2019 IEEE Global Communications Conference (GLOBECOM 2019)

Total Page:16

File Type:pdf, Size:1020Kb

2019 IEEE Global Communications Conference (GLOBECOM 2019) 2019 IEEE Global Communications Conference (GLOBECOM 2019) Waikoloa, Hawaii, USA 9 – 13 December 2019 Pages 1-633 IEEE Catalog Number: CFP19GLO-POD ISBN: 978-1-7281-0963-3 1/9 Copyright © 2019 by the Institute of Electrical and Electronics Engineers, Inc. All Rights Reserved Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For other copying, reprint or republication permission, write to IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, Piscataway, NJ 08854. All rights reserved. *** This is a print representation of what appears in the IEEE Digital Library. Some format issues inherent in the e-media version may also appear in this print version. IEEE Catalog Number: CFP19GLO-POD ISBN (Print-On-Demand): 978-1-7281-0963-3 ISBN (Online): 978-1-7281-0962-6 ISSN: 1930-529X Additional Copies of This Publication Are Available From: Curran Associates, Inc 57 Morehouse Lane Red Hook, NY 12571 USA Phone: (845) 758-0400 Fax: (845) 758-2633 E-mail: [email protected] Web: www.proceedings.com TABLE OF CONTENTS OPTIMIZING LOCATION QUALITY IN PRIVACY PRESERVING CROWDSENSING.........................................1 Yuhui Zhang ; Ming Li ; Dejun Yang ; Jian Tang ; Guoliang Xue PATIENTS-CONTROLLED SECURE AND PRIVACY-PRESERVING EHRS SHARING SCHEME BASED ON CONSORTIUM BLOCKCHAIN....................................................................................................................7 Shunrong Jiang ; Haiqin Wu ; Liangmin Wang SECURE EDGE CACHING FOR LAYERED MULTIMEDIA CONTENTS IN HETEROGENEOUS NETWORKS........................................................................................................................................................................ 13 Qichao Xu ; Zhou Su ; Ying Wang ; Kuan Zhang DENSE: DYNAMIC EDGE NODE SELECTION FOR SAFETY-AS-A-SERVICE.................................................... 19 Chandana Roy ; Sudip Misra ; Jhareswar Maiti ; Mohammad S. Obaidat MMWAVE-MIMO BASED 5G WIRELESS AD-HOC NETWORKS IN THE FINITE BLOCKLENGTH REGIME .............................................................................................................................................. 25 Xi Zhang ; Jingqing Wang ; H. Vincent Poor A LIGHTWEIGHT AND PRIVACY-PRESERVING AUTHENTICATION PROTOCOL FOR MOBILE EDGE COMPUTING ........................................................................................................................................ 31 Kuljeet Kaur ; Sahil Garg ; Georges Kaddoum ; Mohsen Guizani ; Dushantha Nalin K. Jayakody WIPIN: OPERATION-FREE PASSIVE PERSON IDENTIFICATION USING WI-FI SIGNALS............................ 37 Fei Wang ; Jinsong Han ; Feng Lin ; Kui Ren COVERT MILLIMETER-WAVE COMMUNICATION VIA A DUAL-BEAM TRANSMITTER............................ 43 Mohammad Vahid Jamali ; Hessam Mahdavifar IRREGULAR QUADRATURE AMPLITUDE MODULATION FOR ADAPTIVE PHYSICAL- LAYER SECURITY............................................................................................................................................................ 49 Hunter Searle ; Marco A. C. Gomes ; Joao P. Vilela ; Willie K. Harrison ROBUST TRUTH DISCOVERY AGAINST DATA POISONING IN MOBILE CROWDSENSING........................ 55 Zonghao Huang ; Miao Pan ; Yanmin Gong THE IMPACT OF TRAFFIC INFORMATION AGE ON CONGESTION MITIGATION........................................ 61 Mehmet Dedeoglu ; Te-Chuan Chiu ; Junshan Zhang SELF ORGANIZING FEATURE MAP FOR FAKE TASK ATTACK MODELLING IN MOBILE CROWDSENSING.............................................................................................................................................................. 67 Yueqian Zhang ; Murat Simsek ; Burak Kantarci END-TO-END QOS OPTIMIZATION FOR V2X SERVICE LOCALIZATION ........................................................ 73 Emmanouil Pateromichelakis ; Chan Zhou ; Prajwal Keshavamurthy ; Konstantinos Samdanis PERFORMANCE ANALYSIS OF VEHICULAR OPTICAL CAMERA COMMUNICATIONS: ROADMAP TO URLLC..................................................................................................................................................... 79 Amirul Islam ; Leila Musavian ; Nikolaos Thomos PERFORMANCE ANALYSIS USING PHYSICAL LAYER ABSTRACTION MODELING FOR 5G AND BEYOND WAVEFORMS......................................................................................................................................... 85 Waqar Anwar ; Atul Kumar ; Norman Franchi ; Gerhard Fettweis MULTI-AGENT DEEP REINFORCEMENT LEARNING FOR COOPERATIVE CONNECTED VEHICLES .......................................................................................................................................................................... 91 Dohyun Kwon ; Joongheon Kim A MULTI-AGENT DEEP REINFORCEMENT LEARNING BASED SPECTRUM ALLOCATION FRAMEWORK FOR D2D COMMUNICATIONS.......................................................................................................... 97 Zheng Li ; Caili Guo ; Yidi Xuan MULTI-AGENT DEEP REINFORCEMENT LEARNING BASED USER ASSOCIATION FOR DENSE MMWAVE NETWORKS................................................................................................................................... 103 Mohamed Sana ; Antonio De Domenico ; Emilio Calvanese Strinati DEEP REINFORCEMENT LEARNING FOR CHANNEL SELECTION AND POWER CONTROL IN D2D NETWORKS........................................................................................................................................................ 109 Junjie Tan ; Lin Zhang ; Ying-Chang Liang DEEP REINFORCEMENT LEARNING BASED TRAFFIC- AND CHANNEL-AWARE OFDMA RESOURCE ALLOCATION........................................................................................................................................... 115 Ravikumar Balakrishnan ; Kunal Sankhe ; V. Srinivasa Somayazulu ; Rath Vannithamby ; Jerry Sydir PUSH VS PULL PARTICIPANT RECRUITMENT SYSTEM FOR PERSONALIZED VEHICULAR CROWDSENSING............................................................................................................................................................ 121 Tzu-Yang Yu ; Xiru Zhu ; Muthucumaru Maheswaran STOCHASTIC OPTIMIZATION FOR PRICING-AWARE MULTIMEDIA SERVICES IN 5G VEHICULAR NETWORKS ............................................................................................................................................ 127 Tengfei Cao ; Changqiao Xu ; Zhongbai Jiang ; Han Xiao ; Lujie Zhong ; Luigi Alfredo Grieco TREE-BASED INTELLIGENT INTRUSION DETECTION SYSTEM IN INTERNET OF VEHICLES ........................................................................................................................................................................ 133 Li Yang ; Abdallah Moubayed ; Ismail Hamieh ; Abdallah Shami SMART AND CONNECTED SCOOTER FOR PEOPLE WITH MOBILITY CHALLENGES .............................. 139 Kaikai Liu RFID-BASED DRIVING FATIGUE DETECTION....................................................................................................... 145 Chao Yang ; Xuyu Wang ; Shiwen Mao AGE OF INFORMATION SCALING IN LARGE NETWORKS WITH HIERARCHICAL COOPERATION............................................................................................................................................................... 151 Baturalp Buyukates ; Alkan Soysal ; Sennur Ulukus ADAPTIVE CODING FOR INFORMATION FRESHNESS IN A TWO-USER BROADCAST ERASURE CHANNEL ..................................................................................................................................................... 157 Songtao Feng ; Jing Yang ON THE AGE OF INFORMATION OF SHORT-PACKET COMMUNICATIONS WITH PACKET MANAGEMENT............................................................................................................................................................... 163 Rui Wang ; Yifan Gu ; He Chen ; Yonghui Li ; Branka Vucetic ON TIMELY CHANNEL CODING WITH HYBRID ARQ ......................................................................................... 169 Ahmed Arafa ; Karim Banawan ; Karim G. Seddik ; H. Vincent Poor THE INFLUENCE OF CSI IN ULTRA-RELIABLE LOW-LATENCY COMMUNICATIONS WITH IR-HARQ ........................................................................................................................................................................... 175 Apostolos Avranas ; Marios Kountouris ; Philippe Ciblat ROBUST BEAMFORMING DESIGN FOR SWIPT-ENABLED HIERARCHICAL COGNITIVE RADIO NETWORKS ....................................................................................................................................................... 181 Meng-Jie Wang ; Fan-Shuo Tseng ; Chun-Tao Lin JOINT OPTIMIZATION OF CONTROL LAW AND POWER CONSUMPTION FOR WIRELESS SENSOR AND ACTUATOR NETWORKS.................................................................................................................... 186 Zhuwei Wang ; Yuehui Guo ; Yu Gao ; Chao Fang ; Meng Li ; Enchang Sun QUASI-COHERENT DEMODULATION OF AMBIENT FM SIGNAL BACKSCATTER ..................................... 192 Santosh Nagaraj ; Nikhil Namala ; Mahasweta Sarkar ROBUST ENERGY-EFFICIENT BEAMFORMING IN MISO NETWORKS WITH DYNAMIC
Recommended publications
  • The Romance of the Three Kingdoms Podcast. This Is Episode 78. Hey
    Welcome to the Romance of the Three Kingdoms Podcast. This is episode 78. Hey, guess what? We just passed the midway point of the novel, and guess what? We still don’t have three kingdoms in this Romance of the THREE Kingdoms. But stay with me, because we’re about to take a big step toward that this week. So last time, we left Liu Bei in a bit of a dicey situation. His plot with Zhang Song to take over the Riverlands leaked out, and Zhang Song lost his head because of it. Not only that, Liu Zhang was ­­ at long last ­­ on to his dear kinsman’s true intentions and ordered his men to strengthen defenses at all the key points. While this was going on, Liu Bei was putting into action his own plan, which called for pretending that he was leaving the Riverlands. His first stop was going to be Fucheng (2,2), and he sent word on ahead to the two generals defending Fu (2) River Pass that he would like to bid them goodbye before he left. The two officers, Yang (2) Huai (2) and Gao (1) Pei (4), had long been suspicious of Liu Bei, and they decided that this would be the perfect opportunity to assassinate him. So they each stashed a dagger under their clothes and took 200 men with them to go see Liu Bei. Meanwhile, as Liu Bei was approaching the Fu (2) River, his military strategist Pang Tong advised him, “If Yang Huai and Gao Pei come to meet us without hesitation, we must be on guard.
    [Show full text]
  • 2018 IEEE CSAA Guidance, Navigation and Control Conference
    2018 IEEE CSAA Guidance, Navigation and Control Conference (CGNCC 2018) Xiamen, China 10 – 12 August 2018 Pages 1-654 IEEE Catalog Number: CFP1829X-POD ISBN: 978-1-5386-1172-2 1/4 Copyright © 2018 by the Institute of Electrical and Electronics Engineers, Inc. All Rights Reserved Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For other copying, reprint or republication permission, write to IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, Piscataway, NJ 08854. All rights reserved. *** This is a print representation of what appears in the IEEE Digital Library. Some format issues inherent in the e-media version may also appear in this print version. IEEE Catalog Number: CFP1829X-POD ISBN (Print-On-Demand): 978-1-5386-1172-2 ISBN (Online): 978-1-5386-1171-5 Additional Copies of This Publication Are Available From: Curran Associates, Inc 57 Morehouse Lane Red Hook, NY 12571 USA Phone: (845) 758-0400 Fax: (845) 758-2633 E-mail: [email protected] Web: www.proceedings.com TABLE OF CONTENTS STUDY ON LOW ENERGY MOON RETURN ORBIT CONSTRUCTION AND LOW THRUST PROPULSION CONTROL STRATEGY ........................................................................................................................... 1 Yue Liu ; Yingjing Qian ; Wuxing Jing EVOLVEMENT LAWS OF MAGNETIC DIPOLES INTERACTION AND ITS APPLICATION TO SPACECRAFT SELF- AND SOFT-DOCKING* ..............................................................................................................
    [Show full text]
  • Immortality of the Spirit: Chinese Funerary Art from the Han and Tang Dynasties Exhibition Catalogue
    Fairfield University DigitalCommons@Fairfield Immortality of the Spirit: Chinese Funerary Art Immortality of the Spirit - Ephemera from the Han and Tang Dynasties 4-2012 Immortality of the Spirit: Chinese Funerary Art from the Han and Tang Dynasties Exhibition Catalogue Jill J. Deupi Fairfield University, [email protected] Ive Covaci Fairfield University Leopold Swergold Follow this and additional works at: https://digitalcommons.fairfield.edu/immortality_ephemera Recommended Citation Deupi, Jill J.; Covaci, Ive; and Swergold, Leopold, "Immortality of the Spirit: Chinese Funerary Art from the Han and Tang Dynasties Exhibition Catalogue" (2012). Immortality of the Spirit - Ephemera. 1. https://digitalcommons.fairfield.edu/immortality_ephemera/1 This item has been accepted for inclusion in DigitalCommons@Fairfield by an authorized administrator of DigitalCommons@Fairfield. It is brought to you by DigitalCommons@Fairfield with permission from the rights- holder(s) and is protected by copyright and/or related rights. You are free to use this item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses, you need to obtain permission from the rights-holder(s) directly, unless additional rights are indicated by a Creative Commons license in the record and/or on the work itself. For more information, please contact [email protected]. Immortality of the Spirit: Chinese Funerary Art from the Han and Tang Dynasties 1 ust over a year ago, Jane and Leopold Swergold surprised
    [Show full text]
  • Dynasty Warriors 4 TOTAL Guide
    Dynasty Warriors 4 TOTAL Guide By ReVeLaTeD Original Creation Date: 3-29-03 Version 1.01 Build 4403 This guide is a project of ReVeLaTeD, representing Digital Legacy Networks. All content within is copyrighted to Muni 1 Shinobu, and as such, the information is NOT to be duplicated or reproduced, digitally or physically, without express consent of the content owner. Any questions about specific information should be referred directly to Muni Shinobu. Any questions about format, layout, or presentation of this document or the items therein should be referred directly to ReVeLaTeD. Any violation of this edict shall be prosecuted to the fullest extent of the law in your area. Dynasty Warriors 4 TOTAL Guide Itinerary ITINERARY...................................................................................................................................................................2 INTRODUCTION.........................................................................................................................................................3 LEVEL 10 WEAPONS ................................................................................................................................................4 SHU .............................................................................................................................................................................. 4 WEI ..............................................................................................................................................................................
    [Show full text]
  • The Romance of the Three Kingdoms Podcast. This Is Episode 80. Last
    Welcome to the Romance of the Three Kingdoms Podcast. This is episode 80. Last time, Liu Bei had lost Master Young Phoenix, Pang Tong, to an ambush. So he asked Zhuge Liang to come to the Riverlands to bail him out. Zhuge Liang left Guan Yu in charge of Jing Province and set off. He sent Zhang Fei along the main land route while he himself traveled by water with the general Zhao Yun. Zhang Fei had little trouble from the locals until he reached Ba (1) County, where a stubborn general named Yan Yan dared to stand in his way. So Zhang Fei sent a messenger to Yan Yan, and this messenger conveyed the following sentiments from Zhang Fei: “Old fool. If you hurry up and surrender, then I will spare your civilians. If you resist, then I will stomp your city flat and leave no one, not even the old and the young!” This messenger probably did not make it very far past “Old fool ” before Yan Yan blew his lid. … “How dare that bastard be so rude! I am not one to submit to traitors!” But Yan Yan did not shoot the messenger, since beheading was the preferred form of execution during this time. But seriously, Yan Yan actually allowed the messenger to keep his head. “I will use you to deliver my message back to Zhang Fei!” he said. But while the messenger got to keep his head, he was not able to keep everything ON his head. Yan Yan ordered his guards to cut off the guy’s ears and nose before letting him go.
    [Show full text]
  • Community Sanctions: a Comparative Study Between China and Europe
    Community Sanctions: A Comparative Study between China and Europe Xue YANG Dissertation submitted in order to obtain the degree of Doctor in Law Academic year 2017-2018 Promotor: Prof. Dr. Tom Vander Beken Contents Acknowledgement ..................................................................................................................... 8 Abbreviations ............................................................................................................................. 9 Glossary .................................................................................................................................... 10 Chapter One. Introduction ....................................................................................................... 12 Background ........................................................................................................................... 12 Definitions related to community sanctions and measures ................................................ 14 Aim and scope ...................................................................................................................... 16 Questions and methodology ................................................................................................ 18 Structure of the thesis .......................................................................................................... 21 Chapter Two. Legal Framework for Chinese Community Corrections ..................................... 25 1. Introduction ..................................................................................................................
    [Show full text]
  • The Romance of the Three Kingdoms Podcast. This Is Episode 81. Last
    Welcome to the Romance of the Three Kingdoms Podcast. This is episode 81. Last time, we left off with Zhuge Liang about to face off against Zhang Ren, the commander of the Riverlands troops guarding Luocheng, the city that Zhuge Liang and Liu Bei were besieging. The two sides squared off on the battlefield, but Zhuge Liang came out with a sorry­looking bunch of soldiers. Seeing this, Zhang Ren did not hesitate and ordered his men to charge. As soon as they did, Zhuge Liang quickly abandoned his carriage, hopped on a horse, and led his ragtag bunch back across Golden Goose Bridge. Zhang Ren pursued him across the bridge, but as soon as he was across, he could see Liu Bei charging forth from the left and the general Yan Yan sweeping in from the right. Recognizing that he had fallen for a ruse, Zhang Ren tried to turn back, but lo and behold, the bridge had already been taken apart, which is an impressively efficient feat by another of Liu Bei’s generals, Zhao Yun, who had orders to wait until Zhang Ren was across and then tear up the bridge. What’s more, Zhao Yun and his men now guarded the shore, which made Zhang Ren think twice about fleeing back that way. So instead, he fled south along the river. Before he had gone but a couple miles, though, he ran into another ambush. The generals Wei Yan and Huang Zhong sprang out of the reeds with 1,000 men each. Wei Yan’s men stabbed at Zhang Ren’s riders with long spears, while Huang Zhong’s men slashed at the legs of their horses with knives.
    [Show full text]
  • RACR-07 September 25-26, 2007 China Executive Leadership Academy Pudong Shanghai, China
    The First International Conference on Risk Analysis and Crisis Response RACR-07 September 25-26, 2007 China Executive Leadership Academy Pudong Shanghai, China RACR-07 Program and General Information ORGANIZED BY: Risk Analysis Council of China Association for Disaster Prevention HOSTED BY: Shanghai Maritime University SPONSORED BY: National Disaster Reduction Center of China Society for Risk Analysis Society for Risk Analysis-Europe Society for Risk Analysis-Japan SUPPORTED BY: National Natural Science Foundation of China RACR-07 September 25-26, 2007 Shanghai, China The First International Conference on Risk Analysis and Crisis Response Table of Contents RACR-07 - General Information ………………………………………………. 2 About RACR Conference Organization and Supporters Conference Venue Social Acitvities RACR-07 Proceedings Correspondence and further information Referees RACR-07 - Program ………………………………………………………......... 7 General notice Tuesday, September 25 Wednesday, September 26 Some Abstracts for Plenary Sessions Christopher Frey, Methods for Characterizing Variability and Uncertainty in Exposure and Risk Analysis ……………………………….. Shoji Tsuchida, Disaster Prevention and Risk Reseechs ……………… Zongzhi Wu, An Introduction to the Regulations and Standards of Industrial Accident Risk Assessment in China ……………………………. Jinren Ni, Water Erosion Vulnerability and Ecological Risk Analysis in the Yellow River Basin, China ……………………………………………… K. Harald Drager, A Year in Review – TIEMS and Global Emergency Management …………………………………………………………………. Da Ruan, Intelligent
    [Show full text]
  • The Romance of the Three Kingdoms Podcast. This Is Episode 79. Last
    Welcome to the Romance of the Three Kingdoms Podcast. This is episode 79. Last time, Liu Bei and company got a visit from a strange man named Peng (2) Yang (4), who made himself at home in the residence of Liu Bei’s adviser Pang Tong. Peng Yang ate Pang Tong’s food, drank Pang Tong’s wine, and took a nap on Pang Tong’s couch, all without so much as telling his host what his name was. It turns out that Peng Yang was a good friend of Fa Zheng, a Riverlands official who was helping Liu Bei, and he claimed that he was there to save the lives of tens of thousands of Liu Bei’s men, but he would only reveal his secret to Liu Bei. So Fa Zheng quickly alerted Liu Bei, and Liu Bei rushed over to meet this strange man who had apparently come to save his life and the lives of all his troops. “General, how much troops do you have in your front camps?” Peng Yang asked him. “Wei Yan and Huang Zhong are garrisoned there,” Liu Bei answered. “How can a commander not understand geography,” Peng Yang said. “The front camp hugs the River Fu (2). If the enemy redirects the river’s flow, no one would be left alive in your front camp.” This reminder brought Liu Bei to his senses, but Peng Yang was not done yet. “Judging by the stars, something bad is going to happen. You must be careful,” he told Liu Bei. Liu Bei thanked him profusely and treated him as an esteemed guest.
    [Show full text]
  • Paradox of Legal Reform Under the Kuomintang Regime in Mainland
    Paradox of Legal Reform under the Kuomintang Regime in Mainland China, a Case Study in Judicial Reform and Legal Modernisation under an Authoritarian regime (1928-1948). A thesis submitted to The University of Manchester for the degree of Doctor of Philosophy in the Faculty of Humanities 2017 Ran Lu School of Law 1 Declaration No portion of the work referred to in the thesis has been submitted in support of an application for another degree or qualification of this or any other university or other institute of learning. Copyright Statment The following four notes on copyright and the ownership of intellectual property rights must be included as written below: i. The author of this thesis (including any appendices and/or schedules to this thesis) owns certain copyright or related rights in it (the “Copyright”) and s/he has given The University of Manchester certain rights to use such Copyright, including for administrative purposes. ii. Copies of this thesis, either in full or in extracts and whether in hard or electronic copy, may be made only in accordance with the Copyright, Designs and Patents Act 1988 (as amended) and regulations issued under it or, where appropriate, in accordance with licensing agreements which the University has from time to time. This page must form part of any such copies made. iii. The ownership of certain Copyright, patents, designs, trademarks and other intellectual property (the “Intellectual Property”) and any reproductions of copyright works in the thesis, for example graphs and tables (“Reproductions”), which may be described in this thesis, may not be owned by the author and may be owned by third parties.
    [Show full text]
  • A Robotic Gripper Based on Advanced System Set-Up and Fuzzy Control Algorithm
    2009 IEEE International Conference on Automation and Logistics (ICAL 2009) Shenyang, China 5 - 7 August 2009 Pages 1-702 IEEE Catalog Number: CFP09CAL-PRT ISBN: 978-1-4244-4794-7 TABLE OF CONTENTS A Robotic Gripper based on Advanced System Set-up and Fuzzy Control Algorithm ...................................................1 A. M. Soliman, A. M. Zaki, A. M. El-Shafei , O. A. Mahgoub Continuous Steps Toward Humanoid Push Recovery........................................................................................................7 Wentao Mao, Jeong-Jung Kim, Ju-Jang Lee Predictive Function Cascade Control Scheme and its Application to Hydraulic Robot Systems ................................. 13 Zhihuan Zhang Object-Centric Programming: A New Modeling Paradigm for Robotic Applications .................................................. 18 Andreas Angerer, Alwin Hoffmann, Frank Ortmeier, Michael Vistein, Wolfgang Reif Model-based Iterative Learning Control for Industrial Robot Manipulators................................................................ 24 Je Sung Yeon, Jong Hyeon Park, Seung-Woo Son, Sang-Hun Lee Modeling and Simulation of Yard Trailer Dispatching at Container Terminals ........................................................... 29 Bin Li, Wen-feng Li, Yu Zhang, Yan-hong Ge, Huan Chen, Xiao-lei Liang Kinematics Modeling and Simulation for an Amphibious Robot: Design and Implementation................................... 35 Rui Ding, Junzhi Yu, Qinghai Yang, Min Tan The Finite Element Model of Transient Temperature Field
    [Show full text]
  • A SOCIOCULTURAL ANALYSIS of RETRANSLATIONS of CLASSIC ENGLISH NOVELS in MAINLAND CHINA 1949-2009 Chuanmao Tian DL: T 949-2014
    A SOCIOCULTURAL ANALYSIS OF RETRANSLATIONS OF CLASSIC ENGLISH NOVELS IN MAINLAND CHINA 1949-2009 Chuanmao Tian Dipòsit Legal: T 949-2014 ADVERTIMENT. L'accés als continguts d'aquesta tesi doctoral i la seva utilització ha de respectar els drets de la persona autora. Pot ser utilitzada per a consulta o estudi personal, així com en activitats o materials d'investigació i docència en els termes establerts a l'art. 32 del Text Refós de la Llei de Propietat Intel·lectual (RDL 1/1996). Per altres utilitzacions es requereix l'autorització prèvia i expressa de la persona autora. En qualsevol cas, en la utilització dels seus continguts caldrà indicar de forma clara el nom i cognoms de la persona autora i el títol de la tesi doctoral. No s'autoritza la seva reproducció o altres formes d'explotació efectuades amb finalitats de lucre ni la seva comunicació pública des d'un lloc aliè al servei TDX. Tampoc s'autoritza la presentació del seu contingut en una finestra o marc aliè a TDX (framing). Aquesta reserva de drets afecta tant als continguts de la tesi com als seus resums i índexs. ADVERTENCIA. El acceso a los contenidos de esta tesis doctoral y su utilización debe respetar los derechos de la persona autora. Puede ser utilizada para consulta o estudio personal, así como en actividades o materiales de investigación y docencia en los términos establecidos en el art. 32 del Texto Refundido de la Ley de Propiedad Intelectual (RDL 1/1996). Para otros usos se requiere la autorización previa y expresa de la persona autora.
    [Show full text]