![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing > Data structures
This book is designed both for FPGA users interested in developing new, specific components - generally for reducing execution times -and IP core designers interested in extending their catalog of specific components. The main focus is circuit synthesis and the discussion shows, for example, how a given algorithm executing some complex function can be translated to a synthesizable circuit description, as well as which are the best choices the designer can make to reduce the circuit cost, latency, or power consumption. This is not a book on algorithms. It is a book that shows how to translate efficiently an algorithm to a circuit, using techniques such as parallelism, pipeline, loop unrolling, and others. Numerous examples of FPGA implementation are described throughout this book and the circuits are modeled in VHDL. Complete and synthesizable source files are available for download."
Focuses on the definition, engineering, and delivery of AI solutions as opposed to AI itself Reader will still gain a strong understanding of AI, but through the perspective of delivering real solutions Explores the core AI issues that impact the success of an overall solution including i. realities of dealing with data, ii. impact of AI accuracy on the ability of the solution to meet business objectives, iii. challenges in managing the quality of machine learning models Includes real world examples of enterprise scale solutions Provides a series of (optional) technical deep dives and thought experiments.
The notion of swarm intelligence was introduced for describing decentralized and self-organized behaviors of groups of animals. Then this idea was extrapolated to design groups of robots which interact locally to cumulate a collective reaction. Some natural examples of swarms are as follows: ant colonies, bee colonies, fish schooling, bird flocking, horse herding, bacterial colonies, multinucleated giant amoebae Physarum polycephalum, etc. In all these examples, individual agents behave locally with an emergence of their common effect. An intelligent behavior of swarm individuals is explained by the following biological reactions to attractants and repellents. Attractants are biologically active things, such as food pieces or sex pheromones, which attract individuals of swarm. Repellents are biologically active things, such as predators, which repel individuals of swarm. As a consequence, attractants and repellents stimulate the directed movement of swarms towards and away from the stimulus, respectively. It is worth noting that a group of people, such as pedestrians, follow some swarm patterns of flocking or schooling. For instance, humans prefer to avoid a person considered by them as a possible predator and if a substantial part of the group in the situation of escape panic (not less than 5%) changes the direction, then the rest follows the new direction, too. Some swarm patterns are observed among human beings under the conditions of their addictive behavior such as the behavior of alcoholics or gamers. The methodological framework of studying swarm intelligence is represented by unconventional computing, robotics, and cognitive science. In this book we aim to analyze new methodologies involved in studying swarm intelligence. We are going to bring together computer scientists and cognitive scientists dealing with swarm patterns from social bacteria to human beings. This book considers different models of simulating, controlling, and predicting the swarm behavior of different species from social bacteria to humans.
These contributions, written by the foremost international researchers and practitioners of Genetic Programming (GP), explore the synergy between theoretical and empirical results on real-world problems, producing a comprehensive view of the state of the art in GP. Topics in this volume include: evolutionary constraints, relaxation of selection mechanisms, diversity preservation strategies, flexing fitness evaluation, evolution in dynamic environments, multi-objective and multi-modal selection, foundations of evolvability, evolvable and adaptive evolutionary operators, foundation of injecting expert knowledge in evolutionary search, analysis of problem difficulty and required GP algorithm complexity, foundations in running GP on the cloud - communication, cooperation, flexible implementation, and ensemble methods. Additional focal points for GP symbolic regression are: (1) The need to guarantee convergence to solutions in the function discovery mode; (2) Issues on model validation; (3) The need for model analysis workflows for insight generation based on generated GP solutions - model exploration, visualization, variable selection, dimensionality analysis; (4) Issues in combining different types of data. Readers will discover large-scale, real-world applications of GP to a variety of problem domains via in-depth presentations of the latest and most significant results.
Metaheuristic algorithms are considered as generic optimization tools that can solve very complex problems characterized by having very large search spaces. Metaheuristic methods reduce the effective size of the search space through the use of effective search strategies. Book Features: Provides a unified view of the most popular metaheuristic methods currently in use Includes the necessary concepts to enable readers to implement and modify already known metaheuristic methods to solve problems Covers design aspects and implementation in MATLAB (R) Contains numerous examples of problems and solutions that demonstrate the power of these methods of optimization The material has been written from a teaching perspective and, for this reason, this book is primarily intended for undergraduate and postgraduate students of artificial intelligence, metaheuristic methods, and/or evolutionary computation. The objective is to bridge the gap between metaheuristic techniques and complex optimization problems that profit from the convenient properties of metaheuristic approaches. Therefore, engineer practitioners who are not familiar with metaheuristic computation will appreciate that the techniques discussed are beyond simple theoretical tools, since they have been adapted to solve significant problems that commonly arise in such areas.
This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties. More specifically, Walsh spectrum description of the traditional cryptographic properties of Boolean functions, including linear structure, propagation criterion, nonlinearity, and correlation immunity are presented. Constructions of symmetric Boolean functions and of Boolean permutations with good cryptographic properties are specifically studied. This book is not meant to be comprehensive, but with its own focus on some original research of the authors in the past. To be self content, some basic concepts and properties are introduced. This book can serve as a reference for cryptographic algorithm designers, particularly the designers of stream ciphers and of block ciphers, and for academics with interest in the cryptographic properties of Boolean functions.
The last decade has witnessed a rapid surge of interest in new sensing and monitoring devices for wellbeing and healthcare. One key development in this area is wireless, wearable and implantable "in vivo" monitoring and intervention. A myriad of platforms are now available from both academic institutions and commercial organisations. They permit the management of patients with both acute and chronic symptoms, including diabetes, cardiovascular diseases, treatment of epilepsy and other debilitating neurological disorders. Despite extensive developments in sensing technologies, there are significant research issues related to system integration, sensor miniaturisation, low-power sensor interface, wireless telemetry and signal processing. In the 2nd edition of this popular and authoritative reference on Body Sensor Networks (BSN), major topics related to the latest technological developments and potential clinical applications are discussed, with contents covering. Biosensor Design, Interfacing and Nanotechnology Wireless Communication and Network Topologies Communication Protocols and Standards Energy Harvesting and Power Delivery Ultra-low Power Bio-inspired Processing Multi-sensor Fusion and Context Aware Sensing Autonomic Sensing Wearable, Ingestible Sensor Integration and Exemplar Applications System Integration and Wireless Sensor Microsystems The book also provides a comprehensive review of the current wireless sensor development platforms and a step-by-step guide to developing your own BSN applications through the use of BSN development kit.
It explores a variety of modern applications in soft computing, including bioinspired computing, reconfigurable computing, fuzzy logic, fusion-based learning, intelligent healthcare systems, bioinformatics, data mining, functional approximation, genetic and evolutionary algorithms, hybrid models, machine learning, meta heuristics, neuro fuzzy system, and optimization principles. The book acts as a reference book for AI developers, researchers, and academicians as it addresses the recent technological developments in the field of soft computing.
This book is for anyone who wants to gain an understanding of Blockchain technology and its potential. The book is research-oriented and covers different verticals of Blockchain technology. It discusses the characteristics and features of Blockchain, includes techniques, challenges, and future trends, along with case studies for deeper understanding. Blockchain Technology: Exploring Opportunities, Challenges, and Applications covers the core concepts related to Blockchain technology starting from scratch. The algorithms, concepts, and application areas are discussed according to current market trends and industry needs. It presents different application areas of industry and academia and discusses the characteristics and features of this technology. It also explores the challenges and future trends and provides an understanding of new opportunities. This book is for anyone at the beginner to intermediate level that wants to learn about the core concepts related to Blockchain technology.
This book is for anyone who wants to gain an understanding of Blockchain technology and its potential. The book is research-oriented and covers different verticals of Blockchain technology. It discusses the characteristics and features of Blockchain, includes techniques, challenges, and future trends, along with case studies for deeper understanding. Blockchain Technology: Exploring Opportunities, Challenges, and Applications covers the core concepts related to Blockchain technology starting from scratch. The algorithms, concepts, and application areas are discussed according to current market trends and industry needs. It presents different application areas of industry and academia and discusses the characteristics and features of this technology. It also explores the challenges and future trends and provides an understanding of new opportunities. This book is for anyone at the beginner to intermediate level that wants to learn about the core concepts related to Blockchain technology.
The 4th FTRA International Conference on Information Technology
Convergence and Services (ITCS-12) will be held in Gwangju, Korea
on September 6 - 8, 2012.
This book offers a self-contained guide to advanced algorithms and their applications in various fields of science. Gathering contributions by authoritative researchers in the field of mathematics, statistics and computer science, it aims at offering a comprehensive and up-to-date view of algorithms, including the theory behind them, as well as practical considerations, current limitations and solutions. It covers applications in energy management, decision making, computer networks, materials science, mechanics and process optimization. It offers an integrated and timely guide to important algorithms, and represents a valuable reference resource for graduate students and researchers in various fields of applied mathematics, statistics and engineering.
This new book-the first of its kind-examines the use of algorithmic techniques to compress random and non-random sequential strings found in chains of polymers. The book is an introduction to algorithmic complexity. Examples taken from current research in the polymer sciences are used for compression of like-natured properties as found on a chain of polymers. Both theory and applied aspects of algorithmic compression are reviewed. A description of the types of polymers and their uses is followed by a chapter on various types of compression systems that can be used to compress polymer chains into manageable units. The work is intended for graduate and postgraduate university students in the physical sciences and engineering.
Offers fundamental theories and practical and more sophisticated applications of Evolutionary Computation in varied industries Provides insight into various platforms, paradigms, techniques, and tools used in Evolutionary Computation for diverse fields Presents an understanding related to optimization, performance tuning, virtualization, deployment models, and their applications Covers a variety of applications for social and essential models and is based on real life examples Useful for decision making based on optimized data through Evolutionary Computation in multi-dimensions
"High Performance Deformable Image Registration Algorithms for
Manycore Processors" develops highly data-parallel image
registration algorithms suitable for use on modern multi-core
architectures, including graphics processing units (GPUs). Focusing
on deformable registration, we show how to develop data-parallel
versions of the registration algorithm suitable for execution on
the GPU. Image registration is the process of aligning two or more
images into a common coordinate frame and is a fundamental step to
be able to compare or fuse data obtained from different sensor
measurements. Extracting useful information from 2D/3D data is
essential to realizing key technologies underlying our daily lives.
Examples include autonomous vehicles and humanoid robots that can
recognize and manipulate objects in cluttered environments using
stereo vision and laser sensing and medical imaging to localize and
diagnose tumors in internal organs using data captured by CT/MRI
scans. This book demonstrates: How to redesign widely used image registration algorithms so as to best expose the underlying parallelism available in these algorithmsHow to pose and implement the parallel versions of the algorithms within the single instruction, multiple data (SIMD) model supported by GPUsProgramming "tricks" that can help readers develop other image processing algorithms, including registration algorithms for the GPU
This book presents watermarking algorithms derived from signal processing methods such as wavelet transform, matrix decomposition and cosine transform to address the limitations of current technologies. For each algorithm, mathematical foundations are explained with analysis conducted to evaluate performances on robotness and efficiency. Combining theories and practice, it is suitable for information security researchers and industrial engineers.
This book proposes tools for analysis of multidimensional and metric data, by establishing a state-of-the-art of the existing solutions and developing new ones. It mainly focuses on visual exploration of these data by a human analyst, relying on a 2D or 3D scatter plot display obtained through Dimensionality Reduction. Performing diagnosis of an energy system requires identifying relations between observed monitoring variables and the associated internal state of the system. Dimensionality reduction, which allows to represent visually a multidimensional dataset, constitutes a promising tool to help domain experts to analyse these relations. This book reviews existing techniques for visual data exploration and dimensionality reduction such as tSNE and Isomap, and proposes new solutions to challenges in that field. In particular, it presents the new unsupervised technique ASKI and the supervised methods ClassNeRV and ClassJSE. Moreover, MING, a new approach for local map quality evaluation is also introduced. These methods are then applied to the representation of expert-designed fault indicators for smart-buildings, I-V curves for photovoltaic systems and acoustic signals for Li-ion batteries.
High quality meshes play a key role in many applications based on digital modeling and simulation. The finite element method is a paragon for such an approach and it is well known that quality meshes can significantly improve computational efficiency and solution accuracy of this method. Therefore, a lot of effort has been put in methods for improving mesh quality. These range from simple geometric approaches, like Laplacian smoothing, with a high computational efficiency but possible low resulting mesh quality, to global optimization-based methods, resulting in an excellent mesh quality at the cost of an increased computational and implementational complexity. The geometric element transformation method (GETMe) aims to fill the gap between these two approaches. It is based on geometric mesh element transformations, which iteratively transform polygonal and polyhedral elements into their regular counterparts or into elements with a prescribed shape. GETMe combines a Laplacian smoothing-like computational efficiency with a global optimization-like effectiveness. The method is straightforward to implement and its variants can also be used to improve tangled and anisotropic meshes. This book describes the mathematical theory of geometric element transformations as foundation for mesh smoothing. It gives a thorough introduction to GETMe-based mesh smoothing and its algorithms providing a framework to focus on effectively improving key mesh quality aspects. It addresses the improvement of planar, surface, volumetric, mixed, isotropic, and anisotropic meshes and addresses aspects of combining mesh smoothing with topological mesh modification. The advantages of GETMe-based mesh smoothing are demonstrated by the example of various numerical tests. These include smoothing of real world meshes from engineering applications as well as smoothing of synthetic meshes for demonstrating key aspects of GETMe-based mesh improvement. Results are compared with those of other smoothing methods in terms of runtime behavior, mesh quality, and resulting finite element solution efficiency and accuracy. Features: * Helps to improve finite element mesh quality by applying geometry-driven mesh smoothing approaches. * Supports the reader in understanding and implementing GETMe-based mesh smoothing. * Discusses aspects and properties of GETMe smoothing variants and thus provides guidance for choosing the appropriate mesh improvement algorithm. * Addresses smoothing of various mesh types: planar, surface, volumetric, isotropic, anisotropic, non-mixed, and mixed. * Provides and analyzes geometric element transformations for polygonal and polyhedral elements with regular and non-regular limits. * Includes a broad range of numerical examples and compares results with those of other smoothing methods.
This book provides a platform for academics and practitioners for sharing innovative results, approaches, developments, and research projects in computer science and information technology, focusing on the latest challenges in advanced computing and solutions introducing mathematical and engineering approaches. The book presents discussions in the area of advances and challenges of modern computer science, including telecommunications and signal processing, machine learning and artificial intelligence, intelligent control systems, modeling and simulation, data science and big data, data visualization and graphics systems, distributed, cloud and high-performance computing, and software engineering. The papers included are presented at TELECCON 2019 organized by Peter the Great St. Petersburg University during November 18-19, 2019.
This book presents a unique, understandable view of machine learning using many practical examples and access to free professional software and open source code. The user-friendly software can immediately be used to apply everything you learn in the book without the need for programming. After an introduction to machine learning and artificial intelligence, the chapters in Part II present deeper explanations of machine learning algorithms, performance evaluation of machine learning models, and how to consider data in machine learning environments. In Part III the author explains automatic speech recognition, and in Part IV biometrics recognition, face- and speaker-recognition. By Part V the author can then explain machine learning by example, he offers cases from real-world applications, problems, and techniques, such as anomaly detection and root cause analyses, business process improvement, detecting and predicting diseases, recommendation AI, several engineering applications, predictive maintenance, automatically classifying datasets, dimensionality reduction, and image recognition. Finally, in Part VI he offers a detailed explanation of the AI-TOOLKIT, software he developed that allows the reader to test and study the examples in the book and the application of machine learning in professional environments. The author introduces core machine learning concepts and supports these with practical examples of their use, so professionals will appreciate his approach and use the book for self-study. It will also be useful as a supplementary resource for advanced undergraduate and graduate courses on machine learning and artificial intelligence.
Crypto-Finance, Law and Regulation investigates whether crypto-finance will cause a paradigm shift in regulation from a centralised model to a model based on distributed consensus. This book explores the emergence of a decentralised and disintermediated crypto-market and investigates the way in which it can transform the financial markets. It examines three components of the financial market - technology, finance, and the law - and shows how their interrelationship dictates the structure of a crypto-market. It focuses on regulators' enforcement policies and their jurisdiction over crypto-finance operators and participants. The book also discusses the latest developments in crypto-finance, and the advantages and disadvantages of crypto-currency as an alternative payment product. It also investigates how such a decentralised crypto-finance system can provide access to finance, promote a shared economy, and allow access to justice. By exploring the law, regulation and governance of crypto-finance from a national, regional and global viewpoint, the book provides a fascinating and comprehensive overview of this important topic and will appeal to students, scholars and practitioners interested in regulation, finance and the law.
Problem solving is an essential part of every scientific discipline. It has two components: (1) problem identification and formulation, and (2) the solution to the formulated problem. One can solve a problem on its own using ad hoc techniques or by following techniques that have produced efficient solutions to similar problems. This required the understanding of various algorithm design techniques, how and when to use them to formulate solutions, and the context appropriate for each of them.This book presents a design thinking approach to problem solving in computing - by first using algorithmic analysis to study the specifications of the problem, before mapping the problem on to data structures, then on to the situatable algorithms. Each technique or strategy is covered in its own chapter supported by numerous examples of problems and their algorithms. The new edition includes a comprehensive chapter on parallel algorithms, and many enhancements.
Provides a comprehensive review on new swarm intelligence Offers practical implementation of PSO with MATLAB code Presents statistical analysis techniques so that researchers can analyze their own experiment design Discusses swarm intelligence algorithms in social sector and oil and gas industries Covers recent findings and the implementation techniques to Machine Learning
The increasing complexity of telecommunication networks requires us to develop adequate mathematical models. We must find their characteristics, optimize them subject to chosen criteria, and develop the corresponding control algorithms. Multidimensional queueing models are used to design and optimize modern and next-generation networks (NGN). The central problem of the related mathematical theory is to apply multidimensional and large-size queueing models to improve efficiency. In this book new methods are successively developed and applied to solve related problems. The book is recommended for researchers engaged with the mathematical theory of telecommunications traffic. |
You may like...
Comprehensive Metaheuristics…
S. Ali Mirjalili, Amir Hossein Gandomi
Paperback
R3,956
Discovery Miles 39 560
Computational and Statistical Methods…
Shen Liu, James McGree, …
Hardcover
R1,802
Discovery Miles 18 020
|