You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book provides a comprehensive overview of engineering nanostructures mediated by functional polymers in combination with optimal synthesis and processing techniques. The focus is on polymer-engineered nanostructures for advanced energy applications. It discusses a variety of polymers that function as precursors, templates, nano-reactors, surfactants, stabilizers, modifiers, dopants, and spacers for directing self-assembly, assisting organization, and templating growth of numerous diverse nanostructures. It also presents a wide range of polymer processing techniques that enable the efficient design and optimal fabrication of nanostructured polymers, inorganics, and organic–inorganic na...
This book constitutes the thoroughly refereed roceedings of the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017.The 31 revised regular papers and 15 short papers were carefully reviewed and selected from 105 submissions. The topics range from security and privacy in machine learning to differential privacy, which are currently hot research topics in cyber security research.
The objective of this SpringerBrief is to present security architectures and incentive mechanisms to realize system availability for D2D communications. D2D communications enable devices to communicate directly, improving resource utilization, enhancing user’s throughput, extending battery lifetime, etc. However, due to the open nature of D2D communications, there are two substantial technical challenges when applied to large-scale applications, that is, security and availability which is demonstrated in this book. This SpringerBrief proposes a secure data sharing protocol, which merges the advantages of public key cryptography and symmetric encryption, to achieve data security in D2D comm...
New Chinese Cinema: Challenging Representations examines the ‘search for roots’ films that emerged from China in the aftermath of the Cultural Revolution. The authors contextualize the films of the so-called Fifth Generation directors who came to prominence in the 1980s and 1990s, such as Chen Kaige, Zhang Yimou, and Tian Zhuangzhuang. Including close analysis of such pivotal films as Farewell My Concubine, Raise the Red Lantern, and The Blue Kite, this book also examines the rise of contemporary Sixth Generation underground directors whose themes embrace the disaffection of urban youth.
The use of resumptive pronouns is quite productive in Mandarin Chinese; however, their distribution has rarely been studied in a systematic way. This book not only gives a thorough description of the general distribution of resumptive pronouns in different contexts but also offers a theoretical account in the framework of the Minimalist Program. Different types of A'-dependencies, mediated by gaps and by resumptive pronouns, are derived by different minimalist mechanisms, such as Agree, Match and Move. These mechanisms only apply at Narrow Syntax and do not uniformly obey locality constraints. Importantly, interpretative properties of an A'-bound element, such as reconstruction effects, is only related to its internal structure irrespective of how the A'-chain concerned is derived. From this perspective, resumptivity is an exclusively syntactic-related phenomenon and is thus not subject to any interface condition. Adopting a comparative approach, this study improves the general understanding of resumptivity crosslinguistically.
5G WIRELESS NETWORK An expert presentation of 5G security, privacy, and network performance In 5G Wireless Network Security and Privacy, a team of veteran engineers delivers a robust and accessible discussion of 5G security solutions, including physical layer security, authentication, and mobility management. In the book, the authors expertly cover the requirements of 5G wireless network security and privacy, with explorations of existing solutions and vulnerabilities from security architecture and mechanism perspectives. Readers will learn how to enhance the security and network performance of 5G wireless networks in contexts like vehicle‐to‐vehicle and vehicle‐to‐infrastructure com...
Epoxy resins are polymers which are extensively used as coating materials due to their outstanding mechanical properties and good handling characteristics. A disadvantage results from their high cross-link density: they are brittle and have very low resistance to crack growth and propagation. This necessitates the toughening of the epoxy matrix without impairing its good thermomechanical properties. The final properties of the polymer depend on their structure. The book focuses on the microstructural aspects in the modification of epoxy resins with low molecular weight liquid rubbers, one of the prime toughening agents commonly employed. The book follows thoroughly the reactions of elastomer-modified epoxy resins from their liquid stage to the network formation. It gives an in-depth view into the cure reaction, phase separation and the simultaneous development of the morphology. Chapters on ageing, failure analysis and life cycle analysis round out the book.
This collection of articles covers the hottest topics in contemporary applied mathematics. Multiscale modeling, material computing, symplectic methods, parallel computing, mathematical biology, applied differential equations and engineering computing problems are all included. The book contains the latest results of many leading scientists and provides a window on new trends in research in the field.
This book is a compilation of selected papers from the 10th International Field Exploration and Development Conference (IFEDC 2020). The proceedings focuses on Reservoir Surveillance and Management, Reservoir Evaluation and Dynamic Description, Reservoir Production Stimulation and EOR, Ultra-Tight Reservoir, Unconventional Oil and Gas Resources Technology, Oil and Gas Well Production Testing, Geomechanics. The conference not only provides a platform to exchanges experience, but also promotes the development of scientific research in oil & gas exploration and production. The main audience for the work includes reservoir engineer, geological engineer, enterprise managers senior engineers as well as professional students.
SECURITY AND PRIVACY IN THE INTERNET OF THINGS Provides the authoritative and up-to-date information required for securing IoT architecture and applications The vast amount of data generated by the Internet of Things (IoT) has made information and cyber security vital for not only personal privacy, but also for the sustainability of the IoT itself. Security and Privacy in the Internet of Things brings together high-quality research on IoT security models, architectures, techniques, and application domains. This concise yet comprehensive volume explores state-of-the-art mitigations in IoT security while addressing important security and privacy challenges across different IoT layers. The book...