement the
relevant phenomena in other complex micro/nanostructures that have
not been investigated by traditional methods. Dozens of figures and
diagrams throughout this book enhance the understandability through
visualization of experimental techniques and computational
procedures. Meanwhile, the extensive references and detailed index
allow for the further exploration of this evolving area. This book
provides a comprehensive treatment of the subject for graduates and
researchers within material science, quantum chemistry, as well as
atomic, molecular and solid-state physics.
Hybrid systems, inheriting the merits of their predecessors,
exhibit extraordinary strengths to face various challenges and
hostile environments. Hybrid systems have the ability to inspire
and encourage researchers and engineers to propose novel ideas,
which allow for more applications and devices in physics, chemistry
and biology. In this book, the authors introduce various
applications of hybrid methods, hybrid models, hybrid systems and
hybrid materials by taking advantage of high performance and better
implementation of hybrid structures. This book covers both
theoretical methods and practical realisations from distinct
disciplines by introducing the recent advances of hybrid
structures.
|
Machine Learning for Cyber Security - 4th International Conference, ML4CS 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part I (Paperback, 1st ed. 2022)
Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li
|
R3,043
Discovery Miles 30 430
|
Ships in 10 - 15 working days
|
The three-volume proceedings set LNCS 13655,13656 and 13657
constitutes the refereedproceedings of the 4th International
Conference on Machine Learning for Cyber Security, ML4CS 2022,
which taking place during December 2-4, 2022, held in Guangzhou,
China. The 100 full papers and 46 short papers were included in
these proceedings were carefully reviewed and selected from 367
submissions.
|
Machine Learning for Cyber Security - 4th International Conference, ML4CS 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part II (Paperback, 1st ed. 2022)
Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li
|
R3,035
Discovery Miles 30 350
|
Ships in 10 - 15 working days
|
The three-volume proceedings set LNCS 13655,13656 and 13657
constitutes the refereedproceedings of the 4th International
Conference on Machine Learning for Cyber Security, ML4CS 2022,
which taking place during December 2-4, 2022, held in Guangzhou,
China. The 100 full papers and 46 short papers were included in
these proceedings were carefully reviewed and selected from 367
submissions.
|
Machine Learning for Cyber Security - 4th International Conference, ML4CS 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part III (Paperback, 1st ed. 2022)
Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li
|
R3,047
Discovery Miles 30 470
|
Ships in 10 - 15 working days
|
The three-volume proceedings set LNCS 13655,13656 and 13657
constitutes the refereedproceedings of the 4th International
Conference on Machine Learning for Cyber Security, ML4CS 2022,
which taking place during December 2-4, 2022, held in Guangzhou,
China. The 100 full papers and 46 short papers were included in
these proceedings were carefully reviewed and selected from 367
submissions.
|
Security and Privacy in Social Networks and Big Data - 6th International Symposium, SocialSec 2020, Tianjin, China, September 26-27, 2020, Proceedings (Paperback, 1st ed. 2020)
Yang Xiang, Zheli Liu, Jin Li
|
R1,609
Discovery Miles 16 090
|
Ships in 10 - 15 working days
|
This book constitutes revised and selected papers from the 6th
International Symposium on Security and Privacy in Social Networks
and Big Data, SocialSec 2020, held in Tianjin, China, in September
2020. The 38 full papers presented in this volume were carefully
reviewed and selected from a total of 111 submissions. The papers
are organized according to the topical sections on big data
security; social networks; privacy-preserving and security.
This unique compendium focuses on the acquisition and analysis of
social media data. The approaches concern both the data-intensive
characteristics and graphical structures of social media. The book
addresses the critical problems in social media analysis, which
representatively cover its lifecycle.The must-have volume is an
excellent reference text for professionals, researchers, academics
and graduate students in AI and databases.
|
|