You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Recent studies have shown that novel processing and modeling techniques may be used to create patient-specific prostheses, artificial tissues, and other implants using data obtained from magnetic resonance imaging, computed tomography, or other imaging techniques. For example, customized prostheses may be fabricated that possess suitable features, including geometry, size, and weight, for a given medical condition. Many advances have been made in the development of patient-specific implants in the past decade, yet this information is not readily available to scientists and students. Printed Biomaterials: Novel Processing and Modeling Techniques for Medicine and Surgery provides the biomateri...
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2012, held in Beijing, China, in May/June 2012. The 92 revised full papers presented were carefully reviewed and selected from 278 papers. The topics covered are architecture for trusted computing systems, trusted computing platform, trusted systems build, network and protocol security, mobile network security, network survivability and other critical theories and standard systems, credible assessment, credible measurement and metrics, trusted systems, trusted networks, trusted mobile network, trusted routing, trusted software, trusted operating systems, trusted storage, fault-tolerant computing and other key technologies, trusted e-commerce and e-government, trusted logistics, trusted internet of things, trusted cloud and other trusted services and applications.
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building; network and protocol security; mobile network security; network survivability, other critical theories and standard systems; credible assessment; credible measurement and metrics; trusted systems; trusted networks; trusted mobile networks; trusted routing; trusted software; trusted operating systems; trusted storage; fault-tolerant computing and other key technologies; trusted e-commerce and e-government; trusted logistics; trusted internet of things; trusted cloud and other trusted services and applications.
This companion is a cutting-edge primer to critical forms of the posthumanities and the feminist posthumanities, aimed at students and researchers who want to catch up with the recent theoretical developments in various fields in the humanities, such as new media studies, gender studies, cultural studies, science and technology studies, human animal studies, postcolonial critique, philosophy and environmental humanities. It contains a collection of nineteen new and original short chapters introducing influential concepts, ideas and approaches that have shaped and developed new materialism, inhuman theory, critical posthumanism, feminist materialism, and posthuman philosophy. A resource for students and teachers, this comprehensive volume brings together established international scholars and emerging theorists, for timely and astute definitions of a moving target – posthuman humanities and feminist posthumanities.
Qinjiagou Commune Medical Station in the suburbs of Beijing. Li Donglai opened the cotton curtain, and the biting cold wind penetrated into the house through the cracks. The prescription notes on the table in the house were flying.
The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, web intelligence, etc. As such, it offers readers a valuable and unique resource.
This volume constitutes the refereed proceedings of the Fourth European Conference, ServiceWave 2011, held in Poznan, Poland, in October 2011. The 25 revised full papers presented together with 3 invited presentations were carefully reviewed and selected from numerous submissions. They are organized in topical sections on cloud computing, security, privacy and trust, service engineering fundamentals, business services, and FI-PPP. In addition to the scientific track, 14 extended abstracts of demonstrations covering a wide spectrum of technology and application domains were accepted.
Without the slightest hesitation, Wang Haoxuan waved his sword, and a green sword fern roared out, cutting thousands of inferno soldiers who had no time to dodge into two!
Regenerative Medicine Applications in Organ Transplantation illustrates exactly how these two fields are coming together and can benefit one another. It discusses technologies being developed, methods being implemented, and which of these are the most promising. The text encompasses tissue engineering, biomaterial sciences, stem cell biology, and developmental biology, all from a transplant perspective. Organ systems considered include liver, renal, intestinal, pancreatic, and more. Leaders from both fields have contributed chapters, clearly illustrating that regenerative medicine and solid organ transplantation speak the same language and that both aim for similar medical outcomes. The over...
CSIE 2011 is an international scientific Congress for distinguished scholars engaged in scientific, engineering and technological research, dedicated to build a platform for exploring and discussing the future of Computer Science and Information Engineering with existing and potential application scenarios. The congress has been held twice, in Los Angeles, USA for the first and in Changchun, China for the second time, each of which attracted a large number of researchers from all over the world. The congress turns out to develop a spirit of cooperation that leads to new friendship for addressing a wide variety of ongoing problems in this vibrant area of technology and fostering more collaboration over the world. The congress, CSIE 2011, received 2483 full paper and abstract submissions from 27 countries and regions over the world. Through a rigorous peer review process, all submissions were refereed based on their quality of content, level of innovation, significance, originality and legibility. 688 papers have been accepted for the international congress proceedings ultimately.