🍂 Autumn reading time! Let our AI Librarian find your perfect cozy read 🫖
Explore the literary world of this author
...
Mechanical and Thermal Energies
Waste Energy Harvesting overviews the latest progress in waste energy harvesting technologies, with specific focusing on waste thermal mechanical ener...
Traffic Measurement on the Internet presents several novel online measurement methods that are compact and fast. Traffic measurement provides critical...
The neutrosophic set and linguistic term set are widely applied in recently years. Motivated by the advantages of them, we combine the multi-valued ne...
A Corpus-Based Study of Chinese Political Discourse in English Translation
This book is a valuable resource for those involved in translation studies and discourse analysis. Drawing on a corpus-based approach and a combined f...
RFID (radio frequency identification) tags are becoming ubiquitously available in object tracking, access control, and toll payment. The current appli...
This book offers a comprehensive introduction to Subdivision Surface Modeling Technology focusing not only on fundamental theories but also on practic...
The third essay studies how the margin requirements on stock holdings affect the equilibrium. Especially, we characterize how the volatility of stock ...
Presents a phrase book for the Cantonese Chinese language, with a two way dictionary covering two thousand words....
Lonely Planet's Cantonese Phrasebook & Dictionary is your handy passport to culturally enriching travels with the most relevant and useful Cantonese p...
•Two-way dictionary •Guide to pronunciation and phrase-building •Fail-safe guide to etiquette and small talk •Practicalities - how to catch a ...
Algorithms and Applications
Event mining encompasses techniques for automatically and efficiently extracting valuable knowledge from historical event/log data. The field, therefo...
Chat with locals along the Great Wall, ask for recommendations of Hong Kong’s best night spots, and order local delicacies like a pro; all with your...
Two Approaches for the U.S. Department of Defense
The Defense Department increasingly relies on electric power to accomplish critical missions. This report explores two approaches for deterring attack...
The authors identify opportunities to improve policy on technical data, data rights, and intellectual property associated with operating and sustainin...
Abstract: Objective To investigate the distribution of somatic symptom disorder (SSD) and bodily distress syndrome (BDS) and analyze the differences i...
The Air Force needs better access to contractors? technical data to sustain core military aircraft assets and subsystems. For this to happen, the U.S....
Corporate Governance Meets Data and Technology explores this intersection through three main themes: the impact of big data on information asymmetry, ...