You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
FLINS, originally an acronym for Fuzzy Logic and Intelligent Technologies in Nuclear Science, is now extended to Computational Intelligence for applied research. The contributions to the 11th of FLINS conference cover state-of-the-art research, development, and technology for computational intelligence systems, both from the foundations and the applications points-of-view.
The first English translation of one of the most authoritative and significant studies in the field of modern Chinese literature.
Meet five years ago and make the next promise! Five years later, when her mother was in critical condition and her family had cheated and sold themselves, she had no choice but to find the person she once was. As for him, who was in love with her, he didn't know that the truth had hurt her and eventually promised to turn into ashes. Her heart was broken and her love was gone. She had left for another country, and when she returned, she had lived a peaceful life.
This book constitutes the proceedings of the Third International Conference on Mathematics and Computing, ICMC 2017, held in Haldia, India, in January 2017. The 35 papers presented in this volume were carefully reviewed and selected from 129 submissions. They were organized in topical sections named: security and privacy; computing; applied mathematics; and pure mathematics.
This book constitutes the refereed proceedings of the 16th International Conference on Information Security Practice and Experience, ISPEC 2021, held in Nanjing, China, in December 2021. The 23 full papers presented in this volume were carefully reviewed and selected from 94 submissions. The conference focus on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from a total of 76 submissions. The papers in the volume cover a broad range of topics on security in Internet-of-things, Social Networks, User Authentication, Algorithm design, Artificial Intelligence, and Big Data.
Innovation studies have long been confined to the theoretical system established by the scholars of developed countries in the West. It is difficult to use these studies to understand the real nature and law of technological innovation in developing countries. This book, in an innovative manner, studies the theoretical system of secondary innovation, and reveals the evolution law and dynamic innovation mode of the activities carried out by technologically backward countries. It does so by laying an important foundation for the development of management science theory on the basis of the standpoint and characteristics of developing countries.
A critical evaluation of the latest reform in Chinese law that engages legal scholarship with research of Chinese legal historians.
So in this case, someone actually hired her as the general manager of an entertainment agency to control all the business of a company... Even if the company is just a new company that has not yet been established, their director is said to have He is a rich man who is not short of money... He wouldn't be like this, right? Therefore, in order to clear up the doubts of the suspicious Sister Bei, or perhaps to make Sister Bei agree with him, Director Xun simply told her the reason why he came to see her. "To put it simply, I have taken a fancy to your luck! This luck is really amazing to me!" With these words, you don't know whether Master Xun is praising or scolding you. "To be honest, my fam...