You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The chief target of China's infamous Cultural Revolution, Liu Shaoqi is one of the tragic figures of the Chinese revolution. By addressing the issues that decimated China's monolithic elite in the late 1960s, Lowell Dittmer illuminates not only the life and fate of this fascinating leader but also the policy-making process of a revolutionary state facing the diverging exigencies of economic modernization and political development. Liu Shaoqi emerges as the symbol of a systematic endeavor to combine order with revolution and equality using economic efficiency and technocratic values. In this new edition, Mr. Dittmer tells the end of the story -- the death of Liu Shaoqi and the fate of Wang Guangmei (Liu's wife and a notable figure herself) and other members of Liu's family and inner circle -- and the legacy and relevance of Liu's contribution to China in the late twentieth century.
The book is about the revival of China in the 20th century and the first decade of the 21st century. It has eight parts: (1) The civil revolution in China, (2) The countryside bases, (3) The Long Match of the Red Army, (4) The Anti Japanese War, (5) Decisive civil battles before the establishment of the People’s Republic of China, (6) The Mao Era before the Great Cultural Revolution, (7) The Great Cultural Revolution, and (8) The Reform and opening up. This version of the book is with pictures.
Water Security: Big Data-Driven Risk Identification, Assessment and Control of Emerging Contaminants contains the latest information on big data-driven risk detection and analysis, risk assessment and environmental health effect, intelligent risk control technologies, and global control strategy of emerging contaminants. First, this book highlights advances and challenges throughout the detection of emerging chemical contaminants (e.g., antimicrobials, microplastics) by sensors or mass spectrometry, as well as emerging biological contaminant (e.g., ARGs, pathogens) by a combination of next- and third-generation sequencing technologies in aquatic environment. Second, it discusses in depth the...
The book highlights innovative ideas, cutting-edge findings, and novel techniques, methods and applications touching on all aspects of technology and intelligence in smart city management and services. Above all, it explores developments and applications that are of practical use and value for Cyber Intelligence-related methods, which are frequently used in the context of city management and services.
The International Conference on Intelligent Computing (ICIC) was set up as an annual forum dedicated to emerging and challenging topics in the various aspects of advances in computational intelligence fields, such as artificial intelligence, machine learning, bioinformatics, and computational biology, etc. The goal of this conference was to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions related to the multifaceted aspects of intelligent computing. This book constitutes the proceedings of the International Conference on Intelligent Computing (ICIC 2005), held in Hefei, Anhui, China, during August 23–26, 2005. ICIC 2005 r...
Intelligent Approach to Cyber Security provides details on the important cyber security threats and its mitigation and the influence of Machine Learning, Deep Learning and Blockchain technologies in the realm of cyber security. Features: Role of Deep Learning and Machine Learning in the Field of Cyber Security Using ML to defend against cyber-attacks Using DL to defend against cyber-attacks Using blockchain to defend against cyber-attacks This reference text will be useful for students and researchers interested and working in future cyber security issues in the light of emerging technology in the cyber world.
Information systems are complex, including data collecting, storing, processing and delivering. The main components of information systems are computer hardware and software, telecommunications, databases and data warehouses, human resources, and procedures. With the development of information systems, the innovation technologies and their applications continuously appear, such as the Internet of Things (IOT), cloud computing, big data and smart cities. Information Systems and Computing Technology contains 23 technical papers from the International Conference on Information Systems and Computing Technology (ISCT 2013, Wuxi, China, 15-16 September 2013). The book reviews recent advances in information systems and computing technology.
This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presented together with an invited talk were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on digital signatures, public key encryption, cryptographic protocols, applied cryptography, multimedia security, algorithms and evaluation, cryptanalysis, security applications, wireless network security, system security, and network security.
This book presents computationally efficient MPC solutions. The classical model predictive control (MPC) approach to control dynamical systems described by the Wiener model uses an inverse static block to cancel the influence of process nonlinearity. Unfortunately, the model's structure is limited, and it gives poor control quality in the case of an imperfect model and disturbances. An alternative is to use the computationally demanding MPC scheme with on-line nonlinear optimisation repeated at each sampling instant. A linear approximation of the Wiener model or the predicted trajectory is found on-line. As a result, quadratic optimisation tasks are obtained. Furthermore, parameterisation using Laguerre functions is possible to reduce the number of decision variables. Simulation results for ten benchmark processes show that the discussed MPC algorithms lead to excellent control quality. For a neutralisation reactor and a fuel cell, essential advantages of neural Wiener models are demonstrated.