Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Information Science and Applications
  • Language: en
  • Pages: 394

Information Science and Applications

This book presents select proceedings of 11th International Conference on Information Science and Applications 2020 (ICISA 2020) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. Also the proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this book, readers can gain an understanding of the current state-of-the-art information strategies and technologies of convergence security.

The Making of a Hinterland
  • Language: en
  • Pages: 411

The Making of a Hinterland

This wholly original reassessment of critical issues in modern Chinese history traces social, economic, and ecological change in inland North China during the late Qing dynasty and the Republic. Using many new sources, Kenneth Pomeranz argues that the development of certain regions entailed the systematic underdevelopment of other regions. He maps changes in local finance, farming, transportation, taxation, and popular protest, and analyzes the consequences for different classes, sub-regions, and genders. Pomeranz attributes these diverse developments to several causes: the growing but incomplete integration of North China into the world economy, the state's abandonment of many hinterland areas and traditional functions, and the effect of local social structures on these processes. He shows that hinterlands were made, not merely found, and were powerfully shaped by the strategies of local groups as well as outside forces.

Information Security and Cryptology
  • Language: en
  • Pages: 545

Information Security and Cryptology

  • Type: Book
  • -
  • Published: 2017-03-02
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016. The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography; commitment and protocol; elliptic curves; security and implementation.

Computer and Computing Technologies in Agriculture VII
  • Language: en
  • Pages: 581

Computer and Computing Technologies in Agriculture VII

  • Type: Book
  • -
  • Published: 2014-02-21
  • -
  • Publisher: Springer

The two-volume set IFIP AICT 419 and 420 constitutes the refereed post-conference proceedings of the 7th IFIP TC 5, WG 5.14 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2013, held in Beijing, China, in September 2013. The 115 revised papers presented were carefully selected from numerous submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including Internet of things and cloud computing; simulation models and decision-support systems for agricultural production; smart sensor, monitoring, and control technology; traceability and e-commerce technology; computer vision, computer graphics, and virtual reality; the application of information and communication technology in agriculture; and universal information service technology and service systems development in rural areas.

Biodegradable polymers for biomedical applications - volume II
  • Language: en
  • Pages: 167
Architecture, Building Materials and Engineering Management
  • Language: en
  • Pages: 2993

Architecture, Building Materials and Engineering Management

Selected, peer reviewed papers from the 2013 International Conference on Civil, Architecture and Building Materials, (3rd CEABM 2013), May 24-26, 2013, Jinan, China

Artificial Intelligence and Security
  • Language: en
  • Pages: 841

Artificial Intelligence and Security

This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 142 full papers presented in this two-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: Artificial intelligence and internet of things. Part II: Internet of things, information security, big data and cloud computing, and information processing.

New Materials, Applications and Processes
  • Language: en
  • Pages: 2358

New Materials, Applications and Processes

Selected, peer reviewed papers from the International Conference on Chemical, Material and Metallurgical Engineering (ICCMME 2011), December 23-25, 2011, Beihai, China

Information Security and Cryptology
  • Language: en
  • Pages: 487

Information Security and Cryptology

  • Type: Book
  • -
  • Published: 2016-05-06
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Information Security and Cryptology, Inscrypt 2015, held in Beijing, China in November 2015. The 27 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on hash function; signature schemes; symmetric ciphers; elliptic curve and cryptographic fundamentals; Web and applications security; cloud security; key management and public key encryption; zero knowledge and secure computations; software and mobile security.

Who was Who in the People's Republic of China
  • Language: en
  • Pages: 724

Who was Who in the People's Republic of China

The result of painstaking research by a renowned Sinologist, this compilation consists of over 3,100 biographical entries and detailed descriptions of individuals who used to play a decisive role in the People's Republic of China, including: -- Government officials, such as ministers or ambassadors -- Provincial cadres and cultural commissioners -- Party officials and functionaries of mass organizations Covering recently deceased personalities as well as figures who have retired, been exiled, disappeared, or withdrawn from public life for other reasons, Bartke has created an invaluable working tool for both historical and contemporary studies.