You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book contains the original peer-reviewed research papers presented at the 6th China Aeronautical Science and Technology Conference held in Wuzhen, Zhejiang Province, China, in September 2023. Topics covered include but are not limited to Navigation/Guidance and Control Technology, Aircraft Design and Overall Optimisation of Key Technologies, Aviation Testing Technology, Airborne Systems/Electromechanical Technology, Structural Design, Aerodynamics and Flight Mechanics, Advanced Aviation Materials and Manufacturing Technology, Advanced Aviation Propulsion Technology, and Civil Aviation Transportation. The papers presented here share the latest findings in aviation science and technology, making the book a valuable resource for researchers, engineers and students in related fields.
This multi-contributor volume examines the evolving relationship between fear, heterodoxy and crime in traditional China. It throws light on how these three variously interwoven elements shaped local policies and people’s perceptions of the religious, ethnic, and cultural “other.” Authors depart from the assumption that “otherness” is constructed, stereotyped and formalized within the moral, political and legal institutions of Chinese society. The capacity of their findings to address questions about the emotional dimension of mass mobilization, the socio-political implications of heterodoxy, and attributions of crime is the result of integrating multiple sources of knowledge from history, religious studies and social science. Contributors are Ágnes Birtalan, Ayumu Doi, Fabian Graham, Hung Tak Wai, Jing Li, Hang Lin, Tommaso Previato, and Noriko Unno.
Winner of a 2006 Choice Magazine Outstanding Academic Title Award As medieval Chinese manuscripts were copied and recopied through the centuries, both mistakes and deliberate editorial changes were introduced, thereby affecting readers' impressions of the author's intent. In Tao Yuanming and Manuscript Culture, Xiaofei Tian shows how readers not only experience authors but produce them by shaping texts to their interpretation. Tian examines the mechanics and history of textual transmission in China by focusing on the evolution over the centuries of the reclusive poet Tao Yuanming into a figure of epic stature. Considered emblematic of the national character, Tao Yuanming (also known as Tao Q...
This book constitutes the refereed post-conference proceedings of the 12th International Conference on Broadband Communications, Networks, and Systems, Broadnets 2021, which took place in October 2021. Due to COVID-19 pandemic the conference was held virtually. The 24 full papers presented were carefully reviewed and selected from 49 submissions. The papers are thematically grouped as a session on broadband communications, networks, and systems; 5G-enabled smart building: technology and challenge; and 5G: The advances in industry.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-Forensics 2010, held in Shanghai, China, in November 2010. The 32 revised full papers presented were carefully reviewed and selected from 42 submissions in total. These, along with 5 papers from a collocated workshop of E-Forensics Law, cover a wide range of topics including digital evidence handling, data carving, records tracing, device forensics, data tamper identification, and mobile device locating.
Wireless technologies and applications are becoming one of the fastest growing and most promising areas in recent years. To accommodate data transmission by multiple stations sharing the scarce wireless bandwidth, a medium access control (MAC) protocol plays a crucial role in scheduling packet transmission fairly and efficiently. The emerging wireless networks, such as ad-hoc networks, sensor networks or mesh networks, are mostly multi-hop based and in distributed manner, which brings a lot of problems and challenges in designing fine-tuned MAC protocols tailored for modern wireless network. In this book, the authors give complete and in-depth overviews to the classic medium access control a...
This book LNCS 13547 constitutes the proceedings of the 14th International Symposium on Cyberspace Safety and Security, CSS 2022, held in Xi’an, China, in October 2022.The 26 revised full papers presented were carefully reviewed and selected from 104 initial submissions. The papers focus on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.
This book systematically traces the development of Chinese historiography from the 2nd century B.C. to the 19th century A.D. Refusing to fit the Chinese historical narration into the modern Western discourse, the author highlights the significant questions that concern traditional historians, their philosophical foundations, their development over three thousand years and their influence on the intelligentsia. China is a country defined in terms of its history and its historians have worked hard to record the past. However, this book approaches Chinese history from the very beginning not only as a way of recording, but also as a way of dealing with the past in order to orient the people of the present in the temporal dimension of their lives. This book was listed as the key textbook of the “Eleventh Five-year Plan” for college students in China.
Single processing units have now reached a point where further major improvements in their performance are restricted by their physical limitations. This is causing a slowing down in advances at the same time as new scientific challenges are demanding exascale speed. This has meant that parallel processing has become key to High Performance Computing (HPC). This book contains the proceedings of the 14th biennial ParCo conference, ParCo2011, held in Ghent, Belgium. The ParCo conferences have traditionally concentrated on three main themes: Algorithms, Architectures and Applications. Nowadays though, the focus has shifted from traditional multiprocessor topologies to heterogeneous and manycore...
A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based algorithms and involves transdisciplinary approaches, merging theories of cybernetics, mechatronics, design, and process science. This text mainly concentrates on offering a foundational theoretical underpinning, and a comprehensive and coherent review of intelligent security solutions for cyber-physical systems. Features: • Provides an overview of cyber-physical systems (CPSs) along with security concepts like attack detection methods, cyber-physical systems failures, and risk identification and management. • Showcases cyber-physical systems (CPSs) security solutions, lig...