Listing 1 - 9 of 9 |
Sort by
|
Choose an application
Plant cells house highly dynamic cytoskeletal networks of microtubules and actin microfilaments. They constantly undergo remodeling to fulfill their roles in supporting cell division, enlargement, and differentiation. Following early studies on structural aspects of the networks, recent breakthroughs have connected them with more and more intracellular events essential for plant growth and development. Advanced technologies in cell biology (live-cell imaging in particular), molecular genetics, genomics, and proteomics have revolutionized this field of study. Stories summarized in this book may inspire enthusiastic scientists to pursue new directions toward understanding functions of the plant cytoskeleton. The Plant Cytoskeleton is divided into three sections: 1) Molecular Basis of the Plant Cytoskeleton; 2) Cytoskeletal Reorganization in Plant Cell Division; and 3) The Cytoskeleton in Plant Growth and Development. This book is aimed at serving as a resource for anyone who wishes to learn about the plant cytoskeleton beyond ordinary textbooks. Bo Liu is professor in the Department of Plant Biology at the University of California in Davis, California. He received his B.S. degree in cell biology and genetics and M.S. degree in cell biology from Peking University in Beijing, China, and Ph.D. degree in botany from the University of Georgia in Athens, Georgia. Research in his laboratory is focused on studying the cytoskeletal basis of intracellular motility in flowering plants and filamentous fungi.
Plant cytoskeleton. --- Plant physiology. --- Botany --- Plants --- Physiology --- Life sciences. --- Plant science. --- Botany. --- Plant anatomy. --- Plant development. --- Plant genetics. --- Life Sciences. --- Plant Sciences. --- Plant Anatomy/Development. --- Plant Genetics & Genomics. --- Cytoskeleton --- Plant cells and tissues --- Plant Genetics and Genomics. --- Genetics --- Plant structure --- Structural botany --- Vegetable anatomy --- Anatomy --- Botanical science --- Phytobiology --- Phytography --- Phytology --- Plant biology --- Plant science --- Biology --- Natural history --- Structure --- Development of plants --- Plant development --- Developmental biology --- Growth (Plants) --- Ontogeny --- Floristic botany
Choose an application
"Molecular Dynamic Simulation: Fundamentals and Applications explains the basic principles of MD simulation and explores its recent developments and roles in advanced modeling approaches. The implementation of MD simulation and its application to various aspects of materials science and engineering including mechanical, thermal, mass transportation, and physical/chemical reaction problems are illustrated. Innovative modeling techniques that apply MD to explore the mechanics of typical nanomaterials and nanostructures and to characterize crystalline, amorphous, and liquid systems are also presented."--
Molecular dynamics --- Simulation methods. --- Dynamics --- Dynamics, Molecular --- Molecular dynamics.
Choose an application
The aim of this project is to produce the world’s most comprehensive reference in plant sciences. The Plant Sciences will be published both in print and online; the online text will be regularly updated to enable the reference to remain a useful authoritative resource for decades to come. The aim is to provide a sustainable superstructure on which can be built further volumes as plant science evolves. The first edition will contain ten volumes, with approximately 20-30 chapters per volume. The target audience for the initial ten volumes will be upper-division undergraduates, as well as graduate students and practitioners looking for an entry into a particular topic. The Encyclopedia will provide both background and essential information in plant biology. Topics will include plant genetics, genomics, biochemistry, natural products, proteins, cell biology, development, reproduction, physiology, ecology, evolution, systematics, biodiversity, and applications, including crop improvement and non-food applications. .
Plant genetics. --- Plant biochemistry. --- Plant science. --- Botany. --- Plant anatomy. --- Plant development. --- Plant pathology. --- Botanical chemistry. --- Plants --- Plant diseases. --- Development.
Choose an application
Computational intelligence techniques are becoming more and more important for automated problem solving nowadays. Due to the growing complexity of industrial applications and the increasingly tight time-to-market requirements, the time available for thorough problem analysis and development of tailored solution methods is decreasing. There is no doubt that this trend will continue in the foreseeable future. Hence, it is not surprising that robust and general automated problem solving methods with satisfactory performance are needed.
Engineering. --- Artificial intelligence. --- Computational Intelligence. --- Artificial Intelligence (incl. Robotics). --- Engineering & Applied Sciences --- Computer Science --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Construction --- Electronic circuit design --- Integrated circuits --- Computational intelligence. --- Data processing. --- Computer-aided design. --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Artificial Intelligence. --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Industrial arts --- Technology --- Computational intelligence --- Electronic circuits --- Automation --- Design
Choose an application
This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions, attacks and adversaries, location privacy protection methods, location privacy metrics, and location-based mobile applications. In addition, it analyses the relationships between the various elements of location privacy, and elaborates on real-world attacks in a specific application. Furthermore, the book features case studies of three applications and shares valuable insights into future research directions. Shedding new light on key research issues in location privacy and promoting the advance and development of future location-based mobile applications, it will be of interest to a broad readership, from students to researchers and engineers in the field.
Human rights --- Computer architecture. Operating systems --- Computer. Automation --- GSM (global system for mobile communications) --- informatica --- privacy --- computerbeveiliging --- Computer security. --- Mobile computing. --- Privacy. --- Systems and Data Security. --- Mobile Computing. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Electronic data processing --- Context-aware computing --- Portable computers --- Protection --- Security measures
Choose an application
This book provides state-of-the-art Face De-Identification techniques and privacy protection methods, while highlighting the challenges faced in safeguarding personal information. It presents three innovative image privacy protection approaches, including differential private k-anonymity, identity differential privacy guarantee and personalized and invertible Face De-Identification. In addition, the authors propose a novel architecture for reversible Face Video De-Identification, which utilizes deep motion flow to ensure seamless privacy protection across video frames. This book is a compelling exploration of the rapidly evolving field of Face De-Identification and privacy protection in the age of advanced AI-based face recognition technology and pervasive surveillance. This insightful book embarks readers on a journey through the intricate landscape of facial recognition, artificial intelligence, social network and the challenges posed by the digital footprint left behind by individuals in their daily lives. The authors also explore emerging trends in privacy protection and discuss future research directions. Researchers working in computer science, artificial intelligence, machine learning, data privacy and cybersecurity as well as advanced-level students majoring in computers science will find this book useful as reference or secondary text. Professionals working in the fields of biometrics, data security, software development and facial recognition technology as well as policymakers and government officials will also want to purchase this book. .
Human rights --- Mathematical statistics --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- patroonherkenning --- factoranalyse --- privacy --- computerbeveiliging --- AI (artificiële intelligentie) --- Pattern recognition systems. --- Data protection --- Artificial intelligence. --- Automated Pattern Recognition. --- Privacy. --- Artificial Intelligence. --- Law and legislation.
Choose an application
This book constitutes the refereed proceedings at PAKDD Workshops 2013, affiliated with the 17th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) held in Gold Coast, Australia in April 2013. The 47 revised full papers presented were carefully reviewed and selected from 92 submissions. The workshops affiliated with PAKDD 2013 include: Data Mining Applications in Industry and Government (DMApps), Data Analytics for Targeted Healthcare (DANTH), Quality Issues, Measures of Interestingness and Evaluation of Data Mining Models (QIMIE), Biologically Inspired Techniques for Data Mining (BDM), Constraint Discovery and Application (CDA), Cloud Service Discovery (CloudSD).
Engineering & Applied Sciences --- Computer Science --- Computer science. --- Health informatics. --- Data mining. --- Information storage and retrieval. --- Artificial intelligence. --- Computer Science. --- Data Mining and Knowledge Discovery. --- Artificial Intelligence (incl. Robotics). --- Health Informatics. --- Information Storage and Retrieval. --- Information Systems Applications (incl. Internet). --- Database management --- Database searching --- Data mining --- Medical records --- Information storage and retrieva. --- Artificial Intelligence. --- Data processing. --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- EHR systems --- EHR technology --- EHRs (Electronic health records) --- Electronic health records --- Electronic medical records --- EMR systems --- EMRs (Electronic medical records) --- Information storage and retrieval systems --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Medical care --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Clinical informatics --- Health informatics --- Medical information science --- Information science --- Medicine --- Data processing
Choose an application
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book. In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world. The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks. This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.
Data protection. --- Computer communication systems. --- Electrical engineering. --- Security. --- Computer Communication Networks. --- Communications Engineering, Networks. --- Electric engineering --- Engineering --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing
Choose an application
This conference proceedings is a collection of the accepted papers of ISCC2023 - the 7th International Conference on Information Science, Communication and Computing held in Chongqing, China, 2-5 June 2023. The topics focus on intelligent information science and technology, artificial intelligence and intelligent systems, cloud computing and big data, smart computing and communication technology, wireless network, and cyber security. Each part can be used as an excellent reference by industry practitioners, university faculties, research fellows, and undergraduate and graduate students who need to build a knowledge base of the latest advances and state of the practice in the topics covered by this conference proceedings. This will enable them to build, maintain and manage systems of high reliability and complexity. We would like to thank the authors for their hard work and dedication, and the reviewers for ensuring that only the highest quality papers were selected.
Listing 1 - 9 of 9 |
Sort by
|