You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
C. T. Hsia examines six landmark texts: The Romance of the Three Kingdoms, The Water Margin, Journey to the West, Chin P'ing Mei, The Scholars, and Dream of the Red Chamber. In addition to providing historical and bibliographical information, he critiques structure and style, as well as major characters and episodes in relation to moral and philosophical themes. C. T. Hsia cites Western classics for comparison and excerpts each novel. Hailed as a classic upon its publication in 1968, The Classic Chinese Novel has remained the best singlevolume critical introduction to the subject.
Control systems play an important role in engineering. Fuzzy logic is the natural choice for designing control applications and is the most popular and appropriate for the control of home and industrial appliances. Academic and industrial experts are constantly researching and proposing innovative and effective fuzzy control systems. This book is an edited volume and has 21 innovative chapters arranged into five sections covering applications of fuzzy control systems in energy and power systems, navigation systems, imaging, and industrial engineering. Overall, this book provides a rich set of modern fuzzy control systems and their applications and will be a useful resource for the graduate students, researchers, and practicing engineers in the field of electrical engineering.
This volume launches the translation of a work that describes the development of Chinese political thought from the time of Confucius in the late Chou era into the twentieth century. The author systematically treats leading thinkers, schools, and movements, displaying a consummate mastery of traditional Chinese learning, and of Western analytical and comparative methods. This first complete translation includes prefatory remarks by Kung-chuan Hsiao and notes prepared by the translator to assist the Western reader. Originally published in 1979. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
EEA2011 is an integrated conference concentration its focus on Electrical Engineering and Automation. In the proceeding, you can learn much more knowledge about Electrical Engineering and Automation of researchers from all around the world. The main role of the proceeding is to be used as an exchange pillar for researchers who are working in the mentioned fields. In order to meet the high quality of Springer, AISC series, the organization committee has made their efforts to do the following things. Firstly, poor quality paper has been refused after reviewing course by anonymous referee experts. Secondly, periodically review meetings have been held around the reviewers about five times for exchanging reviewing suggestions. Finally, the conference organizers had several preliminary sessions before the conference. Through efforts of different people and departments, the conference will be successful and fruitful.
Fundamentals of Data Science: Theory and Practice presents basic and advanced concepts in data science along with real-life applications. The book provides students, researchers and professionals at different levels a good understanding of the concepts of data science, machine learning, data mining and analytics. Users will find the authors' research experiences and achievements in data science applications, along with in-depth discussions on topics that are essential for data science projects, including pre-processing, that is carried out before applying predictive and descriptive data analysis tasks and proximity measures for numeric, categorical and mixed-type data. The book's authors inc...
This book presents a collection of state-of-the-art AI approaches to cybersecurity and cyberthreat intelligence, offering strategic defense mechanisms for malware, addressing cybercrime, and assessing vulnerabilities to yield proactive rather than reactive countermeasures. The current variety and scope of cybersecurity threats far exceed the capabilities of even the most skilled security professionals. In addition, analyzing yesterday’s security incidents no longer enables experts to predict and prevent tomorrow’s attacks, which necessitates approaches that go far beyond identifying known threats. Nevertheless, there are promising avenues: complex behavior matching can isolate threats based on the actions taken, while machine learning can help detect anomalies, prevent malware infections, discover signs of illicit activities, and protect assets from hackers. In turn, knowledge representation enables automated reasoning over network data, helping achieve cybersituational awareness. Bringing together contributions by high-caliber experts, this book suggests new research directions in this critical and rapidly growing field.
This three volume set LNAI 9244, 9245, and 9246 constitutes the refereed proceedings of the 8th International Conference on Intelligent Robotics and Applications, ICIRA 2015, held in Portsmouth, UK, in August 2015. The 60 papers included in the first volume are organized in topical sections on analysis and control for complex systems; marine vehicles and oceanic engineering; drives and actuators’ modeling; biomechatronics in bionic dexterous hand; robot actuators and sensors; intelligent visual systems; estimation and identification; and adaptive control system.
The 39-volume set, comprising the LNCS books 13661 until 13699, constitutes the refereed proceedings of the 17th European Conference on Computer Vision, ECCV 2022, held in Tel Aviv, Israel, during October 23–27, 2022. The 1645 papers presented in these proceedings were carefully reviewed and selected from a total of 5804 submissions. The papers deal with topics such as computer vision; machine learning; deep neural networks; reinforcement learning; object recognition; image classification; image processing; object detection; semantic segmentation; human pose estimation; 3d reconstruction; stereo vision; computational photography; neural networks; image coding; image reconstruction; object recognition; motion estimation.