|
Books > Computing & IT > General theory of computing
This introductory textbook is designed for a one-semester course on
the use of the matrix and analytical methods for the performance
analysis of telecommunication systems. It provides an introduction
to the modelling and analysis of telecommunication systems for a
broad interdisciplinary audience of students in mathematics and
applied disciplines such as computer science, electronics
engineering, and operations research.
The advent of fast and sophisticated computer graphics has brought
dynamic and interactive images under the control of professional
mathematicians and mathematics teachers. This volume in the NATO
Special Programme on Advanced Educational Technology takes a
comprehensive and critical look at how the computer can support the
use of visual images in mathematical problem solving. The
contributions are written by researchers and teachers from a
variety of disciplines including computer science, mathematics,
mathematics education, psychology, and design. Some focus on the
use of external visual images and others on the development of
individual mental imagery. The book is the first collected volume
in a research area that is developing rapidly, and the authors pose
some challenging new questions.
China Satellite Navigation Conference (CSNC 2021) Proceedings
presents selected research papers from CSNC 2021 held during
22nd-25th May, 2021 in Nanchang, China. These papers discuss the
technologies and applications of the Global Navigation Satellite
System (GNSS), and the latest progress made in the China BeiDou
System (BDS) especially. They are divided into 10 topics to match
the corresponding sessions in CSNC2021 which broadly covered key
topics in GNSS. Readers can learn about the BDS and keep abreast of
the latest advances in GNSS techniques and applications.
Internal migration serves as one of the key contributing factors to
population change involving not only change in the numbers of
people, but also a change in composition and structure of local
populations. Technologies for Migration and Population Analysis:
Spatial Interaction Data Applications addresses the technical and
data-related side of studying population flows and provides a
selection of substantive case studies and applications to exemplify
research currently being carried out. With expert international
contributors currently working in the field, this authoritative
book allows readers to better understand interaction data and ways
knowledge of population flows can be put to use.
The evolution of soft computing applications has offered a
multitude of methodologies and techniques that are useful in
facilitating new ways to address practical and real scenarios in a
variety of fields. In particular, these concepts have created
significant developments in the engineering field. Soft Computing
Techniques and Applications in Mechanical Engineering is a pivotal
reference source for the latest research findings on a
comprehensive range of soft computing techniques applied in various
fields of mechanical engineering. Featuring extensive coverage on
relevant areas such as thermodynamics, fuzzy computing, and
computational intelligence, this publication is an ideal resource
for students, engineers, research scientists, and academicians
involved in soft computing techniques and applications in
mechanical engineering areas.
In this book the authors present an alternative set theory dealing
with a more relaxed notion of infiniteness, called finitely
supported mathematics (FSM). It has strong connections to the
Fraenkel-Mostowski (FM) permutative model of Zermelo-Fraenkel (ZF)
set theory with atoms and to the theory of (generalized) nominal
sets. More exactly, FSM is ZF mathematics rephrased in terms of
finitely supported structures, where the set of atoms is infinite
(not necessarily countable as for nominal sets). In FSM, 'sets' are
replaced either by `invariant sets' (sets endowed with some group
actions satisfying a finite support requirement) or by `finitely
supported sets' (finitely supported elements in the powerset of an
invariant set). It is a theory of `invariant algebraic structures'
in which infinite algebraic structures are characterized by using
their finite supports. After explaining the motivation for using
invariant sets in the experimental sciences as well as the
connections with the nominal approach, admissible sets and Gandy
machines (Chapter 1), the authors present in Chapter 2 the basics
of invariant sets and show that the principles of constructing FSM
have historical roots both in the definition of Tarski `logical
notions' and in the Erlangen Program of Klein for the
classification of various geometries according to invariants under
suitable groups of transformations. Furthermore, the consistency of
various choice principles is analyzed in FSM. Chapter 3 examines
whether it is possible to obtain valid results by replacing the
notion of infinite sets with the notion of invariant sets in the
classical ZF results. The authors present techniques for
reformulating ZF properties of algebraic structures in FSM. In
Chapter 4 they generalize FM set theory by providing a new set of
axioms inspired by the theory of amorphous sets, and so defining
the extended Fraenkel-Mostowski (EFM) set theory. In Chapter 5 they
define FSM semantics for certain process calculi (e.g., fusion
calculus), and emphasize the links to the nominal techniques used
in computer science. They demonstrate a complete equivalence
between the new FSM semantics (defined by using binding operators
instead of side conditions for presenting the transition rules) and
the known semantics of these process calculi. The book is useful
for researchers and graduate students in computer science and
mathematics, particularly those engaged with logic and set theory.
The philosophy of computer science is concerned with issues that
arise from reflection upon the nature and practice of the
discipline of computer science. This book presents an approach to
the subject that is centered upon the notion of computational
artefact. It provides an analysis of the things of computer science
as technical artefacts. Seeing them in this way enables the
application of the analytical tools and concepts from the
philosophy of technology to the technical artefacts of computer
science. With this conceptual framework the author examines some of
the central philosophical concerns of computer science including
the foundations of semantics, the logical role of specification,
the nature of correctness, computational ontology and abstraction,
formal methods, computational epistemology and explanation, the
methodology of computer science, and the nature of computation. The
book will be of value to philosophers and computer scientists.
This book describes simple to complex ASIC design practical
scenarios using Verilog. It builds a story from the basic
fundamentals of ASIC designs to advanced RTL design concepts using
Verilog. Looking at current trends of miniaturization, the contents
provide practical information on the issues in ASIC design and
synthesis using Synopsys DC and their solution. The book explains
how to write efficient RTL using Verilog and how to improve design
performance. It also covers architecture design strategies,
multiple clock domain designs, low-power design techniques, DFT,
pre-layout STA and the overall ASIC design flow with case studies.
The contents of this book will be useful to practicing hardware
engineers, students, and hobbyists looking to learn about ASIC
design and synthesis.
Over the past six years personal computers have carved a deep niche
in the music world. This widespread popularity is largely due to
the establishment of the MIDI (Musical Instrument Digital
Interface) standard in 1983. This communications protocol allows
computers to send, receive, and store digital information generated
by various electronic musical instruments. In addition to numerous
writings exploring the possibilities of present and future
technology, this annotated bibliography offers educators many
introductory sources, articles on how to evaluate and purchase
equipment, and directories of available software. Specifically, it
provides a collection of source material, an overview of
significant publications in the field, and serves as a point of
departure for further inquiry. Part I of the bibliography is
divided into seven sections, each devoted to information regarding
a specific computer. Articles written about two or more popular
computers or models not covered elsewhere are detailed in part II.
Music education is the subject of Part III and Part IV lists and
annotates significant books. The appendix contains information on
associations involved with the musical applications of personal
computers and brief descriptions of several popular online
services. Author and subject indexes are also included. Music and
the Personal Computer covers a variety of topics that will be of
interest to practicing musicians, music educators, and computer
enthusiasts with interests in music.
Highlights key research currently being undertaken within the field
of telepresence, providing the most detailed account of the field
to date, advancing our understanding of a fundamental property of
all media - the illusion of presence; the sense of "being there"
inside a virtual environment, with actual or virtual others. This
collection has been put together by leading international scholars
from America, Europe, and Asia. Together, they describe the
state-of-the-art in presence theory, research and technology design
for an advanced academic audience. Immersed in Media provides
research that can help designers optimize presence for users of
advanced media technologies such as virtual and augmented reality,
collaborative social media, robotics, and artificial intelligence
and lead us to better understand human cognition, emotion and
behaviour.
This book explains the most prominent and some promising new,
general techniques that combine metaheuristics with other
optimization methods. A first introductory chapter reviews the
basic principles of local search, prominent metaheuristics, and
tree search, dynamic programming, mixed integer linear programming,
and constraint programming for combinatorial optimization purposes.
The chapters that follow present five generally applicable
hybridization strategies, with exemplary case studies on selected
problems: incomplete solution representations and decoders; problem
instance reduction; large neighborhood search; parallel
non-independent construction of solutions within metaheuristics;
and hybridization based on complete solution archives. The authors
are among the leading researchers in the hybridization of
metaheuristics with other techniques for optimization, and their
work reflects the broad shift to problem-oriented rather than
algorithm-oriented approaches, enabling faster and more effective
implementation in real-life applications. This hybridization is not
restricted to different variants of metaheuristics but includes,
for example, the combination of mathematical programming, dynamic
programming, or constraint programming with metaheuristics,
reflecting cross-fertilization in fields such as optimization,
algorithmics, mathematical modeling, operations research,
statistics, and simulation. The book is a valuable introduction and
reference for researchers and graduate students in these domains.
Based on the latest version of the language, this book offers a
self-contained, concise and coherent introduction to programming
with Python. The book's primary focus is on realistic case study
applications of Python. Each practical example is accompanied by a
brief explanation of the problem-terminology and concepts, followed
by necessary program development in Python using its constructs,
and simulated testing. Given the open and participatory nature of
development, Python has a variety of incorporated data structures,
which has made it difficult to present it in a coherent manner.
Further, some advanced concepts (super, yield, generator,
decorator, etc.) are not easy to explain. The book specially
addresses these challenges; starting with a minimal subset of the
core, it offers users a step-by-step guide to achieving
proficiency.
This textbook details the architecture of a digital coherent
optical system and describes its main digital signal processing
(DSP) algorithms. The authors first show how the combination of
advanced modulation techniques, DSP and coherent detection has led
to significant gains in capacity and ease of operation. The authors
follow the path of the information from its generation in the
transmitter, to propagation through the fiber and processing by the
DSP algorithms in the receiver. The work summarizes academic
results and presents them in a didactic way to students and
practitioners working on the area of optical communications. A full
suite of classroom materials is included for easy integration into
a curriculum, containing theoretic and simulation problems, and
off-the-shelf Matlab/Octave functions.
This book develops a common understanding between the client and
the provider in each of the four stages of strategic outsourcing.
These stages range from discovery, where the parties envision their
future collaboration; planning, where they lay the ground work for
the contract and the project; building, where they effectively
carry out the work; and lastly to running, where they orchestrate
the relationship on a daily basis to ensure that the new, enlarged
company achieves the results sought. In a simple yet direct style,
it highlights the dos and don'ts the parties should bear in mind at
each stage of the process and combines both the client's and the
provider's perspectives by comparing their respective involvement
at each stage of the process and considering, equally, their
obligations in establishing a balanced relationship. The book is
primarily intended for those in the private sector with experience
of dealing with complex outsourcing situations and who are looking
for the small or bigger differentiators that will support their
decisions and actions. The target audiences include, on the client
side: CCOs, CIOs, lawyers, procurement managers, outsourcing
consultants and IT Service managers and, on the provider side:
account managers, bid managers, outsourcing project managers,
operation managers and service managers. However, it is also useful
for anybody involved in outsourcing who is seeking to develop a
global understanding of the main processes and roles upstream and
downstream in the chain.
Conceptual modeling has always been one of the main issues in
information systems engineering as it aims to describe the general
knowledge of the system at an abstract level that facilitates user
understanding and software development. This collection of selected
papers provides a comprehensive and extremely readable overview of
what conceptual modeling is and perspectives on making it more and
more relevant in our society. It covers topics like modeling the
human genome, blockchain technology, model-driven software
development, data integration, and wiki-like repositories and
demonstrates the general applicability of conceptual modeling to
various problems in diverse domains. Overall, this book is a source
of inspiration for everybody in academia working on the vision of
creating a strong, fruitful and creative community of conceptual
modelers. With this book the editors and authors want to honor
Prof. Antoni Olive for his enormous and ongoing contributions to
the conceptual modeling discipline. It was presented to him on the
occasion of his keynote at ER 2017 in Valencia, a conference that
he has contributed to and supported for over 20 years. Thank you
very much to Antoni for so many years of cooperation and
friendship.
Enterprise information systems touch every process of an
organization as new functionalities in previously existing and
upcoming solutions are created every day. ""Social, Managerial, and
Organizational Dimensions of Enterprise Information Systems""
discusses the technological developments, main issues, challenges,
opportunities, and trends impacting every part of small to medium
sized enterprises. A leading resource for academicians, managers,
and researchers, this advanced publication provides an integrated
and progressive view into the benefits and applications of
enterprise information systems.
This book systematically examines and quantifies industrial
problems by assessing the complexity and safety of large systems.
It includes chapters on system performance management, software
reliability assessment, testing, quality management, analysis using
soft computing techniques, management analytics, and business
analytics, with a clear focus on exploring real-world business
issues. Through contributions from researchers working in the area
of performance, management, and business analytics, it explores the
development of new methods and approaches to improve business by
gaining knowledge from bulk data. With system performance
analytics, companies are now able to drive performance and provide
actionable insights for each level and for every role using key
indicators, generate mobile-enabled scorecards, time series-based
analysis using charts, and dashboards. In the current dynamic
environment, a viable tool known as multi-criteria decision
analysis (MCDA) is increasingly being adopted to deal with complex
business decisions. MCDA is an important decision support tool for
analyzing goals and providing optimal solutions and alternatives.
It comprises several distinct techniques, which are implemented by
specialized decision-making packages. This book addresses a number
of important MCDA methods, such as DEMATEL, TOPSIS, AHP, MAUT, and
Intuitionistic Fuzzy MCDM, which make it possible to derive maximum
utility in the area of analytics. As such, it is a valuable
resource for researchers and academicians, as well as practitioners
and business experts.
This book contains all refereed papers accepted during the fourth
asia-pacific edition & twelve edition - which were merged this
year - of the CSD&M conference that took place in Beijing,
People's Republic of China by 2021. Mastering complex systems
requires an integrated understanding of industrial practices as
well as sophisticated theoretical techniques and tools. This
explains the creation of an annual go-between European and Asian
forum dedicated to academic researchers & industrial actors
working on complex industrial systems architecting, modeling &
engineering. These proceedings cover the most recent trends in the
emerging field of complex systems, both from an academic and
professional perspective. A special focus was put this year on
"Digital Transformation in Complex Systems Engineering". CESAM
Community The CSD&M series of conferences are organized under
the guidance of CESAM Community, managed by CESAMES. CESAM
Community aims in organizing the sharing of good practices in
systems architecting and model-based systems engineering (MBSE) and
certifying the level of knowledge and proficiency in this field
through the CESAM certification. The CESAM systems architecting
& model-based systems engineering (MBSE) certification is
especially currently the most disseminated professional
certification in the world in this domain through more than 1,000
real complex system development projects on which it was
operationally deployed and around 10,000 engineers who were trained
on the CESAM framework at international level.
Transactions are a concept related to the logical database as seen
from the perspective of database application programmers: a
transaction is a sequence of database actions that is to be
executed as an atomic unit of work. The processing of transactions
on databases is a well- established area with many of its
foundations having already been laid in the late 1970s and early
1980s. The unique feature of this textbook is that it bridges the
gap between the theory of transactions on the logical database and
the implementation of the related actions on the underlying
physical database. The authors relate the logical database, which
is composed of a dynamically changing set of data items with unique
keys, and the underlying physical database with a set of fixed-size
data and index pages on disk. Their treatment of transaction
processing builds on the "do-redo-undo" recovery paradigm, and all
methods and algorithms presented are carefully designed to be
compatible with this paradigm as well as with write-ahead logging,
steal-and-no-force buffering, and fine-grained concurrency control.
Chapters 1 to 6 address the basics needed to fully appreciate
transaction processing on a centralized database system within the
context of our transaction model, covering topics like ACID
properties, database integrity, buffering, rollbacks, isolation,
and the interplay of logical locks and physical latches. Chapters 7
and 8 present advanced features including deadlock-free algorithms
for reading, inserting and deleting tuples, while the remaining
chapters cover additional advanced topics extending on the
preceding foundational chapters, including multi-granular locking,
bulk actions, versioning, distributed updates, and write-intensive
transactions. This book is primarily intended as a text for
advanced undergraduate or graduate courses on database management
in general or transaction processing in particular.
|
|