Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 8 of 8 matches in All Departments
This book is about how Chinese entrepreneurs deal with China's most important institution--the government in their struggle to survive and even prosper in China's transitional economy. It takes an "inside look" at several private firms in China and provides a firsthand account, as well as the underlying rationale and decision considerations, of their corporate political strategy. The book is based firmly on solid academic research but actually written with both practitioners and scholars in mind. It offers candid and insightful quotes and observations from the owners and executives of China's private firms with regards to their dealing with the government. This book advances a typology of corporate political strategies based on the respective motivations of the business (the entrepreneurs and their firms) and the government (the government institutions and individual officials) as well as the modes of their interactions. Eight different types of political strategies by China's private firms are identified and illustrated with real-life examples, ranging from one-night-stand, situational shopper, good-ole-friend, patronage seeker, model volunteer, institutional improviser, direct participator, to red hat insider. The book also dissects a living case and traces the development of one particular private firm, from its humble start-up to present day glory, which fittingly illustrates the evolution and dynamics of the various types of political strategies the firm employed at different stages of its growth. For anyone who wants to understand China's private firms and the Chinese government, thus be able to deal with them more effectively, this book is a must-read.
As the demand for data reliability increases, coding for error control becomes increasingly important in data transmission systems and has become an integral part of almost all data communication system designs. In recent years, various trellis-based soft-decoding algorithms for linear block codes have been devised. New ideas developed in the study of trellis structure of block codes can be used for improving decoding and analyzing the trellis complexity of convolutional codes. These recent developments provide practicing communication engineers with more choices when designing error control systems. Trellises and Trellis-based Decoding Algorithms for Linear Block Codes combines trellises and trellis-based decoding algorithms for linear codes together in a simple and unified form. The approach is to explain the material in an easily understood manner with minimal mathematical rigor. Trellises and Trellis-based Decoding Algorithms for Linear Block Codes is intended for practicing communication engineers who want to have a fast grasp and understanding of the subject. Only material considered essential and useful for practical applications is included. This book can also be used as a text for advanced courses on the subject.
Using easy-to-follow mathematics, this textbook provides comprehensive coverage of block codes and techniques for reliable communications and data storage. It covers major code designs and constructions from geometric, algebraic, and graph-theoretic points of view, decoding algorithms, error control additive white Gaussian noise (AWGN) and erasure, and dataless recovery. It simplifies a highly mathematical subject to a level that can be understood and applied with a minimum background in mathematics, provides step-by-step explanation of all covered topics, both fundamental and advanced, and includes plenty of practical illustrative examples to assist understanding. Numerous homework problems are included to strengthen student comprehension of new and abstract concepts, and a solutions manual is available online for instructors. Modern developments, including polar codes, are also covered. An essential textbook for senior undergraduates and graduates taking introductory coding courses, students taking advanced full-year graduate coding courses, and professionals working on coding for communications and data storage.
This book is about how Chinese entrepreneurs deal with China's most important institution-the government-in their struggle to survive and even prosper in China's transitional economy. It takes an "inside look" at several private firms in China and provides a first-hand account, as well as the underlying rationale and decision considerations, of their corporate political strategy. The book is based firmly on solid academic research but actually written with both practitioners and scholars in mind. It offers candid and insightful quotes and observations from the owners and executives of China's private firms with regards to their dealing with the government. This book advances a typology of corporate political strategies based on the respective motivations of the business (the entrepreneurs and their firms) and the government (the government institutions and individual officials) as well as the modes of their interactions. Eight different types of political strategies by China's private firms are identified and illustrated with real-life examples, ranging from one-night-stand, situational shopper, good ole friend, patronage seeker, model volunteer, institutional improviser, direct participator, to red hat insider. The book also dissects a living case and traces the development of one particular private firm, from its humble start-up to present day glory, which fittingly illustrates the evolution and dynamics of the various types of political strategies the firm employed at different stages of its growth. For anyone who wants to understand China's private firms and the Chinese government, thus be able to deal with them more effectively, this book is a must-read.
As the demand for data reliability increases, coding for error control becomes increasingly important in data transmission systems and has become an integral part of almost all data communication system designs. In recent years, various trellis-based soft-decoding algorithms for linear block codes have been devised. New ideas developed in the study of trellis structure of block codes can be used for improving decoding and analyzing the trellis complexity of convolutional codes. These recent developments provide practicing communication engineers with more choices when designing error control systems. Trellises and Trellis-based Decoding Algorithms for Linear Block Codes combines trellises and trellis-based decoding algorithms for linear codes together in a simple and unified form. The approach is to explain the material in an easily understood manner with minimal mathematical rigor. Trellises and Trellis-based Decoding Algorithms for Linear Block Codes is intended for practicing communication engineers who want to have a fast grasp and understanding of the subject. Only material considered essential and useful for practical applications is included. This book can also be used as a text for advanced courses on the subject.
The 25 revised full papers presented here together with 7 invited papers address subjects such as block codes; algebra and codes: rings, fields, and AG codes; cryptography; sequences; decoding algorithms; and algebra: constructions in algebra, Galois groups, differential algebra, and polynomials.
This book constitutes the refereed proceedings of the 19th
International Symposium on Applied Algebra, Algebraic Algorithms
and Error-Correcting Codes, AAECC-13, held in Honolulu, Hawaii, USA
in November 1999.
Written by leading experts, this self-contained text provides systematic coverage of LDPC codes and their construction techniques, unifying both algebraic- and graph-based approaches into a single theoretical framework (the superposition construction). An algebraic method for constructing protograph LDPC codes is described, and entirely new codes and techniques are presented. These include a new class of LDPC codes with doubly quasi-cyclic structure, as well as algebraic methods for constructing spatially and globally coupled LDPC codes. Authoritative, yet written using accessible language, this text is essential reading for electrical engineers, computer scientists and mathematicians working in communications and information theory.
|
You may like...
|