Browse Results

Showing 27,126 through 27,150 of 53,350 results

C++-Metaprogrammierung: Eine Einführung in die Präprozessor- und Template-Metaprogrammierung (Xpert.press)

by Jürgen Lemke

Dieses Buch ist das erste deutschsprachige Fachbuch zur C++-Metaprogrammierung. Es hilft dem C++ Programmierer, die Metaprogrammierung zu verstehen und die Vorteile f#65533;r den t#65533;glichen Gebrauch zu erkennen. Durch die umfangreiche Darstellung der Grundlagen der Pr#65533;prozessor- und Template-Metaprogrammierung bietet das Buch einen strukturierten Einstieg, f#65533;r den Grundkenntnisse in C++ ausreichend sind. Die Anwendung der Metaprogrammierung und ihr Zusammenspiel mit Softwaresystemen werden an vielen Beispielen ausf#65533;hrlich erl#65533;utert. Die Generierung der Modulschnittstellen wird hierbeierstmalig beschrieben. Es wird in den Beispielen der Metaprogrammierung sowohl auf den Standard C++11 als auch auf die . NET-Erweiterung C++/CLI eingegangen.

A Hybrid Approach for Power Plant Fault Diagnostics (Studies in Computational Intelligence #743)

by Tamiru Alemu Lemma

This book provides a hybrid approach to fault detection and diagnostics. It presents a detailed analysis related to practical applications of the fault detection and diagnostics framework, and highlights recent findings on power plant nonlinear model identification and fault diagnostics. The effectiveness of the methods presented is tested using data acquired from actual cogeneration and cooling plants (CCPs). The models presented were developed by applying Neuro-Fuzzy (NF) methods. The book offers a valuable resource for researchers and practicing engineers alike.

Haskell Design Patterns

by Ryan Lemmer

If you're a Haskell programmer with a firm grasp of the basics and are ready to move more deeply into modern idiomatic Haskell programming, then this book is for you.

Data-Driven Methods for Adaptive Spoken Dialogue Systems: Computational Learning for Conversational Interfaces

by Oliver Lemon Olivier Pietquin

Data driven methods have long been used in Automatic Speech Recognition (ASR) and Text-To-Speech (TTS) synthesis and have more recently been introduced for dialogue management, spoken language understanding, and Natural Language Generation. Machine learning is now present "end-to-end" in Spoken Dialogue Systems (SDS). However, these techniques require data collection and annotation campaigns, which can be time-consuming and expensive, as well as dataset expansion by simulation. In this book, we provide an overview of the current state of the field and of recent advances, with a specific focus on adaptivity.

Agent-Based Modeling of Social Conflict: From Mechanisms to Complex Behavior (SpringerBriefs in Complexity)

by Carlos M. Lemos

This Brief revisits and extends Epstein's classical agent-based model of civil violence by considering important mechanisms suggested by social conflict theories. Among them are: relative deprivation as generator of hardship, generalized vanishing of the risk perception ('massive fear loss') when the uprisings surpass a certain threshold, endogenous legitimacy feedback, and network influence effects represented by the mechanism of dispositional contagion. The model is explored in a set of computer experiments designed to provide insight on how mechanisms lead to increased complexity of the solutions. The results of the simulations are compared with statistical analyses of estimated size, duration and recurrence of large demonstrations and riots for eight African countries affected by the "Arab Spring," based on the Social Conflict Analysis Database. It is shown that the extensions to Epstein's model proposed herein lead to increased "generative capacity" of the agent-based model (i. e. a richer set of meaningful qualitative behaviors) as well the identification of key mechanisms and associated parameters with tipping points. The use of quantitative information (international indicators and statistical analyses of conflict events) allows the assessment of the plausibility of input parameter values and simulated results, and thus a better understanding of the model's strengths and limitations. The contributions of the present work for understanding how mechanisms of large scale conflict lead to complex behavior include a new form of the estimated arrest probability, a simple representation of political vs economic deprivation with a parameter which controls the `sensitivity' to value, endogenous legitimacy feedback, and the effect of network influences (due to small groups and "activists"). In addition, the analysis of the Social Conflict Analysis Database provided a quantitative description of the impact of the "Arab Spring" in several countries focused on complexity issues such as peaceful vs violent, spontaneous vs organized, and patterns of size, duration and recurrence of conflict events in this recent and important large-scale conflict process. This book will appeal to students and researchers working in these computational social science subfields.

Teaching in the Online Classroom: Surviving and Thriving in the New Normal

by Doug Lemov

A timely guide to online teaching strategies from bestselling author Doug Lemov and the Teach Like a Champion team School closures in response to the covid-19 coronavirus pandemic resulted in an immediate and universal pivot to online teaching. More than 3.7 million teachers in the U.S. were suddenly asked to teach in an entirely new setting with little preparation and no advance notice. This has caused an unprecedented threat to children's education, giving rise to an urgent need for resources and guidance. The New Normal is a just-in-time response to educators’ call for help. Teaching expert Doug Lemov and his colleagues spent weeks studying videos of online teaching and they now provide educators in the midst of this transition with a clear guide to engaging and educating their students online. Although the transition to online education is happening more abruptly than anyone anticipated, technology-supported teaching may be here to stay. This guide explores the challenges involved in online teaching and guides educators and administrators to identify and understand best practices. It is a valuable tool to help you and your students succeed in synchronous and asynchronous settings this school year and beyond. Learn strategies for engaging students more fully online Find new techniques to assess student progress from afar Discover tools for building online classroom culture, combating online distractions, and more Watch videos of teachers building rigor and relationships during online instruction The New Normal features real-world examples you can apply and adapt right away in your own online classroom to allow you to survive and thrive online.

Database of Dreams

by Rebecca Lemov

Just a few years before the dawn of the digital age, Harvard psychologist Bert Kaplan set out to build the largest database of sociological information ever assembled. It was the mid-1950s, and social scientists were entranced by the human insights promised by Rorschach tests and other innovative scientific protocols. Kaplan, along with anthropologist A. I. Hallowell and a team of researchers, sought out a varied range of non-European subjects among remote and largely non-literate peoples around the globe. Recording their dreams, stories, and innermost thoughts in a vast database, Kaplan envisioned future researchers accessing the data through the cutting-edge Readex machine. Almost immediately, however, technological developments and the obsolescence of the theoretical framework rendered the project irrelevant, and eventually it was forgotten.

Funktionalität und Standardunterstützung von IoT-Software-Plattformen: HMD Best Paper Award 2019 (essentials)

by Sebastian Lempert Alexander Pflaum

​Derzeit konkurrieren über 450 Anbieter von IoT-Software-Plattformen miteinander, die Komplexität und die unterschiedlichen Eigenschaften dieser Plattformen führen zu einem intransparenten Markt. Folglich stehen Unternehmen, die eine IoT-Anwendung unter Weiternutzung ihrer bestehenden IT-Infrastruktur umsetzen wollen, vor der Herausforderung, die für diesen unternehmensspezifischen Anwendungsfall am besten geeignete IoT-Plattform aus einer Vielzahl von Kandidaten auszuwählen. Vor diesem Hintergrund werden Unternehmen durch das vorliegende Buch in die Lage versetzt, die Funktionalität und Standardunterstützung der am Markt verfügbaren IoT-Plattformen schnell zu verstehen und untereinander zu vergleichen.

The Dynamics of Broadband Markets in Europe

by Wolter Lemstra William H. Melody

The European Commission's Digital Agenda for Europe sets the targets for broadband development by 2020, yet current broadband market outcomes vary widely amongst the EU Member States and the objectives seem challenging for many. In this book, a group of in-country experts follows a framework of qualitative and quantitative analysis to capture patterns, commonalities and differences between 12 different European countries, in terms of infrastructure endowments, institutional arrangements, time of joining the EU, behavior of market actors, personal interventions of regulators, the role of municipalities, and the role perception of governments. By exploring how the past explains present broadband market outcomes, these longitudinal country case studies look to how improvements can be made for the future. As the first in-depth study of broadband developments in Europe, this book will be invaluable to policy-makers, regulators, academic researchers, advisors, and consultants working in the fields of telecommunications, broadband development, technology and innovation.

Latest Advances in Robot Kinematics

by Jadran Lenarcic Manfred Husty

This book is of interest to researchers inquiring about modern topics and methods in the kinematics, control and design of robotic manipulators. It considers the full range of robotic systems, including serial, parallel and cable driven manipulators, both planar and spatial. The systems range from being less than fully mobile to kinematically redundant to overconstrained. In addition to recognized areas, this book also presents recent advances in emerging areas such as the design and control of humanoids and humanoid subsystems, and the analysis, modeling and simulation of human body motions, as well as the mobility analysis of protein molecules and the development of machines which incorporate man.

Advances in Robot Kinematics 2018 (Springer Proceedings in Advanced Robotics #8)

by Jadran Lenarcic Vincenzo Parenti-Castelli

This is the proceedings of ARK 2018, the 16th International Symposium on Advances in Robot Kinematics, that was organized by the Group of Robotics, Automation and Biomechanics (GRAB) from the University of Bologna, Italy.ARK are international symposia of the highest level organized every two years since 1988. ARK provides a forum for researchers working in robot kinematics and stimulates new directions of research by forging links between robot kinematics and other areas.The main topics of the symposium of 2018 were: kinematic analysis of robots, robot modeling and simulation, kinematic design of robots, kinematics in robot control, theories and methods in kinematics, singularity analysis, kinematic problems in parallel robots, redundant robots, cable robots, over-constrained linkages, kinematics in biological systems, humanoid robots and humanoid subsystems.

Advances in Robot Kinematics 2020 (Springer Proceedings in Advanced Robotics #15)

by Jadran Lenarčič Bruno Siciliano

This book is of interest to researchers wanting to know more about the latest topics and methods in the fields of the kinematics, control and design of robotic systems. The papers cover the full range of robotic systems, including serial, parallel and cable-driven manipulators. The systems range from being less than fully mobile, to kinematically redundant, to over-constrained. The book brings together 43 peer-reviewed papers. They report on the latest scientific and applied achievements. The main theme that connects them is the movement of robots in the most diverse areas of application.

Proceedings of ELM-2015 Volume 2

by Amaury Lendasse Jonathan Wu Kezhi Mao Jiuwen Cao

This book contains some selected papersfrom the International Conference on Extreme Learning Machine 2015,which was held in Hangzhou, China,December 15-17,2015. This conference brought together researchers and engineers to share andexchange R&D experience on both theoretical studies and practicalapplications of the Extreme Learning Machine (ELM) technique and brainlearning. This book covers theories, algorithms adapplications of ELM. It gives readers a glance of the most recent advances ofELM.

Learning-Based Reconfigurable Multiple Access Schemes for Virtualized MTC Networks (Wireless Networks)

by Tho Le-Ngoc Atoosa Dalili Shoaei

This book assists readers with understanding the key aspects, problems and solutions related to the design of proper Multiple Access Schemes for MTC (Machine-Type Communications) and IoT applications in 5G-and-beyond wireless networks. An overview of MTC applications and their traffic features are also provided. In addition, it presents a comprehensive review of MTC access schemes including orthogonal multiple access schemes (OMA), non-orthogonal multiple access schemes (NOMA), massive MIMO-based schemes and fast uplink grant approaches. It also proposes efficient and reconfigurable access schemes deploying machine learning and optimization techniques to address the main requirements of MTC networks. This book discusses potential research directions to further enhance the performance of MTC access schemes.Machine-type communications are expected to account for the dominant share of the traffic in future wireless networks. While in traditional wireless networks, designed for human-type communications, the focus is on support of large packet sizes in downlink, machine-type communication systems deal with heavy uplink traffic. This is due to the nature of the tasks performed by machine-type communication devices, which is mainly reporting measured data or a detected event. Furthermore, in these networks, using the virtualization framework, the network infrastructure can be shared between different applications for which providing isolation is of high importance. To support these unique characteristics of machine-type communications, proper access schemes need to be developed, which is the focus of this book.This book benefits advanced-level students studying computer science and electrical engineering as a secondary textbook and researchers working in this field. Engineers and practitioners interested in the challenges and practical solutions of integrating MTC in the cloud radio access network of 5G-and-beyond cellular systems will want to purchase this book as well.

Architectures of Small-Cell Networks and Interference Management (SpringerBriefs in Computer Science)

by Tho Le-Ngoc Duy Trong Ngo

This Springer Brief presents the architectures of small-cell networks and recent advances in interference management. The key challenges and values of small cells are first introduced, followed by the reviews of various small-cell architectures and interference management techniques in both heterogeneous CDMA and heterogeneous OFDMA small-cell networks. New adaptive power control and dynamic spectrum access techniques are discussed to promote a harmonized coexistence of diverse network entities in both 3G and 4G small-cell networks. Analytically devised from optimization and game theories, autonomous solutions are shown to effectively manage the intra-tier and cross-tier interferences in small cells. Informative and practical, this Springer Brief is designed for researchers and professionals working in networking and resource management. The content is also valuable for advanced-level students interested in network communications and power allocation.

PHP 8 for Absolute Beginners: Basic Website and Web Application Development

by Jason Lengstorf Thomas Blom Hansen Steve Prettyman

Embark on a practical journey of building dynamic sites aided by multiple projects that can be easily adapted to real-world scenarios. This third edition will show you how to become a confident PHP developer, ready to take the next steps to being a Full Stack Developer and/or successful website or web application programmer. You won't be swamped with every detail of the full PHP language up front – instead, you’ll be introduced to a small, versatile subset of PHP by learning to use it creatively to develop dynamic projects. You will see how to use variables, control structures, functions, and object-oriented programming. Secure programming techniques are used throughout the book to demonstrate the proper way to defend against hackers. You will learn how to plan and create MySQL/MariaDB databases and access them using PHP. During this process, you will be introduced to data objects, UI design concepts, and design patterns. Model-View-Controller (MVC) methodology will be used to keep a consistent logical design for each project. Four main projects will be introduced: an image gallery, a blogging system, a data management dashboard, and an interactive game. Initially, a general discussion of how operating systems make programming easier, more reliable, and efficient will be provided. A brief example will follow to demonstrate installation of the latest versions of Apache, PHP, and MySQL/MariaDB. Basic PHP logic will be used during the development of the first project, an image gallery. Once these concepts have been absorbed, a further review of additional concepts of PHP 8 will be discussed, followed by an extensive blogging system will use MVC to reinforce and introduce additional PHP techniques. You’ll also discover the use of Google Charts to create a data management dashboard. Finally, you’ll explore arrays in more depth by developing logic for a checkers game. Along the way, exercises and projects are provided to reinforce what has been learned. What You'll Learn Explore the basics of PHP syntax, structures, functions, modules and more Design and develop of interactive UIs Build dynamic UIs using SQL to access MySQL/MariaDB Databases Understand the development of secure and efficient Object-Oriented classes and objects Apply the knowledge learned when creating four real-world PHP projects Who This Book Is For Aspiring web developers and designers who are new to web development and/or PHP; programmers who are new to PHP and even programming itself.

Pro PHP and jQuery

by Jason Lengstorf Keith Wald

Take advantage of the improved performance and reduced memory requirements of PHP version 7, and learn to utilize the new built-in PHP functions and features such as typed variable enforcement with declare(strict_types=1) and the new available data types, scalar type declarations for function arguments and return statements, constant arrays using define(), argument unpacking with the . . . operator, integer division with intdiv(), the null coalesce operator, the spaceship operator, new exception types, and improvements to existing features. Pro PHP and jQuery, Second Edition is for intermediate level programmers interested in building web applications using jQuery and PHP. Updated for PHP version 7 and the latest version of jQuery, this book teaches some advanced PHP techniques and it shows you how to take your dynamic applications to the next level by adding a JavaScript layer using the jQuery framework and APIs. After reading and using this book, you'll come away having built a fully functional PHP and jQuery web application that you can reapply as a template for your own particular web application. What you'll learn How to use PHP 7 to build a calendar application that allows users to post, view, edit, and delete events How to use jQuery to allow the calendar app to be viewed and edited without requiring page refreshes using built-in Ajax functions How to harness the power and versatility of PHP's object-oriented programming style How to apply the various forms of security available How to use jQuery plug-in development patterns to create modular, reusable jQuery plug-ins. How to employ jQuery effects, including fading elements, generating HTML markup on the fly, and creating modal windows Who this book is for This book is intended for programmers who want to bridge the gap between front- and back-end programming. It does not cover HTML or CSS except where absolutely necessary, and it focuses on taking intermediate PHP developers to the next level while getting comfortable with Ajax and the power of jQuery. Table of Contents 1. Introducing jQuery in PHP 2. Common jQuery Actions and Methods 3. Object-Oriented Programming 4. Build an Events Calendar 5. Add Controls to Create, Edit, and Delete Events 6. Password Protecting Sensitive Actions and Areas 7. Enhancing the User Interface with jQuery 8. Editing the Calendar with Ajax and jQuery 9. Performing Form Validation with Regular Expressions 10. Extending jQuery

Data Security: Technical and Organizational Protection Measures against Data Loss and Computer Crime

by Thomas H. Lenhard

Using many practical examples and notes, the book offers an easy-to-understand introduction to technical and organizational data security. It provides an insight into the technical knowledge that is mandatory for data protection officers. Data security is an inseparable part of data protection, which is becoming more and more important in our society. It can only be implemented effectively if there is an understanding of technical interrelationships and threats. Data security covers much more information than just personal data. It secures all data and thus the continued existence of companies and organizations.This book is a translation of the original German 2nd edition Datensicherheit by Thomas H. Lenhard, published by Springer Fachmedien Wiesbaden GmbH, part of Springer Nature in 2020. The translation was done with the help of artificial intelligence (machine translation by the service DeepL.com). A subsequent human revision was done primarily in terms of content, so that the book will read stylistically differently from a conventional translation. Springer Nature works continuously to further the development of tools for the production of books and on the related technologies to support the authors.

Datensicherheit: Technische und organisatorische Schutzmaßnahmen gegen Datenverlust und Computerkriminalität

by Thomas H. Lenhard

Anhand vieler Praxisbeispiele und Merks#65533;tze bietet das Buch einen leicht verst#65533;ndlichen Einstieg in die technische und organisatorische Datensicherheit. Es liefert einen Einblick in das f#65533;r Datenschutzbeauftragte obligatorische technische Wissen. Datensicherheit ist ein untrennbarer Teil des Datenschutzes, der mehr und mehr in unserer Gesellschaft an Bedeutung gewinnt. Er kann nur dann wirksam umgesetzt werden, wenn ein Verst#65533;ndnis f#65533;r technische Zusammenh#65533;nge und Gef#65533;hrdungen gegeben ist. Dabei erstreckt sich die Datensicherheit auf weit mehr Informationen als nur auf Daten mit Personenbezug. Sie sichert s#65533;mtliche Daten und damit den Fortbestand von Unternehmen und Organisationen.

Datensicherheit: Technische und organisatorische Schutzmaßnahmen gegen Datenverlust und Computerkriminalität

by Thomas H. Lenhard

Anhand vieler Praxisbeispiele und Merksätze bietet das Buch einen leicht verständlichen Einstieg in die technische und organisatorische Datensicherheit. Es liefert einen Einblick in das für Datenschutzbeauftragte obligatorische technische Wissen. Datensicherheit ist ein untrennbarer Teil des Datenschutzes, der mehr und mehr in unserer Gesellschaft an Bedeutung gewinnt. Er kann nur dann wirksam umgesetzt werden, wenn ein Verständnis für technische Zusammenhänge und Gefährdungen gegeben ist. Dabei erstreckt sich die Datensicherheit auf weit mehr Informationen als nur auf Daten mit Personenbezug. Sie sichert sämtliche Daten und damit den Fortbestand von Unternehmen und Organisationen.

Passwords: Philology, Security, Authentication

by Brian Lennon

Cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages, are typically understood as separate domains of activity. But Brian Lennon contends that these two domains, both concerned with authentication of text, should be viewed as contiguous. He argues that computing’s humanistic applications are as historically important as its mathematical and technical ones. What is more, these humanistic uses, no less than cryptological ones, are marked and constrained by the priorities of security and military institutions devoted to fighting wars and decoding intelligence. Lennon’s history encompasses the first documented techniques for the statistical analysis of text, early experiments in mechanized literary analysis, electromechanical and electronic code-breaking and machine translation, early literary data processing, the computational philology of late twentieth-century humanities computing, and early twenty-first-century digital humanities. Throughout, Passwords makes clear the continuity between cryptology and philology, showing how the same practices flourish in literary study and in conditions of war. Lennon emphasizes the convergence of cryptology and philology in the modern digital password. Like philologists, hackers use computational methods to break open the secrets coded in text. One of their preferred tools is the dictionary, that preeminent product of the philologist’s scholarly labor, which supplies the raw material for computational processing of natural language. Thus does the historic overlap of cryptology and philology persist in an artifact of computing—passwords—that many of us use every day.

Procedural 3D Modeling Using Geometry Nodes in Blender: Discover the professional usage of geometry nodes and develop a creative approach to a node-based workflow

by Siemen Lens Wouter Adriaensen

An easy-to-follow, illustrated guide to learning the geometry nodes editor and various other facets of geometry nodes through simple exercises that progress to more challenging projectsPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesDevelop a creative mathematical thinking of the modeling workflowUnderstand how Blender and geometry nodes store and manage the data that you are handlingLearn different scatter methods and how to use themBook DescriptionFor anyone working in the computer graphics industry, understanding how to use Blender's new geometry nodes tools to manipulate and generate 3D geometry in a node-based workflow is an essential skill. In this book, you'll learn how to use the basic and intermediate features of geometry nodes that are a crucial part of your Blender roadmap.You'll start by understanding the different node inputs and outputs followed by the basic nodes you'll need throughout your geometry nodes projects. The book will show you how the node system works and enable you to put your newfound knowledge to use through exercises that involve modifying curves, meshes, and more. You'll work on a range of interesting projects such as creating a procedural plant, where you'll use nodes to generate the intricate details and variations of a plant in a procedural manner, and a spiderweb generator to refine your skills of cleaning up a node tree. Finally, you'll build a procedural LED panel using geometry nodes to generate the look of an LED panel.By the end of this book, you'll be able to overcome any geometry node issue confidently and make complicated geometry node trees exactly how you need them.What you will learnDiscover the different node inputs and outputs that geometry nodes have to offerGet the hang of the flow of the geometry node systemUnderstand the common nodes you'll be using along with their functions in the geometry node editorModify basic mesh primitives using the node system inside BlenderScatter and modify objects aligned onto a curveBecome familiar with the more advanced nodes in the geometry nodes systemLink geometry and material nodes editors using named attributesImplement your new-found knowledge of nodes in real-world projectsWho this book is forIf you are a CG Artist or follow modeling careers like that of an environment artist or even a CG generalist in the cinematography industry and you are looking to get into learning a node-based modeling workflow using Geometry Nodes in Blender, this is the perfect book for you. You will need a basic knowledge of the fundamentals of Blender, for example, knowing the specific workflow of material nodes and being able to apply this knowledge to your projects. To get the most out of this book, you should have a basic understanding of Blender's shortcut system and some modeling experience.

Cybernetic Approach to Project Management

by Bogdan Lent

This book attempts to reflect the project reality as closely as possible, covering the ISO 21500:2012 standard that has just been introduced and the benefits from the best contributions worldwide and also providing the concise yet powerful tool box. It shall be easy to use and intuitively supportive of project managers. So far, evidence indicates that these targets are successfully met. One of its key recognitions, and in consequence a distinctive feature of this book, is the impact that the project manager's personality has on the fate of the project. The project manager's successful self-management in work & life and in leadership processes should be considered as important in any endeavor as all other project management processes, covered by the new standards and guidelines.

Learning to Program with MATLAB: Building GUI Tools

by Craig S. Lent

Learning to Program with MATLAB Introductory text integrating science, mathematics, and engineering to give a basic understanding of the fundamentals of computer programming with MATLAB Learning to Program with MATLAB: Building GUI Tools, Second Edition serves as a compact introduction to computer programming using the MATLAB language, covering elements of both program and graphical user interface (GUI) design to enable readers to create computer programs just like the ones they are accustomed to interacting with. Rather than being encyclopedic in scope, the goal of the text is to describe what users will find most useful and point to other features. Descriptions and examples of some of the most useful functions are included throughout, particularly with regards to engineering and science applications. The work also includes updated videos and problem solutions on an instructor companion website. The first edition of Learning to Program with MATLAB employed the MATLAB graphical user interface design environment (GUIDE) to develop the GUI tools. The second edition is based on the new and improved App Designer program, which has supplanted GUIDE. This edition includes: Core concepts of computer programming using MATLAB, such as arrays, loops, functions, and basic data structures How to write your own MATLAB functions, covering topics such as local workspaces, multiple outputs, function files, and other functional forms The new string class and table class, some new features of function arguments, and re-written sections for building GUI tools with App Designer Syntax for graphics and App Designer features, plus examples demonstrating the new way to handle string information Starting with the basics and building up to an emphasis on GUI tools, Learning to Program with MATLAB is a comprehensive introduction to programming in a robust and multipurpose language, making it an ideal classroom resource for both students and instructors in related programs of study.

Energy Limits in Computation: A Review of Landauer’s Principle, Theory and Experiments

by Craig S. Lent Alexei O. Orlov Wolfgang Porod Gregory L. Snider

This book is a single-source reference to the issues involved in the Landauer principle, which has gained new prominence recently, due to the large amount of heat generated by today’s computers. If Landauer’s principle is correct, there may be ways to build computers that dissipate far less power (corresponding to heat generated) than today’s computers. This book brings together all sides of the discussions regarding Landauer’s principle, both theoretical and experimental, empowering readers to gain better understanding of dissipation in computation, and the limits if any to progress in computation related to energy dissipation. It represents the best and most thorough examination of the important issue of Landauer’s principle that is available in one volume.Provides an in-depth investigation of the Landauer principle and how it relates to the possible existence of lower bounds on dissipation in computation;Gathers together both sides of the discussion: those who agree with Landauer and his conclusions, and those who think that Landauer was not correct, offering fresh perspective on the issues in the new light of experiments;Offers insight into the future of silicon CMOS and the limits if any to progress in computation related to energy dissipation.

Refine Search

Showing 27,126 through 27,150 of 53,350 results