You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
CSISE2011 is an integrated conference concentrating its focus upon Computer Science,Intelligent System and Environment. In the proceeding, you can learn much more knowledge about Computer Science, Intelligent System and Environment of researchers all around the world. The international conference will provide a forum for engineers, scientist, teachers and all researchers to discuss their latest research achievements and their future research plan. The main role of the proceeding is to be used as an exchange pillar for researchers who are working in the mentioned field. In order to meet high standard of Springer ́s Advances in Intelligent and Soft Computing ,the organization committee has ma...
Selected, peer reviewed papers from the 2014 International Conference on Energy and Environmental Protection (ICEEP 2014), April 26-28, 2014, Xi'an, China
This book selects leading, innovative and influential Chinese maritime judgments and presents full translation of them, with brief summary, to the readers so that they can have insights of how the Chinese maritime judges interpret, apply and develop Chinese maritime law in practice. China trades with other states in trillions of USD every year, and about 95% of the cargoes are carried by ocean-going ships calling at hundreds of Chinese ports each single day. Due to the enormous and steadily growing trade volume and shipping activities, foreign ships, companies and persons are often caught by the Chinese maritime law and court. The parties involved and their lawyers are more than ever enthusi...
‘Waste’ is generally identified as goods or material that are perceived to be mostly valueless. However, objects that are perceived to be waste based on consumers’ object valuation can be redefined to create value. This requires a multitude of efforts using different strategies in waste prevention and management. This book is an edited collection of various chemical approaches used for valorization of solid wastes, particularly, waste electrical and electronic equipment, plastic waste, and agro-residue waste, that provide research insights into the concept "waste-to-energy". Covering a variety of interdisciplinary topics on waste treatment and resource recovery makes the book one for all that serves as an excellent reading material for engineers, science scholars, entrepreneurs, and organizations who are working in the field of waste management.
The largest migration in history is taking place in China today, off the radar of the world's major media. Since the 1990s at least 120 million Chinese peasants have left the countryside for the big cities to work in factories, on construction sites, in catering and prostitution - typically without the most basic rights or protections. Here van Luyn relates the remarkable tales of migrant workers who have helped fuel the explosive growth of the People's Republic of China.
The collection focuses on the advancements of characterization of minerals, metals, and materials and the applications of characterization results on the processing of these materials. Advanced characterization methods, techniques, and new instruments are emphasized. Areas of interest include, but are not limited to: • Novel methods and techniques for characterizing materials across a spectrum of systems and processes. • Characterization of mechanical, thermal, electrical, optical, dielectric, magnetic, physical, and other properties of materials. • Characterization of structural, morphological, and topographical natures of materials at micro- and nano- scales. • Characterization of extraction and processing including process development and analysis. • Advances in instrument developments for microstructure analysis and performance evaluation of materials, such as computer tomography (CT), X-ray and neutron diffraction, electron microscopy (SEM, FIB, TEM), and spectroscopy (EDS, WDS, EBSD) techniques. • 2D and 3D modelling for materials characterization.
Wireless sensor networks (WSNs) have attracted high interest over the last few decades in the wireless and mobile computing research community. Applications of WSNs are numerous and growing, including indoor deployment scenarios in the home and office to outdoor deployment in an adversary’s territory in a tactical background. However, due to their distributed nature and deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their performance. This problem is more critical if the network is deployed for some mission-critical applications, such as in a tactical battlefield. Random failure of nodes is also very likely in real-life depl...