|
Books > Computing & IT > General theory of computing > Data structures
Introduction to Chemical Engineering Analysis Using Mathematica,
Second Edition reviews the processes and designs used to
manufacture, use, and dispose of chemical products using
Mathematica, one of the most powerful mathematical software tools
available for symbolic, numerical, and graphical computing.
Analysis and computation are explained simultaneously. The book
covers the core concepts of chemical engineering, ranging from the
conservation of mass and energy to chemical kinetics. The text also
shows how to use the latest version of Mathematica, from the basics
of writing a few lines of code through developing entire analysis
programs. This second edition has been fully revised and updated,
and includes analyses of the conservation of energy, whereas the
first edition focused on the conservation of mass and ordinary
differential equations.
Image Analysis, Classification and Change Detection in Remote
Sensing: With Algorithms for Python, Fourth Edition, is focused on
the development and implementation of statistically motivated,
data-driven techniques for digital image analysis of remotely
sensed imagery and it features a tight interweaving of statistical
and machine learning theory of algorithms with computer codes. It
develops statistical methods for the analysis of optical/infrared
and synthetic aperture radar (SAR) imagery, including wavelet
transformations, kernel methods for nonlinear classification, as
well as an introduction to deep learning in the context of feed
forward neural networks. New in the Fourth Edition: An in-depth
treatment of a recent sequential change detection algorithm for
polarimetric SAR image time series. The accompanying software
consists of Python (open source) versions of all of the main image
analysis algorithms. Presents easy, platform-independent software
installation methods (Docker containerization). Utilizes freely
accessible imagery via the Google Earth Engine and provides many
examples of cloud programming (Google Earth Engine API). Examines
deep learning examples including TensorFlow and a sound
introduction to neural networks, Based on the success and the
reputation of the previous editions and compared to other textbooks
in the market, Professor Canty's fourth edition differs in the
depth and sophistication of the material treated as well as in its
consistent use of computer codes to illustrate the methods and
algorithms discussed. It is self-contained and illustrated with
many programming examples, all of which can be conveniently run in
a web browser. Each chapter concludes with exercises complementing
or extending the material in the text.
The Physics of Computing gives a foundational view of the physical
principles underlying computers. Performance, power, thermal
behavior, and reliability are all harder and harder to achieve as
transistors shrink to nanometer scales. This book describes the
physics of computing at all levels of abstraction from single gates
to complete computer systems. It can be used as a course for
juniors or seniors in computer engineering and electrical
engineering, and can also be used to teach students in other
scientific disciplines important concepts in computing. For
electrical engineering, the book provides the fundamentals of
computing that link core concepts to computing. For computer
science, it provides foundations of key challenges such as power
consumption, performance, and thermal. The book can also be used as
a technical reference by professionals.
High-performance computing (HPC) describes the use of connected
computing units to perform complex tasks. It relies on
parallelization techniques and algorithms to synchronize these
disparate units in order to perform faster than a single processor
could, alone. Used in industries from medicine and research to
military and higher education, this method of computing allows for
users to complete complex data-intensive tasks. This field has
undergone many changes over the past decade, and will continue to
grow in popularity in the coming years. Innovative Research
Applications in Next-Generation High Performance Computing aims to
address the future challenges, advances, and applications of HPC
and related technologies. As the need for such processors
increases, so does the importance of developing new ways to
optimize the performance of these supercomputers. This timely
publication provides comprehensive information for researchers,
students in ICT, program developers, military and government
organizations, and business professionals.
In recent years, swarm intelligence has become a popular
computational approach among researchers working on optimization
problems throughout the globe. Several algorithms inside swarm
intelligence have been implemented due to their application to
real-world issues and other advantages. A specific procedure,
Fireworks Algorithm, is an emerging method that studies the
explosion process of fireworks within local areas. Applications of
this developing program are undiscovered, and research is necessary
for scientists to fully understand the workings of this innovative
system. The Handbook of Research on Fireworks Algorithms and Swarm
Intelligence is a pivotal reference source that provides vital
research on theory analysis, improvements, and applications of
fireworks algorithm. While highlighting topics such as convergence
rate, parameter applications, and global optimization analysis,
this publication explores up-to-date progress on the specific
techniques of this algorithm. This book is ideally designed for
researchers, data scientists, mathematicians, engineers, software
developers, postgraduates, and academicians seeking coverage on
this evolutionary computation method.
Text analysis tools aid in extracting meaning from digital content.
As digital text becomes more and more complex, new techniques are
needed to understand conceptual structure. Concept Parsing
Algorithms (CPA) for Textual Analysis and Discovery: Emerging
Research and Opportunities provides an innovative perspective on
the application of algorithmic tools to study unstructured digital
content. Highlighting pertinent topics such as semantic tools,
semiotic systems, and pattern detection, this book is ideally
designed for researchers, academics, students, professionals, and
practitioners interested in developing a better understanding of
digital text analysis.
Modern computing systems preserve all information in intricate
binary codes. The evolution of systems and technologies that aid in
this preservation process must be continually assessed to ensure
that they are keeping up with the demands of society. Formation
Methods, Models, and Hardware Implementation of Pseudorandom Number
Generators: Emerging Research and Opportunities is a crucial
scholarly resource that examines the current methodologies used in
number generator construction, and how they pertain to the overall
advancement of contemporary computer systems. Featuring coverage on
relevant topics such as cellular automata theory, inhomogeneous
cells, and sequence generators, this publication is ideal for
software engineers, computer programmers, academicians, students,
and researchers that are interested in staying abreast of
innovative trends within the computer engineering field.
Security video surveillance systems, such as homeland security and
national defence, rely on specific mathematical algorithms in order
to run effectively. It is essential for these parameters to be
understood in order to design and create a successful system. Video
Surveillance Techniques and Technologies presents empirical
research and acquired experience on the original solutions and
mathematical algorithms for motion detection and object
identification problems. Emphasising a wide variety of applications
of security systems, this book is an essential tool for graduate
students and professionals in the field of signal and image
processing applied in static/moving object detection, tracking, and
identification.
This book focuses on artifi cial intelligence in the field of
digital signal processing and wireless communication. The
implementation of machine learning and deep learning in audio,
image, and video processing is presented, while adaptive signal
processing and biomedical signal processing are also explored
through DL algorithms, as well as 5G and green communication.
Finally, metaheuristic algorithms of related mathematical problems
are explored.
This book describes concepts and tools needed for water resources
management, including methods for modeling, simulation,
optimization, big data analysis, data mining, remote sensing,
geographical information system, game theory, conflict resolution,
System dynamics, agent-based models, multiobjective, multicriteria,
and multiattribute decision making and risk and uncertainty
analysis, for better and sustainable management of water resources
and consumption, thus mitigating the present and future global
water shortage crisis. It presents the applications of these tools
through case studies which demonstrate its benefits of proper
management of water resources systems. This book acts as a
reference for students, professors, industrial practitioners, and
stakeholders in the field of water resources and hydrology.
This book discusses machine learning and artificial intelligence
(AI) for agricultural economics. It is written with a view towards
bringing the benefits of advanced analytics and prognostics
capabilities to small scale farmers worldwide. This volume provides
data science and software engineering teams with the skills and
tools to fully utilize economic models to develop the software
capabilities necessary for creating lifesaving applications. The
book introduces essential agricultural economic concepts from the
perspective of full-scale software development with the emphasis on
creating niche blue ocean products. Chapters detail several
agricultural economic and AI reference architectures with a focus
on data integration, algorithm development, regression, prognostics
model development and mathematical optimization. Upgrading
traditional AI software development paradigms to function in
dynamic agricultural and economic markets, this volume will be of
great use to researchers and students in agricultural economics,
data science, engineering, and machine learning as well as
engineers and industry professionals in the public and private
sectors.
This book focuses on the combination of IoT and data science, in
particular how methods, algorithms, and tools from data science can
effectively support IoT. The authors show how data science
methodologies, techniques and tools, can translate data into
information, enabling the effectiveness and usefulness of new
services offered by IoT stakeholders. The authors posit that if IoT
is indeed the infrastructure of the future, data structure is the
key that can lead to a significant improvement of human life. The
book aims to present innovative IoT applications as well as ongoing
research that exploit modern data science approaches. Readers are
offered issues and challenges in a cross-disciplinary scenario that
involves both IoT and data science fields. The book features
contributions from academics, researchers, and professionals from
both fields.
This stimulating textbook presents a broad and accessible guide to
the fundamentals of discrete mathematics, highlighting how the
techniques may be applied to various exciting areas in computing.
The text is designed to motivate and inspire the reader,
encouraging further study in this important skill. Features: This
book provides an introduction to the building blocks of discrete
mathematics, including sets, relations and functions; describes the
basics of number theory, the techniques of induction and recursion,
and the applications of mathematical sequences, series,
permutations, and combinations; presents the essentials of algebra;
explains the fundamentals of automata theory, matrices, graph
theory, cryptography, coding theory, language theory, and the
concepts of computability and decidability; reviews the history of
logic, discussing propositional and predicate logic, as well as
advanced topics such as the nature of theorem proving; examines the
field of software engineering, including software reliability and
dependability and describes formal methods; investigates
probability and statistics and presents an overview of operations
research and financial mathematics.
This book provides awareness of methods used for functional
encryption in the academic and professional communities. The book
covers functional encryption algorithms and its modern applications
in developing secure systems via entity authentication, message
authentication, software security, cyber security, hardware
security, Internet of Thing (IoT), cloud security, smart card
technology, CAPTCHA, digital signature, and digital watermarking.
This book is organized into fifteen chapters; topics include
foundations of functional encryption, impact of group theory in
cryptosystems, elliptic curve cryptography, XTR algorithm, pairing
based cryptography, NTRU algorithms, ring units, cocks IBE schemes,
Boneh-Franklin IBE, Sakai-Kasahara IBE, hierarchical identity based
encryption, attribute based Encryption, extensions of IBE and
related primitives, and digital signatures. Explains the latest
functional encryption algorithms in a simple way with examples;
Includes applications of functional encryption in information
security, application security, and network security; Relevant to
academics, research scholars, software developers, etc.
This book is written for software product teams that use AI to add
intelligent models to their products or are planning to use it. As
AI adoption grows, it is becoming important that all AI driven
products can demonstrate they are not introducing any bias to the
AI-based decisions they are making, as well as reducing any
pre-existing bias or discrimination. The responsibility to ensure
that the AI models are ethical and make responsible decisions does
not lie with the data scientists alone. The product owners and the
business analysts are as important in ensuring bias-free AI as the
data scientists on the team. This book addresses the part that
these roles play in building a fair, explainable and accountable
model, along with ensuring model and data privacy. Each chapter
covers the fundamentals for the topic and then goes deep into the
subject matter - providing the details that enable the business
analysts and the data scientists to implement these fundamentals.
AI research is one of the most active and growing areas of computer
science and statistics. This book includes an overview of the many
techniques that draw from the research or are created by combining
different research outputs. Some of the techniques from relevant
and popular libraries are covered, but deliberately not drawn very
heavily from as they are already well documented, and new research
is likely to replace some of it.
This book introduces the state-of-the-art algorithms for data and
computation privacy. It mainly focuses on searchable symmetric
encryption algorithms and privacy preserving multi-party
computation algorithms. This book also introduces algorithms for
breaking privacy, and gives intuition on how to design algorithm to
counter privacy attacks. Some well-designed differential privacy
algorithms are also included in this book. Driven by lower cost,
higher reliability, better performance, and faster deployment, data
and computing services are increasingly outsourced to clouds. In
this computing paradigm, one often has to store privacy sensitive
data at parties, that cannot fully trust and perform privacy
sensitive computation with parties that again cannot fully trust.
For both scenarios, preserving data privacy and computation privacy
is extremely important. After the Facebook-Cambridge Analytical
data scandal and the implementation of the General Data Protection
Regulation by European Union, users are becoming more privacy aware
and more concerned with their privacy in this digital world. This
book targets database engineers, cloud computing engineers and
researchers working in this field. Advanced-level students studying
computer science and electrical engineering will also find this
book useful as a reference or secondary text.
|
|