You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Lenni wants to find someone to understand her and the new girl could just be that person Lenni can't please anyone lately. At school, her friends want her to kiss someone for a stupid competition. At home, her grandmother wants her to be more ladylike. And on the playing field, her friend Adam has started acting like a big weirdo around her. Then Lenni meets Jo, the new girl at school, and everything feels so normal. Jo is cool, fun, and unlike anyone Lenni's ever known—finally, someone's on Lenni's wavelength!
The present volume contains twelve chapters authored by specialists of Asian, African and European manuscript cultures reflecting on the cohesion of written artefacts, particularly manuscripts. Assuming that 'codicological units' exist in every manuscript culture and that they are usually composed of discrete elements (such as clay tablets, papyrus sheets, bamboo slips, parchment bifolios, palm leaves), the issue of the cohesion of the constituents is a general one. The volume presents a series of case studies on devices and strategies adopted to achieve this cohesion by manuscript cultures distant in space (from China to West Africa) and time (from the third millennium bce to the present). ...
Archives are considered to be collections of administrative, legal, commercial and other records or the actual place where they are located. They have become ubiquitous in the modern world, but emerged not much later than the invention of writing. Following Foucault, who first used the word archive in a metaphorical sense as "the general system of the formation and transformation of statements" in his "Archaeology of Knowledge" (1969), postmodern theorists have tried to exploit the potential of this concept and initiated the "archival turn". In recent years, however, archives have attracted the attention of anthropologists and historians of different denominations regarding them as historical objects and "grounding" them again in real institutions. The papers in this volume explore the complex topic of the archive in a historical, systematic and comparative context and view it in the broader context of manuscript cultures by addressing questions like how, by whom and for which purpose were archival records produced, and if they differ from literary manuscripts regarding materials, formats, and producers (scribes).
Recent archaeological finds in China have made possible a reconstruction of the ancient history of Sichauan, the country's most populous province. Excavated artifacts and newly recovered texts can now supplement traditional textual materials. Combing these materials, Sage shows how Sichauan matured from peripheral obscurity to attain central importance in the formation of the Chinese empire during the first millennium B.C.
Zi Zhi Tong Jian (Chinese: 资治通鉴;English: "Comprehensive Mirror in Aid of Governance") is a pioneering reference work in Chinese historiography, published in 1084 in the form of a chronicle. In 1065 AD, Emperor Yingzong of Songordered the great historian Sima Guang (1019–1086 AD) to lead with other scholars such as his chief assistants Liu Shu, Liu Ban and Fan Zuyu, the compilation of a universal history of China. The task took 19 years to be completed,and, in 1084 AD, it was presented to his successor Emperor Shenzong of Song. The Zi Zhi Tong Jian records Chinese history from 403 BC to 959 AD, covering 16 dynasties and spanning across almost 1,400 years,and contains 294 volumes (å·...
This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in the field of cybersecurity. The provided research goes beyond simply applying AI techniques to datasets and instead delves into deeper issues that arise at the interface between deep learning and cybersecurity. This book also provides insight into the difficult "how" and "why" questions that arise in AI within the security domain. For example, this book includes chapters covering "explainable AI", "adversarial learning", "resilient AI", and a wide variety of related topics. It’s not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Researchers and advanced level students working and studying in the fields of cybersecurity (equivalently, information security) or artificial intelligence (including deep learning, machine learning, big data, and related fields) will want to purchase this book as a reference. Practitioners working within these fields will also be interested in purchasing this book.
This is the proceedings of the International Conference on Intelligent Computing, ICIC 2006, Kunming, China, August 2006. The book presents 165 revised full papers, carefully chosen and reviewed, organized in topical sections on fuzzy systems, fuzzy-neuro-evolutionary hybrids, supervised, unsupervised and reinforcement learning, intelligent agent and Web applications, intelligent fault diagnosis, natural language processing and expert systems, natural language human-machine interface using artificial neural networks, and intelligent financial engineering.