You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The three-volume set LNCS 6361, 6362 and 6363 constitutes the refereed proceedings of the 13th International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2010, held in Beijing, China, in September 2010. Based on rigorous peer reviews, the program committee carefully selected 251 revised papers from 786 submissions for presentation in three volumes. The second volume includes 84 papers organized in topical sections on ultrasound imaging, neuroimage analysis, simulation of anatomical structures, endoscopic and microscopic imaging, and image registration.
Following the great progress made in computing technology, both in computer and programming technology, computation has become one of the most powerful tools for researchers and practicing engineers. It has led to tremendous achievements in computer-based structural engineering and there is evidence that current devel- ments will even accelerate in the near future. To acknowledge this trend, Tongji University, Vienna University of Technology, and Chinese Academy of Engine- ing, co-organized the International Symposium on Computational Structural En- neering 2009 in Shanghai (CSE’09). CSE’09 aimed at providing a forum for presentation and discussion of sta- of-the-art development in scien...
This book constitutes the refereed proceedings of the 4th International Conference on Cryptology and Network Security, CANS 2005, held in Xiamen, China in December 2005. The 28 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 118 submissions. The papers are organized in topical sections on cryptanalysis, intrusion detection and viruses, authentication and signature, signcryption, e-mail security, cryptosystems, privacy and tracing, information hiding, firewalls, denial of service and DNS security, and trust management.
The contributors to this volume were born in Beijing, Shanghai, and Hong Kong; they have been immigrants, foreign students, settlers, permanent residents, citizens, and-above all-"travelers." They are both geographic inhabitants of various overseas diaspora Chinese communities as well as figurative inhabitants of imagined heterogeneous and hybrid communities. Their migratory histories are here presented as an interdisciplinary collection of texts in distinctive voices: law professor, journalist, historian, poet, choreographer, film scholar, tai-chi expert, translator, writer, literary scholar.
Transforming Consciousness forces us to rethink the entire project in modern China of the "translation of the West." Taken together, the chapters develop a wide-ranging and deeply sourced argument that Yogacara Buddhism played a much more important role in the development of modern Chinese thought (including philosophy, religion, scientific thinking, social, thought, and more) than has previously been recognized. They show that Yogacara Buddhism enabled key intellectuals of the late Qing and early Republic to understand, accept, modify, and critique central elements of Western social, political, and scientific thought. The chapters cover the entire period of Yogacara's distinct shaping of mo...
Machine Learning and Deep Learning in Medical Data Analytics and Healthcare Applications introduces and explores a variety of schemes designed to empower, enhance, and represent multi-institutional and multi-disciplinary machine learning (ML) and deep learning (DL) research in healthcare paradigms. Serving as a unique compendium of existing and emerging ML/DL paradigms for the healthcare sector, this book demonstrates the depth, breadth, complexity, and diversity of this multi-disciplinary area. It provides a comprehensive overview of ML/DL algorithms and explores the related use cases in enterprises such as computer-aided medical diagnostics, drug discovery and development, medical imaging,...
This book provides an essential compilation of relevant and cutting edge academic and industry work on key cybersecurity applications topics. Further, it introduces cybersecurity applications to the public at large to develop their cybersecurity applications knowledge and awareness. The book concentrates on a wide range of advances related to Cybersecurity Applications which include, among others, applications in the areas of Data Science, Internet of Things, Artificial Intelligence, Robotics, Web, High-Tech Systems, Cyber-Physical Systems, Mobile Devices, Digital Media, and Cloud Computing. It introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity application specialists and educators for keeping current their cybersecurity applications knowledge. Further, it provides a glimpse of future directions where cybersecurity applications are headed. The book can be a valuable resource to applied cybersecurity experts towards their professional development efforts and to students as a supplement to their cybersecurity courses.
Human Factors and Systems Interaction Proceedings of the 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022), July 24–28, 2022, New York, USA
In Differentiating the Pearl from the Fish-Eye, Eyal Aviv offers an account of Ouyang Jingwu (1871-1943), a leading intellectual who revived the Buddhist scholastic movement during the early Republican period in China. Ouyang believed that authentic Indian Buddhism was an alternative to the prevalent Chinese Buddhist doctrines of his time. Aviv shows how Ouyang’s rhetoric of authenticity won the movement well-known admirers but also influential critics. This debate shaped modern intellectual history in China and has lost none of its relevancy today.
This book intends to present emerging Federated Learning (FL)-based architectures, frameworks, and models in Internet of Medical Things (IoMT) applications. It intends to build on the basics of the healthcare industry, the current data sharing requirements, and security and privacy issues in medical data sharing. Once IoMT is presented, the book shifts towards the proposal of privacy-preservation in IoMT, and explains how FL presents a viable solution to these challenges. The claims are supported through lucid illustrations, tables, and examples that present effective and secured FL schemes, simulations, and practical discussion on use-case scenarios in a simple manner. The book intends to c...