You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
"The Mongol conquest of north China between 1211 and 1234 inflicted terrible wartime destruction, wiping out more than one-third of the population and dismantling the existing social order. In the Wake of the Mongols recounts the riveting story of how northern Chinese men and women adapted to these trying circumstances and interacted with their alien Mongol conquerors to create a drastically new social order. To construct this story, the book uses a previously unknown source of inscriptions recorded on stone tablets. Jinping Wang explores a north China where Mongol patrons, Daoist priests, Buddhist monks, and sometimes single women—rather than Confucian gentry—exercised power and shaped events, a portrait that upends the conventional view of imperial Chinese society. Setting the stage by portraying the late Jin and closing by tracing the Mongol period’s legacy during the Ming dynasty, she delineates the changing social dynamics over four centuries in the northern province of Shanxi, still a poorly understood region."
From A to Z, Abandon Superstitions (1958; Po Chu Mi Xing in Chinese) to Zuo Wenjun and Sima Xiangru (1984; Zuo Wen Jun Ahe Si Ma Xiang Ru), this comprehensive reference work provides filmographic data on 2,444 Chinese features released since the formation of the People's Republic of China. The films reflect the shifting dynamics of the Chinese film industry, from sweeping epics to unabashedly political docudramas, although straight documentaries are excluded from the current work. The entries include the title in English, the Chinese title (in Pinyin romanization with each syllable noted separately for clarity), year of release, studio, technical information (e.g., black and white or color, letterboxed or widescreen), length, technical credits, literary source (when applicable), cast, plot summary, and awards won.
description not available right now.
Annotation. This is volume I of the proceedings of the Second International Conference on Natural Computation, ICNC 2006. After a demanding review process 168 carefully revised full papers and 86 revised short papers were selected from 1915 submissions for presentation in two volumes. This first volume includes 130 papers related to artificial neural networks, natural neural systems and cognitive science, neural network applications, as well as evolutionary computation: theory and algorithms.
The 4-volume set LNAI 13013 – 13016 constitutes the proceedings of the 14th International Conference on Intelligent Robotics and Applications, ICIRA 2021, which took place in Yantai, China, during October 22-25, 2021. The 299 papers included in these proceedings were carefully reviewed and selected from 386 submissions. They were organized in topical sections as follows: Robotics dexterous manipulation; sensors, actuators, and controllers for soft and hybrid robots; cable-driven parallel robot; human-centered wearable robotics; hybrid system modeling and human-machine interface; robot manipulation skills learning; micro_nano materials, devices, and systems for biomedical applications; actuating, sensing, control, and instrumentation for ultra-precision engineering; human-robot collaboration; robotic machining; medical robot; machine intelligence for human motion analytics; human-robot interaction for service robots; novel mechanisms, robots and applications; space robot and on-orbit service; neural learning enhanced motion planning and control for human robot interaction; medical engineering.
Who said that life after crossing must be easier? In the past life, she was obviously a sweet and lovely little girl. Her parents loved each other and endlessly loved her. Life was always so happy and beautiful. But she crossed. After passing through this life, she became a small village girl, her father and mother were honest men without culture, her sister was weak and did not understand resistance. Only she faced a group of relatives who bullied them. Apart from being brave, could she have other options? ☆About the Author☆ Qian Zui Wei Meng, a well-known online novelist. She has written many novels and described many kind and strong girls. Her novel plot and writing style are both good.
This book constitutes the refereed proceedings of the 16th International Conference on Information Security Practice and Experience, ISPEC 2021, held in Nanjing, China, in December 2021. The 23 full papers presented in this volume were carefully reviewed and selected from 94 submissions. The conference focus on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
This is volume II of the proceedings of the Second International Conference on Natural Computation, ICNC 2006. After a demanding review process 168 carefully revised full papers and 86 revised short papers were selected from 1915 submissions for presentation in two volumes. The 124 papers in the second volume are organized in topical sections on additional topics in natural computation, natural computation techniques applications, hardware, and cross-disciplinary topics.
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023. The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.
description not available right now.