Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Profiting from Innovation in China
Profiting from Innovation in China

China is dramatically catching up and is rapidly becoming a leading technological innovator on the global scale. The number of Chinese firms with global ambitions is growing fast, more and more technological innovation is coming from China, and the number of patents in China is also growing steadily. The negative side of this development is...

Progress on Cryptography: 25 Years of Cryptography in China
Progress on Cryptography: 25 Years of Cryptography in China
This workshop entitled “Progress on Cryptography: 25 Year of Cryptography in China” is being held during the celebration of Professor Guozhen Xiao’s 70th birthday. This proceeding is a birthday gift from all of his current and former graduate students, who have had the pleasure of being supervised by Professor Xiao during the last...
Tea: Bioactivity and Therapeutic Potential (Medicinal and Aromatic Plants - Industrial Profiles)
Tea: Bioactivity and Therapeutic Potential (Medicinal and Aromatic Plants - Industrial Profiles)

The tea plant, Camellia sinensis, is of particular importance to humans, and the consumption of tea has a long history of over 2000 years. Currently, tea is one of the most popular beverages worldwide. In recent years the subject of tea has attracted a great deal of attention. As well as the use of tea in traditional medicine, modern...

Information Security and Cryptology: 5th International Conference, Inscrypt 2009
Information Security and Cryptology: 5th International Conference, Inscrypt 2009

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are...

Molecular Pharmacognosy
Molecular Pharmacognosy

"Molecular Pharmacognosy” discusses the application of molecular biology in resource science and authentication of traditional Chinese medicine (TCM). This book reviews the latest developments in pharmacognosy, introduces a series of new views and insights, presents the hotspots and focus of the field of study on molecular...

The Internet of Things in the Cloud: A Middleware Perspective
The Internet of Things in the Cloud: A Middleware Perspective

Although the Internet of Things (IoT) is a vast and dynamic territory that is evolving rapidly, there has been a need for a book that offers a holistic view of the technologies and applications of the entire IoT spectrum. Filling this void, The Internet of Things in the Cloud: A Middleware Perspective provides a comprehensive...

Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems
Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems
In the last decade there has been a phenomenal growth in interest in crime pattern analysis. Geographic information systems are now widely used in urban police agencies throughout industrial nations. With this, scholarly interest in understanding crime patterns has grown considerably.

Artificial Crime Analysis Systems: Using Computer...

Bilingual Education and Minority Language Maintenance in China: The Role of Schools in Saving the Yi Language (Multilingual Education (31))
Bilingual Education and Minority Language Maintenance in China: The Role of Schools in Saving the Yi Language (Multilingual Education (31))
This book looks closely at Yi bilingual education practice in the southwest of China from an educationalist’s perspective and, in doing so, provides an insight toward our understanding of minority language maintenance and bilingual education implementation in China. The book provides an overview on the Yi people since 1949, their history,...
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g....
The Treatment of Modern Western Diseases With Chinese Medicine: A Textbook & Clinical Manual: A Textbook and Clinical Manual
The Treatment of Modern Western Diseases With Chinese Medicine: A Textbook & Clinical Manual: A Textbook and Clinical Manual

The book covers acupuncture and Chinese herbal treatment of more than 65 modern Western diseases, many of which have never been discussed in the Chinese medical literature. A partial listing of some of the diseases covered include: allergic rhinitis; amyotrophic lateral sclerosis; Alzheimers disease; benign prostatic hypertrophy; bronchial...

The Treatment of Disease in Tcm V6 : Diseases of the Urogenital System & Proctology
The Treatment of Disease in Tcm V6 : Diseases of the Urogenital System & Proctology

This book is the sixth volume in this series on the clinical practice of medicine. In it, students and practitioners will find the disease causes and mechanisms, patterns, acupuncture, and Chinese herbal treatment of three dozen or more diseases affecting the urogenital system and lower gastrointestinal tract. It includes an amazingly wide...

UNIX Operating System (The Development Tutorial via UNIX Kernel Services, English Edition) (Chinese Edition)
UNIX Operating System (The Development Tutorial via UNIX Kernel Services, English Edition) (Chinese Edition)

UNIX operating system, which is a source code operating system, is widely used in the application area of enterprise-level industries and in the embedded devices. This book comprehensively and systematically introduces the development and management principles of UNIX operating system, core services, Shell, computer networking and...

unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy