Search
Search Results
-
Federated Learning for Drowsiness Detection in Connected Vehicles
Ensuring driver readiness poses challenges, yet driver monitoring systems can assist in determining the driver’s state. By observing visual cues,... -
-
Approaching the Concept of Competency
The concept of competency is one of the core elements in this book. For this reason, it is crucial to illustrate several approaches to the definition... -
Right and Wrong: Ten Choices in Language Design
A description of language design choices that have a profound effect on software quality, criticism of how ordinary OO languages addressed them, and... -
Sequences
Computers are really good at dealing with large amounts of information. They can repeat a task over and over again without getting bored. When they... -
Trees
WhenTree we see a tree in our everyday lives the rootsTreeroot are generally in the ground and the leaves are up in the air. The branches of a tree... -
Heaps
The word heap is used in a couple of different contexts in Computer Science. A heap sometimes refers to an area of memory used for dynamic (i.e.... -
Balanced Binary Search Trees
In chapter 6 binary search trees were defined along with a recursive insert algorithm. The discussion of binary search trees pointed out they have... -
Appendix F: Turtle Methods
in the Python shell. In the documentation found here the variable turtle is a reference to a Turtle objectTurtlemethods. This is a subset of that... -
B-Trees
This chapter covers one of the more important data structures of the last thirty years. B-Trees are primarily used by relational databases to... -
Appendix G: TurtleScreen Methods
in the Python shell. In the documentation found here the variable turtle is a reference to a Turtle object and screenScreenoperators and methods is a... -
Membership Structures
In Chap. 5 we covered data structures that support insertion, deletion, membership testing, and iteration. For some applications testing membership... -
Exception Handling in Real-Time and Embedded Systems
Modern computing not only demands precise execution but also timely and responsive actions. Nowhere is this truer than in the realm of real-time and... -
Performance Analysis of Compiler Support for Parallel Evaluation of C++ Constant Expressions
Metaprogramming, the practice of writing programs that manipulate other programs at compile-time, continues to impact software development; enabling... -
An Auditable Framework for Evidence Sharing and Management Using Smart Lockers and Distributed Technologies: Law Enforcement Use Case
This paper presents a decentralised framework for sharing and managing evidence that uses smart lockers, blockchain technology, and the... -
A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence
The effective management of digital evidence is critical to modern forensic investigations. However, traditional evidence management approaches are... -
BigText-QA: Question Answering over a Large-Scale Hybrid Knowledge Graph
Answering complex questions over textual resources remains a challenge, particularly when dealing with nuanced relationships between multiple... -
Pauli Spin Matrices, Adjoint Matrix, and Hermitian Matrix
In this chapter, I will show you some of the tedious mathematical derivations step-by-step. They are not difficult, and you just need to be patient... -
The Last But Not the Least
In this chapter, we will discuss how to write scripts on IBM-Q to run more sophisticated quantum programs. At this final step, you will find that you... -
Grover’s Algorithm: I
We will first discuss computational complexity analysis before we introduce Grover’s algorithm that has a quadratic speedup over classical...