Free Delivery Over $100
358034 books were found.
◎前言◎ 在這個強調跨領域融合與創新加速的時代,如何設計出符合現代需求、又延續傳統智慧的中藥配方,是一項極具挑戰的任務。本書所探討的「關聯式創新」,正是一種應對這項挑戰的全新思維框架。 若要用一句話定義關聯式創新,那便是:一種運用符號關係來發明新事物的思維模式。這種思維模式不同於單一經驗的延伸,它強調的是有系統地發現、分析並重組各種「關聯」,進而催生出真正創新的成果。... Read More >>
This book is the latest work of Chinese-American physicist Dr. Shui-Yin Lo, and it continues the book of ""Internal... Read More >>
This book constitutes the refereed proceedings of the 13th International Conference on Computational Advances in... Read More >>
This volume LNCS 14480 constitutes the refereed proceedings of the International Workshop, LCPC 2023, in Lexington,... Read More >>
This book CCIS 2647 constitutes the refereed proceedings of First Research Twinning Conference on Digitalisation... Read More >>
This book constitutes the revised selected papers of the Third International Conference on Speech and Language Technologies... Read More >>
This LNCS conference volume constitutes the proceedings of 29th International Symposium on Database Engineered Applications,... Read More >>
This book constitutes the refereed proceedings of the 24th China National Conference on Chinese Computational Linguistics,... Read More >>
In an age where cyber warfare is no longer science fiction but daily reality, Cybersecurity Through Simulation offers... Read More >>
Read More >>
An up-to-date discussion about the mitigation of satellite communications vulnerabilities In Safeguarding Satellite... Read More >>
Dieses Buch präsentiert Entwicklungen und Zukunftstrends im E-Commerce, der durch die neuen digitalen Kommunikations-... Read More >>
This book is your essential guide to mastering the fundamentals of electrical analysis. Starting with direct current... Read More >>
This book contains a selection of extended and peer-reviewed high-quality research papers presented at the XIX International... Read More >>
This practical, in-depth guide shows you how to build modern, sophisticated data processes using the Snowflake platform... Read More >>
Build threat modeling skills with practical advanced techniques to enhance risk analysis, optimize security measures,... Read More >>
Every book, treaty, and patent hides a secret identity: the bibliographic code. The Bibliographic Layer unveils... Read More >>
--- Publisher's Summary - AIPI Port 80808 / The Legal Layer AIPI-CRIMASCW-ACOTO-ZEDEX36N9M9-9780692977453... Read More >>
This volume features selected contributions from participants of the 17th African Conference on Research in Computer... Read More >>
Small Sample Modelling Based on Deep and Broad Forest Regression: Theory and Industrial Application delves into... Read More >>
Psychophysics and Experimental Phenomenology of Pattern Cognition, Second Edition delves into the cognitive processes... Read More >>
Design and Analysis of Green and Sustainable IoT Technologies for Future Wireless Communications explores innovative... Read More >>