Program IC (Impedance and Complex Number Calculations), developed at Leicester Polytechnic's School of Electronic and Electrical Engineering, is used to illustrate d.c. and a.c. circuit theory, Bode diagrams, Four...
详细信息
Program IC (Impedance and Complex Number Calculations), developed at Leicester Polytechnic's School of Electronic and Electrical Engineering, is used to illustrate d.c. and a.c. circuit theory, Bode diagrams, Fourier synthesis, filters, and systems theory. The program enables the user to concentrate on the equations that model a circuit or system and the effect of frequency, yet not be frustrated by the tedious, time consuming, repetitive arithmetic. It provides tabulated inputs, calculations and tabulated results.
In this article, the author examines computer algorithms and their possible biases. Particular focus is given to the human decision-making behind these algorithms. Additional topics discussed include the use of algori...
详细信息
In this article, the author examines computer algorithms and their possible biases. Particular focus is given to the human decision-making behind these algorithms. Additional topics discussed include the use of algorithms in the criminal justice system, investigative journalism on the topic from the nonprofit organization 'Pro Publica,' and machine learning engineering.
An undergraduate level experiment involving the nonlinear mechanics of deformable bodies is described. The phenomenon of interest is the large elastic sideways deflection of a column under compressive loading. The exp...
详细信息
An undergraduate level experiment involving the nonlinear mechanics of deformable bodies is described. The phenomenon of interest is the large elastic sideways deflection of a column under compressive loading. The experimental arrangement and the measurement's simple equipment are usually found in undergraduate laboratories. The analysis is more involved because the use of nonelementary functions is required. To circumvent this difficulty, the analysis can be done with a spreadsheet or a data analysis program that has been preprogrammed to compute the required integrals. (C) 2004 American Association of Physics Teachers.
Identifier design for linear systems via nonlinear programming is studied. In the first part of the paper the identification of a linear system with lumped parameters is presented. In the second part of the paper the ...
详细信息
Identifier design for linear systems via nonlinear programming is studied. In the first part of the paper the identification of a linear system with lumped parameters is presented. In the second part of the paper the identification of a linear system with unknown time-delay is discussed. Quadratic cost functions are formed by using vector output error. How to choose cost functions and different gradient methods is discussed. A new concept of time-varying nonlinear programming is introduced. In order to guarantee the convergence of the identification process of the unknown linear system with time-delay, a logical decision is proposed. The presented identification schemes guarantee a rapid convergence of the estimated parameters to their true values.
Imagine that an optimal solution is available for a constrained geometric program, and suppose one wishes a satisfactory solution for greatly different values of some of the coefficients. An estimate can be constructe...
详细信息
Imagine that an optimal solution is available for a constrained geometric program, and suppose one wishes a satisfactory solution for greatly different values of some of the coefficients. An estimate can be constructed by using the values of the dual variables for the old optimum in the invariance conditions for the new problem. Although these are inconsistent except at the precise optimum, a unique primal solution can easily be generated from them by the method of least squares with individual equations weighted by the value of the corresponding dual variable. The matrix equations for these linear operations are derived and applied to a well-known merchant fleet design problem. The predictions are remarkably accurate—1.4 percent error for a 100 percent coefficient change.
The basic concepts of logic programming (languages of the PROLOG type) are described. Three versions, neighborhood, classical, and homogeneous, are examined. In the last one, the same signature is used for representin...
详细信息
The basic concepts of logic programming (languages of the PROLOG type) are described. Three versions, neighborhood, classical, and homogeneous, are examined. In the last one, the same signature is used for representing objects and for defining relations on them. This version is a special case of the club systems examined earlier and is close to the constructs of the PROLOG-II language. Parametric constructs are studied and their semantics is presented.
Presents the experiences of the author in becoming a computer systems librarian. Experiences of the author with computer programming; Discussion of computer servers; Importance of computer access; Discussion of comput...
详细信息
Presents the experiences of the author in becoming a computer systems librarian. Experiences of the author with computer programming; Discussion of computer servers; Importance of computer access; Discussion of computer downtime; Trends in technology; Outlook for the industry; Discussion of library education.
In their efforts to teach computers how to show "common sense," artificial intelligence researchers have found themselves paying more attention to causality, structure, process, and time. These factors are d...
详细信息
In their efforts to teach computers how to show "common sense," artificial intelligence researchers have found themselves paying more attention to causality, structure, process, and time. These factors are discussed.
This paper starts with an overview of the way the ASIS file management exercise was approached using three of the divisions of UL/1. These were establishment, update, and interrogation in that order. After the 65-reco...
详细信息
This paper starts with an overview of the way the ASIS file management exercise was approached using three of the divisions of UL/1. These were establishment, update, and interrogation in that order. After the 65-record file was established via a necessary data conversion, it was updated in one run. Finally, three of the four required listings and all queries were handled in one run of the interrogation division. Examples are included of how updates, listings, and queries are specified in UL/1. The conclusion discusses shortcomings in UL/1 which the exercise revealed and mentions UL/1 capability not called for in the exercise.
暂无评论