![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing > Data structures
Problem solving is an essential part of every scientific discipline. It has two components: (1) problem identification and formulation, and (2) the solution to the formulated problem. One can solve a problem on its own using ad hoc techniques or by following techniques that have produced efficient solutions to similar problems. This required the understanding of various algorithm design techniques, how and when to use them to formulate solutions, and the context appropriate for each of them.This book presents a design thinking approach to problem solving in computing - by first using algorithmic analysis to study the specifications of the problem, before mapping the problem on to data structures, then on to the situatable algorithms. Each technique or strategy is covered in its own chapter supported by numerous examples of problems and their algorithms. The new edition includes a comprehensive chapter on parallel algorithms, and many enhancements.
Presents original method of enhanced ant colony optimization in feature selection, based on mathematical experiments and modelling. Provides a theoretical concept in iris features searching and detection as part of feature extraction process. Demonstrates the iris features selection and detection using the proposed design methodology with enhanced ant colony optimization for iris recognition.
Resolves linear and non-linear data structures in C language using the algorithm, diagrammatically and its time and space complexity analysis. Covers interview questions and MCQs on all topics of campus readiness Identifies possible solutions to each problem. Includes real life and computational applications of linear and non-linear data structures
This book presents fundamental concepts of optimization problems and its real-world applications in various fields. The core concepts of optimization, formulations and solution procedures of various real-world problems are provided in an easy-to-read manner. The unique feature of this book is that it presents unified knowledge of the modelling of real-world decision-making problems and provides the solution procedure using the appropriate optimization techniques. The book will help students, researchers, and faculty members to understand the need for optimization techniques for obtaining optimal solution for the decision-making problems. It provides a sound knowledge of modelling of real-world problems using optimization techniques. It is a valuable compendium of several optimization techniques for solving real-world application problems using optimization software LINGO. The book is useful for academicians, practitioners, students and researchers in the field of OR. It is written in simple language with a detailed explanation of the core concepts of optimization techniques. Readers of this book will understand the formulation of real-world problems and their solution procedures obtained using the appropriate optimization techniques.
This book provides an integrated solution for security and safety in the home, covering both assistance in health monitoring and safety from strangers/intruders who want to enter the home with harmful intentions. It defines a system whereby recognition of a person/stranger at the door is done using three modules: Face Recognition, Voice Recognition and Similarity Index. These three modules are taken together to provide a percentage likelihood that the individual is in the "known" or "unknown" category. The system can also continuously monitor the health parameters of a vulnerable person living alone at home and aid them in calling for help in an emergency. The authors have analyzed a number of existing biometric techniques to provide security for an individual living alone at home. These biometric techniques have been tested using MATLAB (R) image processing and signal processing toolboxes, and results have been calculated on the basis of recognition rate. A major contribution in providing security is a hybrid algorithm proposed by the author named PICA, which combines features of both PCA (Principle Component Analysis) and ICA (Independent Component Analysis) algorithms. This hybrid approach gives better performance recognition than either system alone. The second proposed hybrid algorithm for voice recognition is named as a MFRASTA algorithm by combining features of MFCC (Mel Frequency Cepstral Coefficient) and RASTA-PLP (RelAtive SpecTrA-Perceptual Linear Prediction) algorithm. After performing experiments, results are collected on the basis of recognition rate. The authors have also proposed a third technique named as a Similarity Index to provide trust-based security for an individual. This technique is text independent in which a person is recognized by pronunciation, frequency, tone, pitch, etc., irrespective of the content spoken by the person. By combining these three techniques, a high recognition rate is provided to the person at the door and high security to the individual living independently at home. In the final contribution, the authors have proposed a fingertip-based application for health monitoring by using the concept of sensors. This application is developed using iPhone 6's camera. When a person puts their fingertip on a camera lens, with the help of brightness of the skin, the person's heartbeat will be monitored. This is possible even with a low-quality camera. In case of any emergency, text messages will be sent to the family members of the individual living alone by using 3G Dongle and MATLAB tool. Results show that the proposed work outperforms all the existing techniques used in face recognition, voice recognition, and health monitoring alone.
This comprehensive reference text discusses evolutionary optimization techniques, to find optimal solutions for single and multi-objective problems. The text presents each evolutionary optimization algorithm along with its history and other working equations. It also discusses variants and hybrids of optimization techniques. The text presents step-by-step solution to a problem and includes software's like MATLAB and Python for solving optimization problems. It covers important optimization algorithms including single objective optimization, multi objective optimization, Heuristic optimization techniques, shuffled frog leaping algorithm, bacteria foraging algorithm and firefly algorithm. Aimed at senior undergraduate and graduate students in the field of electrical engineering, electronics engineering, mechanical engineering, and computer science and engineering, this text: Provides step-by-step solution for each evolutionary optimization algorithm. Provides flowcharts and graphics for better understanding of optimization techniques. Discusses popular optimization techniques include particle swarm optimization and genetic algorithm. Presents every optimization technique along with the history and working equations. Includes latest software like Python and MATLAB.
Modelling Transitions shows what computational, formal and data-driven approaches can and could mean for sustainability transitions research, presenting the state-of-the-art and exploring what lies beyond. Featuring contributions from many well-known authors, this book presents the various benefits of modelling for transitions research. More than just taking stock, it also critically examines what modelling of transformative change means and could mean for transitions research and for other disciplines that study societal changes. This includes identifying a variety of approaches currently not part of the portfolios of transitions modellers. Far from only singing praise, critical methodological and philosophical introspection are key aspects of this important book. This book speaks to modellers and non-modellers alike who value the development of robust knowledge on transitions to sustainability, including colleagues in congenial fields. Be they students, researchers or practitioners, everyone interested in transitions should find this book relevant as reference, resource and guide.
This is a how-to book for solving geometric problems robustly or error free in actual practice. The contents and accompanying source code are based on the feature requests and feedback received from industry professionals and academics who want both the descriptions and source code for implementations of geometric algorithms. The book provides a framework for geometric computing using several arithmetic systems and describes how to select the appropriate system for the problem at hand. Key Features: A framework of arithmetic systems that can be applied to many geometric algorithms to obtain robust or error-free implementations Detailed derivations for algorithms that lead to implementable code Teaching the readers how to use the book concepts in deriving algorithms in their fields of application The Geometric Tools Library, a repository of well-tested code at the Geometric Tools website, https://www.geometrictools.com, that implements the book concepts
Provides a comprehensive introduction to multi-robot systems planning and task allocation; Explores multi robot aerial planning, flight planning, orienteering and coverage, and deployment, patrolling, and foraging; Includes real-world case studies; Treats different aspects of cooperation in multi-agent systems.
Understand the introductory concepts and design principles of algorithms and their complexities. Demonstrate the programming implementations of all the algorithms using C-Language. Be an excellent handbook on algorithms with self-explanatory chapters enriched with problems and solutions.
What are citizens of a free country willing to tolerate in the name of public safety? Jon Fasman journeys from the US to London - one of the most heavily surveilled cities on earth - to China and beyond, to expose the legal, political, and moral issues surrounding how the state uses surveillance technology. Automatic licence-plate readers allow police to amass a granular record of where people go, when, and for how long. Drones give the state eyes - and possibly weapons - in the skies. Algorithms purport to predict where and when crime will occur, and how big a risk a suspect has of reoffending. Specially designed tools can crack a device's encryption keys, rending all privacy protections useless. And facial recognition technology poses perhaps a more dire and lasting threat than any other form of surveillance. Jon Fasman examines how these technologies help police do their jobs, and what their use means for our privacy rights and civil liberties, exploring vital questions, such as: Should we expect to be tracked and filmed whenever we leave our homes? Should the state have access to all of the data we generate? Should private companies? What might happen if all of these technologies are combined and put in the hands of a government with scant regard for its citizens' civil liberties? Through on-the-ground reporting and vivid storytelling, Fasman explores one of the most urgent issues of our time.
Addresses real-world challenges in using AI Covers the entire AI process in a holistic manner Explains the technical issues in an easy to use manner Provides real-world examples of AI enablement Addresses the challenges of complex enterprises, coalitions and consortia Avoids the hype, with balanced perspective on benefits and drawbacks of AI
This textbook introduces basic algorithms and explains their analytical methods. All algorithms and methods introduced in this book are well known and frequently used in real programs. Intended to be self-contained, the contents start with the basic models, and no prerequisite knowledge is required. This book is appropriate for undergraduate students in computer science, mathematics, and engineering as a textbook, and is also appropriate for self-study by beginners who are interested in the fascinating field of algorithms. More than 40 exercises are distributed throughout the text, and their difficulty levels are indicated. Solutions and comments for all the exercises are provided in the last chapter. These detailed solutions will enable readers to follow the author's steps to solve problems and to gain a better understanding of the contents. Although details of the proofs and the analyses of algorithms are also provided, the mathematical descriptions in this book are not beyond the range of high school mathematics. Some famous real puzzles are also used to describe the algorithms. These puzzles are quite suitable for explaining the basic techniques of algorithms, which show how to solve these puzzles.
The ?rst and foremost goal of this lecture series was to show the beauty, depth and usefulness of the key ideas in computer science. While working on the lecture notes, we came to understand that one can recognize the true spirit of a scienti?c discipline only by viewing its contributions in the framework of science as a whole. We present computer science here as a fundamental science that, interacting with other scienti?c disciplines, changed and changes our view on the world, that contributes to our understanding of the fundamental concepts of science and that sheds new light on and brings new meaning to several of these concepts. We show that computer science is a discipline that discovers spectacular, unexpected facts, that ?nds ways out in seemingly unsolvable s- uations, and that can do true wonders. The message of this book is that computer science is a fascinating research area with a big impact on the real world, full of spectacular ideas and great ch- lenges. It is an integral part of science and engineering with an above-average dynamic over the last 30 years and a high degree of interdisciplinarity. The goal of this book is not typical for popular science writing, whichoftenrestrictsitselftooutliningtheimportanceofaresearch area. Whenever possible we strive to bring full understanding of the concepts and results presented.
This book treats state-of-the-art computational methods for power flow studies and contingency analysis. In the first part the authors present the relevant computational methods and mathematical concepts. In the second part, power flow and contingency analysis are treated. Furthermore, traditional methods to solve such problems are compared to modern solvers, developed using the knowledge of the first part of the book. Finally, these solvers are analyzed both theoretically and experimentally, clearly showing the benefits of the modern approach.
This book proposes tools for analysis of multidimensional and metric data, by establishing a state-of-the-art of the existing solutions and developing new ones. It mainly focuses on visual exploration of these data by a human analyst, relying on a 2D or 3D scatter plot display obtained through Dimensionality Reduction. Performing diagnosis of an energy system requires identifying relations between observed monitoring variables and the associated internal state of the system. Dimensionality reduction, which allows to represent visually a multidimensional dataset, constitutes a promising tool to help domain experts to analyse these relations. This book reviews existing techniques for visual data exploration and dimensionality reduction such as tSNE and Isomap, and proposes new solutions to challenges in that field. In particular, it presents the new unsupervised technique ASKI and the supervised methods ClassNeRV and ClassJSE. Moreover, MING, a new approach for local map quality evaluation is also introduced. These methods are then applied to the representation of expert-designed fault indicators for smart-buildings, I-V curves for photovoltaic systems and acoustic signals for Li-ion batteries.
Introduces a new web-based optimizer for Geometric algebra algorithms; Supports many programming languages as well as hardware; Covers the advantages of High-dimensional algebras; Includes geometrically intuitive support of quantum computing
rd This book constitutes a collection of extended versions of papers presented at the 23 IFIP TC7 Conference on System Modeling and Optimization, which was held in C- cow, Poland, on July 23-27, 2007. It contains 7 plenary and 22 contributed articles, the latter selected via a peer reviewing process. Most of the papers are concerned with optimization and optimal control. Some of them deal with practical issues, e. g. , p- formance-based design for seismic risk reduction, or evolutionary optimization in structural engineering. Many contributions concern optimization of infini- dimensional systems, ranging from a general overview of the variational analysis, through optimization and sensitivity analysis of PDE systems, to optimal control of neutral systems. A significant group of papers is devoted to shape analysis and opti- zation. Sufficient optimality conditions for ODE problems, and stochastic control methods applied to mathematical finance, are also investigated. The remaining papers are on mathematical programming, modeling, and information technology. The conference was the 23rd event in the series of such meetings biennially org- ized under the auspices of the Seventh Technical Committee "Systems Modeling and Optimization" of the International Federation for Information Processing (IFIP TC7).
the handbook is a valuable reference to researchers from industry and academia, as well as Masters and PhD students around the globe working in the metaheuristics and applications domain includes contributions from a variety of academics/researchers in the field of metaheuristics
This book covers the most important topics in the area of pattern recognition, object recognition, computer vision, robot vision, medical computing, computational geometry, and bioinformatics systems. Students and researchers will find a comprehensive treatment of polygonal approximation and its real life applications. The book not only explains the theoretical aspects but also presents applications with detailed design parameters. The systematic development of the concept of polygonal approximation of digital curves and its scale-space analysis are useful and attractive to scholars in many fields.
This new book-the first of its kind-examines the use of algorithmic techniques to compress random and non-random sequential strings found in chains of polymers. The book is an introduction to algorithmic complexity. Examples taken from current research in the polymer sciences are used for compression of like-natured properties as found on a chain of polymers. Both theory and applied aspects of algorithmic compression are reviewed. A description of the types of polymers and their uses is followed by a chapter on various types of compression systems that can be used to compress polymer chains into manageable units. The work is intended for graduate and postgraduate university students in the physical sciences and engineering.
The new multimedia standards (for example, MPEG-21) facilitate the seamless integration of multiple modalities into interoperable multimedia frameworks, transforming the way people work and interact with multimedia data. These key technologies and multimedia solutions interact and collaborate with each other in increasingly effective ways, contributing to the multimedia revolution and having a significant impact across a wide spectrum of consumer, business, healthcare, education, and governmental domains. This book aims to provide a complete coverage of the areas outlined and to bring together the researchers from academic and industry as well as practitioners to share ideas, challenges, and solutions relating to the multifaceted aspects of this field.
The opportunistic network is an emerging and recent area of research. To make this research area more adaptable for practical and industrial use, there is a need to further investigate several research challenges in all aspects of opportunistic networks. Therefore, Opportunistic Networks: Fundamentals, Applications and Emerging Trends provides theoretical, algorithmic, simulation, and implementation-based research developments related to fundamentals, applications, and emerging research trends in opportunistic networks. The book follows a theoretical approach to describe fundamentals to beginners and incorporates a practical approach depicting the implementation of real-life applications to intermediate and advanced readers. This book is beneficial for academicians, researchers, developers, and engineers who work in or are interested in the fields related to opportunistic networks, delay tolerant networks, and intermittently connected ad hoc networks. This book also serves as a reference book for graduate and postgraduate courses in computer science, computer engineering, and information technology streams.
This book seeks to generalize techniques and experiences in designing and analyzing cryptographic schemes for blockchain. It devotes three chapters to review the background and basic knowledge, four chapters to discuss specific types of cryptographic primitive design for blockchain, one chapter to discuss optimization tools and another chapter for blockchain regulation and economies. This book covers the systematic survey of research objects, as well as detailed reviews of cryptographic schemes, lectures and methodologies to practice cryptography. The main findings of this book are summarized as following, first, the practical design and analysis of cryptographic schemes for blockchain can address major problems in blockchain at algorithmic level. Then, some intrinsic deficiencies in some traditional cryptographic primitives, like centralized setup, impractical design, etc, prevent the successful application of these primitives in blockchain. However, huge efforts are being made to make these primitives practical and applicable for researchers. Finally, the formal and rigorous design and analysis of public key cryptographic algorithms is vital to blockchain. Design and Analysis of Cryptographic Algorithms in Blockchain is a useful textbook for graduate students and PhD students, or researches who wish to connect cryptography with blockchain for research and developing projects.
The aim of this book is to present new computational techniques and methodologies for the analysis of the clinical, epidemiological and public health aspects of SARS-CoV-2 and COVID-19 pandemic. The book presents the use of soft computing techniques such as machine learning algorithms for analysis of the epidemiological aspects of the SARS-CoV-2. This book clearly explains novel computational image processing algorithms for the detection of COVID-19 lesions in lung CT and X-ray images. It explores various computational methods for computerized analysis of the SARS-CoV-2 infection including severity assessment. The book provides a detailed description of the algorithms which can potentially aid in mass screening of SARS-CoV-2 infected cases. Finally the book also explains the conventional epidemiological models and machine learning techniques for the prediction of the course of the COVID-19 epidemic. It also provides real life examples through case studies. The book is intended for biomedical engineers, mathematicians, postgraduate students; researchers; medical scientists working on identifying and tracking infectious diseases. |
You may like...
AWS Billing and Cost Management User…
Documentation Team
Hardcover
Networking, Models and Methods of Cloud…
Michel Levine
Hardcover
Electrodynamics - Problems and Solutions
Carolina C Ilie, Zachariah S. Schrecengost
Paperback
R754
Discovery Miles 7 540
Multi-disciplinary Sustainable…
P. N. Tekwani, M. Bhavsar, …
Paperback
R1,531
Discovery Miles 15 310
|