Listing 1 - 10 of 42 | << page >> |
Sort by
|
Choose an application
The Second International Symposium on Constitutive Modeling of Geomaterials: Advances and New Applications (IS-Model 2012), is to be held in Beijing, China, during October 15-16, 2012. The symposium is organized by Tsinghua University, the International Association for Computer Methods and Advances in Geomechanics (IACMAG), the Committee of Numerical and Physical Modeling of Rock Mass, Chinese Society for Rock Mechanics and Engineering, and the Committee of Constitutive Relations and Strength Theory, China Institution of Soil Mechanics and Geotechnical Engineering, China Civil Engineering Society. This Symposium follows the first successful International Workshop on Constitutive Modeling held in Hong Kong, which was organized by Prof. JH Yin in 2007. Constitutive modeling of geomaterials has been an active research area for a long period of time. Different approaches have been used in the development of various constitutive models. A number of models have been implemented in the numerical analyses of geotechnical structures. The objective of the symposium is to provide a forum for researchers and engineers working or interested in the area of constitutive modeling to meet together and share new ideas, achievements and experiences through presentations and discussions. Emphasis is placed on recent advances of constitutive modeling and its applications in both theoretic and experimental aspects. Six famous scholars have been invited for the plenary speeches of the symposiums. Some prominent scholars have been invited to organize four specialized workshops on hot topics, including “Time-dependent stress-strain behavior of geomaterials”, “Constitutive modeling within critical state soil mechanics”, “Multiscale and multiphysics in geomaterials”, and “Damage to failure in rock structures”. A total of 49 papers are included in the above topics. In addition, 51 papers are grouped under three topics covering “Behaviour of geomaterials”, “Constitutive model”, and “Applications”. The editors expect that the book can be helpful as a reference to all those in the field of constitutive modeling of geomaterials.
Foundations. --- Soil mechanics. --- Soils -- Mathematical models. --- Civil & Environmental Engineering --- Mechanical Engineering --- Engineering & Applied Sciences --- Civil Engineering --- Hydraulic Engineering --- Rock mechanics --- Soil mechanics --- Mathematical models. --- Engineering. --- Geotechnical engineering. --- Engineering geology. --- Engineering --- Hydraulics. --- Geoengineering, Foundations, Hydraulics. --- Geotechnical Engineering & Applied Earth Sciences. --- Geology. --- Hydraulic engineering. --- Engineering, Hydraulic --- Fluid mechanics --- Hydraulics --- Shore protection --- Engineering—Geology. --- Engineering, Geotechnical --- Geotechnics --- Geotechnology --- Engineering geology --- Flow of water --- Water --- Hydraulic engineering --- Jets --- Architecture --- Building --- Structural engineering --- Underground construction --- Caissons --- Earthwork --- Masonry --- Soil consolidation --- Walls --- Civil engineering --- Geology, Economic --- Flow --- Distribution --- Details --- Geology
Choose an application
Choose an application
Privacy-preserving computing aims to protect the personal information of users while capitalizing on the possibilities unlocked by big data. This practical introduction for students, researchers, and industry practitioners is the first cohesive and systematic presentation of the field's advances over four decades. The book shows how to use privacy-preserving computing in real-world problems in data analytics and AI, and includes applications in statistics, database queries, and machine learning. The book begins by introducing cryptographic techniques such as secret sharing, homomorphic encryption, and oblivious transfer, and then broadens its focus to more widely applicable techniques such as differential privacy, trusted execution environment, and federated learning. The book ends with privacy-preserving computing in practice in areas like finance, online advertising, and healthcare, and finally offers a vision for the future of the field.
Privacy-preserving techniques (Computer science) --- Computer security. --- Data privacy. --- Artificial intelligence. --- Information technology --- Privacy, Right of. --- Big data. --- Security measures.
Choose an application
Artificial intelligence --- Planning --- Congresses --- Data processing
Choose an application
What is it like to be a researcher or a scientist? For young people, including graduate students and junior faculty members in universities, how can they identify good ideas for research? How do they conduct solid research to verify and realize their new ideas? How can they formulate their ideas and research results into high-quality articles, and publish them in highly competitive journals and conferences? What are effective ways to supervise graduate students so that they can establish themselves quickly in their research careers? In this book, Ling and Yang answer these questions in a step-by-step manner with specific and concrete examples from their first-hand research experience. Table of Contents: Acknowledgments / Preface / Basics of Research / Goals of Ph.D. Research / Getting Started: Finding New Ideas and Organizing Your Plans / Conducting Solid Research / Writing and Publishing Papers / Misconceptions and Tips for Paper Writing / Writing and Defending a Ph.D. Thesis / Life After Ph.D. / Summary / References / Author Biographies.
Engineering design. --- Materials. --- Professional education. --- Vocational education. --- Engineering Design. --- Materials Engineering. --- Professional and Vocational Education.
Choose an application
Choose an application
"Smart Power Distribution Systems: Control, Communication, and Optimization explains how diverse technologies work to build and maintain smart grids around the globe. Yang, Yang and Li present the most recent advances in the control, communication and optimization of smart grids and provide unique insight into power system control, sensing and communication, and optimization technologies. The book covers control challenges for renewable energy and smart grids, communication in smart power systems, and optimization challenges in smart power system operations. Each area discussed focuses on the scientific innovations relating to the approaches, methods and algorithmic solutions presented."
Smart power grids. --- Grids, Smart power --- Power grids, Smart --- Smart grids (Electric power distribution) --- Electric power distribution --- Automation
Choose an application
Choose an application
This book provides a comprehensive and self-contained introduction to Federated Learning, ranging from the basic knowledge and theories to various key applications, and the privacy and incentive factors are the focus of the whole book. This book is timely needed since Federated Learning is getting popular after the release of the General Data Protection Regulation (GDPR). As Federated Learning aims to enable a machine model to be collaboratively trained without each party exposing private data to others. This setting adheres to regulatory requirements of data privacy protection such as GDPR. This book contains three main parts. First, it introduces different privacy-preserving methods for protecting a Federated Learning model against different types of attacks such as Data Leakage and/or Data Poisoning. Second, the book presents incentive mechanisms which aim to encourage individuals to participate in the Federated Learning ecosystems. Last but not the least, this book also describes how Federated Learning can be applied in industry and business to address data silo and privacy-preserving problems. The book is intended for readers from both academia and industries, who would like to learn federated learning from scratch, practice its implementation, and apply it in their own business. Readers are expected to have some basic understanding of linear algebra, calculus, and neural network. Additionally, domain knowledge in FinTech and marketing are preferred.
Artificial intelligence. --- Computer security. --- Computer communication systems. --- Application software. --- Artificial Intelligence. --- Systems and Data Security. --- Computer Communication Networks. --- Computer Applications. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Distributed processing --- Protection --- Security measures --- Federated database systems. --- Machine learning. --- Learning, Machine --- Artificial intelligence --- Database systems, Federated --- FDBSs (Federated database systems) --- Federated systems (Database management) --- Systems, Federated (Database management) --- Metadatabases --- Management
Choose an application
The Paci?c Rim International Conference on Arti?cial Intelligence (PRICAI) is one of the preeminent international conferences on arti?cial intelligence (AI). PRICAI 2006 (http://www.csse.monash.edu.au/pricai06/Header.htm) was the ninth in this series of biennial international conferences highlighting the most signi?cant contributions to the ?eld of AI. The conference was held during - gust 7-11, 2006, in the beautiful city of Guilin in Guangxi Province, China. As in previous years,this year's technical programsawvery high standards in both the submission and paper review process, resulting in an exciting program that re?ects the great variety and depth of modern AI research. This year's contributions coveredall traditional areas of AI, including machine learning and data mining, knowledge representation and planning, probabilistic reasoning, constraintsatisfaction,computervisionandautomatedagents,aswellasvarious exciting and innovative applications of AI to many di?erent areas. There was particularemphasis inthe areasof machinelearning anddata mining,intelligent agents, evolutionary computing and intelligent image and video analysis. The technical papers in this volume were selected from a record of 596 s- missions after a rigorous review process. Each submission was reviewed by at least three members of the PRICAI Program Committee, including at least two reviewers and one Vice Program Chair. Decisions were reached following d- cussions among the reviewers of each paper, and ?nalized in a highly selective process that balanced many aspects of a paper, including the signi?cance of the contribution and originality, technical quality and clarity of contributions, and relevance to the conference objectives.
Listing 1 - 10 of 42 | << page >> |
Sort by
|