You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Genome-reduced, wall-less, and fastidious bacteria of the genera Spiroplasma, Mycoplasma, Phytoplasma and allies belonging to the class Mollicutes, are known for a number of unique microbiological features, which have prompted researchers to investigate their basic, applied, and medical aspects. They are mostly parasitic or symbiotic to a variety of animals and plants, living on or within the eukaryotic cells. Spiroplasmas, recognized by their characteristic spiral shape and active twitching motility, are associated with insects and/or plants. S. poulsonii causes remarkable reproductive phenotype, called male-killing, of their insect hosts. S. citri and S. kunkelii are notorious as devastati...
Diversity, Distribution, and Current Status is the first volume in a three-volume series dedicated to the analysis of this important group of plant pathogens across Asia with a particular focus on geographic distribution. This book offers updated data on the most prevalent phytoplasma diseases specific to each region. Phytoplasmas are emerging plant pathogens all around the world, causing significant economic losses to crops, as well as affecting international trade. The chapters in Volume 1 look closely at different countries and regions across Asia, providing data on country-wide distribution, phytoplasma groups, insect vectors and transmission. The Phytoplama Diseases in Asian Countries s...
A comparative history that reconsiders China's relations with the rest of Eurasia, Sui-Tang China and Its Turko-Mongol Neighbors challenges the notion that inhabitants of medieval China and Mongolia were irreconcilably different from each other.
This is the first systematic study of modern China's military campaigns and the actual fighting conducted by the People's Liberation Army since the founding of the People's Republic. It provides a general overview of the evolution of PLA military doctrine, and then focuses on major combat episodes from the civil war with the Nationalists to the last significant combat in Vietnam in 1979, in addition to navy and air operations through 1999. In contrast to the many works on the specifics and hardware of China's military modernization, this book discusses such topics as military planning, command, and control; fighting and politics; combat tactics and performance; technological catch-up and doctrinal flexibility; the role of Mao Zedong; scale and typologies of fighting; and deterrence. The contributors include scholars from Mainland China, Taiwan, and the United States, who draw from a wealth of fresh archival sources.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Digital Watermarking, IWDW 2008, held in Busan, Korea, in November 2008. The 36 regular papers included in the volume were carefully reviewed and selected from 62 submissions. Areas of interest to the conference are mathematical modeling of embedding and detection; information theoretic, stochastic aspects of data hiding; security issues, including attacks and counter-attacks; combination of data hiding and cryptography; optimum watermark detection and reliable recovery; estimation of watermark capacity; channel coding techniques for watermarking; large-scale experimental tests and benchmarking; new statistical and perceptual models of content; reversible data hiding; data hiding in special media; data hiding and authentication; steganography and steganalysis; data forensics; copyright protection, DRM, and forensic watermarking; and visual cryptography.
This three-volume set of LNCS 14086, LNCS 14087 and LNCS 14088 constitutes - in conjunction with the double-volume set LNAI 14089-14090- the refereed proceedings of the 19th International Conference on Intelligent Computing, ICIC 2023, held in Zhengzhou, China, in August 2023. The 337 full papers of the three proceedings volumes were carefully reviewed and selected from 828 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications". Papers that focused on this theme were solicited, addressing theories, methodologies, and applications in science and technology.
th It is our great pleasure to present this volume of the proceedings of the 10 edition of Information Hiding (IH 2008). The conference was held in Santa Barbara - the Ame- can Riviera, California, USA, during May 19–21, 2008. It was organized by three Santa Barbarans on fire, from both industry (Mayachitra) and academia (UCSB). Over the years, Information Hiding (IH) has established itself as a premier forum for presenting research covering various aspects of information hiding. Continuing the tradition, this year, we provide a balanced program including topics such as anonymity and privacy, forensics, steganography, watermarking, fingerprinting, other hiding domains, and novel applicatio...