0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (7)
  • R250 - R500 (61)
  • R500+ (5,390)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing > Data structures

Discriminative Learning in Biometrics (Hardcover, 1st ed. 2016): David Zhang, Yong Xu, Wangmeng Zuo Discriminative Learning in Biometrics (Hardcover, 1st ed. 2016)
David Zhang, Yong Xu, Wangmeng Zuo
R3,591 Discovery Miles 35 910 Ships in 12 - 19 working days

This monograph describes the latest advances in discriminative learning methods for biometric recognition. Specifically, it focuses on three representative categories of methods: sparse representation-based classification, metric learning, and discriminative feature representation, together with their applications in palmprint authentication, face recognition and multi-biometrics. The ideas, algorithms, experimental evaluation and underlying rationales are also provided for a better understanding of these methods. Lastly, it discusses several promising research directions in the field of discriminative biometric recognition.

Pattern Mining with Evolutionary Algorithms (Hardcover, 1st ed. 2016): Sebastian Ventura, Jose Maria Luna Pattern Mining with Evolutionary Algorithms (Hardcover, 1st ed. 2016)
Sebastian Ventura, Jose Maria Luna
R3,504 Discovery Miles 35 040 Ships in 12 - 19 working days

This book provides a comprehensive overview of the field of pattern mining with evolutionary algorithms. To do so, it covers formal definitions about patterns, patterns mining, type of patterns and the usefulness of patterns in the knowledge discovery process. As it is described within the book, the discovery process suffers from both high runtime and memory requirements, especially when high dimensional datasets are analyzed. To solve this issue, many pruning strategies have been developed. Nevertheless, with the growing interest in the storage of information, more and more datasets comprise such a dimensionality that the discovery of interesting patterns becomes a challenging process. In this regard, the use of evolutionary algorithms for mining pattern enables the computation capacity to be reduced, providing sufficiently good solutions. This book offers a survey on evolutionary computation with particular emphasis on genetic algorithms and genetic programming. Also included is an analysis of the set of quality measures most widely used in the field of pattern mining with evolutionary algorithms. This book serves as a review of the most important evolutionary algorithms for pattern mining. It considers the analysis of different algorithms for mining different type of patterns and relationships between patterns, such as frequent patterns, infrequent patterns, patterns defined in a continuous domain, or even positive and negative patterns. A completely new problem in the pattern mining field, mining of exceptional relationships between patterns, is discussed. In this problem the goal is to identify patterns which distribution is exceptionally different from the distribution in the complete set of data records. Finally, the book deals with the subgroup discovery task, a method to identify a subgroup of interesting patterns that is related to a dependent variable or target attribute. This subgroup of patterns satisfies two essential conditions: interpretability and interestingness.

Discrete Cuckoo Search for Combinatorial Optimization (Hardcover, 1st ed. 2020): Aziz Ouaarab Discrete Cuckoo Search for Combinatorial Optimization (Hardcover, 1st ed. 2020)
Aziz Ouaarab
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

This book provides a literature review of techniques used to pass from continuous to combinatorial space, before discussing a detailed example with individual steps of how cuckoo search (CS) can be adapted to solve combinatorial optimization problems. It demonstrates the application of CS to three different problems and describes their source code. The content is divided into five chapters, the first of which provides a technical description, together with examples of combinatorial search spaces. The second chapter summarizes a diverse range of methods used to solve combinatorial optimization problems. In turn, the third chapter presents a description of CS, its formulation and characteristics. In the fourth chapter, the application of discrete cuckoo search (DCS) to solve three POCs (the traveling salesman problem, quadratic assignment problem and job shop scheduling problem) is explained, focusing mainly on a reinterpretation of the terminology used in CS and its source of inspiration. In closing, the fifth chapter discusses random-key cuckoo search (RKCS) using random keys to represent positions found by cuckoo search in the TSP and QAP solution space.

Handbook of Weighted Automata (Hardcover, 2009 ed.): Manfred Droste, Werner Kuich, Heiko Vogler Handbook of Weighted Automata (Hardcover, 2009 ed.)
Manfred Droste, Werner Kuich, Heiko Vogler
R6,464 Discovery Miles 64 640 Ships in 10 - 15 working days

Weighted finite automata are classical nondeterministic finite automata in which the transitions carry weights. These weights may model, for example, the cost involved when executing a transition, the resources or time needed for this, or the probability or reliability of its successful execution. Weights can also be added to classical automata with infinite state sets like pushdown automata, and this extension constitutes the general concept of weighted automata. Since their introduction in the 1960s they have stimulated research in related areas of theoretical computer science, including formal language theory, algebra, logic, and discrete structures. Moreover, weighted automata and weighted context-free grammars have found application in natural-language processing, speech recognition, and digital image compression.

This book covers all the main aspects of weighted automata and formal power series methods, ranging from theory to applications. The contributors are the leading experts in their respective areas, and each chapter presents a detailed survey of the state of the art and pointers to future research. The chapters in Part I cover the foundations of the theory of weighted automata, specifically addressing semirings, power series, and fixed point theory. Part II investigates different concepts of weighted recognizability. Part III examines alternative types of weighted automata and various discrete structures other than words. Finally, Part IV deals with applications of weighted automata, including digital image compression, fuzzy languages, model checking, and natural-language processing.

Computer scientists and mathematicians will find this book an excellent survey and reference volume, and it will also be a valuable resource for students exploring this exciting research area.

Advances in Intelligent Information and Database Systems (Hardcover, Edition.): Ngoc Thanh Nguyen, Radoslaw Katarzyniak Advances in Intelligent Information and Database Systems (Hardcover, Edition.)
Ngoc Thanh Nguyen, Radoslaw Katarzyniak
R4,424 Discovery Miles 44 240 Ships in 10 - 15 working days

Intelligent information and database systems are two closely related and we- established subfields of modern computer science. They focus on the integration of artificial intelligence and classic database technologies in order to create the class of next generation information systems. The major target of this new gene- tion of systems is to provide end-users with intelligent behavior: simple and/or advanced learning, problem solving, uncertain and certain reasoning, se- organization, cooperation, etc. Such intelligent abilities are implemented in classic information systems to make them autonomous and user oriented, in particular when advanced problems of multimedia information and knowledge discovery, access, retrieval and manipulation are to be solved in the context of large, distr- uted and heterogeneous environments. It means that intelligent knowledge-based information and database systems are used to solve basic problems of large coll- tions management, carry out knowledge discovery from large data collections, reason about information under uncertain conditions, support users in their for- lation of complex queries etc. Topics discussed in this volume include but are not limited to the foundations and principles of data, information, and knowledge models, methodologies for intelligent information and database systems analysis, design, implementation, validation, maintenance and evolution.

Grid Generation and Adaptive Algorithm (Hardcover, New): M. Luskin, Etc, J. E Flaherty, M.W. Bern Grid Generation and Adaptive Algorithm (Hardcover, New)
M. Luskin, Etc, J. E Flaherty, M.W. Bern
R2,619 Discovery Miles 26 190 Ships in 10 - 15 working days

The papers in this volume are based on lectures given at the IMA Workshop on Grid Generation and Adaptive Algorithms held during April 28 - May 2, 1997. Grid generation is a common feature of many computational tasks which require the discretization and representation of space and surfaces. The papers in this volume discuss how the geometric complexity of the physical object or the non-uniform nature of the solution variable make it impossible to use a uniform grid. Since an efficient grid requires knowledge of the computed solution, many of the papers in this volume treat how to construct grids that are adaptively computed with the solution. This volume will be of interest to computational scientists and mathematicians working in a broad variety of applications including fluid mechanics, solid mechanics, materials science, chemistry, and physics. Papers treat residual-based error estimation and adaptivity, repartitioning and load balancing for adaptive meshes, data structures and local refinement methods for conservation laws, adaptivity for hp-finite element methods, the resolution of boundary layers in high Reynolds number flow, adaptive methods for elastostatic contact problems, the full domain partition approach to parallel adaptive refinement, the adaptive solution of phase change problems, and quality indicators for triangular meshes.

Optimization and Its Applications in Control and Data Sciences - In Honor of Boris T. Polyak's 80th Birthday (Hardcover,... Optimization and Its Applications in Control and Data Sciences - In Honor of Boris T. Polyak's 80th Birthday (Hardcover, 1st ed. 2016)
Boris Goldengorin
R4,444 R3,875 Discovery Miles 38 750 Save R569 (13%) Ships in 12 - 19 working days

This book focuses on recent research in modern optimization and its implications in control and data analysis. This book is a collection of papers from the conference "Optimization and Its Applications in Control and Data Science" dedicated to Professor Boris T. Polyak, which was held in Moscow, Russia on May 13-15, 2015. This book reflects developments in theory and applications rooted by Professor Polyak's fundamental contributions to constrained and unconstrained optimization, differentiable and nonsmooth functions, control theory and approximation. Each paper focuses on techniques for solving complex optimization problems in different application areas and recent developments in optimization theory and methods. Open problems in optimization, game theory and control theory are included in this collection which will interest engineers and researchers working with efficient algorithms and software for solving optimization problems in market and data analysis. Theoreticians in operations research, applied mathematics, algorithm design, artificial intelligence, machine learning, and software engineering will find this book useful and graduate students will find the state-of-the-art research valuable.

Distributed Graph Algorithms for Computer Networks (Hardcover, 2013 ed.): Kayhan Erciyes Distributed Graph Algorithms for Computer Networks (Hardcover, 2013 ed.)
Kayhan Erciyes
R3,149 Discovery Miles 31 490 Ships in 12 - 19 working days

This book presents a comprehensive review of key distributed graph algorithms for computer network applications, with a particular emphasis on practical implementation. Topics and features: introduces a range of fundamental graph algorithms, covering spanning trees, graph traversal algorithms, routing algorithms, and self-stabilization; reviews graph-theoretical distributed approximation algorithms with applications in ad hoc wireless networks; describes in detail the implementation of each algorithm, with extensive use of supporting examples, and discusses their concrete network applications; examines key graph-theoretical algorithm concepts, such as dominating sets, and parameters for mobility and energy levels of nodes in wireless ad hoc networks, and provides a contemporary survey of each topic; presents a simple simulator, developed to run distributed algorithms; provides practical exercises at the end of each chapter.

Identity-Based Encryption (Hardcover, 2011 ed.): Sanjit Chatterjee, Palash Sarkar Identity-Based Encryption (Hardcover, 2011 ed.)
Sanjit Chatterjee, Palash Sarkar
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Identity-Based Encryption a useful book. Practitioners and engineers who work with real-world IBE schemes and need a proper understanding of the basic IBE techniques, will also find this book a valuable asset.

Policies and Research in Identity Management - First IFIP WG 11.6 Working Conference on Policies and Research in Identity... Policies and Research in Identity Management - First IFIP WG 11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007 (Hardcover, 2008 ed.)
Elisabeth De Leeuw, Simone Fischer-Hubner, Jimmy C. Tseng, John Borking
R1,515 Discovery Miles 15 150 Ships in 10 - 15 working days

st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification and access control is growing, not only in companies and organisations but also in the world at large. At the same time, such security measures have to be balanced with means for protecting the privacy of users. Identity management is put under pressure, due to the growing number of frauds who want to hide their true identity. This challenges the information security research community to focus on interdisciplinary and holistic approaches while retaining the benefits of previous research efforts. In this context, the IFIP Working Group 11.6 on Identity Management has been founded in August 2006. The intention of the Working Group is to offer a broad forum for the exchange of knowledge and for the tracking and discussion of issues and new developments. In this, we take an interdisciplinary approach. Scientists as well as practitioners, from government and business, who are involved in the field of identity management are welcome to participate. The IDMAN 2007 Conference on Policies and Research in Identity Management was the very first conference organized by this Working Group. We aim to organize conferences bi-annually. The IDMAN 2007 Conference has been centered around the theme of National Identity Management or, in other words, identity management in the public sector.

Advances in Data Management (Hardcover, 2009 ed.): Zbigniew W. Ras, Agnieszka Dardzinska Advances in Data Management (Hardcover, 2009 ed.)
Zbigniew W. Ras, Agnieszka Dardzinska
R4,585 Discovery Miles 45 850 Ships in 10 - 15 working days

Data Management is the process of planning, coordinating and controlling data resources. More often, applications need to store and search a large amount of data. Managing Data has been continuously challenged by demands from various areas and applications and has evolved in parallel with advances in hardware and computing techniques.

This volume focuses on its recent advances and it is composed of five parts and a total of eighteen chapters. The first part of the book contains five contributions in the area of information retrieval and Web intelligence: a novel approach to solving index selection problem, integrated retrieval from Web of documents and data, bipolarity in database querying, deriving data summarization through ontologies, and granular computing for Web intelligence. The second part of the book contains four contributions in knowledge discovery area. Its third part contains three contributions in information integration and data security area. The remaining two parts of the book contain six contributions in the area of intelligent agents and applications of data management in medical domain.

Algorithmic Topology and Classification of 3-Manifolds (Hardcover, 2nd ed. 2007): Sergei Matveev Algorithmic Topology and Classification of 3-Manifolds (Hardcover, 2nd ed. 2007)
Sergei Matveev
R2,720 Discovery Miles 27 200 Ships in 10 - 15 working days

From the reviews of the 1st edition:

"This book provides a comprehensive and detailed account of different topics in algorithmic 3-dimensional topology, culminating with the recognition procedure for Haken manifolds and including the up-to-date results in computer enumeration of 3-manifolds. Originating from lecture notes of various courses given by the author over a decade, the book is intended to combine the pedagogical approach of a graduate textbook (without exercises) with the completeness and reliability of a research monograph...

All the material, with few exceptions, is presented from the peculiar point of view of special polyhedra and special spines of 3-manifolds. This choice contributes to keep the level of the exposition really elementary.

In conclusion, the reviewer subscribes to the quotation from the back cover: "the book fills a gap in the existing literature and will become a standard reference for algorithmic 3-dimensional topology both for graduate students and researchers."

Zentralblatt fur Mathematik 2004

For this 2nd edition, new results, new proofs, and commentaries for a better orientation of the reader have been added. In particular, in Chapter 7 several new sections concerning applications of the computer program "3-Manifold Recognizer" have been included. "

Fundamentals of Data Analytics - With a View to Machine Learning (Hardcover, 1st ed. 2020): Rudolf Mathar, Gholamreza... Fundamentals of Data Analytics - With a View to Machine Learning (Hardcover, 1st ed. 2020)
Rudolf Mathar, Gholamreza Alirezaei, Emilio Balda, Arash Behboodi
R2,628 Discovery Miles 26 280 Ships in 10 - 15 working days

This book introduces the basic methodologies for successful data analytics. Matrix optimization and approximation are explained in detail and extensively applied to dimensionality reduction by principal component analysis and multidimensional scaling. Diffusion maps and spectral clustering are derived as powerful tools. The methodological overlap between data science and machine learning is emphasized by demonstrating how data science is used for classification as well as supervised and unsupervised learning.

Nature-inspired Methods in Chemometrics: Genetic Algorithms and Artificial Neural Networks, Volume 23 (Hardcover, 1st ed):... Nature-inspired Methods in Chemometrics: Genetic Algorithms and Artificial Neural Networks, Volume 23 (Hardcover, 1st ed)
Riccardo Leardi
R6,118 Discovery Miles 61 180 Ships in 12 - 19 working days

In recent years Genetic Algorithms (GA) and Artificial Neural Networks (ANN) have progressively increased in importance amongst the techniques routinely used in chemometrics. This book contains contributions from experts in the field is divided in two sections (GA and ANN). In each part, tutorial chapters are included in which the theoretical bases of each technique are expertly (but simply) described. These are followed by application chapters in which special emphasis will be given to the advantages of the application of GA or ANN to that specific problem, compared to classical techniques, and to the risks connected with its misuse.
This book is of use to all those who are using or are interested in GA and ANN. Beginners can focus their attentions on the tutorials, whilst the most advanced readers will be more interested in looking at the applications of the techniques. It is also suitable as a reference book for students.
- Subject matter is steadily increasing in importance
- Comparison of Genetic Algorithms (GA) and Artificial Neural Networks (ANN) with the classical techniques
- Suitable for both beginners and advanced researchers

Cryptography in Constant Parallel Time (Hardcover, 2011): Benny Applebaum Cryptography in Constant Parallel Time (Hardcover, 2011)
Benny Applebaum
R3,569 R1,969 Discovery Miles 19 690 Save R1,600 (45%) Ships in 12 - 19 working days

Locally computable (NC0) functions are "simple" functions for which every bit of the output can be computed by reading a small number of bits of their input. The study of locally computable cryptography attempts to construct cryptographic functions that achieve this strong notion of simplicity and simultaneously provide a high level of security. Such constructions are highly parallelizable and they can be realized by Boolean circuits of constant depth.

This book establishes, for the first time, the possibility of local implementations for many basic cryptographic primitives such as one-way functions, pseudorandom generators, encryption schemes and digital signatures. It also extends these results to other stronger notions of locality, and addresses a wide variety of fundamental questions about local cryptography. The author's related thesis was honorably mentioned (runner-up) for the ACM Dissertation Award in 2007, and this book includes some expanded sections and proofs, and notes on recent developments.

The book assumes only a minimal background in computational complexity and cryptography and is therefore suitable for graduate students or researchers in related areas who are interested in parallel cryptography. It also introduces general techniques and tools which are likely to interest experts in the area.

New Advancements in Swarm Algorithms: Operators and Applications (Hardcover, 1st ed. 2020): Erik Cuevas, Fernando Fausto,... New Advancements in Swarm Algorithms: Operators and Applications (Hardcover, 1st ed. 2020)
Erik Cuevas, Fernando Fausto, Adrian Gonzalez
R2,909 Discovery Miles 29 090 Ships in 10 - 15 working days

This book presents advances in alternative swarm development that have proved to be effective in several complex problems. Swarm intelligence (SI) is a problem-solving methodology that results from the cooperation between a set of agents with similar characteristics. The study of biological entities, such as animals and insects, manifesting social behavior has resulted in several computational models of swarm intelligence. While there are numerous books addressing the most widely known swarm methods, namely ant colony algorithms and particle swarm optimization, those discussing new alternative approaches are rare. The focus on developments based on the simple modification of popular swarm methods overlooks the opportunity to discover new techniques and procedures that can be useful in solving problems formulated by the academic and industrial communities. Presenting various novel swarm methods and their practical applications, the book helps researchers, lecturers, engineers and practitioners solve their own optimization problems.

Feature Selection for High-Dimensional Data (Hardcover, 1st ed. 2015): Veronica Bolon-Canedo, Noelia Sanchez-Marono, Amparo... Feature Selection for High-Dimensional Data (Hardcover, 1st ed. 2015)
Veronica Bolon-Canedo, Noelia Sanchez-Marono, Amparo Alonso-Betanzos
R3,165 R1,914 Discovery Miles 19 140 Save R1,251 (40%) Ships in 12 - 19 working days

This book offers a coherent and comprehensive approach to feature subset selection in the scope of classification problems, explaining the foundations, real application problems and the challenges of feature selection for high-dimensional data. The authors first focus on the analysis and synthesis of feature selection algorithms, presenting a comprehensive review of basic concepts and experimental results of the most well-known algorithms. They then address different real scenarios with high-dimensional data, showing the use of feature selection algorithms in different contexts with different requirements and information: microarray data, intrusion detection, tear film lipid layer classification and cost-based features. The book then delves into the scenario of big dimension, paying attention to important problems under high-dimensional spaces, such as scalability, distributed processing and real-time processing, scenarios that open up new and interesting challenges for researchers. The book is useful for practitioners, researchers and graduate students in the areas of machine learning and data mining.

Innovations in Digital Watermarking Techniques (Hardcover, 2009 ed.): Feng-Hsing Wang Innovations in Digital Watermarking Techniques (Hardcover, 2009 ed.)
Feng-Hsing Wang
R2,985 Discovery Miles 29 850 Ships in 10 - 15 working days

Information security and copyright protection are more important today than before. Digital watermarking is one of the widely used techniques used in the world in the area of information security. This book introduces a number of digital watermarking techniques and is divided into four parts. The first part introduces the importance of watermarking techniques and intelligent technology. The second part includes a number of watermarking techniques. The third part includes the hybrid watermarking techniques and the final part presents conclusions. This book is directed to students, professors, researchers and application engineers who are interested in the area of information security.

Information Systems -- Creativity and Innovation in Small and Medium-Sized Enterprises - IFIP WG 8.2 International Conference,... Information Systems -- Creativity and Innovation in Small and Medium-Sized Enterprises - IFIP WG 8.2 International Conference, CreativeSME 2009, Guimaraes, Portugal, June 21-24, 2009, Proceedings (Hardcover, 2009 ed.)
Gurpreet Dhillon, Bernd Carsten Stahl, Richard Baskerville
R2,910 Discovery Miles 29 100 Ships in 10 - 15 working days

This book contains the collection of papers presented at the conference of the International Federation for Information Processing Working Group 8.2 "Information and Organizations." The conference took place during June 21-24, 2009 at the Universidade do Minho in Guimaraes, Portugal. The conference entitled "CreativeSME - The Role of IS in Leveraging the Intelligence and Creativity of SME's" attracted high-quality submissions from across the world. Each paper was reviewed by at least two reviewers in a double-blind review process. In addition to the 19 papers presented at the conference, there were five panels and four workshops, which covered a range of issues relevant to SMEs, creativity and information systems. We would like to show our appreciation of the efforts of our two invited keynote speakers, Michael Dowling of the University of Regensburg, Germany and Carlos Zorrinho, Portuguese coordinator of the Lisbon Strategy and the Technological Plan. The following organizations supported the conference through financial or other contributions and we would like to thank them for their engagement: "

Patterns of Intuition - Musical Creativity in the Light of Algorithmic Composition (Hardcover, 2015 ed.): Gerhard Nierhaus Patterns of Intuition - Musical Creativity in the Light of Algorithmic Composition (Hardcover, 2015 ed.)
Gerhard Nierhaus
R4,451 Discovery Miles 44 510 Ships in 12 - 19 working days

The present book is the result of a three year research project which investigated the creative act of composing by means of algorithmic composition. Central to the investigation are the compositional strategies of 12 composers, which were documented through a dialogic and cyclic process of modelling and evaluating musical materials. The aesthetic premises and compositional approaches configure a rich spectrum of diverse positions, which is reflected also in the kinds of approaches and methods used. These approaches and methods include the generation and evaluation of chord sequences using genetic algorithms, the application of morphing strategies to research harmonic transformations, an automatic classification of personal preferences via machine learning, and an application of mathematical music theory to the analysis and resynthesis of musical material. The second part of the book features contributions by Sandeep Bhagwati, William Brooks, David Cope, Darla Crispin, Nicolas Donin, and Guerino Mazzola. These authors variously consider the project from different perspectives, offer independent approaches, or provide more general reflections from their respective research fields.

Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography - Efficient Modular Exponential Techniques... Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography - Efficient Modular Exponential Techniques (Hardcover, 1st ed. 2021)
Satyanarayana Vollala, N. Ramasubramanian, Utkarsh Tiwari
R4,929 Discovery Miles 49 290 Ships in 12 - 19 working days

Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly depends on the efficient implementation of modular exponentiation and modular multiplication. Since 1984, when Montgomery first introduced a method to evaluate modular multiplications, many algorithmic modifications have been done for improving the efficiency of modular multiplication, but very less work has been done on the modular exponentiation to improve the efficiency. This research monograph addresses the question- how can the performance of modular exponentiation, which is the crucial operation of many public-key cryptographic techniques, be improved? The book focuses on Energy Efficient Modular Exponentiations for Cryptographic hardware. Spread across five chapters, this well-researched text focuses in detail on the Bit Forwarding Techniques and the corresponding hardware realizations. Readers will also discover advanced performance improvement techniques based on high radix multiplication and Cryptographic hardware based on multi-core architectures.

Computational Methods in Power System Analysis (Hardcover, 2014 ed.): Reijer Idema, Domenico J. P. Lahaye Computational Methods in Power System Analysis (Hardcover, 2014 ed.)
Reijer Idema, Domenico J. P. Lahaye
R3,539 Discovery Miles 35 390 Ships in 12 - 19 working days

This book treats state-of-the-art computational methods for power flow studies and contingency analysis. In the first part the authors present the relevant computational methods and mathematical concepts. In the second part, power flow and contingency analysis are treated. Furthermore, traditional methods to solve such problems are compared to modern solvers, developed using the knowledge of the first part of the book. Finally, these solvers are analyzed both theoretically and experimentally, clearly showing the benefits of the modern approach.

Differential Evolution - In Search of Solutions (Hardcover, 2006 ed.): Vitaliy Feoktistov Differential Evolution - In Search of Solutions (Hardcover, 2006 ed.)
Vitaliy Feoktistov
R1,639 Discovery Miles 16 390 Ships in 10 - 15 working days

This book presents an overview of the differential evolution algorithm. In the last few years the evolutionary computation domain has developed rapidly, and differential evolution is one of the representatives of this domain. It is a recently invented evolutionary algorithm that is gaining more and more popularity. Originally proposed for continuous unconstraint optimization, it was enlarged both for mixed optimization and for handling nonlinear constraints. Later on, new strategies, tuning, and adaptation of control parameters, ways of hybridization were elaborated. Attempts at theoretical analysis were accomplished as well. Moreover, the algorithm has a huge number of practical applications in different areas of science and industry.

Music-Inspired Harmony Search Algorithm - Theory and Applications (Hardcover, 2009 ed.): Zong Woo Geem Music-Inspired Harmony Search Algorithm - Theory and Applications (Hardcover, 2009 ed.)
Zong Woo Geem
R2,993 Discovery Miles 29 930 Ships in 10 - 15 working days

Calculus has been used in solving many scientific and engineering problems. For optimization problems, however, the differential calculus technique sometimes has a drawback when the objective function is step-wise, discontinuous, or multi-modal, or when decision variables are discrete rather than continuous. Thus, researchers have recently turned their interests into metaheuristic algorithms that have been inspired by natural phenomena such as evolution, animal behavior, or metallic annealing.

This book especially focuses on a music-inspired metaheuristic algorithm, harmony search. Interestingly, there exists an analogy between music and optimization: each musical instrument corresponds to each decision variable; musical note corresponds to variable value; and harmony corresponds to solution vector. Just like musicians in Jazz improvisation play notes randomly or based on experiences in order to find fantastic harmony, variables in the harmony search algorithm have random values or previously-memorized good values in order to find optimal solution.

Computational Thinking - First Algorithms, Then Code (Hardcover, 1st ed. 2018): Paolo Ferragina, Fabrizio Luccio Computational Thinking - First Algorithms, Then Code (Hardcover, 1st ed. 2018)
Paolo Ferragina, Fabrizio Luccio
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book offers a gentle motivation and introduction to computational thinking, in particular to algorithms and how they can be coded to solve significant, topical problems from domains such as finance, cryptography, Web search, and data compression. The book is suitable for undergraduate students in computer science, engineering, and applied mathematics, university students in other fields, high-school students with an interest in STEM subjects, and professionals who want an insight into algorithmic solutions and the related mindset. While the authors assume only basic mathematical knowledge, they uphold the scientific rigor that is indispensable for transforming general ideas into executable algorithms. A supporting website contains examples and Python code for implementing the algorithms in the book.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Network Flows - Pearson New…
Ravindra Ahuja, Thomas Magnanti, … Paperback R2,679 Discovery Miles 26 790
Python Programming for Computations…
Computer Language Hardcover R1,216 R1,024 Discovery Miles 10 240
Coding for Kids in Python - Python…
Bob Mather Hardcover R917 Discovery Miles 9 170
Functional Encryption
Khairol Amali Bin Ahmad, Khaleel Ahmad, … Hardcover R2,911 Discovery Miles 29 110
Gamma Solution - An Application of…
James R Warren Hardcover R1,338 R1,131 Discovery Miles 11 310
Data Science and Internet of Things…
Giancarlo Fortino, Antonio Liotta, … Hardcover R4,234 Discovery Miles 42 340
Genetic Algorithms with Python
Clinton Sheppard Hardcover R911 R858 Discovery Miles 8 580
C Programming - C Programming Language…
Adam Dodson Hardcover R598 R542 Discovery Miles 5 420
Image Analysis, Classification and…
Morton John Canty Paperback R1,540 Discovery Miles 15 400
A Textbook of Data Structures and…
Vijayalakshmi P Hardcover R3,817 Discovery Miles 38 170

 

Partners