You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The five-volume set LNCS 14355, 14356, 14357, 14358 and 14359 constitutes the refereed proceedings of the 12th International Conference on Image and Graphics, ICIG 2023, held in Nanjing, China, during September 22–24, 2023. The 166 papers presented in the proceedings set were carefully reviewed and selected from 409 submissions. They were organized in topical sections as follows: computer vision and pattern recognition; computer graphics and visualization; compression, transmission, retrieval; artificial intelligence; biological and medical image processing; color and multispectral processing; computational imaging; multi-view and stereoscopic processing; multimedia security; surveillance and remote sensing, and virtual reality. The ICIG 2023 is a biennial conference that focuses on innovative technologies of image, video and graphics processing and fostering innovation, entrepreneurship, and networking. It will feature world-class plenary speakers, exhibits, and high-quality peer reviewed oral and poster presentations.
None
Competing in the 1986 National College Games of the People's Republic of China, Susan Brownell earned both a gold medal in the heptathlon and fame throughout China as "the American girl who won glory for Beijing University." Now an anthropologist, Brownell draws on her direct experience of Chinese athletics in this fascinating look at the culture of sports and the body in China. Training the Body for China is the first book on Chinese sports based on extended fieldwork by a Westerner. Brownell introduces the notion of "body culture" to analyze Olympic sports as one element in a whole set of Chinese body practices: the "old people's disco dancing" craze, the new popularity of bodybuilding (fo...
This book brings together papers presented at the 2017 International Conference on Communications, Signal Processing, and Systems (ICCSP 2017), which was held on July 14–17, 2017 in Harbin, China. Presenting the latest developments and discussing the interactions and links between these multidisciplinary fields, the book spans topics ranging from communications, signal processing and systems. It is aimed at undergraduate and graduate electrical engineering, computer science and mathematics students, researchers and engineers from academia and industry as well as government employees.
The three-volume set CCIS 923, CCIS 924, and CCIS 925 constitutes the thoroughly refereed proceedings of the First International Conference on Intelligent Manufacturing and Internet of Things, and of the 5th International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2018, held in Chongqing, China, in September 2018.The 135 revised full papers presented were carefully reviewed and selected from over 385 submissions.The papers of this volume are organized in topical sections on: digital manufacturing; industrial product design; logistics, production and operation management; manufacturing material; manufacturing optimization; manufacturing process; mechanical transmission system; robotics.
Expands understandings of voice to and the poetics of gibberish showing how speech is fundamentally shaped by the complex dynamics of the mouth..
The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.
A beggar, an itinerant monk, leapt to greatness during a tumultuous epoch and went on to found the Ming Dynasty of China (1368--1644). As a destitute peasant with nothing to lose, he started a local rebellion; success built on success. Defeating local warlords, Zhu Yuan Zhang conquered all the southern part of China, then sent his army north and took the rest. By unifying many Chinese lands, he brought peace and prosperity after a long period of tumult. He is honored with the temple name of Ming Taizu, Grand Ancestor of Ming.
This book offers an on-the-ground view of colonial Calcutta's neighbourhoods, where kinship-like ties shaped urban space and resisted city-making efforts of the state.
This book constitutes the refereed proceedings of the 4th International Conference on Applied Cryptography and Network Security, ACNS 2006, held in Singapore in June 2006. Book presents 33 revised full papers, organized in topical sections on intrusion detection and avoidance, cryptographic applications, DoS attacks and countermeasures, key management, cryptanalysis, security of limited devices, cryptography, authentication and Web security, ad-hoc and sensor network security, cryptographic constructions, and security and privacy.