![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Showing 1 - 25 of 31 matches in All Departments
In The Price and Promise of Specialness, Jin Li Lim revises narratives on the overseas Chinese and the People's Republic of China by analysing the Communist approach to 'overseas Chinese affairs' in New China's first decade as a function of a larger political economy. Jin Li Lim shows how the party-state centred its approach towards the overseas Chinese on a perception of their financial utility and thus sought to offer them a special identity and place in New China, so as to unlock their riches. Yet, this contradicted the quest for socialist transformation, and as its early pragmatism fell away, the radicalising party-state abandoned its promises to the overseas Chinese, who were left to pay the price for their difference.
*Systematically introducing major components of SPM process. *Novel hybrid methods (228 hybrids plus numerous variants) of modern statistical methods or machine learning methods with mathematical and/or univariate geostatistical methods. *Novel predictive accuracy-based variable selection techniques for spatial predictive methods. *Predictive accuracy-based parameter/model optimization. *Reproducible examples for SPM of various data types in R.
Plasmonics stems from the surface charge density oscillations at metal–dielectric interface, leading to extremely strong light–matter interactions. In the past few decades, plasmonics has become one of the most favorite fields/techniques in realizing high-performance photonic devices. For this purpose, different new concepts, such as exploration of different radiation frequency regions, two-dimensional materials/heterostructures, and different types of substrates for the excitation of plasmons have been investigated for plasmonics-based sensors and detectors. This book focuses on the recent and advanced works on optical sensors and detectors utilizing plasmonic techniques for opto-electronic applications. The book is unique as it describes both sensors and detectors based on plasmonics and their practical applications in a single book, a feature not found in any book so far.
This unique compendium focuses on the acquisition and analysis of social media data. The approaches concern both the data-intensive characteristics and graphical structures of social media. The book addresses the critical problems in social media analysis, which representatively cover its lifecycle.The must-have volume is an excellent reference text for professionals, researchers, academics and graduate students in AI and databases.
A mechanical oscillator coupled to the optical field in a cavity is a typical cavity optomechanical system. In our textbook, we prepare to introduce the quantum optical properties of optomechanical system, i.e. linear and nonlinear effects. Some quantum optical devices based on optomechanical system are also presented in the monograph, such as the Kerr modulator, quantum optical transistor, optomechanical mass sensor, and so on. But most importantly, we extend the idea of typical optomechanical system to coupled mechanical resonator system and demonstrate that the combined two-level structure and resonator system can serve as a generalized optomechanical system. The quantum optical properties, which exist in typical system, are also presented in the combined two-level structure and resonator system.
The rise of Asia in global affairs has forced western thinkers to rethink their assumptions, theories, and conclusions about the region. Eric Voegelin's Asian Political Thought brings together a mixture of established and rising scholars from both Asia and the West to reflect upon the political philosopher's thought about China, Japan, Korea, Central Asia, and India. From Voegelin's writings, readers will not only understand how Voegelin's approach can illuminate the fundamental principles and issues about Asia but also what are the challenges and possibilities that Asia offers in the twentieth-first century. For those who want to move past the superficial commentary and cliches about Asia, Eric Voegelin's Asian Political Thought is the book for you.
This book constitutes the refereed proceedings of the 2nd EAI International Conference on Security and Privacy in New Computing Environments, SPNCE 2019, held in Tianjin, China, in April 2019. The 62 full papers were selected from 112 submissions and are grouped into topics on privacy and security analysis, Internet of Things and cloud computing, system building, scheme, model and application for data, mechanism and method in new computing.
This book constitutes the refereed proceedings of the 7th International Conference on Cloud Computing, Security, Privacy in New Computing Environments, CloudComp 2016, and the First EAI International Conference SPNCE 2016, both held in Guangzhou, China, in November and December 2016.The proceedings contain 10 full papers selected from 27 submissions and presented at CloudComp 2016 and 12 full papers selected from 69 submissions and presented at SPNCE 2016. CloudComp 2016 presents recent advances and experiences in clouds, cloud computing and related ecosystems and business support. SPNCE 2016 focuses on security and privacy aspects of new computing environments including mobile computing, big data, cloud computing and other large-scale environments.
The four-volume set LNCS 11334-11337 constitutes the proceedings of the 18th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2018, held in Guangzhou, China, in November 2018. The 141 full and 50 short papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on Distributed and Parallel Computing; High Performance Computing; Big Data and Information Processing; Internet of Things and Cloud Computing; and Security and Privacy in Computing.
This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are now available for various applications, including risk assessment and image recognition. In light of open access to datasets and not fully trusted environments, machine learning-based applications face enormous security and privacy risks. In turn, it presents studies conducted to address privacy issues and a series of proposed solutions for ensuring privacy protection in machine learning tasks involving multiple parties. In closing, the book reviews state-of-the-art privacy-preserving techniques and examines the security threats they face.
This book constitutes the refereed proceedings of the 7th International Symposium on Intelligence Computation and Applications, ISICA 2015, held in Guangzhou, China, in November 2015. The 77 revised full papers presented were carefully reviewed and selected from 189 submissions. The papers feature the most up-to-date research in analysis and theory of evolutionary computation, neural network architectures and learning; neuro-dynamics and neuro-engineering; fuzzy logic and control; collective intelligence and hybrid systems; deep learning; knowledge discovery; learning and reasoning.
This unique compendium focuses on the acquisition and analysis of social media data. The approaches concern both the data-intensive characteristics and graphical structures of social media. The book addresses the critical problems in social media analysis, which representatively cover its lifecycle.The must-have volume is an excellent reference text for professionals, researchers, academics and graduate students in AI and databases.
The characters in this literary exploration of one of the world's biggest cities are all on a mission. Whether it is responding to events around them, or following some impulse of their own, they are defined by their determination - a refusal to lose themselves in a city that might otherwise leave them anonymous, disconnected, alone. From the neglected mother whose side-hustle in collecting sellable waste becomes an obsession, to the schoolboy determined to end a long-standing feud between his family and another, the characters in The Book of Shanghai show a defiance that reminds us why Shanghai - despite its hurtling economic growth -remains an epicentre for individual creativity.
The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereedproceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2-4, 2022, held in Guangzhou, China. The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from 367 submissions.
The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereedproceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2-4, 2022, held in Guangzhou, China. The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from 367 submissions.
The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereedproceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2-4, 2022, held in Guangzhou, China. The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from 367 submissions.
Western and East Asian people hold fundamentally different beliefs about learning that influence how they approach child rearing and education. Reviewing decades of research, Dr Jin Li presents an important conceptual distinction between the Western mind model and the East Asian virtue model of learning. The former aims to cultivate the mind to understand the world, whereas the latter prioritizes the self to be perfected morally and socially. Tracing the cultural origins of the two large intellectual traditions, Li details how each model manifests itself in the psychology of the learning process, learning affect, regard of one's learning peers, expression of what one knows and parents' guiding efforts. Despite today's accelerated cultural exchange, these learning models do not diminish but endure.
Western and East Asian people hold fundamentally different beliefs about learning that influence how they approach child rearing and education. Reviewing decades of research, Dr Jin Li presents an important conceptual distinction between the Western mind model and the East Asian virtue model of learning. The former aims to cultivate the mind to understand the world, whereas the latter prioritizes the self to be perfected morally and socially. Tracing the cultural origins of the two large intellectual traditions, Li details how each model manifests itself in the psychology of the learning process, learning affect, regard of one's learning peers, expression of what one knows and parents' guiding efforts. Despite today's accelerated cultural exchange, these learning models do not diminish but endure.
This book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2020, held in Tianjin, China, in September 2020. The 38 full papers presented in this volume were carefully reviewed and selected from a total of 111 submissions. The papers are organized according to the topical sections on big data security; social networks; privacy-preserving and security.
The two volumes LNCS 11982 and 11983 constitute the proceedings of the 11th International Symposium on Cyberspace Safety and Security, CSS 2019, held in Guangzhou, China, in December 2019. The 61 full papers and 40 short papers presented were carefully reviewed and selected from 235 submissions. The papers cover a broad range of topics in the field of cyberspace safety and security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace. They are organized in the following topical sections: network security; system security; information security; privacy preservation; machine learning and security; cyberspace safety; big data and security; and cloud and security;
The four-volume set LNCS 11334-11337 constitutes the proceedings of the 18th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2018, held in Guangzhou, China, in November 2018. The 141 full and 50 short papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on Distributed and Parallel Computing; High Performance Computing; Big Data and Information Processing; Internet of Things and Cloud Computing; and Security and Privacy in Computing.
The four-volume set LNCS 11334-11337 constitutes the proceedings of the 18th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2018, held in Guangzhou, China, in November 2018. The 141 full and 50 short papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on Distributed and Parallel Computing; High Performance Computing; Big Data and Information Processing; Internet of Things and Cloud Computing; and Security and Privacy in Computing. |
You may like...
Advances in Research and Development…
Maurice H. Francombe, John L. Vossen
Hardcover
R1,216
Discovery Miles 12 160
Arming America through the Centuries…
Benjamin Franklin Cooling
Hardcover
R1,449
Discovery Miles 14 490
|