You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
With the dramatic development of air-space-ground-sea environmental monitoring networks and large-scale high-resolution Earth simulators, Environmental science is facing opportunities and challenges of big data. Environmental Data Analysis focuses on state-of-the-art models and methods for big environmental data and demonstrates their applications through various case studies in the real world. It covers the comprehensive range of topics in data analysis in space, time and spectral domains, including linear and nonlinear environmental systems, feature extraction models, data envelopment analysis, risk assessments, and life cycle assessments. The 2nd Edition adds emerging network models, including neural networks, complex networks, downscaling analysis and streaming data on network. This book is a concise and self-contained work with enormous amount of information. It is a must-read for environmental scientists who struggle to conduct big data mining and data scientists who try to find the way into environmental science.
This edited book gives a general overview on current research, focusing on geoenvironmental issues and challenges in hydrogeosciences in model regions in Asia, Europe, and America, with a focus on the Middle East and Mediterranean region and surrounding areas. This proceedings book is based on the accepted papers for oral/poster presentations at the 2nd Springer Conference of the Arabian Journal of Geosciences (CAJG-2), Tunisia 2019. It offers a broad range of recent studies that discuss the latest advances in geoenvironmental and hydrogeosciences from diverse backgrounds including climate change, geoecology, biogeochemistry, water resources management, and environmental monitoring and asses...
The three volume set LNCS 8226, LNCS 8227 and LNCS 8228 constitutes the proceedings of the 20th International Conference on Neural Information Processing, ICONIP 2013, held in Daegu, Korea, in November 2013. The 180 full and 75 poster papers presented together with 4 extended abstracts were carefully reviewed and selected from numerous submissions. These papers cover all major topics of theoretical research, empirical study and applications of neural information processing research. The specific topics covered are as follows: cognitive science and artificial intelligence; learning theory, algorithms and architectures; computational neuroscience and brain imaging; vision, speech and signal processing; control, robotics and hardware technologies and novel approaches and applications.
This two-volume set of LNCS 12836 and LNCS 12837 constitutes - in conjunction with the volume LNAI 12838 - the refereed proceedings of the 17th International Conference on Intelligent Computing, ICIC 2021, held in Shenzhen, China in August 2021. The 192 full papers of the three proceedings volumes were carefully reviewed and selected from 458 submissions. The ICIC theme unifies the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. The theme for this conference is “Advanced Intelligent Computing Methodologies and Applications.” The papers are organized in the following subsections: Artificial Intelligence in Real World Applications, Biomedical Informatics Theory and Methods, Complex Diseases Informatics, Gene Regulation Modeling and Analysis, Intelligent Computing in Computational Biology, and Protein Structure and Function Prediction.
Emerging technologies and products such as digital health technology, computing platforms, wearable devices, smartphone sensors and electronic gadgets have the potential to transform and empower society while simultaneously presenting unprecedented challenges in our life. Some like electronic cigarettes (e-cigarettes) are for entertainment, some like online conference platforms are for convenience and some like social media have become a life necessity. However, there is an ongoing debate about whether the use of physical and virtual digital technology products can do harm to mental health. Some evidence-based research shows that frequent use of social media may cause depression and anxiety, and derived behavioral phenomena like cyberbullying and game addiction, which negatively affect people’s lives. Other scholars think digital technology products could provide insights into timely, personalized, engaging and accessible intervention, promotion and improvement of mental health. Given the ubiquity of digital devices and their complex and subtle associations with mental health, more research is needed to bring benefits to both research and daily life practices.
The two-volume set LNCS 8325 and 8326 constitutes the thoroughly refereed proceedings of the 20th Anniversary International Conference on Multimedia Modeling, MMM 2014, held in Dublin, Ireland, in January 2014. The 46 revised regular papers, 11 short papers and 9 demonstration papers were carefully reviewed and selected from 176 submissions. 28 special session papers and 6 papers from Video Browser Showdown workshop are also included in the proceedings. The papers included in these two volumes cover a diverse range of topics including: applications of multimedia modelling, interactive retrieval, image and video collections, 3D and augmented reality, temporal analysis of multimedia content, compression and streaming. Special session papers cover the following topics: Mediadrom: artful post-TV scenarios, MM analysis for surveillance video and security applications, 3D multimedia computing and modeling, social geo-media analytics and retrieval, multimedia hyperlinking and retrieval.
Cyber-physical systems are a crucial part of modern automation applications. These systems are widespread across the production industry and critical infrastructures where a high degree of security, reliability and availability is required. This work investigates possible defense mechanisms against attacks on cyber-physical systems modeled by networked discrete event systems. Based on a threat assessment, attack prevention, attack detection and localization, and attack recovery methods are proposed. The cyber attacks under consideration are stealthy attacks that actively hide their influence and are not detectable by conventional anomaly detection schemes. The attack prevention is based on a controller encryption scheme exploiting the use of homomorphic encryption. The attack detection and localization are realized by introducing unexpected behavior into the transmitted signals and analyzing the timing behavior. The attack recovery reconfigures the controller based on the information gained from the attack localization and Monte-Carlo Tree Search.
The objective of GCN 2011 is to facilitate an exchange of information on best practices for the latest research advances in the area of green communications and networks, which mainly includes the intelligent control, or efficient management, or optimal design of access network infrastructures, home networks, terminal equipment, and etc. Topics of interests include network design methodology, enabling technologies, network components and devices, applications, others and emerging new topics.
In this volume, Lipman and Harrell explore the prevalence and ubiquity of violence in China, a society whose official norms value harmony and condemn conflict. The book investigates violence in a wide variety of situations through the sweep of history and in contexts ranging from the family to the national polity. The book explores motivations for violence from both a historical and a contemporary perspective. Historically, the authors cover bloody religious rebellions in premodern times, the depiction of violence in traditional popular novels, ethnic strife between Muslims and Han Chinese in the Northwest, and feuding local communities in the Southeast. Modern China is depicted by analyses of rural and urban violence in Maos Cultural Revolution and an examination of continuing domestic violence. This depiction of the cultural themes and motivations for violence allow lessons drawn from specific contexts to be applied to the nature of Chinese culture in general.