You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book presents new research into the great structural diversity found in Sinitic languages. While many studies focus principally on Standard Mandarin, this work draws on extensive empirical data from lesser-known languages, and seeks to dispel many recurrent linguistic myths about the Sinitic language family. Part I presents findings that show the important interplay of research into diachronic linguistics and typology in China, beginning with a discussion of how to tackle the issue of linguistic diversity in Sinitic languages. Chapters in Part II examine the Sinitic languages from a crosslinguistic perspective with pan-Sinitic explorations of demonstrative paradigms; bare classifier phrases in relation to the coding of definiteness; and of the diachronic development of two main structures for comparatives of inequality with respect to issues in language contact. Part III is devoted to individual studies of linguistic micro-areas in China: Pinghua and the Guangxi Autonomous Region in the far South of China; Shaowu Min in the northwestern corner of Fujian province; the Wu dialect of Fuyang; and the Hui'an Southern Min dialect in the South of Fujian province.
Shows that the feminist interventions of the Mao era (19491976) continue to influence contemporary Chinese women. This book traces how the legacy of the Maoist gender project is experienced or contested by particular Chinese women, remembered or forgotten in their lives, and highlighted or buried in their narratives. Xin Huang examines four womens life stories: an urban woman who lived through the Mao era (19491976), a rural migrant worker, a lesbian artist who has close connections with transnational queer networks, and an urban woman who has lived abroad. The individual narratives are paired with analysis of the historical and social contexts in which each woman lives. Huang focuses on the shifting relationship between gender and class, fashion and shame in the Mao and post-Mao eras, queer desire and artwork, and contemporary transnational encounters. By rethinking the historical significance and contemporary relevance of one of the twentieth centurys major feminist interventionssocialist and Marxist womens liberation during the Mao yearsThe Gender Legacy of the Mao Era provides insight into current struggles over gender equality in China and around the world.
Applied mathematics, together with modeling and computer simulation, is central to engineering and computer science and remains intrinsically important in all aspects of modern technology. This book presents the proceedings of AMMCS 2022, the 2nd International Conference on Applied Mathematics, Modeling and Computer Simulation, held in Wuhan, China, on 13 and 14 August 2022, with online presentations available for those not able to attend in person due to continuing pandemic restrictions. The conference served as an open forum for the sharing and spreading of the newest ideas and latest research findings among all those involved in any aspect of applied mathematics, modeling and computer sim...
The current volume “New Advances in Intelligent Signal Processing” contains extended works based on a careful selection of papers presented originally at the jubilee sixth IEEE International Symposium on Intelligent Signal Processing (WISP’2009), held in Budapest Hungary, August 26-28, 2009 - celebrating the 10 years anniversary of the WISP event series. The present book does not intent to be an overall survey on the fields of interest of the area, but tries to find topics which represent new, hot, and challenging problems. The book begins with papers investigating selected problems of Modeling, Identification, and Clustering such as fuzzy random variables, evolutionary multi-objective...
This book presents a comprehensive report on the evolution of Fuzzy Logic since its formulation in Lotfi Zadeh’s seminal paper on “fuzzy sets,” published in 1965. In addition, it features a stimulating sampling from the broad field of research and development inspired by Zadeh’s paper. The chapters, written by pioneers and prominent scholars in the field, show how fuzzy sets have been successfully applied to artificial intelligence, control theory, inference, and reasoning. The book also reports on theoretical issues; features recent applications of Fuzzy Logic in the fields of neural networks, clustering, data mining and software testing; and highlights an important paradigm shift caused by Fuzzy Logic in the area of uncertainty management. Conceived by the editors as an academic celebration of the fifty years’ anniversary of the 1965 paper, this work is a must-have for students and researchers willing to get an inspiring picture of the potentialities, limitations, achievements and accomplishments of Fuzzy Logic-based systems.
The unexpected and premature passing away of Professor Ebrahim H. "Abe" Mamdani on January, 22, 2010, was a big shock to the scientific community, to all his friends and colleagues around the world, and to his close relatives. Professor Mamdani was a remarkable figure in the academic world, as he contributed to so many areas of science and technology. Of great relevance are his latest thoughts and ideas on the study of language and its handling by computers. The fuzzy logic community is particularly indebted to Abe Mamdani (1941-2010) who, in 1975, in his famous paper An Experiment in Linguistic Synthesis with a Fuzzy Logic Controller, jointly written with his student Sedrak Assilian, introd...
This book constitutes the refereed proceedings of the Third International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2006, held in federation with the Second International Conference on Natural Computation ICNC 2006. The book presents 115 revised full papers and 50 revised short papers. Coverage includes neural computation, quantum computation, evolutionary computation, DNA computation, fuzzy computation, granular computation, artificial life, innovative applications to knowledge discovery, finance, operations research, and more.
The notion of Fuzziness stands as one of the really new concepts that have recently enriched the world of Science. Science grows not only through technical and formal advances on one side and useful applications on the other side, but also as consequence of the introduction and assimilation of new concepts in its corpus. These, in turn, produce new developments and applications. And this is what Fuzziness, one of the few new concepts arisen in the XX Century, has been doing so far. This book aims at paying homage to Professor Lotfi A. Zadeh, the “father of fuzzy logic” and also at giving credit to his exceptional work and personality. In a way, this is reflected in the variety of contrib...
This book presents innovative intelligent techniques, with an emphasis on their biomedical applications. Although many medical doctors are willing to share their knowledge – e.g. by incorporating it in computer-based advisory systems that can benefit other doctors – this knowledge is often expressed using imprecise (fuzzy) words from natural language such as “small,” which are difficult for computers to process. Accordingly, we need fuzzy techniques to handle such words. It is also desirable to extract general recommendations from the records of medical doctors’ decisions – by using machine learning techniques such as neural networks. The book describes state-of-the-art fuzzy, neural, and other techniques, especially those that are now being used, or potentially could be used, in biomedical applications. Accordingly, it will benefit all researchers and students interested in the latest developments, as well as practitioners who want to learn about new techniques.
This new book discusses the concepts while also highlighting the challenges in the field of quantum cryptography and also covering cryptographic techniques and cyber security techniques, in a single volume. It comprehensively covers important topics in the field of quantum cryptography with applications, including quantum key distribution, position-based quantum cryptography, quantum teleportation, quantum e-commerce, quantum cloning, cyber security techniques’ architectures and design, cyber security techniques management, software-defined networks, and cyber security techniques for 5G communication. The text also discusses the security of practical quantum key distribution systems, applications and algorithms developed for quantum cryptography, as well as cyber security through quantum computing and quantum cryptography. The text will be beneficial for graduate students, academic researchers, and professionals working in the fields of electrical engineering, electronics and communications engineering, computer science, and information technology.