You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The collaborative effort of nearly 100 China scholars from around the world, this unique one-volume reference provides 89 in-depth biographies of important Chinese women from the fifth century B.C.E to the early twentieth century.
This book constitutes the refereed proceedings of the Second SKLOIS Conference on Information Security and Cryptology, Inscrypt 2006, held in Beijing, China in November/December 2006. The 23 revised full papers cover digital signature schemes, sequences and stream ciphers, symmetric-key cryptography, cryptographic schemes, network security, access control, computer and applications security, as well as Web and media security.
This book constitutes the refereed post-proceedings of the Joint International Conference on Pervasive Computing and the Networked World, ICPCA-SWS 2012, held in Istanbul, Turkey, in November 2012. This conference is a merger of the 7th International Conference on Pervasive Computing and Applications (ICPCA) and the 4th Symposium on Web Society (SWS). The 53 revised full papers and 26 short papers presented were carefully reviewed and selected from 143 submissions. The papers cover a wide range of topics from different research communities such as computer science, sociology and psychology and explore both theoretical and practical issues in and around the emerging computing paradigms, e.g., pervasive collaboration, collaborative business, and networked societies. They highlight the unique characteristics of the "everywhere" computing paradigm and promote the awareness of its potential social and psychological consequences.
This book aims to evaluate and improve the state of charge (SOC) and state of health (SOH) of automotive lithium-ion batteries. The authors first introduce the basic working principle and dynamic test characteristics of lithium-ion batteries. They present the dynamic transfer model, compare it with the traditional second-order reserve capacity (RC) model, and demonstrate the advantages of the proposed new model. In addition, they propose the chaotic firefly optimization algorithm and demonstrate its effectiveness in improving the accuracy of SOC and SOH estimation through theoretical and experimental analysis. The book will benefit researchers and engineers in the new energy industry and provide students of science and engineering with some innovative aspects of battery modeling.
Based on the framework of geostrategic psychology, this book elucidates the intrinsic law of the rise and fall of great powers and gives insights into the quandary of China's rise and the mechanism behind the strategy. Conflating geopolitics and strategic psychology, geostrategic psychology is rooted in the historical study of strategy and premised on an assumption that human beings bear resemblance in psychology and behavior when facing the same structure of geopolitical circumstance. The book analyzes intriguing phenomena from strategic psychology, including trend anxiety and conflict willingness, the Old Man Phenomenon in international politics, the Santa Claus Effect, the Myth of the Sun...
I was invited to join the Organizing Committee of the First International Conference on Complex Sciences: Theory and Applications (Complex 2009) as its ninth member. At that moment, eight distinguished colleagues, General Co-chairs Eugene Stanley and Gaoxi Xiao, Technical Co-chairs János Kertész and Bing-Hong Wang, Local Co-chairs Hengshan Wang and Hong-An Che, Publicity Team Shi Xiao and Yubo Wang, had spent hundreds of hours pushing the conference half way to its birth. Ever since then, I have been amazed to see hundreds of papers flooding in, reviewed and commented on by the TPC members. Finally, more than 200 contributions were - lected for the proceedings currently in your hands. They...