2Nd International Symposium on Application of Materials Science and Energy Materials
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
1. Adaptive Moving Shadows Detection Using Local Neighboring
www.engineeringvillage.com Citation results: 500 Downloaded: 3/5/2018 1. Adaptive moving shadows detection using local neighboring information Wang, Bingshu (School of Electronic and Computer Engineering, Shenzhen Graduate School of Peking University, Shenzhen, China); Yuan, Yule; Zhao, Yong; Zou, Wenbin Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 10117 LNCS, p 521-535, 2017, Computer Vision - ACCV 2016 Workshops, ACCV 2016 International Workshops, Revised Selected Papers Database: Compendex Compilation and indexing terms, Copyright 2018 Elsevier Inc. Data Provider: Engineering Village 2. Matrix completion based direction-of-Arrival estimation in nonuniform noise Liao, Bin (College of Information Engineering, Shenzhen University, Shenzhen; 518060, China); Guo, Chongtao; Huang, Lei; Wen, Jun Source: International Conference on Digital Signal Processing, DSP, p 66-69, March 1, 2017, Proceedings - 2016 IEEE International Conference on Digital Signal Processing, DSP 2016 Database: Compendex Compilation and indexing terms, Copyright 2018 Elsevier Inc. Data Provider: Engineering Village 3. Computing the personalized HRTFs based on weighted anthropometric parameters matching Yuan, Xiang (Shenzhen University, China); Zheng, Nengheng; Cai, Sudao Source: INTER-NOISE 2017 - 46th International Congress and Exposition on Noise Control Engineering: Taming Noise and Moving Quiet, v 2017- January, 2017, INTER-NOISE 2017 - 46th International Congress and -
China's Domestic Politicsand
China’s Domestic Politics and Foreign Policies and Major Countries’ Strategies toward China edited by Jung-Ho Bae and Jae H. Ku China’s Domestic Politics and Foreign Policies and Major Countries’ Strategies toward China 1SJOUFE %FDFNCFS 1VCMJTIFE %FDFNCFS 1VCMJTIFECZ ,PSFB*OTUJUVUFGPS/BUJPOBM6OJGJDBUJPO ,*/6 1VCMJTIFS 1SFTJEFOUPG,*/6 &EJUFECZ $FOUFSGPS6OJGJDBUJPO1PMJDZ4UVEJFT ,*/6 3FHJTUSBUJPO/VNCFS /P "EESFTT SP 4VZVEPOH (BOHCVLHV 4FPVM 5FMFQIPOF 'BY )PNFQBHF IUUQXXXLJOVPSLS %FTJHOBOE1SJOU )ZVOEBJ"SUDPN$P -UE $PQZSJHIU ,*/6 *4#/ 1SJDF G "MM,*/6QVCMJDBUJPOTBSFBWBJMBCMFGPSQVSDIBTFBUBMMNBKPS CPPLTUPSFTJO,PSFB "MTPBWBJMBCMFBU(PWFSONFOU1SJOUJOH0GGJDF4BMFT$FOUFS4UPSF 0GGJDF China’s Domestic Politics and Foreign Policies and Major Countries’ Strategies toward China �G 1SFGBDF Jung-Ho Bae (Director of the Center for Unification Policy Studies at Korea Institute for National Unification) �G *OUSPEVDUJPO 1 Turning Points for China and the Korean Peninsula Jung-Ho Bae and Dongsoo Kim (Korea Institute for National Unification) �G 1BSUEvaluation of China’s Domestic Politics and Leadership $IBQUFS 19 A Chinese Model for National Development Yong Shik Choo (Chung-Ang University) $IBQUFS 55 Leadership Transition in China - from Strongman Politics to Incremental Institutionalization Yi Edward Yang (James Madison University) $IBQUFS 81 Actors and Factors - China’s Challenges in the Crucial Next Five Years Christopher M. Clarke (U.S. State Department’s Bureau of Intelligence and Research-INR) China’s Domestic Politics and Foreign Policies -
The Consequences of Allowing Home Country Auditors to Audit Cross-Listed Firms: Evidence from Hong Kong-Listed H Share Firms
The Consequences of Allowing Home Country Auditors to Audit Cross-listed Firms: Evidence from Hong Kong-listed H Share Firms Manyi Fan1, Bin Ke2, Wenruo Wu3, Lijun Xia4, and Qingquan Xin5 April 8, 2020 We wish to thank Xi Wu (discussant), Donghua Chen, Pingyang Gao, Yongxiang Wang, and workshop participants at the Nanjing University and the 3rd New Institutional Accounting Conference (Shanghai, 2019) for helpful comments. 1 Department of Accounting, NUS Business School, National University of Singapore, B01-03, 1 Business Link, Singapore 117592. Email: [email protected]. 2 Department of Accounting, NUS Business School, National University of Singapore, Mochtar Riady Building, BIZ 1, # 07-53, 15 Kent Ridge Drive, Singapore 119245.Tel: +65 6601 3133. Fax: +65 6773 6493. Email: [email protected]. 3 Antai College of Economics and Management, Shanghai Jiao Tong University, Shanghai, P.R. China 200030. Tel: +86-183 1707 8667. Email: [email protected]. 4 Antai College of Economics and Management, Shanghai Jiao Tong University, Shanghai, P.R. China 200030. Tel: +86-21-6293 2639. Email: [email protected]. 5 Chongqing University. Email: [email protected]. 1 The Consequences of Allowing Home Country Auditors to Audit Cross-listed Firms: Evidence from Hong Kong-listed H Share Firms April 8, 2020 The Consequences of Allowing Home Country Auditors to Audit Cross-listed Firms: Evidence from Hong Kong-listed H Share Firms ABSTRACT We examine the consequences of a 2010 Hong Kong regulation that allows, for the first time, companies incorporated in mainland China and cross-listed in Hong Kong (H share companies) to hire mainland domiciled auditors to audit their Hong Kong financial reports. -
Graduation Program December 2017
VICTORIA UNIVERSITY GRADUATION PROGRAM DECEMBER 2017 #vualumni #vicunigrads vu.edu.au CONFERRING OF DEGREES AND GRANTING TABLE OF CONTENTS OF DIPLOMAS AND Our Value Proposition to our Students CERTIFICATES and the Community 1 A Message from the Chancellor 2 12 - 14 December 2017 A Message from the Vice-Chancellor Flemington Racecourse, Grandstand and President 3 Epsom Road, Flemington VIC Victoria University 100 years of opportunity and success 4 At VU, family is everything 5 University Senior Executives 6 Acknowledgement of Country 7 The University Mace – An Established Tradition 7 University Medals for Excellence 7 Academic Dress 8 Welcome to the Alumni Community 9 Social Media 10 GRADUATES College of Arts And Education 12 College of Business 16 College of Engineering and Science 20 College of Health and Biomedicine 21 College of Law and Justice 24 College of Sport and Exercise Science 24 VU College 26 Victoria Polytechnic 29 College Research and Doctoral Award 36 Award of the University 36 Companion of the University 38 Honorary Graduates of the University 1987–2017 39 VICTORIA UNIVERSITY GRADUATION PROGRAM DECEMBER 2017 OUR VALUE PROPOSITION TO OUR STUDENTS AND THE COMMUNITY Victoria University (VU) aims to be a great university of the 21st century by being inclusive rather than exclusive. We will provide exceptional value to our diverse community of students by guiding them to achieve their career aspirations through personalised, flexible, well-supported and industry relevant learning opportunities. Achievement will be demonstrated by our students’ and graduates’ employability and entrepreneurship. The applied and translational research conducted by our staff and students will enhance social and economic outcomes in our heartland communities of the West of Melbourne and beyond. -
2Nd International Conference on Computer and Information Applications (ICCIA 2012)
2nd International Conference on Computer and Information Applications (ICCIA 2012) Advances in Intelligent Systems Research Volume 26 Taiyuan, China 8-9 December 2012 Volume 1 of 2 ISBN: 978-1-62993-088-6 Printed from e-media with permission by: Curran Associates, Inc. 57 Morehouse Lane Red Hook, NY 12571 Some format issues inherent in the e-media version may also appear in this print version. Copyright© (2012) by Atlantis Press All rights reserved. Printed by Curran Associates, Inc. (2013) For permission requests, please contact Atlantis Press at the address below. Atlantis Press 8 Square des Bouleaux 75019 Paris France [email protected] Additional copies of this publication are available from: Curran Associates, Inc. 57 Morehouse Lane Red Hook, NY 12571 USA Phone: 845-758-0400 Fax: 845-758-2634 Email: [email protected] Web: www.proceedings.com TABLE OF CONTENTS VOLUME 1 The Patient Admission Scheduling of an Ophthalmic Hospital Using Genetic Algorithm ........................................................................1 Liming Zhang, Huiyou Chang, Ruitian Xu An Effective Image Fusion Method Based on Nonsubsampled Contourlet Transform and Pulse Coupled Neural Network ...............................................................................................................................................................................................................8 Lijuan Ma, Chunhui Zhao An Improved Personalized Recommendation System Research.................................................................................................................13 -
Warriors As the Feminised Other
Warriors as the Feminised Other The study of male heroes in Chinese action cinema from 2000 to 2009 A thesis submitted in partial fulfilment of the requirements for the Degree of Doctor of Philosophy in Chinese Studies at the University of Canterbury by Yunxiang Chen University of Canterbury 2011 i Abstract ―Flowery boys‖ (花样少年) – when this phrase is applied to attractive young men it is now often considered as a compliment. This research sets out to study the feminisation phenomena in the representation of warriors in Chinese language films from Hong Kong, Taiwan and Mainland China made in the first decade of the new millennium (2000-2009), as these three regions are now often packaged together as a pan-unity of the Chinese cultural realm. The foci of this study are on the investigations of the warriors as the feminised Other from two aspects: their bodies as spectacles and the manifestation of feminine characteristics in the male warriors. This study aims to detect what lies underneath the beautiful masquerade of the warriors as the Other through comprehensive analyses of the representations of feminised warriors and comparison with their female counterparts. It aims to test the hypothesis that gender identities are inventory categories transformed by and with changing historical context. Simultaneously, it is a project to study how Chinese traditional values and postmodern metrosexual culture interacted to formulate Chinese contemporary masculinity. It is also a project to search for a cultural nationalism presented in these films with the examination of gender politics hidden in these feminisation phenomena. With Laura Mulvey‘s theory of the gaze as a starting point, this research reconsiders the power relationship between the viewing subject and the spectacle to study the possibility of multiple gaze as well as the power of spectacle. -
Intermedialtranslation As Circulation
Journal of World Literature 5 (2020) 568–586 brill.com/jwl Intermedial Translation as Circulation Chu Tien-wen, Taiwan New Cinema, and Taiwan Literature Jessica Siu-yin Yeung soas University of London, London, UK [email protected] Abstract We generally believe that literature first circulates nationally and then scales up through translation and reception at an international level. In contrast, I argue that Taiwan literature first attained international acclaim through intermedial translation during the New Cinema period (1982–90) and was only then subsequently recognized nationally. These intermedial translations included not only adaptations of literature for film, but also collaborations between authors who acted as screenwriters and film- makers. The films resulting from these collaborations repositioned Taiwan as a mul- tilingual, multicultural and democratic nation. These shifts in media facilitated the circulation of these new narratives. Filmmakers could circumvent censorship at home and reach international audiences at Western film festivals. The international success ensured the wide circulation of these narratives in Taiwan. Keywords Taiwan – screenplay – film – allegory – cultural policy 1 Introduction We normally think of literature as circulating beyond the context in which it is written when it obtains national renown, which subsequently leads to interna- tional recognition through translation. In this article, I argue that the contem- porary Taiwanese writer, Chu Tien-wen (b. 1956)’s short stories and screenplays first attained international acclaim through the mode of intermedial transla- tion during the New Cinema period (1982–90) before they gained recognition © jessica siu-yin yeung, 2020 | doi:10.1163/24056480-00504005 This is an open access article distributed under the terms of the cc by 4.0Downloaded license. -
Safety Culture Assessment of Coal Mine Enterprise
Available online at www.sciencedirect.com Procedia Engineering ProcediaProcedia Engineering Engineering 00 (2011 26) 000(2011)–000 1939 – 1948 www.elsevier.com/locate/procedia First International Symposium on Mine Safety Science and Engineering Safety culture assessment of coal mine enterprise CHEN Kuna∗,b, XU Longjunb, CHEN Yanc, BI Zhiming b, YI Juna aCollege of Safety Engineering, Chongqing University of Science and Technology, Chongqing 401331, China bState Key Laboratory of Coal Mine Disaster Dynamics and Control (Chongqing University),Chongqing 400030,China cSchool of Foreign Languages and Literature, Chongqing Education College, Chongqing, 400067, China Abstract The paper is inclined to introduce a renovated fuzzy overall evaluation model specially purposed for safety culture of coal mine enterprise, which was established by us authors based on our own years’ experience in this area. The index system of coal mine enterprise safety assessment here mentioned has been founded, as well as analyzing safety culture on-spot along with the duty consultants. And, then, all the fuzzy membership indexes and their degrees were to be weighed, calculated with the final evaluation results presented in accordance with the analytic hierarchy process. Furthermore, all the safety culture statuses of T coal mine enterprise, S coal mine enterprise and X coal mine enterprise were then put into detailed analysis. The results of our application prove that the order of the safety cultural level can be as follows: X coal mine enterprise <T coal mine enterprise <S coal mine enterprise. The safety cultural grade of T coal mine enterprise and S coal mine enterprise were both “qualified”, which indicate that the production could be continued. -
1St China Onscreen Biennial
2012 1st China Onscreen Biennial LOS ANGELES 10.13 ~ 10.31 WASHINGTON, DC 10.26 ~ 11.11 Presented by CONTENTS Welcome 2 UCLA Confucius Institute in partnership with Features 4 Los Angeles 1st China Onscreen UCLA Film & Television Archive All Apologies Biennial Academy of Motion Picture Arts and Sciences Are We Really So Far from the Madhouse? Film at REDCAT Pomona College 2012 Beijing Flickers — Pop-Up Photography Exhibition and Film Seeding cross-cultural The Cremator dialogue through the The Ditch art of film Double Xposure Washington, DC Feng Shui Freer and Sackler Galleries of the Smithsonian Institution Confucius Institute at George Mason University Lacuna — Opening Night Confucius Institute at the University of Maryland The Monkey King: Uproar in Heaven 3D Confucius Institute Painted Skin: The Resurrection at Mason 乔治梅森大学 孔子学院 Sauna on Moon Three Sisters The 2012 inaugural COB has been made possible with Shorts 17 generous support from the following Program Sponsors Stephen Lesser The People’s Secretary UCLA Center for Chinese Studies Shanghai Strangers — Opening Night UCLA Center for Global Management (CGM) UCLA Center for Management of Enterprise in Media, Entertainment and Sports (MEMES) Some Actions Which Haven’t Been Defined Yet in the Revolution Shanghai Jiao Tong University Chinatown Business Improvement District Mandarin Plaza Panel Discussion 18 Lois Lambert of the Lois Lambert Gallery Film As Culture | Culture in Film Queer China Onscreen 19 Our Story: 10 Years of Guerrilla Warfare of the Beijing Queer Film Festival and -
Curriculum Vitæ
Curriculum Vitae Dr. Neal N. Xiong Department of Computer Science and Mathematics Sul Ross State University, TX, USA Emails: [email protected], [email protected] Cell phone: (404)645-4067 Neal N. Xiong, Dr. Associate Professor of Computer Science Department of Computer Science and Mathematics Sul Ross State University, TX, USA Associate Professor, Tenure Track Peer Review List & Promotion are given by this link: https://drive.google.com/drive/u/0/folders/17WyoQRpQbRiFnwyvVDbznXYAjteUr1WO Education Ph.D. Japan Advanced Institute of Science and Technology School of Information Science § Ph.D. earned in March of 2008 § in area: Fault-tolerant System/Networks, GPA 3.67, Rank: 1/27, Top 1% § Thesis: Design and Analysis of Quality of Service on Fault-tolerant Communication Networks (on Network Security) Ph.D. Wuhan University School of Computer Science § Ph.D. earned in June of 2007, Rank: 1/69, Top 1% § in the area of Software Engineering § Thesis: Res. on QoS of Network Based on Congestion Control Schemes (on Network Performance) M.E. Central China Normal University Department of Computer Science § M.E. earned in June of 2004, Rank: 1/18, Top 1% § Thesis: Research on Congestion Control of Many-to-many Multicast (on Network Security) B.E. Hubei University of Technology § Department of Computer Science and Technology § Thesis: Distributed intrusion detection and response system (security software realization) Academic and Professional Experience 2021.7 – Present Sul Ross State University (SR) Department of Computer Science and Mathematics Alpine, TX, USA § Associate Professor, with Tenure Track, 3 years’ Credits for Promotion 1 § Teaching responsibilities include online and live classes in computer science and information systems. -
2011 International Conference on Multimedia Technology
2011 International Conference on Multimedia Technology (ICMT 2011) Hangzhou, China 26-28 July 2011 Pages 1-834 IEEE Catalog Number: CFP1153K-PRT ISBN: 978-1-61284-771-9 1/8 Table Of Content 2DCS: Two Dimensional Random Underdetermined Projection for Image Representation and Classification..............1 Liang Liao, Yanning Zhang, Chao Zhang 3D Human Reconstruction from Multi-image...................................................................................................................6 Chengze Yang, Zhiquan Cheng A Bayes Thresholding Method Based on Edge Protection Strategies...........................................................................12 zhenhua zhang, yuxin zhang, yang pan, linchang xiao A CAVLC Embedded Method for Audio-Video Synchronization Coding Based on H.264............................................16 Xiaoyin Qi, Mianshu Chen, Hexin Chen A classification method of fingerprint quality based on neural network.........................................................................20 Yang Xiu-kun, Luo Yang A Distributed Top-k Query Algorithm Integrated k-Cone Structure for DHT Overlay Networks.....................................24 Guimin HUANG,Yuhong LIANG,Ya ZHOU A Framework for Electronic Pasture Based on WSN....................................................................................................28 Ru Xue,Huan-sheng Song, A-ning Bai A Hue-Saturation Histogram Difference Method to Vehicle Detection..........................................................................31 Tiezhu Yue, Yaping Dai, -
Final Program of CCC2020
第三十九届中国控制会议 The 39th Chinese Control Conference 程序册 Final Program 主办单位 中国自动化学会控制理论专业委员会 中国自动化学会 中国系统工程学会 承办单位 东北大学 CCC2020 Sponsoring Organizations Technical Committee on Control Theory, Chinese Association of Automation Chinese Association of Automation Systems Engineering Society of China Northeastern University, China 2020 年 7 月 27-29 日,中国·沈阳 July 27-29, 2020, Shenyang, China Proceedings of CCC2020 IEEE Catalog Number: CFP2040A -USB ISBN: 978-988-15639-9-6 CCC2020 Copyright and Reprint Permission: This material is permitted for personal use. For any other copying, reprint, republication or redistribution permission, please contact TCCT Secretariat, No. 55 Zhongguancun East Road, Beijing 100190, P. R. China. All rights reserved. Copyright@2020 by TCCT. 目录 (Contents) 目录 (Contents) ................................................................................................................................................... i 欢迎辞 (Welcome Address) ................................................................................................................................1 组织机构 (Conference Committees) ...................................................................................................................4 重要信息 (Important Information) ....................................................................................................................11 口头报告与张贴报告要求 (Instruction for Oral and Poster Presentations) .....................................................12 大会报告 (Plenary Lectures).............................................................................................................................14