![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > General
Absolute clarity is the aim with a new generation of revision guide for the 2020s. This guide has been expertly compiled and edited by successful former teachers of Computer Science, highly experienced examiners and a good dollop of scientific research into what makes revision most effective. Past examinations questions are essential to good preparation, improving understanding and confidence. This guide has combined revision with tips and more practice questions than you could shake a stick at. All the essential ingredients for getting a grade you can be really proud of. Each specification topic has been referenced and distilled into the key points to make in an examination for top marks. Questions on all topics assessing knowledge, application and analysis are all specifically and carefully devised throughout this book.
The theory of parsing is an important application area of the theory of formal languages and automata. The evolution of modem high-level programming languages created a need for a general and theoretically dean methodology for writing compilers for these languages. It was perceived that the compilation process had to be "syntax-directed," that is, the functioning of a programming language compiler had to be defined completely by the underlying formal syntax of the language. A program text to be compiled is "parsed" according to the syntax of the language, and the object code for the program is generated according to the semantics attached to the parsed syntactic entities. Context-free grammars were soon found to be the most convenient formalism for describing the syntax of programming languages, and accordingly methods for parsing context-free languages were devel oped. Practical considerations led to the definition of various kinds of restricted context-free grammars that are parsable by means of efficient deterministic linear-time algorithms."
"My absolute favorite for this kind of interview preparation is Steven Skiena's The Algorithm Design Manual. More than any other book it helped me understand just how astonishingly commonplace ... graph problems are -- they should be part of every working programmer's toolkit. The book also covers basic data structures and sorting algorithms, which is a nice bonus. ... every 1 - pager has a simple picture, making it easy to remember. This is a great way to learn how to identify hundreds of problem types." (Steve Yegge, Get that Job at Google) "Steven Skiena's Algorithm Design Manual retains its title as the best and most comprehensive practical algorithm guide to help identify and solve problems. ... Every programmer should read this book, and anyone working in the field should keep it close to hand. ... This is the best investment ... a programmer or aspiring programmer can make." (Harold Thimbleby, Times Higher Education) "It is wonderful to open to a random spot and discover an interesting algorithm. This is the only textbook I felt compelled to bring with me out of my student days.... The color really adds a lot of energy to the new edition of the book!" (Cory Bart, University of Delaware) "The is the most approachable book on algorithms I have." (Megan Squire, Elon University) --- This newly expanded and updated third edition of the best-selling classic continues to take the "mystery" out of designing algorithms, and analyzing their efficiency. It serves as the primary textbook of choice for algorithm design courses and interview self-study, while maintaining its status as the premier practical reference guide to algorithms for programmers, researchers, and students. The reader-friendly Algorithm Design Manual provides straightforward access to combinatorial algorithms technology, stressing design over analysis. The first part, Practical Algorithm Design, provides accessible instruction on methods for designing and analyzing computer algorithms. The second part, the Hitchhiker's Guide to Algorithms, is intended for browsing and reference, and comprises the catalog of algorithmic resources, implementations, and an extensive bibliography. NEW to the third edition: -- New and expanded coverage of randomized algorithms, hashing, divide and conquer, approximation algorithms, and quantum computing -- Provides full online support for lecturers, including an improved website component with lecture slides and videos -- Full color illustrations and code instantly clarify difficult concepts -- Includes several new "war stories" relating experiences from real-world applications -- Over 100 new problems, including programming-challenge problems from LeetCode and Hackerrank. -- Provides up-to-date links leading to the best implementations available in C, C++, and Java Additional Learning Tools: -- Contains a unique catalog identifying the 75 algorithmic problems that arise most often in practice, leading the reader down the right path to solve them -- Exercises include "job interview problems" from major software companies -- Highlighted "take home lessons" emphasize essential concepts -- The "no theorem-proof" style provides a uniquely accessible and intuitive approach to a challenging subject -- Many algorithms are presented with actual code (written in C) -- Provides comprehensive references to both survey articles and the primary literature Written by a well-known algorithms researcher who received the IEEE Computer Science and Engineering Teaching Award, this substantially enhanced third edition of The Algorithm Design Manual is an essential learning tool for students and professionals needed a solid grounding in algorithms. Professor Skiena is also the author of the popular Springer texts, The Data Science Design Manual and Programming Challenges: The Programming Contest Training Manual.
Advances in Electrical Engineering and Computational Science contains sixty-one revised and extended research articles written by prominent researchers participating in the conference. Topics covered include Control Engineering, Network Management, Wireless Networks, Biotechnology, Signal Processing, Computational Intelligence, Computational Statistics, Internet Computing, High Performance Computing, and industrial applications. Advances in Electrical Engineering and Computational Science will offer the state of art of tremendous advances in electrical engineering and computational science and also serve as an excellent reference work for researchers and graduate students working with/on electrical engineering and computational science.
During the reception of a piece of information, we are never passive. Depending on its origin and content, from our personal beliefs and convictions, we bestow upon this piece of information, spontaneously or after reflection, a certain amount of confidence. Too much confidence shows a degree of naivety, whereas an absolute lack of it condemns us as being paranoid. These two attitudes are symmetrically detrimental, not only to the proper perception of this information but also to its use. Beyond these two extremes, each person generally adopts an intermediate position when faced with the reception of information, depending on its provenance and credibility. We still need to understand and explain how these judgements are conceived, in what context and to what end. Spanning the approaches offered by philosophy, military intelligence, algorithmics and information science, this book presents the concepts of information and the confidence placed in it, the methods that militaries, the first to be aware of the need, have or should have adopted, tools to help them, and the prospects that they have opened up. Beyond the military context, the book reveals ways to evaluate information for the good of other fields such as economic intelligence, and, more globally, the informational monitoring by governments and businesses. Contents 1. Information: Philosophical Analysis and Strategic Applications, Mouhamadou El Hady Ba and Philippe Capet. 2. Epistemic Trust, Gloria Origgi. 3. The Fundamentals of Intelligence, Philippe Lemercier. 4. Information Evaluation in the Military Domain: Doctrines, Practices and Shortcomings, Philippe Capet and Adrien Revault d Allonnes. 5. Multidimensional Approach to Reliability Evaluation of Information Sources, Frederic Pichon, Christophe Labreuche, Bertrand Duqueroie and Thomas Delavallade. 6. Uncertainty of an Event and its Markers in Natural Language Processing, Mouhamadou El Hady Ba, Stephanie Brizard, Tanneguy Dulong and Benedicte Goujon. 7. Quantitative Information Evaluation: Modeling and Experimental Evaluation, Marie-Jeanne Lesot, Frederic Pichon and Thomas Delavallade. 8. When Reported Information Is Second Hand, Laurence Cholvy. 9. An Architecture for the Evolution of Trust: Definition and Impact of the Necessary Dimensions of Opinion Making, Adrien Revault d Allonnes. About the Authors Philippe Capet is a project manager and research engineer at Ektimo, working mainly on information management and control in military contexts. Thomas Delavallade is an advanced studies engineer at Thales Communications & Security, working on social media mining in the context of crisis management, cybersecurity and the fight against cybercrime.
Nikon's D5500 DSLR is an update to the popular D5300, featuring a touch-sensitive rear LCD screen and improved ergonomics. In almost every other respect, it's a compact, lightweight 24MP entry-level DSLR similar to its predecessor. This is a comprehensive step-by-step guide to the Nikon D5500 that includes a pull-out reference card. Author Jon Sparks provides practical tips on how to get the best from this versatile camera.
At last, a right up-to-the-minute volume on a topic of huge national and international importance. As governments around the world battle voter apathy, the need for new and modernized methods of involvement in the polity is becoming acute. This work provides information on advanced research and case studies that survey the field of digital government. Successful applications in a variety of government settings are delineated, while the authors also analyse the implications for current and future policy-making. Each chapter has been prepared and carefully edited within a structured format by a known expert on the individual topic.
The purpose of this book is to question the relationships involved in decision making and the systems designed to support it: decision support systems (DSS). The focus is on how these systems are engineered; to stop and think about the questions to be asked throughout the engineering process and, in particular, about the impact designers choices have on these systems.
by Kurt Keutzer Those looking for a quick overview of the book should fast-forward to the Introduction in Chapter 1. What follows is a personal account of the creation of this book. The challenge from Earl Killian, formerly an architect of the MIPS processors and at that time Chief Architect at Tensilica, was to explain the significant performance gap between ASICs and custom circuits designed in the same process generation. The relevance of the challenge was amplified shortly thereafter by Andy Bechtolsheim, founder of Sun Microsystems and ubiquitous investor in the EDA industry. At a dinner talk at the 1999 International Symposium on Physical Design, Andy stated that the greatest near-term opportunity in CAD was to develop tools to bring the performance of ASIC circuits closer to that of custom designs. There seemed to be some synchronicity that two individuals so different in concern and character would be pre-occupied with the same problem. Intrigued by Earl and Andy's comments, the game was afoot. Earl Killian and other veterans of microprocessor design were helpful with clues as to the sources of the performance discrepancy: layout, circuit design, clocking methodology, and dynamic logic. I soon realized that I needed help in tracking down clues. Only at a wonderful institution like the University of California at Berkeley could I so easily commandeer an ab- bodied graduate student like David Chinnery with a knowledge of architecture, circuits, computer-aided design and algorithms.
Are you tired of squinting at the tiny color-coded tables and difficult-to-read text you find on the typical laminated reference card or cheat sheet that you keep with you when you're in the field or on location? DAVID BUSCH'S COMPACT GUIDE FOR THE NIKON D5000 is your solution! This new, lay-flat, spiral bound, reference guide condenses all the must-have information you need while shooting into a portable book you'll want to permanently tuck into your camera bag. You'll find every settings option for your Nikon D5000 listed, along with advice on why you should use--or not use--each adjustment. Useful tables provide recommended settings for a wide variety of shooting situations, including landscapes, portraits, sports, close-ups, and travel. With this guide on hand you have all the information you need at your fingertips so you can confidently use your camera on-the-go.
Design automation of electronic and hybrid systems is a steadily growing field of interest and a permanent challenge for researchers in Electronics, Computer Engineering and Computer Science. System Design Automation presents some recent results in design automation of different types of electronic and mechatronic systems. It deals with various topics of design automation, ranging from high level digital system synthesis, through analogue and heterogeneous system analysis and design, up to system modeling and simulation. Design automation is treated from the aspects of its theoretical fundamentals, its basic approach and its methods and tools. Several application cases are presented in detail. The book consists of three chapters: High-Level System Synthesis (Digital Hardware/Software Systems). Here embedded systems, distributed systems and processor arrays as well as hardware-software codesign are treated. Also three special application cases are discussed in detail; Analog and Heterogeneous System Design (System Approach and Methodology). This chapter copes with the analysis and design of hybrid systems comprised of analog and digital, electronic and mechanical components; System Simulation and Evaluation (Methods and Tools). In this chapter object-oriented Modelling, analog system simulation including fault-simulation, parameter optimization and system validation are regarded. The contents of the book are based on material presented at the Workshop System Design Automation (SDA 2000) organised by the Sonderforschungsbereich 358 of the Deutsche Forschungsgemeinschaft at TU Dresden.
Managing information technology (IT) on a global scale presents a number of opportunities and challenges. IT can drive the change in global business strategies and improve international coordination. At the same time, IT can be an impediment to achieving globalization. IT as an enabler of and inhibitor to globalization raises interesting questions. Global Perspective of Information Technology Management provides a collection of research works that address relevant IT management issues from a global perspective. As the world economy becomes more interdependent and competition for business continues to be more globally oriented, it has, likewise, become necessary to address the issues of IT management from a broader global focus.
This book contains selected papers presented at the seventh Conference on Working Group 3.7 of the Internation Federation for Information Processing. The focus of Working Froup 3.7 is on ITEM: Information Technology in Educational Management. The event toook place in Hamamatsu, Japan, and enabled the exchange of findings and ideas between researchers in educational management and information technology, policy-makers in the field of education, developers of ITEM systems, and vendors. The overall goal of the conference was to demonstrate and explore directions for developing and improving all types of educational institutions through ITEM. Contributions to this conference hailed from all over the world. The papers in this volume investigate how ITEM can support and improve educational practice at the level of instruction as well as at the institutional level, an analysis of the history of ITEM as a field of study and practice, results of researcdh on how training can promote the implementation of ITEM systems, and theoretical analyses of the conditions under which ITEM will have the strongest impact. Moreover, all sectors of educational systems (from schools to universities) are represented by the various chapters of this book.
Access and Control in Digital Humanities explores a range of important questions about who controls data, who is permitted to reproduce or manipulate data, and what sorts of challenges digital humanists face in making their work accessible and useful. Contributors to this volume present case studies and theoretical approaches from their experience with applications for digital technology in classrooms, museums, archives, in the field and with the general public. Offering potential answers to the issues of access and control from a variety of perspectives, the volume acknowledges that access is subject to competing interests of a variety of stakeholders. Museums, universities, archives, and some communities all place claims on how data can or cannot be shared through digital initiatives and, given the collaborative nature of most digital humanities projects, those in the field need to be cognizant of the various and often competing interests and rights that shape the nature of access and how it is controlled. Access and Control in Digital Humanities will be of interest to researchers, academics and graduate students working in a variety of fields, including digital humanities, library and information science, history, museum and heritage studies, conservation, English literature, geography and legal studies.
Attacks on information systems and applications have become more prevalent with new advances in technology. Management of security and quick threat identification have become imperative aspects of technological applications. Information Technology Risk Management and Compliance in Modern Organizations is a pivotal reference source featuring the latest scholarly research on the need for an effective chain of information management and clear principles of information technology governance. Including extensive coverage on a broad range of topics such as compliance programs, data leak prevention, and security architecture, this book is ideally designed for IT professionals, scholars, researchers, and academicians seeking current research on risk management and compliance.
Globalization is defined in economic terms to mean flows of trade, foreign direct investment and finance, and liberalization of trade and investment policies. The impacts of globalization and information technology are examined in this text in terms of growth and productivity, poverty and income distribution, and employment. The experiences of Africa, East and Southeast Africa, South Asia and Latin America in the era of globalization are discussed. It is argued that benefits of freer trade and capital flows need to be managed carefully in order to minimize the costs and maximize gains.
Management of new technologies is a critical factor in achieving global competitiveness. A recent survey of managers in the United States revealed that the implementation of new and advanced technologies is the most popular strategy in achieving global competitiveness. This book explores the role of technology in that context. The book identifies the role of new technologies in improving quality and shows that adopting a strategic total quality management will, in fact, lead to improved productivity and survivability of the firm. A thorough comparison of the Japanese and American production management practices is presented. This in-depth analysis helps to identify the problems of managing new technologies and shows that human resources management is a critical factor that should not be overlooked. Other strategies for improving global competitiveness are presented. Each of the five sections of the book deals with a major thrust that confronts management of new technologies. The book also discusses information system management and product design. The book uses real-life cases, models, and conceptual frameworks to support the views presented. Productivity, quality, and competitiveness are all related to technology. The success of Japanese corporations in achieving quality management has impelled the U.S. executives to listen and re-evaluate their management practices. Increasingly, many managers believe that new, advanced technologies can contribute to improving the productivity, quality, and competitiveness of a firm. However, simply adopting a new technology will not put an end to productivity and/or quality problems. This fact is most apparent in the case of computer-integrated manufacturing. The islands of automation that have resulted convinced many that effective management of new technologies is necessary in order to exploit any potential benefits. This book focuses on efficient management techniques and looks at the critical areas that can enhance the performance of a firm as a result of the adoption of new technologies. The book is divided into five sections: The total quality management section contains four chapters that present a comparison between the Japanese and American production practices. This section also presents a new way to measure the performance of a firm---not just by the direct quality of the product or service produced, but also by the sensitivity and responsibility of the firm to environmental and greening issues. The selection and implementation of new technologies section discusses the problems associated with the cost-accounting techniques in justifying new technologies and uses a multicriteria decision framework to show how this decision could be made. The strategic management section presents issues on production innovation and performance; The knowledge-based techniques section investigates the role of artificial intelligence and expert systems in the management of new technologies. Finally, the product design and inventory management section discusses the role of product design and reduced lot sizes in achieving a competitive advantage.
Introduction to Programming with Java: A Problem Solving Approach teaches the reader how to write programs using Java. It does so with a unique approach that combines fundamentals first with objects early. The book transitions smoothly through a carefully selected set of procedural programming fundamentals to object-oriented fundamentals. During this early transition and beyond, the book emphasizes problem solving. For example, Chapter 2 is devoted to algorithm development, Chapter 8 is devoted to program design, and problem-solving sections appear throughout the book. The third edition introduces several new Java language features, most of the end-of-chapter GUI sections and the final GUI chapters use JavaFX, and almost all end-of-chapter exercises are new.
Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography, and provide a way of understanding how privacy, identity provision and integrity can be enhanced with the usage of encryption. The book has many novel features including: - full provision of Web-based material on almost every topic covered - provision of additional on-line material, such as videos, source code, and labs - coverage of emerging areas such as Blockchain, Light-weight Cryptography and Zero-knowledge Proofs (ZKPs) Key areas covered include: - Fundamentals of Encryption - Public Key Encryption - Symmetric Key Encryption - Hashing Methods - Key Exchange Methods - Digital Certificates and Authentication - Tunneling - Crypto Cracking - Light-weight Cryptography - Blockchain - Zero-knowledge Proofs This book provides extensive support through the associated website of: http://asecuritysite.com/encryption
Textiles and computing have long been associated. High volume and low profit margins of textile products have driven the industry to invest in high technology, particularly in the area of data interpretation and analysis. Thus, it is virtually inevitable that soft computing has found a home in the textile industry. Contained in this volume are six chapters discussing various aspects of soft computing in the field of textiles and apparel.
A Timely Exploration of Multiuser Detection in Wireless Networks During the past decade, the design and development of current and emerging wireless systems have motivated many important advances in multiuser detection. This book fills an important need by providing a comprehensive overview of crucial recent developments that have occurred in this active research area. Each chapter is contributed by noted experts and is meant to serve as a self-contained treatment of the topic. Coverage includes: Linear and decision feedback methodsIterative multiuser detection and decodingMultiuser detection in the presence of channel impairmentsPerformance analysis with random signatures and channelsJoint detection methods for MIMO channelsInterference avoidance methods at the transmitterTransmitter precoding methods for the MIMO downlink This book is an ideal entry point for exploring ongoing research in multiuser detection and for learning about the field's existing unsolved problems and issues. It is a valuable resource for researchers, engineers, and graduate students who are involved in the area of digital communications.
Helping you understand the technological foundations for a wide range of digital devices, New Perspectives Computer Concepts Comprehensive, 21st edition, presents what every learner should know about using technology to complete your education, launch a successful career and engage in issues that shape today's world. The book's proven learning path is structured with today's busy reader in mind. Leading tech author June Parsons combines the latest on emerging technology with detailed illustrations and interactive activities that help you quickly understand technical topics. This edition provides updated information on current operating systems, digital rights management, the deep web and dark web, videoconferencing, the pandemic's impact on tech jobs, work-at-home and more. A unique module provides a hands-on introduction to programming, while MindTap offers anywhere, anytime learning solutions.
This book focuses on the design methodologies of various quantum circuits, DNA circuits, DNA-quantum circuits and quantum-DNA circuits. It considers the merits and challenges of multivalued logic circuits in quantum, DNA, quantum-DNA and DNA-quantum computing. Multiple-Valued Computing in Quantum Molecular Biology: Arithmetic and Combinational Circuits is Volume 1 of a two-volume set. From fundamentals to advanced levels, this book discusses different multiple-valued logic DNA-quantum and quantum-DNA circuits. The text consists of four parts. Part I introduces multiple-valued quantum computing and DNA computing. It contains the basic understanding of multiple-valued quantum computing, multiple-valued DNA computing, multiple-valued quantum-DNA computing and multiple-valued DNA-quantum computing. Part II examines heat calculation, speed calculation, heat transfer, data conversion and data management in multi-valued quantum, DNA, quantum-DNA and DNA-quantum computing. Part III discusses multiple-valued logic operations in quantum and DNA computing such as ternary AND, NAND, OR, NOR, XOR, XNOR and multiple-valued arithmetic operations such as adder, multiplier, divider and more. Quantum-DNA and DNA-quantum multiple-valued arithmetic operations are also explained in this section. Part IV explains multiple-valued quantum and DNA combinational circuits such as multiple-valued DNA-quantum and quantum-DNA multiplexer, demultiplexer, encoder and decoder. This book will be of great help to researchers and students in quantum computing, DNA computing, quantum-DNA computing and DNA-quantum computing researchers.
Discusses various design aspects of multiple-valued logic DNA-quantum and quantum-DNA sequential circuits, memory devices, programmable logic devices and nano-processors Presents how multiple-valued quantum, DNA, quantum-DNA and DNA-quantum nano processors are designed with algorithms Examines the architecture and design procedure of memory devices such as Random Access Memory (RAM), Read Only Memory (ROM) Reviews the designs and algorithms of Multiple-valued quantum, DNA, quantum-DNA and DNA-quantum nano processors. |
![]() ![]() You may like...
Bootstrap Methods - With Applications in…
Gerhard Dikta, Marsel Scheer
Hardcover
R3,143
Discovery Miles 31 430
Outsourcing and Offshoring Business…
Leslie P. Willcocks, Mary C. Lacity, …
Hardcover
R5,624
Discovery Miles 56 240
Big Data and Smart Service Systems
Xiwei Liu, Rangachari Anand, …
Hardcover
Social Sensing - Building Reliable…
Dong Wang, Tarek Abdelzaher, …
Paperback
R1,924
Discovery Miles 19 240
|