Listing 1 - 10 of 16 | << page >> |
Sort by
|
Choose an application
Ultra-high-pressure technology has been taking the sterilization and inactivation of agricultural products and food as core research and application fields since its birth. This book first outlines the basic principles of ultra-high pressure and then introduces non-traditional applications of the ultra-high-pressure technology in agricultural products such as Baijiu (the Chinese liquor), brown rice, and wood. These applications were discovered by the author, as well as the representative quality improvements of treatment objects brought by these applications. Finally, the author puts forward his own ideas on the non-traditional application trend of ultra-high-pressure technology in the future. This book aims to broaden the thinking for the application and research of ultra-high-pressure technology in agricultural product processing and propose specific ideas for future research and application in this field on the basis of the author’s current research.
Biochemical engineering. --- Manufactures. --- Biomaterials. --- Agriculture. --- Bioprocess Engineering. --- Machines, Tools, Processes. --- Plant Materials. --- Farming --- Husbandry --- Industrial arts --- Life sciences --- Food supply --- Land use, Rural --- Manufactured goods --- Manufactured products --- Products --- Products, Manufactured --- Commercial products --- Manufacturing industries --- Bio-process engineering --- Bioprocess engineering --- Biochemistry --- Biotechnology --- Chemical engineering
Choose an application
Choose an application
This book highlights novel research work done on cold atom-based quantum networks. Given that one of the main challenges in building the quantum network is the limited entanglement distribution distance, this book presents some state-of-the-art experiments in tackling this challenge and, for the first time, establishes entanglement between quantum memories via metropolitan-scale fiber transmission. This achievement is accomplished by cooperating high-efficiency cold quantum memories, low-loss quantum frequency conversion modules, and long-fiber phase-locking techniques. In the book, the scheme design, experimental setup, data analyses, and numerous technical details are given. Therefore, it suits a broad readership that includes all students, researchers, and technicians who work in quantum information sciences.
Quantum mechanics. Quantumfield theory --- quantumfysica --- Quantum computing. --- Quantum entanglement.
Choose an application
Ultra-high-pressure technology has been taking the sterilization and inactivation of agricultural products and food as core research and application fields since its birth. This book first outlines the basic principles of ultra-high pressure and then introduces non-traditional applications of the ultra-high-pressure technology in agricultural products such as Baijiu (the Chinese liquor), brown rice, and wood. These applications were discovered by the author, as well as the representative quality improvements of treatment objects brought by these applications. Finally, the author puts forward his own ideas on the non-traditional application trend of ultra-high-pressure technology in the future. This book aims to broaden the thinking for the application and research of ultra-high-pressure technology in agricultural product processing and propose specific ideas for future research and application in this field on the basis of the author's current research.
General biophysics --- Applied physical engineering --- Agriculture. Animal husbandry. Hunting. Fishery --- Biochemical engineering --- biologische materialen --- fabrieken --- bio-engineering --- biochemie --- landbouw
Choose an application
Choose an application
Forecasting is a crucial function for companies in the fashion industry, but for many real-life forecasting applications, the data patterns are notorious for being highly volatile and it is very difficult, if not impossible, to analytically learn about the underlying patterns. As a result, many traditional methods (such as pure statistical models) will fail to make a sound prediction. Over the past decade, advances in artificial intelligence and computing technologies have provided an alternative way of generating precise and accurate forecasting results for fashion businesses. Despite being an important and timely topic, there is currently an absence of a comprehensive reference source that provides up-to-date theoretical and applied research findings on the subject of intelligent fashion forecasting systems. This three-part handbook fulfills this need and covers materials ranging from introductory studies and technical reviews, theoretical modeling research, to intelligent fashion forecasting applications and analysis. This book is suitable for academic researchers, graduate students, senior undergraduate students and practitioners who are interested in the latest research on fashion forecasting.
Fashion --- Management information systems. --- Forecasting. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Business. --- Production management. --- Information technology. --- Business --- Business and Management. --- IT in Business. --- Information Systems Applications (incl. Internet). --- Operations Management. --- Data processing. --- Sociotechnical systems --- Information resources management --- Management --- Forecasting --- Communication systems --- Manufacturing management --- Industrial management --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Business—Data processing. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
Pragmatics --- East Asia --- Linguistics --- Semantics (Philosophy) --- Pragmatique --- Pragmatics. --- Pragmalinguistics --- General semantics --- Language and languages --- Logic, Symbolic and mathematical --- Intension (Philosophy) --- Logical semantics --- Semantics (Logic) --- Semeiotics --- Significs --- Syntactics --- Unified science --- Logical positivism --- Meaning (Psychology) --- Philosophy, Modern --- Semiotics --- Signs and symbols --- Symbolism --- Analysis (Philosophy) --- Definition (Philosophy) --- Philosophy --- Linguistics. --- Linguistic science --- Science of language
Choose an application
This book constitutes the refereed proceedings of the 11th International Conference on Provable Security, ProvSec 2017, held in Xi'an, China, in October 2017. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 76 submissions. The papers are grouped in topical sections on secure cloud storage and computing; digital signature and authentication; authenticated encryption and key exchange; security models; lattice and post-quantum cryptography; public key encryption and signcryption; proxy re-encryption and functional encryption; protocols. .
Computer science. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Application software. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computers and Society. --- Computer Appl. in Administrative Data Processing. --- Management of Computing and Information Systems. --- Algorithm Analysis and Problem Complexity. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Civilization and computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Algorism --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Sociotechnical systems --- Information resources management --- Management --- Civilization --- Computer software --- Algebra --- Arithmetic --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Communication systems --- Foundations --- Information systems. --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Data encryption (Computer science)
Choose an application
This book constitutes the proceedings of the Second International Conference on Frontiers in Cyber Security, FCS 2019, held in Xi'an, China, in November 2019. The 20 full papers along with the 2 short papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on: symmetric key cryptography; public key cryptography; post-quantum cryptography: signature; attack and behavior detection; authenticated key agreement; blockchain; system and network security.
Computer security. --- Data protection. --- Software engineering. --- Application software. --- Computer communication systems. --- Systems and Data Security. --- Security. --- Software Engineering. --- Information Systems Applications (incl. Internet). --- Computer Communication Networks. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer software engineering --- Engineering --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Distributed processing --- Protection --- Security measures --- Computer security --- Internet --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web
Choose an application
This book constitutes the refereed proceedings of the fourth Asian Semantic Web Conference, ASWC 2009, held in Shanghai, China, in December 2009. The 35 revised full papers presented were carefully reviewed and selected from 63 submissions. These submissions cover a broad range of topics including, query languages and optimization, rule and logics, scalable reasoning, semantic content generation, database and semantics, semantic web services, eSemantics (e.g., e-Business, e-Science, e-Learning, e-Culture, e-Health), social web and semantics, semantic graph mining, security for semantic web, ontology modeling, ontology management, to name a few.
Listing 1 - 10 of 16 | << page >> |
Sort by
|