|
Showing 1 - 25 of
33 matches in All Departments
Analysis, Design and Construction of Foundations outlines methods
for analysis and design of the construction of shallow and deep
foundations with particular reference to case studies in Hong Kong
and China, as well as a discussion of the methods used in other
countries. It introduces the main approaches used by geotechnical
and structural engineers, and the precautions required for
planning, design and construction of foundation structures. Some
computational methods and computer programmes are reviewed to
provide tools for performing a more realistic analysis of
foundation systems. The authors examine in depth the methods used
for constructing shallow foundations, deep foundations, excavation
and lateral support systems, slope stability analysis and
construction, and ground monitoring for proper site management.
Some new and innovative foundation construction methods are also
introduced. It is illustrated with case studies of failures and
defects from actual construction projects. Some advanced and modern
theories are also covered in this book. This book is more targeted
towards the understanding of the basic behavior and the actual
construction of many geotechnical works, and this book is not
dedicated to any design code or specification, though Euro codes
and Hong Kong code are also used in this book for illustration. It
is ideal for consulting geotechnical engineers, undergraduate and
postgraduate students.
Security and Policy Driven Computing covers recent advances in
security, storage, parallelization, and computing as well as
applications. The author incorporates a wealth of analysis,
including studies on intrusion detection and key management,
computer storage policy, and transactional management. The book
first describes multiple variables and index structure derivation
for high dimensional data distribution and applies numeric methods
to proposed search methods. It also focuses on discovering
relations, logic, and knowledge for policy management. To manage
performance, the text discusses contention management for
transactional structures, buffer tuning, and test environments. It
then illustrates search optimization using truncated functions with
paralleled techniques. The final chapters present structures,
recovery, message conflicts, and test coverage of quantum policies
and explain methods of quantum protection for intrusion prevention.
An overview of security and policy applications for systems and
computing, this book explores the latest R&D, emerging
technology, and state-of-the-art technical studies of security and
policy issues. It also looks to future research and technologies
that will propel the innovation of next-generation systems.
This book explores the experiences and emotional expression of 30
people Living with HIV/AIDS (PLWHA) using qualitative research
methods such as "illness narratives," and analyzes the dilemmas of
"sicknesses of the society" including "Acquired Needs Deficiency"
Syndrome, "Acquired Expectation Insufficiency" Syndrome, and
"Acquired Punishment" Syndrome at the micro, meso and macro levels,
so as to investigate higher-intensity negative emotions.In turn,
the book draws on the perspectives of conflict and game, structure
and function, and system and interaction, in order to propose a
dynamic mechanism of emotion and expression, and argues that these
negative emotions can be transformed, strengthened and presented
through defense mechanisms such as suppression and attribution,
which will influence social institutions at the micro, meso and
macro levels and even possibly bring about positive changes in the
social structure.
Analysis, Design and Construction of Foundations outlines methods
for analysis and design the construction of shallow and deep
foundations with particular reference to case studies in Hong Kong
and China, as well as a discussion of methods used in other
countries. It introduces the main approaches used by geotechnical
and structural engineers, and the precautions required for planning
and designing foundation structures. Some computational methods and
computer programs are reviewed to provide tools for performing more
realistic analysis of foundation systems. The authors examine in
depth the methods used for constructing shallow foundations, deep
foundations, excavation and lateral support systems, ground
improvement techniques, and ground monitoring for proper site
management. Some new and innovative foundation construction methods
are also introduced. It is illustrated with case studies of
failures and defects from actual construction projects. It is ideal
for consulting geotechnical engineers.
Each review within the volume critically surveys one aspect of that
topic and places it within the context of the volume as a whole.
The most significant developments of the last 5 to 10 years are
presented using selected examples to illustrate the principles
discussed. The coverage is not intended to be an exhaustive summary
of the field or include large quantities of data, but should rather
be conceptual, concentrating on the methodological thinking that
will allow the non-specialist reader to understand the information
presented. Contributions also offer an outlook on potential future
developments in the field.
Each review within the volume critically surveys one aspect of that
topic and places it within the context of the volume as a whole.
The most significant developments of the last 5 to 10 years are
presented using selected examples to illustrate the principles
discussed. The coverage is not intended to be an exhaustive summary
of the field or include large quantities of data, but should rather
be conceptual, concentrating on the methodological thinking that
will allow the non-specialist reader to understand the information
presented. Contributions also offer an outlook on potential future
developments in the field.
Each review within the volume critically surveys one aspect of that
topic and places it within the context of the volume as a whole.
The most significant developments of the last 5 to 10 years are
presented using selected examples to illustrate the principles
discussed. The coverage is not intended to be an exhaustive summary
of the field or include large quantities of data, but should rather
be conceptual, concentrating on the methodological thinking that
will allow the non-specialist reader to understand the information
presented. Contributions also offer an outlook on potential future
developments in the field.
Each review within the volume critically surveys one aspect of that
topic and places it within the context of the volume as a whole.
The most significant developments of the last 5 to 10 years are
presented using selected examples to illustrate the principles
discussed. The coverage is not intended to be an exhaustive summary
of the field or include large quantities of data, but should rather
be conceptual, concentrating on the methodological thinking that
will allow the non-specialist reader to understand the information
presented. Contributions also offer an outlook on potential future
developments in the field.
|
Algorithms and Architectures for Parallel Processing - 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part I (Paperback, 2014 ed.)
Xiang-he Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, …
|
R1,741
Discovery Miles 17 410
|
Ships in 10 - 15 working days
|
This two volume set LNCS 8630 and 8631 constitutes the proceedings
of the 14th International Conference on Algorithms and
Architectures for Parallel Processing, ICA3PP 2014, held in Dalian,
China, in August 2014. The 70 revised papers presented in the two
volumes were selected from 285 submissions. The first volume
comprises selected papers of the main conference and papers of the
1st International Workshop on Emerging Topics in Wireless and
Mobile Computing, ETWMC 2014, the 5th International Workshop on
Intelligent Communication Networks, IntelNet 2014, and the 5th
International Workshop on Wireless Networks and Multimedia, WNM
2014. The second volume comprises selected papers of the main
conference and papers of the Workshop on Computing, Communication
and Control Technologies in Intelligent Transportation System, 3C
in ITS 2014, and the Workshop on Security and Privacy in Computer
and Network Systems, SPCNS 2014.
|
Algorithms and Architectures for Parallel Processing - 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part II (Paperback, 2014 ed.)
Xiang-he Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, …
|
R1,690
Discovery Miles 16 900
|
Ships in 10 - 15 working days
|
This two volume set LNCS 8630 and 8631 constitutes the proceedings
of the 14th International Conference on Algorithms and
Architectures for Parallel Processing, ICA3PP 2014, held in Dalian,
China, in August 2014. The 70 revised papers presented in the two
volumes were selected from 285 submissions. The first volume
comprises selected papers of the main conference and papers of the
1st International Workshop on Emerging Topics in Wireless and
Mobile Computing, ETWMC 2014, the 5th International Workshop on
Intelligent Communication Networks, IntelNet 2014, and the 5th
International Workshop on Wireless Networks and Multimedia, WNM
2014. The second volume comprises selected papers of the main
conference and papers of the Workshop on Computing, Communication
and Control Technologies in Intelligent Transportation System, 3C
in ITS 2014, and the Workshop on Security and Privacy in Computer
and Network Systems, SPCNS 2014.
Reviews the historical process of the financial system reform and
development of China. This book introduces the background,
implementation effect and experience of major events about the
central bank system, financial macro-control, foreign exchange
management and foreign exchange market, banking reform and
supervision, capital market, insurance market, financial
supervision and financial opening up and other financial areas. It
thus reveals the basic path of China's financial reform,
development and evolution, and explores China's path of financial
development and reform in line with the national conditions.
Through an in-depth study of more than 40 years of China's
financial system reform, this book explores the laws of monetary
and financial operation and development during the reform, the path
of which is roughly as follows: breakthrough of the financial
system's forbidden zone (restoration and separation of national
specialised banks; establishment of a central bank; opening of
financial markets; enterprisation of professional banks;
commercialisation of specialised banks; establishing an indirect
financial regulation system; strengthening and improving the
financial supervision system) hence, providing constructive advice
and reform proposals for the national macro policy-making
departments. 1. This book reviews the main history of the reform of
China's financial system and analyses the starting point,
objectives, sequence, characteristics, ways of advancing and the
logic behind the reform of the financial system. 2. This book
breaks down the traditional financial system and establishes, step
by step, a diversified financial system that meets the requirements
of the development of the socialist market economy. 3. This book
provides an overview of the development process of the major areas
of the financial industry and an outlook on the future direction of
the financial system reform, hoping to provide useful reference and
lessons for readers who interested in the financial undertakings of
China.
|
Health Information Processing. Evaluation Track Papers - 8th China Conference, CHIP 2022, Hangzhou, China, October 21–23, 2022, Revised Selected Papers (1st ed. 2023)
Buzhou Tang, Qingcai Chen, Hongfei Lin, Fei Wu, Lei Liu, …
|
R2,306
Discovery Miles 23 060
|
Ships in 10 - 15 working days
|
This book constitutes the papers presented at the Evaluation Track
of the 8th China Conference on Health Information
Processing, CHIP 2022, held in Hangzhou,
China during  October 21–23, 2022. The 20 full
papers included in this book were carefully reviewed
and selected from 20 submissions. They were organized in
topical sections as follows: text mining for gene-disease
association semantic; medical causal entity and relation
extraction; medical decision tree extraction from unstructured
text; OCR of electronic medical document; clinical diagnostic
coding.
This book provides a unique perspective on atom economical
utilization of biomass resources into value-added productions.
Humins are inevitably formed during the process of biomass
conversion, which compete with desired products, restrain the
activity of catalyst and hinder the recycling of catalyst and
separation of products. To further improve the efficiency of
biomass conversion toward downstream products, unambiguous
elucidation of the chemical structure and formation mechanism of
humins are prerequisite. This book primarily presents the chemical
structure analysis and formation mechanism of various
biomass-derived humins, from simple molecular models to raw biomass
resources. The chemical similarities and differences of various
biomass-derived humins have been systematically summarized
according to advanced analytical interpretation, which offers a
comprehensive viewpoint for readers with chemistry, engineering and
material backgrounds. Furthermore, the progress that has been
achieved on humins valorization and future perspectives are
discussed. Given its scope, this book can be treated as an
informative resource for undergraduates, postgraduates, lecturers
and researchers interested in biomass conversion from academia and
industry from entry to professional levels.
This book explores the experiences and emotional expression of 30
people Living with HIV/AIDS (PLWHA) using qualitative research
methods such as "illness narratives," and analyzes the dilemmas of
"sicknesses of the society" including "Acquired Needs Deficiency"
Syndrome, "Acquired Expectation Insufficiency" Syndrome, and
"Acquired Punishment" Syndrome at the micro, meso and macro levels,
so as to investigate higher-intensity negative emotions.In turn,
the book draws on the perspectives of conflict and game, structure
and function, and system and interaction, in order to propose a
dynamic mechanism of emotion and expression, and argues that these
negative emotions can be transformed, strengthened and presented
through defense mechanisms such as suppression and attribution,
which will influence social institutions at the micro, meso and
macro levels and even possibly bring about positive changes in the
social structure.
Carbon dots (CDs) as an emerging carbon nanomaterial have attracted
considerable attention and have been widely used in numerous
fields. When compared with semiconductor quantum dots and organic
dyes, CDs are a very friendly optical probe with low toxicity, good
biocompatibility and good anti-photobleaching. These qualities give
them the potential to be greener than other types of quantum dots
and organic dyes. Covering several common synthesis strategies,
including biomass synthesis, large-scale synthesis and sustainable
synthesis technology, this book focuses on the green synthesis of
CDs and their applications in the fields of bioanalytical,
catalytic, biomedical, and environmental sciences. It is a useful
reference for anyone working in green chemistry, analytical
chemistry, biomedical or environmental science.
The Bar Model Method is a key problem solving strategy consistently
taught to primary school
students in Singapore, a nation acknowledged as a global top
performer in mathematics based
on its performance in benchmarking studies such as the Trends in
International Mathematics
and Science Study (TIMSS).
The Bar Model Method is acknowledged as an effective problem
solving heuristic that enables students to understand, visualize
and represent conceptually complex problems and their solutions
simply and elegantly, and in doing so, further reinforces and
builds their conceptual and procedural knowledge, making them more
effective problem solvers. The visual representation of the problem
and the solution constructed by the student enables the teacher to
understand the student's thought process and allows them to correct
misconceptions immediately and appropriately.
This professional learning workbook introduces teachers to the
fundamentals of using the
Bar Model Method, providing the basis and process of understanding
different types of word
problems and deriving the bar models to solve them. For use with
Grades 1-6.
Modelling and Precision Control of Systems with Hysteresis covers
the piezoelectric and other smart materials that are increasingly
employed as actuators in precision engineering, from scanning probe
microscopes (SPMs) in life science and nano-manufacturing, to
precision active optics in astronomy, including space laser
communication, space imaging cameras, and the
micro-electro-mechanical systems (MEMS). As smart materials are
known for having hysteretic dynamics, it is necessary to overcome
issues with a broadband range of frequencies. This book offers both
the mathematical tools for modeling the systems and applications,
including complete case studies and source code for the experiments
to help both academics and researchers in the industry to achieve
precision in the control of Smart Actuator systems.
|
|