This book systematically analyzes how and why China has expectedly lost and then surprisingly gained ground in the quest to solve the complicated environmental problem of air pollution over the past two decades. Yuan Xu shines a light on how China’s sulfur dioxide emissions rose quickly in tandem with rapid economic growth but then dropped to a level not seen for at least four decades. Des…
"In Writing Pirates, Yuanfei Wang connects Chinese literary production to emerging discourses of pirates and the sea. In the late Ming dynasty, so-called “Japanese pirates” raided southeast coastal China. Hideyoshi invaded Korea. Europeans sailed for overseas territories, and Chinese maritime merchants and emigrants founded diaspora communities in Southeast Asia. Travel writings, histories,…
This book includes results of the seventh International Conference on Fuzzy Information and Engineering (ICFIE'2014) and the 1st International Conference of Operations Research and Management (ICORM'2014) on November 7-11, 2014 in ZhuHai, China. The book, contains 35 selected high-quality papers, and is divided into five main parts: Part I focuses on Fuzzy Systems and Its Applications",…
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by…
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of…
This book enables readers to design effective ESD protection solutions for all mainstream RF fabrication processes (GaAs pHEMT, SiGe HBT, CMOS). The new techniques introduced by the authors have much higher protection levels and much lower parasitic effects than those of existing ESD protection devices. The authors describe in detail the ESD phenomenon, as well as ESD protection fundamentals, s…
This volume constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2015, Ontologies, Databases, and Applications of Semantics, ODBASE 2015, and Cloud and Trusted Computing, C&TC, held as part of OTM 2015 in October 2015 in Rhodes, Greece. The 30 full papers presented together with 15 short papers were carefully reviewed and s…
This book contains two review articles on nonlinear data assimilation that deal with closely related topics but were written and can be read independently. Both contributions focus on so-called particle filters. The first contribution by Jan van Leeuwen focuses on the potential of proposal densities. It discusses the issues with present-day particle filters and explorers new ideas for proposal…
The subject of this book is CMOS RF circuit design for reliability. The device reliability and process variation issues on RF transmitter and receiver circuits will be particular interest to the readers in the field of semiconductor devices and circuits. This proposed book is unique to explore typical reliability issues in the device and technology level and then to examine their impact on RF w…
The Annual Report objectively reflects the year’s developments in terms of politics, the economy, society, culture, the environment, innovation and reform, and describes the problems, challenges and countermeasures in both traditional and new special economic zones. It provides an analysis of China’s special economic zones, including a review of the year’s developments in the form of expe…