![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing > Data structures
The detailed survey on constraint handling techniques specifically penalty function approach is presented in the book; presents the Cohort Intelligence (CI) algorithm incorporated with a novel self-adaptive penalty function (SAPF) approach which helped in avoiding preliminary trials of selecting penalty parameter. The approach is referred to as CI-SAPF; CI-SAPF is further hybridized with Colliding Bodies Optimization (CBO) algorithm to promote a parameter less metaheuristic algorithm; presents solutions to several problems from discrete truss structure domain, mixed variable design engineering domain, and linear & nonlinear domain validating the CI-SAPF and CI-SAPF-CBO; behavior of SAPF approach on pseudo objective function, constraint violations, penalty function and penalty parameter have been analyzed and discussed in very detail; presents the in-depth analysis and comparison of the CI-SAPF, CI-SAPF-CBO and CBO algorithms with other contemporary techniques; provides the solution to real-world manufacturing problems of optimizing multi pass milling and turning processes using CI-SPF, CI-SAPF and CI-SAPF-CBO approaches.
Nature-based algorithms play an important role among artificial intelligence algorithms. Among them are global optimization algorithms called swarm intelligence algorithms. These algorithms that use the behavior of simple agents and various ways of cooperation between them, are used to solve specific problems that are defined by the so-called objective function. Swarm intelligence algorithms are inspired by the social behavior of various animal species, e.g. ant colonies, bird flocks, bee swarms, schools of fish, etc. The family of these algorithms is very large and additionally includes various types of modifications to enable swarm intelligence algorithms to solve problems dealing with areas other than those for which they were originally developed. This book presents 24 swarm algorithms together with their modifications and practical applications. Each chapter is devoted to one algorithm. It contains a short description along with a pseudo-code showing the various stages of its operation. In addition, each chapter contains a description of selected modifications of the algorithm and shows how it can be used to solve a selected practical problem. This book should also be useful for undergraduate and postgraduate students studying nature-based optimization algorithms, and can be a helpful tool for learning these algorithms, along with their modifications and practical applications. In addition, it can be a useful source of knowledge for scientists working in the field of artificial intelligence, as well as for engineers interested in using this type of algorithms in their work. If the reader wishes to expand his knowledge beyond the basics of swarm intelligence algorithms presented in this book and is interested in more detailed information, we recommend the book "Swarm Intelligence Algorithms: A Tutorial" (Edited by A. Slowik, CRC Press, 2020). It contains a detailed explanation of how each algorithm works, along with relevant program codes in Matlab and the C ++ programming language, as well as numerical examples illustrating step-by-step how individual algorithms work.
1) Focuses on the concepts and implementation strategies of various Deep Learning algorithms through properly curated examples. 2) The subject area will be valid for the next 10 years or so, as Deep Learning theory/algorithms and their applications will not be outdated easily. Hence there will be demand for such a book in the market. 3) In comparison to other titles, this book rigorously covers mathematical and conceptual details of relevant topics.
Do you have creative ideas that you wish you could transform into code? Do you want to boost your problem solving and logic skills? Do you want to enhance your career by adopting an algorithmic mindset? In our increasingly digital world, coding is an essential skill. Communicating an algorithm to a machine to perform a set of tasks is vital. Beginner's Guide to Code Algorithms: Experiments to Enhance Productivity and Solve Problems written by Deepankar Maitra teaches you how to think like a programmer. The author unravels the secret behind writing code - building a good algorithm. Algorithmic thinking leads to asking the right question and enables a shift from issue resolution to value creation. Having this mindset will make you more marketable to employers. This book takes you on a problem-solving journey to expand your mind and increase your willingness to experiment with code. You will: Learn the art of building an algorithm through hands-on exercises Understand how to develop code for inspiring productivity concepts Build a mentality of developing algorithms to solve problems Develop, test, review, and improve code through guided experimentation This book is designed to develop a culture of logical thinking through intellectual stimulation. It will benefit students and teachers of programming, business professionals, as well as experienced users of Microsoft Excel who wish to become proficient with macros.
Automatic Differentiation (AD) is a maturing computational technology and has become a mainstream tool used by practicing scientists and computer engineers. The rapid advance of hardware computing power and AD tools has enabled practitioners to quickly generate derivative-enhanced versions of their code for a broad range of applications in applied research and development. "Automatic Differentiation of Algorithms" provides a comprehensive and authoritative survey of all recent developments, new techniques, and tools for AD use. The book covers all aspects of the subject: mathematics, scientific programming ( i.e., use of adjoints in optimization) and implementation (i.e., memory management problems). A strong theme of the book is the relationships between AD tools and other software tools, such as compilers and parallelizers. A rich variety of significant applications are presented as well, including optimum-shape design problems, for which AD offers more efficient tools and techniques. Topics and features: * helpful introductory AD survey chapter for brief overview of the field *extensive applications chapters, i.e., for circuit simulation, optimization and optimal-control shape design, structural mechanics, and multibody dynamical systems modeling *comprehensive bibliography for all current literature and results for the field *performance issues *optimal control sensitivity analysis *AD use with object oriented software tool kits The book is an ideal and accessible survey of recent developments and applications of AD tools and techniques for a broad scientific computing and computer engineering readership. Practitioners, professionals, and advanced graduates working in AD development will find the book a useful reference and essential resource for their work.
Resolves linear and non-linear data structures in C language using the algorithm, diagrammatically and its time and space complexity analysis. Covers interview questions and MCQs on all topics of campus readiness Identifies possible solutions to each problem. Includes real life and computational applications of linear and non-linear data structures
Covers deep learning fundamentals; Focuses on applications; Covers human emotion analysis and deep learning; Explains how to use web based techniques for deep learning applications; Includes coverage of autonomous vehicles and deep learning
This book presents fundamental concepts of optimization problems and its real-world applications in various fields. The core concepts of optimization, formulations and solution procedures of various real-world problems are provided in an easy-to-read manner. The unique feature of this book is that it presents unified knowledge of the modelling of real-world decision-making problems and provides the solution procedure using the appropriate optimization techniques. The book will help students, researchers, and faculty members to understand the need for optimization techniques for obtaining optimal solution for the decision-making problems. It provides a sound knowledge of modelling of real-world problems using optimization techniques. It is a valuable compendium of several optimization techniques for solving real-world application problems using optimization software LINGO. The book is useful for academicians, practitioners, students and researchers in the field of OR. It is written in simple language with a detailed explanation of the core concepts of optimization techniques. Readers of this book will understand the formulation of real-world problems and their solution procedures obtained using the appropriate optimization techniques.
Presents original method of enhanced ant colony optimization in feature selection, based on mathematical experiments and modelling. Provides a theoretical concept in iris features searching and detection as part of feature extraction process. Demonstrates the iris features selection and detection using the proposed design methodology with enhanced ant colony optimization for iris recognition.
Provides a comprehensive introduction to multi-robot systems planning and task allocation; Explores multi robot aerial planning, flight planning, orienteering and coverage, and deployment, patrolling, and foraging; Includes real-world case studies; Treats different aspects of cooperation in multi-agent systems.
Modelling Transitions shows what computational, formal and data-driven approaches can and could mean for sustainability transitions research, presenting the state-of-the-art and exploring what lies beyond. Featuring contributions from many well-known authors, this book presents the various benefits of modelling for transitions research. More than just taking stock, it also critically examines what modelling of transformative change means and could mean for transitions research and for other disciplines that study societal changes. This includes identifying a variety of approaches currently not part of the portfolios of transitions modellers. Far from only singing praise, critical methodological and philosophical introspection are key aspects of this important book. This book speaks to modellers and non-modellers alike who value the development of robust knowledge on transitions to sustainability, including colleagues in congenial fields. Be they students, researchers or practitioners, everyone interested in transitions should find this book relevant as reference, resource and guide.
Addresses real-world challenges in using AI Covers the entire AI process in a holistic manner Explains the technical issues in an easy to use manner Provides real-world examples of AI enablement Addresses the challenges of complex enterprises, coalitions and consortia Avoids the hype, with balanced perspective on benefits and drawbacks of AI
This volume contains the texts of the principal survey papers presented at ALGORITHMS -and ORDER, held. at Ottawa, Canada from June 1 to June 12, 1987. The conference was supported by grants from the N.A.T.O. Advanced Study Institute programme, the University of Ottawa, and the Natural Sciences and Engineering Research Council of Canada. We are grateful for this considerable support. Over fifty years ago, the Symposium on Lattice Theory, in Charlottesville, U.S.A., proclaimed the vitality of ordered sets. Only twenty years later the Symposium on Partially Ordered Sets and Lattice Theory, held at Monterey, U.S.A., had solved many of the problems that had been originally posed. In 1981, the Symposium on Ordered Sets held at Banff, Canada, continued this tradition. It was marked by a landmark volume containing twenty-three articles on almost all current topics in the theory of ordered sets and its applications. Three years after, Graphs and Orders, also held at Banff, Canada, aimed to document the role of graphs in the theory of ordered sets and its applications. Because of its special place in the landscape of the mathematical sciences order is especially sensitive to new trends and developments. Today, the most important current in the theory and application of order springs from theoretical computer seience. Two themes of computer science lead the way. The first is data structure. Order is common to data structures."
This book provides an integrated solution for security and safety in the home, covering both assistance in health monitoring and safety from strangers/intruders who want to enter the home with harmful intentions. It defines a system whereby recognition of a person/stranger at the door is done using three modules: Face Recognition, Voice Recognition and Similarity Index. These three modules are taken together to provide a percentage likelihood that the individual is in the "known" or "unknown" category. The system can also continuously monitor the health parameters of a vulnerable person living alone at home and aid them in calling for help in an emergency. The authors have analyzed a number of existing biometric techniques to provide security for an individual living alone at home. These biometric techniques have been tested using MATLAB (R) image processing and signal processing toolboxes, and results have been calculated on the basis of recognition rate. A major contribution in providing security is a hybrid algorithm proposed by the author named PICA, which combines features of both PCA (Principle Component Analysis) and ICA (Independent Component Analysis) algorithms. This hybrid approach gives better performance recognition than either system alone. The second proposed hybrid algorithm for voice recognition is named as a MFRASTA algorithm by combining features of MFCC (Mel Frequency Cepstral Coefficient) and RASTA-PLP (RelAtive SpecTrA-Perceptual Linear Prediction) algorithm. After performing experiments, results are collected on the basis of recognition rate. The authors have also proposed a third technique named as a Similarity Index to provide trust-based security for an individual. This technique is text independent in which a person is recognized by pronunciation, frequency, tone, pitch, etc., irrespective of the content spoken by the person. By combining these three techniques, a high recognition rate is provided to the person at the door and high security to the individual living independently at home. In the final contribution, the authors have proposed a fingertip-based application for health monitoring by using the concept of sensors. This application is developed using iPhone 6's camera. When a person puts their fingertip on a camera lens, with the help of brightness of the skin, the person's heartbeat will be monitored. This is possible even with a low-quality camera. In case of any emergency, text messages will be sent to the family members of the individual living alone by using 3G Dongle and MATLAB tool. Results show that the proposed work outperforms all the existing techniques used in face recognition, voice recognition, and health monitoring alone.
This comprehensive reference text discusses evolutionary optimization techniques, to find optimal solutions for single and multi-objective problems. The text presents each evolutionary optimization algorithm along with its history and other working equations. It also discusses variants and hybrids of optimization techniques. The text presents step-by-step solution to a problem and includes software's like MATLAB and Python for solving optimization problems. It covers important optimization algorithms including single objective optimization, multi objective optimization, Heuristic optimization techniques, shuffled frog leaping algorithm, bacteria foraging algorithm and firefly algorithm. Aimed at senior undergraduate and graduate students in the field of electrical engineering, electronics engineering, mechanical engineering, and computer science and engineering, this text: Provides step-by-step solution for each evolutionary optimization algorithm. Provides flowcharts and graphics for better understanding of optimization techniques. Discusses popular optimization techniques include particle swarm optimization and genetic algorithm. Presents every optimization technique along with the history and working equations. Includes latest software like Python and MATLAB.
The aim of this book is to present new computational techniques and methodologies for the analysis of the clinical, epidemiological and public health aspects of SARS-CoV-2 and COVID-19 pandemic. The book presents the use of soft computing techniques such as machine learning algorithms for analysis of the epidemiological aspects of the SARS-CoV-2. This book clearly explains novel computational image processing algorithms for the detection of COVID-19 lesions in lung CT and X-ray images. It explores various computational methods for computerized analysis of the SARS-CoV-2 infection including severity assessment. The book provides a detailed description of the algorithms which can potentially aid in mass screening of SARS-CoV-2 infected cases. Finally the book also explains the conventional epidemiological models and machine learning techniques for the prediction of the course of the COVID-19 epidemic. It also provides real life examples through case studies. The book is intended for biomedical engineers, mathematicians, postgraduate students; researchers; medical scientists working on identifying and tracking infectious diseases.
Understand the introductory concepts and design principles of algorithms and their complexities. Demonstrate the programming implementations of all the algorithms using C-Language. Be an excellent handbook on algorithms with self-explanatory chapters enriched with problems and solutions.
This book "Advanced Applications of Computational Mathematics" covers multidisciplinary studies containing advanced research in the field of computational and applied mathematics. The book includes research methodology, techniques, applications, and algorithms. The book will be very useful to advanced students, researchers and practitioners who are involved in the areas of computational and applied mathematics and engineering.
Introduces a new web-based optimizer for Geometric algebra algorithms; Supports many programming languages as well as hardware; Covers the advantages of High-dimensional algebras; Includes geometrically intuitive support of quantum computing
Soft computing techniques are no longer limited to the arena of computer science. The discipline has an exponentially growing demand in other branches of science and engineering and even into health and social science. This book contains theory and applications of soft computing in engineering, health, and social and applied sciences. Different soft computing techniques such as artificial neural networks, fuzzy systems, evolutionary algorithms and hybrid systems are discussed. It also contains important chapters in machine learning and clustering. This book presents a survey of the existing knowledge and also the current state of art development through original new contributions from the researchers. This book may be used as a one-stop reference book for a broad range of readers worldwide interested in soft computing. In each chapter, the preliminaries have been presented first and then the advanced discussion takes place. Learners and researchers from a wide variety of backgrounds will find several useful tools and techniques to develop their soft computing skills. This book is meant for graduate students, faculty and researchers willing to expand their knowledge in any branch of soft computing. The readers of this book will require minimum prerequisites of undergraduate studies in computation and mathematics.
The opportunistic network is an emerging and recent area of research. To make this research area more adaptable for practical and industrial use, there is a need to further investigate several research challenges in all aspects of opportunistic networks. Therefore, Opportunistic Networks: Fundamentals, Applications and Emerging Trends provides theoretical, algorithmic, simulation, and implementation-based research developments related to fundamentals, applications, and emerging research trends in opportunistic networks. The book follows a theoretical approach to describe fundamentals to beginners and incorporates a practical approach depicting the implementation of real-life applications to intermediate and advanced readers. This book is beneficial for academicians, researchers, developers, and engineers who work in or are interested in the fields related to opportunistic networks, delay tolerant networks, and intermittently connected ad hoc networks. This book also serves as a reference book for graduate and postgraduate courses in computer science, computer engineering, and information technology streams.
In this multidisciplinary book, experts from around the globe examine how data-driven political campaigning works, what challenges it poses for personal privacy and democracy, and how emerging practices should be regulated. The rise of big data analytics in the political process has triggered official investigations in many countries around the world, and become the subject of broad and intense debate. Political parties increasingly rely on data analytics to profile the electorate and to target specific voter groups with individualised messages based on their demographic attributes. Political micro-targeting has become a major factor in modern campaigning, because of its potential to influence opinions, to mobilise supporters and to get out votes. The book explores the legal, philosophical and political dimensions of big data analytics in the electoral process. It demonstrates that the unregulated use of big personal data for political purposes not only infringes voters' privacy rights, but also has the potential to jeopardise the future of the democratic process, and proposes reforms to address the key regulatory and ethical questions arising from the mining, use and storage of massive amounts of voter data. Providing an interdisciplinary assessment of the use and regulation of big data in the political process, this book will appeal to scholars from law, political science, political philosophy and media studies, policy makers and anyone who cares about democracy in the age of data-driven political campaigning.
This book presents watermarking algorithms derived from signal processing methods such as wavelet transform, matrix decomposition and cosine transform to address the limitations of current technologies. For each algorithm, mathematical foundations are explained with analysis conducted to evaluate performances on robotness and efficiency. Combining theories and practice, it is suitable for information security researchers and industrial engineers.
This book addresses the issue of improving the accuracy in exon prediction in DNA sequences using various adaptive techniques based on different performance measures that are crucial in disease diagnosis and therapy. First, the authors present an overview of genomics engineering, structure of DNA sequence and its building blocks, genetic information flow in a cell, gene prediction along with its significance, and various types of gene prediction methods, followed by a review of literature starting with the biological background of genomic sequence analysis. Next, they cover various theoretical considerations of adaptive filtering techniques used for DNA analysis, with an introduction to adaptive filtering, properties of adaptive algorithms, and the need for development of adaptive exon predictors (AEPs) and structure of AEP used for DNA analysis. Then, they extend the approach of least mean squares (LMS) algorithm and its sign-based realizations with normalization factor for DNA analysis. They also present the normalized logarithmic-based realizations of least mean logarithmic squares (LMLS) and least logarithmic absolute difference (LLAD) adaptive algorithms that include normalized LMLS (NLMLS) algorithm, normalized LLAD (NLLAD) algorithm, and their signed variants. This book ends with an overview of the goals achieved and highlights the primary achievements using all proposed techniques. This book is intended to provide rigorous use of adaptive signal processing algorithms for genetic engineering, biomedical engineering, and bioinformatics and is useful for undergraduate and postgraduate students. This will also serve as a practical guide for Ph.D. students and researchers and will provide a number of research directions for further work. Features Presents an overview of genomics engineering, structure of DNA sequence and its building blocks, genetic information flow in a cell, gene prediction along with its significance, and various types of gene prediction methods Covers various theoretical considerations of adaptive filtering techniques used for DNA analysis, introduction to adaptive filtering, properties of adaptive algorithms, need for development of adaptive exon predictors (AEPs), and structure of AEP used for DNA analysis Extends the approach of LMS algorithm and its sign-based realizations with normalization factor for DNA analysis Presents the normalized logarithmic-based realizations of LMLS and LLAD adaptive algorithms that include normalized LMLS (NLMLS) algorithm, normalized LLAD (NLLAD) algorithm, and their signed variants Provides an overview of the goals achieved and highlights the primary achievements using all proposed techniques Dr. Md. Zia Ur Rahman is a professor in the Department of Electronics and Communication Engineering at Koneru Lakshmaiah Educational Foundation (K. L. University), Guntur, India. His current research interests include adaptive signal processing, biomedical signal processing, genetic engineering, medical imaging, array signal processing, medical telemetry, and nanophotonics. Dr. Srinivasareddy Putluri is currently a Software Engineer at Tata Consultancy Services Ltd., Hyderabad. He received his Ph.D. degree (Genomic Signal Processing using Adaptive Signal Processing algorithms) from the Department of Electronics and Communication Engineering at Koneru Lakshmaiah Educational Foundation (K. L. University), Guntur, India. His research interests include genomic signal processing and adaptive signal processing. He has published 15 research papers in various journals and proceedings. He is currently a reviewer of publishers like the IEEE Access and IGI.
the handbook is a valuable reference to researchers from industry and academia, as well as Masters and PhD students around the globe working in the metaheuristics and applications domain includes contributions from a variety of academics/researchers in the field of metaheuristics |
![]() ![]() You may like...
Statistical Physics, Automata Networks…
E. Goles, Servet Martinez
Hardcover
R1,644
Discovery Miles 16 440
|