You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Researchers and professionals
From 1885–1924, China underwent a period of acute political struggle and cultural change, brought on by a radical change in thought: after over 2,000 years of monarchical rule, the Chinese people stopped believing in the emperor. These forty years saw the collapse of Confucian political orthodoxy and the struggle among competing definitions of modern citizenship and the state. What made it possible to suddenly imagine a world without the emperor? After Empire traces the formation of the modern Chinese idea of the state through the radical reform programs of the late Qing (1885–1911), the Revolution of 1911, and the first years of the Republic through the final expulsion of the last emper...
This book comprises select proceedings of the 4th International Conference on Innovative Computing (IC 2021) focusing on cutting-edge research carried out in the areas of information technology, science, and engineering. Some of the themes covered in this book are cloud communications and networking, high performance computing, architecture for secure and interactive IoT, satellite communication, wearable network and system, infrastructure management, etc. The essays are written by leading international experts, making it a valuable resource for researchers and practicing engineers alike.
This book provides comprehensive coverage of the latest advances and trends in information technology, science and engineering. Specifically, it addresses a number of broad themes, including multi-modal informatics, data mining, agent-based and multi-agent systems for health and education informatics, which inspire the development of intelligent information technologies. The contributions cover a wide range of topics such as AI applications and innovations in health and education informatics; data and knowledge management; multi-modal application management; and web/social media mining for multi-modal informatics. Outlining promising future research directions, the book is a valuable resource for students, researchers and professionals, and a useful reference guide for newcomers to the field. This book is a compilation of the papers presented in the 2021 International Conference on Multi-modal Information Analytics, held in Huhehaote, China, on April 23–24, 2021.
None
This book presents the proceedings of the 2020 2nd International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2021), online conference, on 30 October 2021. It provides comprehensive coverage of the latest advances and trends in information technology, science and engineering, addressing a number of broad themes, including novel machine learning and big data analytics methods for IoT security, data mining and statistical modelling for the secure IoT and machine learning-based security detecting protocols, which inspire the development of IoT security and privacy technologies. The contributions cover a wide range of topics: analytics and machine learning applications to IoT security; data-based metrics and risk assessment approaches for IoT; data confidentiality and privacy in IoT; and authentication and access control for data usage in IoT. Outlining promising future research directions, the book is a valuable resource for students, researchers and professionals and provides a useful reference guide for newcomers to the IoT security and privacy field.
This book covers cutting-edge and advanced research on data processing techniques and applications for cyber-physical systems, gathering the proceedings of the International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2020), held in Laibin City, Guangxi Province, China, on December 11–12, 2020. It examines a wide range of topics, including distributed processing for sensor data in CPS networks; approximate reasoning and pattern recognition for CPS networks; data platforms for efficient integration with CPS networks; machine learning algorithms for CPS networks; and data security and privacy in CPS networks. Outlining promising future research directions, the book offers a valuable resource for students, researchers, and professionals alike, while also providing a useful reference guide for newcomers to the field.
This book presents the outcomes of the 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber security, particularly focusing on threat intelligence, analytics, and countering cybercrime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings and novel techniques, methods and applications on all aspects of cyber security intelligence and analytics. Due to COVID-19, Authors, Keynote Speakers and PC committees will attend the conference online.
During his lifetime, L. K. Hua played a leading role in and exerted a great influence upon the development in China of modern mathematics, both pure and applied. His mathematical career began in 1931 at Tsinghua University where he continued as a professor for many years. Hua made many significant contributions to number theory, algebra, geometry, complex analysis, numerical analysis, and operations research. In particular, he initiated the study of classical groups in China and developed new matrix methods which, as applied by him as well as his followers, were instrumental in the successful attack of many problems. To honor his memory, a joint China-U.S. conference on Classical Groups and Related Topics was held at Tsinghua University in Beijing in May 1987. This volume represents the proceedings of that conference and contains both survey articles and research papers focusing on classical groups and closely related topics.
None