Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 10 of 10 matches in All Departments
The huge bandwidth of optical fiber was recognized back in the 1970s during the early development of fiber optic technology. For the last two decades, the capacity of experimental and deployed systems has been increasing at a rate of 100-fold each decade-a rate exceeding the increase of integrated circuit speeds. Today, optical communication in the public communication networks has developed from the status of a curiosity into being the dominant technology. Various great challenges arising from the deployment of the wavelength division multiplexing (WDM) have attracted a lot of efforts from many researchers. Indeed, the optical networking has been a fertile ground for both theoretical researches and experimental studies. This monograph presents the contribution from my past and ongoing research in the optical networking area. The works presented in this book focus more on graph-theoretical and algorithmic aspects of optical networks. Although this book is limited to the works by myself and my coauthors, there are many outstanding achievements made by other individuals, which will be cited in many places in this book. Without the inspiration from their efforts, this book would have never been possible. This monograph is divided into four parts: * Multichannel Optical Networking Architectures, * Broadcast-and-Select Passive Optical Networks, * Wavelength-Switched Optical Networks, * SONET/WDM Optical Networks. The first part consists of the first three chapters. Chapter 1 pro vides a brief survey on the networking architectures of optical trans- XVll xvm MULTICHANNEL OPTICAL NETWORKS port networks, optical access networks and optical premise networks.
The connected dominating set has been a classic subject studied in graph theory since 1975. Since the 1990s, it has been found to have important applications in communication networks, especially in wireless networks, as a virtual backbone. Motivated from those applications, many papers have been published in the literature during last 15 years. Now, the connected dominating set has become a hot research topic in computer science. In this book, we are going to collect recent developments on the connected dominating set, which presents the state of the art in the study of connected dominating sets. The book consists of 16 chapters. Except the 1st one, each chapter is devoted to one problem, and consists of three parts, motivation and overview, problem complexity analysis, and approximation algorithm designs, which will lead the reader to see clearly about the background, formulation, existing important research results, and open problems. Therefore, this would be a very valuable reference book for researchers in computer science and operations research, especially in areas of theoretical computer science, computer communication networks, combinatorial optimization, and discrete mathematics.
This book covers the research fields in biodiversity conservation, the Belt and Road eco-environmental cooperation, China's five-year plan for eco-environmental protection, sustainable development goals assessment, and human health loss assessment. In the past, these achievements have played an important scientific role in supporting China's ecological and environmental protection, and produced extensive social impacts and significant environmental benefits. At the same time, the relevant research ideas and methods also show the latest progress and trend in the field of environmental strategy and planning in China in recent years, which can be used for reference by experts and scholars of other countries in the field of ecological environment.
The problem of dealing with missing or incomplete data in machine learning and computer vision arises in many applications. Recent strategies make use of generative models to impute missing or corrupted data. Advances in computer vision using deep generative models have found applications in image/video processing, such as denoising, restoration, super-resolution, or inpainting. Inpainting and Denoising Challenges comprises recent efforts dealing with image and video inpainting tasks. This includes winning solutions to the ChaLearn Looking at People inpainting and denoising challenges: human pose recovery, video de-captioning and fingerprint restoration. This volume starts with a wide review on image denoising, retracing and comparing various methods from the pioneer signal processing methods, to machine learning approaches with sparse and low-rank models, and recent deep learning architectures with autoencoders and variants. The following chapters present results from the Challenge, including three competition tasks at WCCI and ECML 2018. The top best approaches submitted by participants are described, showing interesting contributions and innovating methods. The last two chapters propose novel contributions and highlight new applications that benefit from image/video inpainting.
The connected dominating set has been a classic subject studied in graph theory since 1975. Since the 1990s, it has been found to have important applications in communication networks, especially in wireless networks, as a virtual backbone. Motivated from those applications, many papers have been published in the literature during last 15 years. Now, the connected dominating set has become a hot research topic in computer science. In this book, we are going to collect recent developments on the connected dominating set, which presents the state of the art in the study of connected dominating sets. The book consists of 16 chapters. Except the 1st one, each chapter is devoted to one problem, and consists of three parts, motivation and overview, problem complexity analysis, and approximation algorithm designs, which will lead the reader to see clearly about the background, formulation, existing important research results, and open problems. Therefore, this would be a very valuable reference book for researchers in computer science and operations research, especially in areas of theoretical computer science, computer communication networks, combinatorial optimization, and discrete mathematics.
The huge bandwidth of optical fiber was recognized back in the 1970s during the early development of fiber optic technology. For the last two decades, the capacity of experimental and deployed systems has been increasing at a rate of 100-fold each decade-a rate exceeding the increase of integrated circuit speeds. Today, optical communication in the public communication networks has developed from the status of a curiosity into being the dominant technology. Various great challenges arising from the deployment of the wavelength division multiplexing (WDM) have attracted a lot of efforts from many researchers. Indeed, the optical networking has been a fertile ground for both theoretical researches and experimental studies. This monograph presents the contribution from my past and ongoing research in the optical networking area. The works presented in this book focus more on graph-theoretical and algorithmic aspects of optical networks. Although this book is limited to the works by myself and my coauthors, there are many outstanding achievements made by other individuals, which will be cited in many places in this book. Without the inspiration from their efforts, this book would have never been possible. This monograph is divided into four parts: * Multichannel Optical Networking Architectures, * Broadcast-and-Select Passive Optical Networks, * Wavelength-Switched Optical Networks, * SONET/WDM Optical Networks. The first part consists of the first three chapters. Chapter 1 pro vides a brief survey on the networking architectures of optical trans- XVll xvm MULTICHANNEL OPTICAL NETWORKS port networks, optical access networks and optical premise networks.
This book covers the research fields in biodiversity conservation, the Belt and Road eco-environmental cooperation, China's five-year plan for eco-environmental protection, sustainable development goals assessment, and human health loss assessment. In the past, these achievements have played an important scientific role in supporting China's ecological and environmental protection, and produced extensive social impacts and significant environmental benefits. At the same time, the relevant research ideas and methods also show the latest progress and trend in the field of environmental strategy and planning in China in recent years, which can be used for reference by experts and scholars of other countries in the field of ecological environment.
The problem of dealing with missing or incomplete data in machine learning and computer vision arises in many applications. Recent strategies make use of generative models to impute missing or corrupted data. Advances in computer vision using deep generative models have found applications in image/video processing, such as denoising, restoration, super-resolution, or inpainting. Inpainting and Denoising Challenges comprises recent efforts dealing with image and video inpainting tasks. This includes winning solutions to the ChaLearn Looking at People inpainting and denoising challenges: human pose recovery, video de-captioning and fingerprint restoration. This volume starts with a wide review on image denoising, retracing and comparing various methods from the pioneer signal processing methods, to machine learning approaches with sparse and low-rank models, and recent deep learning architectures with autoencoders and variants. The following chapters present results from the Challenge, including three competition tasks at WCCI and ECML 2018. The top best approaches submitted by participants are described, showing interesting contributions and innovating methods. The last two chapters propose novel contributions and highlight new applications that benefit from image/video inpainting.
For the last ten years, face biometric research has been intensively studied by the computer vision community. Face recognition systems have been used in mobile, banking, and surveillance systems. For face recognition systems, face spoofing attack detection is a crucial stage that could cause severe security issues in government sectors. Although effective methods for face presentation attack detection have been proposed so far, the problem is still unsolved due to the difficulty in the design of features and methods that can work for new spoofing attacks. In addition, existing datasets for studying the problem are relatively small which hinders the progress in this relevant domain. In order to attract researchers to this important field and push the boundaries of the state of the art on face anti-spoofing detection, we organized the Face Spoofing Attack Workshop and Competition at CVPR 2019, an event part of the ChaLearn Looking at People Series. As part of this event, we released the largest multi-modal face anti-spoofing dataset so far, the CASIA-SURF benchmark. The workshop reunited many researchers from around the world and the challenge attracted more than 300 teams. Some of the novel methodologies proposed in the context of the challenge achieved state-of-the-art performance. In this manuscript, we provide a comprehensive review on face anti-spoofing techniques presented in this joint event and point out directions for future research on the face anti-spoofing field.
DNA methylation is the modification of DNA molecule, transferring methy group to the 5th position of the cytosine pyrimidine ring. This biochemical process plays a crucial role in many cellular processes of higher organisms. For example, people have found distinct patterns of DNA methylation during cellular differentiation and tissue development. The differential DNA methylation profiles are often associated with gene expression. In addition, DNA methylation reveals genomic imprinting and affects on chromatin remodeling and cellular homeostasis. Such epigenetic modification has also been proven to be involved in nearly all cancer-related signaling pathways. However, the mechanism and process against how DNA methylation regulates gene expression are still not clear. The study of DNA methylation and its regulation on gene expression provides fundamental and new insights into the genetic heritability. In Chapter 1, Gene duplication event of NAC transcription factor genes in rice and Arabidopsis was analyzed, then it was found that chromosomal segment duplications mainly contributed to the expansion of both species, whereas tandem duplication occurred less frequently in Arabidopsis than rice. Chapter 2 reviews the current literature related to the epigenetics of alcoholism and summarizes our advanced study of global DNA methylation in human post-mortem frontal cortex tissues obtained from adult alcoholics and controls utilizing new microarray technology and bioinformatics approaches. Chapter 3 gives a comprehensive synopsis over the epigenetic modifications involved in the regulation of bacterial gene expression as well as the patho-epigenetic modifications in eukaryotic host tissues triggered in the pathogenesis of particular Gram-negative bacterial infections. Both, basic molecular mechanisms and complex pathogenetic relations are described. Chapter 4 provides an epigenetic repressing mechanism for breast cancer metastasis by recruiting NuRD complex to ESR1 gene through TWIST1. Chapter 5 summarises most of mouse models that have helped us better understand the pathogenesis mechanism during the development of colitis. In Chapter 6, the authors review the various forms of presentation of celiac disease including the lymphocytic enteritis, along with their systemic manifestations. Chapter 7 provides an insight to inflammatory response in light of DNA regulation and methylation of key players. Because chronic inflammatory diseases do share common features, recent progress in our understanding of renal fibrosis and inflammation in chronic kidney disease will be discussed as an example of epigenetic regulation in inflammatory diseases. Chapter 8 summarizes the regulation of gene expression in pterygium. Pterygium is an ocular surface disease and its pathogenesis is currently unknown. Here, the genetic and epigenetic changes in the disease are explored. Chapter 9 summaries the basics and applications of recently proposed MiRaGE method that infer miRNA-mediated regulation of target genes and miRNA-targeting-specific promoter methylation. The applications to differentiation, cell senescence, and miRNA transfection to lung cancer celll lines are discussed. Chapter 10 proposes the role of AP-1 chromatin modulator Jun dimerization protein 2 (JDP2) on antioxidant response and inhibition of ROS production via Nrf2-ARE signaling, as well as the induction of replicative senescence. Chapter 11 compares expression profiles of mRNAs, microRNAs and proteins of human embryonic stem cells hES-T3 grown on different feeders and conditioned media. Chapter 12 reviews the most recent molecular markers of Amyotrophic Lateral Sclerosis (ALS) and shows some innovative perspectives on this topic from the point of view of gene therapy. In addition, non-viral gene therapy based on the non-toxic C-terminal fragment of the tetanus toxin (TTC) will also be discussed.
|
You may like...
We Were Perfect Parents Until We Had…
Vanessa Raphaely, Karin Schimke
Paperback
|