Lecture P5: Abstract Data Types Data Type

Total Page:16

File Type:pdf, Size:1020Kb

Lecture P5: Abstract Data Types Data Type Review Lecture P5: Abstract Data Types Data type: Set of values and collection of operations on those values. Example: int Set of values: between -32,767 and 32,767 (minimum limits). Operations: +, -, *, /, %, printf("%d"), sqrt How is an int represented? multiply 16 bits? negative integers? shouldn't care! add int print ... 2 Overview "Non ADT’s" Is Rational data type an ABSTRACT data type? Separate implementation from specification. No: Representation in interface. INTERFACE: specify the allowed operations. Client can directly manipulate the data type: a.num = 5; IMPLEMENTATION: provide code for operations. CLIENT: code that uses operations. RAT.h client.c Abstract data type (ADT): typedef struct { #include "RAT.h" int num; Data type whose representation is HIDDEN. int den; int main(void) { Don’t want client to directly manipulate data type. } Rational; Rational a; Operations ONLY permitted through interface. legal C, but very bad a.num = 5; Rational RATadd(Rationalsoftware a, Rational design b); a.den = 8; Rational RATmul(Rational a, Rational b); RATshow(a); Principle of least privilege. Rational RATshow(Rational a); return 0; Rational RATinit(int x, int y); } Violates "principle of least privilege." 3 6 ADT's for Stacks and Queues Stack Interface Fundamental data type. Stack operations. Set of operations (insert, delete) on generic data. STACKinit(): initialize empty stack STACKisempty(): return 1 if stack is empty; 0 otherwise Stack ("last in first out" or LIFO). STACKpush(int): insert new item push: add info to the data structure STACKpop(): delete and return item most recently added pop: remove the info MOST recently added initialize, test if empty STACK.h Queue ("first in first out" or FIFO). void STACKinit(void); put: add info to the data structure int STACKisempty(void); get: remove the info LEAST recently added void STACKpush(int item); initialize, test if empty int STACKpop(void); Could use EITHER array or "linked list" to implement EITHER stack or queue. 7 9 Stack Implementation with Arrays Stack Client: Balanced Parentheses stackarray.c Push and pop at the end of array. par.c #include "STACK.h" #include <stdio.h> Demo: #define MAX_SIZE 1000 #include "STACK.h" static int s[MAX_SIZE]; static int N; int main(void) { int c, balanced = 1; void STACKinit(void) { STACKinit(); N=0; } . /* MAIN CODE HERE */ int STACKisempty(void) { if (balanced) return N == 0; printf("Balanced.\n"); } else printf("NOT Balanced.\n"); void STACKpush(int item) { s[N] = item; N++; s[N++] = item; return 0; } } int STACKpop(void) { N--; Good: ((()())) return s[N]; return s[--N]; Bad: (()))(() } 10 12 Stack Client: Balanced Parentheses Stack Client: Balanced Parentheses par.c (cont) Check if your C program has unbalanced parentheses. stop loop if unbalanced Read character from stdin Unix % gcc par.c stackarray.c while (balanced && (c = getchar()) != EOF) { % a.out < myprog.c if ( c == '(' ) balanced STACKpush(c); push left parentheses else if ( c == ')' ) { % a.out < someprogram.c if (STACKisempty()) check for matching unbalanced balanced = 0; left parenthesis else How could valid C program have STACKpop(); unbalanced parentheses? } } if (!STACKisempty()) balanced if empty stack balanced = 0; when no more input Exercise: extend to handle square and curly braces. Good: {([([])()])} Good: ((()())) Bad: (([)]) Bad: (()))(() 13 14 Stack Client: Postfix Evaluation Stack Client: Postfix Evaluation Practical example of use of stack abstraction. Practical example of use of stack abstraction. Put operator after operands in expression. Put operator after operands in expression. Use stack to evaluate. Use stack to evaluate. – operand: push it onto stack. – operand: push it onto stack. – operator: pop operands, push result. – operator: pop operands, push result. Systematic way to save intermediate results. Systematic way to save intermediate results. Example 1. Example 2a: convert 27531 from octal to decimal. 12345*+6**789++*+ 28888****7888***588**38*1++++ Example 2b: convert 27531 from octal to decimal. 28*7+8*5+8*3+8*1+ Stack never has more than two numbers on it! Horner’s method (see lecture P2). 15 17 Stack Client: Postfix Evaluation Stack Client: Postfix Evaluation postfix.c Program has some flaws. Unix #include <stdio.h> #include <ctype.h> 2+5 % gcc postfix.c stackarray.c #include "STACK.h" 16 12 + % a.out 24+ int main(void) { top of stack = 6 int c; STACKinit(); % a.out while ((c = getchar()) != EOF) { 12345*+6**789++* if ('+' == c) top of stack = 6624 pop 2 elements STACKpush(STACKpop() + STACKpop()); and push sum else if ('*' == c) % a.out STACKpush(STACKpop() * STACKpop()); 598+46**7+* else if (isdigit(c)) convert char to top of stack = 2075 STACKpush(c - '0'); integer and push } % a.out 28*7+8*5+8*3+8*1+ printf("top of stack = %d\n", STACKpop()); top of stack = 12121 return 0; } 18 19 Stack Client: Infix to Postfix ADT Review Unix infix2postfix.c Client can access data type ONLY through interface. % gcc infix2postfix.c ... #include <stdio.h> Example: STACK. % a.out #include <ctype.h> (2 + ((3 + 4) * (5 * 6))) #include "STACK.h" Representation is HIDDEN in the implementation. 234+56**+ int main(void) { Provides security. int c; Infix to postfix algorithm: STACKinit(); Convenient way to organize large problems. while ((c = getchar()) != EOF) { Left paren: ignore. Decompose into smaller problems. if (c == ')') Right paren: pop and print. Substitute alternate solutions (time / space tradeoffs). printf("%c ", STACKpop()); Separation compilation. Operator: push. else if (c == '+' || c == '*') Build libraries. Digit: print. STACKpush(c); else if (isdigit(c)) Different clients can share the same ADT. printf("%c ", c); } Powerful mechanism for building layers of abstraction. printf("\n"); Client works at a higher level of abstraction. return 0; } 20 21 PostScript: Abstract Stack Machine PostScript: Abstract Stack Machine Language of most printers nowadays. Some commands: Postfix language. Coordinate system: rotate, translate, scale,... Abstract stack machine. Turtle commands: moveto, lineto, rmoveto, rlineto, ... Graphics commands: stroke, fill, ... Ex: convert 27531 from octal to decimal. Arithmetic: add, sub, mul, div, ... 28mul7add8mul5add8mul3add8mul1add Stack commands: copy, exch, dup, currentpoint, ... Control constructs: if, ifelse, while, for, ... Stack uses: Define functions: /XX { ... } def Operands for operators. Arguments for functions. Everyone’s first PostScript program (draw a box). Return value(s) for functions. %! 50 50 translate 0 0 moveto 0 512 rlineto 512 0 rlineto 0 -512 rlineto -512 0 rlineto stroke showpage 22 23 Summary Data type. Set of values and collection of operations on those values. Lecture P5: Supplemental Notes ABSTRACT data type (ADT). Data type whose representation is completely HIDDEN from client. Stacks and queues. Fundamental ADT's. – calculators – printers and PostScript language – compiler uses to implement functions (see next lecture) 24 First Class ADT First Class ADT Client: Infix infix.c So far, only 1 stack per program. STACKinit(); #include <stdio.h> ... #include <ctype.h> First Class ADT: STACKpush(a); #include "STACK.h" ... int main(void) { ADT that is just like a built-in C type. Stack s1 = STACKinit(); s1 = stack of operatorsUnix b = STACKpop(); Stack s2 = STACKinit(); Can declare multiple instances of s2 =% stack gcc of infix.c integers ... int c, op; them. % a.out while ((c = getchar()) != EOF) { (2 + ((3 + 4) * (5 * 6))) Pass specific instances of them to if (c == ')') { interface as inputs. Stack s1, s2; op = STACKpop(s1); 212 if (op == '+') Details omitted in COS 126. STACKpush(s2, STACKpop(s2) + STACKpop(s2)); (See Sedgewick 4.8 or COS 226.) s1 = STACKinit(); else if (op == '*') s2 = STACKinit(); STACKpush(s2, STACKpop(s2) * STACKpop(s2)); ... } else if (c == '+' || c == '*') STACKpush(s1, a); STACKpush(s1, c); STACKpush(s2, b); else if (isdigit(c)) ... STACKpush(s2, c - '0'); c = STACKpop(s2); } printf("Result = %d\n", STACKpop(s2)); return 0; } 26 27 "Non ADT’s" Queue Interface Is Complex data type an ABSTRACT data type? Queue operations. NO: Representation in interface. QUEUEinit(): initialize empty queue. QUEUEisempty(): return 1 if queue is empty; 0 otherwise Are C built-in types like int ADT’s? QUEUEput(int): insert new item at end of list. ALMOST: we generally ignore representation. QUEUEget(): return and remove item at beginning of list. NO: set of values depends on representation. – might use (x & 0) to test if even – works only if they’re stored as "two’s complement integers" QUEUE.h CONSEQUENCE: strive to write programs that function properly independent of representation. void QUEUEinit(void); – (x % 2 == 0) is more portable way to test if even int QUEUEisempty(void); – also, use <limits.h> for machine-specific ranges of int, long void QUEUEput(int item); int QUEUEget(void); 28 29 Queue Implementation Queue Client: Josephus Problem queuearray.c queuearray.c Flavius Josephus. (first century) Band of 41 Jewish rebels trapped in cave by Romans. #include "QUEUE.h" void QUEUEput(int item) { #define MAX_SIZE 1000 q[back++] = item; Preferring suicide to capture, rebels formed a circled and killed back %= MAX_SIZE; every 3rd remaining person until no one was left. static int q[MAX_SIZE]; } Where should you stand to be among last two survivors? static int front, back; 31 and and 16 int QUEUEget(void) { void QUEUEinit(void) { int r = q[front++]; front = back = 0; front %= MAX_SIZE; } return r; } int QUEUEisempty(void) { return front == back; } front Variable q[0] q[1] q[2] q[3] q[4] q[5] MAX_SIZE = 6 Value M D T E X A back 30 31 Queue Client: Josephus Problem josephus.c N=8,M=3 #include <stdio.h> #include "QUEUE.h" #define N 41 1 2 3 4 5 6 7 8 #define M 3 2 3 4 5 6 7 8 1 int main(void) { 3 4 5 6 7 8 1 2 int i; QUEUEinit(); for (i = 1; i <= N; i++) 4 5 6 7 8 1 2 QUEUEput(i); 5 6 7 8 1 2 4 while (!QUEUEisempty()) { for(i=0;i<M-1;i++) 6 7 8 1 2 4 5 QUEUEput(QUEUEget()); printf("%d\n", QUEUEget()); 7 8 1 2 4 5 } .
Recommended publications
  • GNU MPFR the Multiple Precision Floating-Point Reliable Library Edition 4.1.0 July 2020
    GNU MPFR The Multiple Precision Floating-Point Reliable Library Edition 4.1.0 July 2020 The MPFR team [email protected] This manual documents how to install and use the Multiple Precision Floating-Point Reliable Library, version 4.1.0. Copyright 1991, 1993-2020 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover Texts, and with no Back- Cover Texts. A copy of the license is included in Appendix A [GNU Free Documentation License], page 59. i Table of Contents MPFR Copying Conditions ::::::::::::::::::::::::::::::::::::::: 1 1 Introduction to MPFR :::::::::::::::::::::::::::::::::::::::: 2 1.1 How to Use This Manual::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 2 2 Installing MPFR ::::::::::::::::::::::::::::::::::::::::::::::: 3 2.1 How to Install ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 3 2.2 Other `make' Targets :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 4 2.3 Build Problems :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 4 2.4 Getting the Latest Version of MPFR ::::::::::::::::::::::::::::::::::::::::::::::: 4 3 Reporting Bugs::::::::::::::::::::::::::::::::::::::::::::::::: 5 4 MPFR Basics ::::::::::::::::::::::::::::::::::::::::::::::::::: 6 4.1 Headers and Libraries :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 6
    [Show full text]
  • Perl 6 Deep Dive
    Perl 6 Deep Dive Data manipulation, concurrency, functional programming, and more Andrew Shitov BIRMINGHAM - MUMBAI Perl 6 Deep Dive Copyright © 2017 Packt Publishing All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews. Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information. First published: September 2017 Production reference: 1060917 Published by Packt Publishing Ltd. Livery Place 35 Livery Street Birmingham B3 2PB, UK. ISBN 978-1-78728-204-9 www.packtpub.com Credits Author Copy Editor Andrew Shitov Safis Editing Reviewer Project Coordinator Alex Kapranoff Prajakta Naik Commissioning Editor Proofreader Merint Mathew Safis Editing Acquisition Editor Indexer Chaitanya Nair Francy Puthiry Content Development Editor Graphics Lawrence Veigas Abhinash Sahu Technical Editor Production Coordinator Mehul Singh Nilesh Mohite About the Author Andrew Shitov has been a Perl enthusiast since the end of the 1990s, and is the organizer of over 30 Perl conferences in eight countries.
    [Show full text]
  • Functional and Procedural Languages and Data Structures Learning
    Chapter 1 Functional and Procedural Languages and Data Structures Learning Joao˜ Dovicchi and Joao˜ Bosco da Mota Alves1 Abstract: In this paper authors present a didactic method for teaching Data Structures on Computer Science undergraduate course. An approach using func- tional along with procedural languages (Haskell and ANSI C) is presented, and adequacy of such a method is discussed. Authors are also concerned on how functional language can help students to learn fundamental concepts and acquire competence on data typing and structure for real programming. 1.1 INTRODUCTION Computer science and Information Technology (IT) undergraduate courses have its main focus on software development and software quality. Albeit recent in- troduction of Object Oriented Programming (OOP) have been enphasized, the preferred programming style paradigm is based on imperative languages. FOR- TRAN, Cobol, Algol, Pascal, C and other procedural languages were frequently used to teach computer and programming concepts [Lev95]. Nowadays, Java is the choice for many computer science teaching programs [KW99, Gri00, Blu02, GT98], although “the novelty and popularity of a language do not automatically imply its suitability for the learning of introductory programming” [Had98]. Inside undergraduate curricula, Data Structures courses has some specific re- quirements that depends on mathematical formalism. In this perspective, concepts 1Remote Experimentation Laboratory, Informatics and Statistics Department (INE), Universidade Federal de Santa Catarina (UFSC), Florianopolis,´ SC, Brazil, CEP 88040-900; Phone: +55 (48) 331 7511; Fax: +55 (48) 331 9770; Email: [email protected] and [email protected] 1 on discrete mathematics is very important on understanding this formalism. These courses’ syllabuses include concept attainment and competence development on expression evaluation, iteration, recursion, lists, graphs, trees, and so on.
    [Show full text]
  • Vivado Design Suite User Guide: High-Level Synthesis (UG902)
    Vivado Design Suite User Guide High-Level Synthesis UG902 (v2018.3) December 20, 2018 Revision History Revision History The following table shows the revision history for this document. Section Revision Summary 12/20/2018 Version 2018.3 Schedule Viewer Updated information on the schedule viewer. Optimizing the Design Clarified information on dataflow and loops throughout section. C++ Arbitrary Precision Fixed-Point Types: Reference Added note on using header files. Information HLS Math Library Updated information on how hls_math.h is used. The HLS Math Library, Fixed-Point Math Functions Updated functions. HLS Video Library, HLS Video Functions Library Moved the HLS video library to the Xilinx GitHub (https:// github.com/Xilinx/xfopencv) HLS SQL Library, HLS SQL Library Functions Updated hls::db to hls::alg functions. System Calls Added information on using the __SYNTHESIS__ macro. Arrays Added information on array sizing behavior. Command Reference Updated commands. config_dataflow, config_rtl Added the option -disable_start_propagation Class Methods, Operators, and Data Members Added guidance on specifying data width. UG902 (v2018.3) December 20, 2018Send Feedback www.xilinx.com High-Level Synthesis 2 Table of Contents Revision History...............................................................................................................2 Chapter 1: High-Level Synthesis............................................................................ 5 High-Level Synthesis Benefits....................................................................................................5
    [Show full text]
  • C++ Object-Oriented Library User's Manual [COOL]
    TEXAS I NSTRUMENTS C++ Object-Oriented Library User’s Manual MANUAL REVISION HISTORY C++ Object-Oriented Library User’s Manual (2566801-0001) Original Issue. March 1990 Copyright © 1990, 1991 Texas Instruments Incorporated Permission is granted to any individual or institution to use, copy, modify, and distribute this document, provided that this complete copyright and permission notice is maintained, intact, in all copies and supporting documentation. Texas Instruments Incorporated makes no representations about the suitability of this document or the software described herein for any purpose. It is provided ”as is” without express or implied warranty. Texas Instruments Incorporated Information Technology Group Austin, Texas C++ OBJECT-ORIENTED LIBRARY USER’S MANUAL CONTENTS Paragraph Title Page About This Manual . xi 1 Overview of COOL 1.1 Introduction. 1-1 1.2 Audience. 1-1 1.3 Major Attributes. 1-1 1.4 Macros. 1-2 1.5 Parameterized Templates. 1-2 1.6 Symbols and Packages. 1-3 1.7 Polymorphic Management. 1-3 1.8 Exception Handling. 1-4 1.9 Classes. 1-4 1.10 Class Hierarchy. 1-7 2 String Classes 2.1 Introduction. 2-1 2.2 Requirements. 2-1 2.3 String Class. 2-1 2.4 String Example. 2-7 2.5 Auxiliary char* Functions. 2-8 2.6 Regular Expression Class. 2-10 2.7 Regular Expression Example. 2-12 2.8 General String Class. 2-13 2.9 General String Example. 2-20 3 Number Classes 3.1 Introduction. 3-1 3.2 Requirements. 3-1 3.3 Random Class. 3-1 3.4 Random Class Example.
    [Show full text]
  • The Sage Interpreter
    Parabola Volume 44, Issue 1 (2008) Sage | Free Software for Mathematics Bill McLean1 A lot of useful mathematical software is freely available via the internet. If you look hard enough you can find a code to solve just about any standard mathematical problem, and for many years professional scientists have downloaded programs and subroutine libraries from repositories like netlib [4]. The trouble is that most of this software is not easy to use, and typically requires specialised programming skills. For this reason, university mathematics courses mostly use commercial software appli- cations like Maple, Matlab or Mathematica, that provide a simpler user interface. Several free applications [1,3,6,8] provide similar, if less sophisticated, facilities. Some of these mathematics packages have a long history, for example, the earliest version of Matlab dates from the 1970s. In this article I will describe a relatively recent package called Sage [9] (Software for Algebra and Geometry Experimentation). The lead developer of Sage, a mathematics professor from the University of Washington called William Stein, released version 0.1 in February of 2005. At the time of writing, the latest version of Sage is 2.10.1. The Sage interpreter The quickest way to get a feeling for how Sage works is by looking at a few examples. After starting Sage, a command prompt appears, sage: You can then type a command and press enter to have the Sage interpreter carry out that command. For example, rational arithmetic is easy. sage: 3531=83411 − 45134=3132542 3648166864=130644230381 Here, Sage has evaluated the typed expression and printed the result on the next line (cancelling any common factors in the numerator and denominator).
    [Show full text]
  • Formal Methods for Secure Software Construction
    Formal Methods for Secure Software Construction by Ben Goodspeed A Thesis Submitted to Saint Mary's University, Halifax, Nova Scotia in Partial Fulfillment of the Requirements for the Degree of Master of Science in Applied Science. April, 2016, Halifax, Nova Scotia Copyright Ben Goodspeed. Approved: Dr. Stavros Konstantinidis Supervisor Approved: Dr. Diego Rojas Examiner Approved: Dr. Cristian Suteanu Examiner Approved: Dr. Peter Selinger Examiner Date: April 8, 2016 Abstract Formal Methods for Secure Software Construction by Ben Goodspeed The objective of this thesis is to evaluate the state of the art in formal methods usage in secure computing. From this evaluation, we analyze the common components and search for weaknesses within the common workflows of secure software construction. An improved workflow is proposed and appropriate system requirements are discussed. The systems are evaluated and further tools in the form of libraries of functions, data types and proofs are provided to simplify work in the selected system. Future directions include improved program and proof guidance via compiler error messages, and targeted proof steps. April 8, 2016 \There is no such thing as perfect security, only varying levels of insecurity." Salman Rushdie Acknowledgements Thanks to Dr. Stavros Konstantinidis for supervising this work - providing no end of encouragement and freedom to learn. Thanks to Drs Rojas, Suteanu, and Selinger for their help in making this thesis what it is today. Thank you to Mayya Assouad for putting up with me while I did this, and reading countless drafts. Thanks to my father Dan Goodspeed, my mother Kathy Goodspeed, my aunt Amy Austin and my uncle Wayne Basler for supporting me throughout my education, and always encouraging me.
    [Show full text]
  • Programming in Scilab
    Programming in Scilab Micha¨elBaudin September 2011 Abstract In this document, we present programming in Scilab. In the first part, we present the management of the memory of Scilab. In the second part, we present various data types and analyze programming methods associated with these data structures. In the third part, we present features to design flexible and robust functions. In the last part, we present methods which allow to achieve good performances. We emphasize the use of vectorized functions, which allow to get the best performances, based on calls to highly optimized numerical libraries. Many examples are provided, which allow to see the effectiveness of the methods that we present. Contents 1 Introduction5 2 Variable and memory management5 2.1 The stack.................................6 2.2 More on memory management......................8 2.2.1 Memory limitations from Scilab.................8 2.2.2 Memory limitations of 32 and 64 bit systems.......... 10 2.2.3 The algorithm in stacksize ................... 11 2.3 The list of variables and the function who ................ 11 2.4 Portability variables and functions.................... 12 2.5 Destroying variables : clear ....................... 15 2.6 The type and typeof functions..................... 16 2.7 Notes and references........................... 17 2.8 Exercises.................................. 18 3 Special data types 18 3.1 Strings................................... 18 3.2 Polynomials................................ 22 3.3 Hypermatrices............................... 25 3.4 Type and dimension of an extracted hypermatrix........... 28 3.5 The list data type............................ 30 3.6 The tlist data type........................... 33 3.7 Emulating OO Programming with typed lists............. 36 1 3.7.1 Limitations of positional arguments............... 37 3.7.2 A "person" class in Scilab...................
    [Show full text]
  • TIFF Image Metadata
    Guidelines for TIFF Metadata Version 1.0 Guidelines for TIFF Metadata Recommended Elements and Format Version 1.0 February 10, 2009 Tagged Image File Format (TIFF) is a tag-based file format for the storage and interchange of raster images. It serves as a wrapper for a variety of encoded bit-mapped images, and is a popular format to use as a sustainable master in cultural heritage digital imaging projects. Created in the mid-1980s, TIFF was designed to be cross platform, backward compatible and, whenever possible, forward compatible. The most recent version of TIFF is 6.0, published in 1992. Adobe Systems controls the TIFF specification. Metadata is an essential component of the TIFF format; many TIFF images dating back to the 1980s still can be displayed in modern TIFF readers through the interpretation of the tagged metadata set. The tag set is extensible through a system of “private tags” and a framework for new complete systems of tags. Aware Systems’ TIFF Tag Reference lists 36 “Baseline” tags, 60 “Extension” tags, 74 “Private” tags, plus a set of 58 Exchangeable image file format (Exif) tags standardized by the Japan Electronics and Information Technology Industries Association (JEITA), a large group of camera manufactures. Other large extension sets of tags have been developed for GPS, GeoReference, and medical informatics purposes, as well as for Adobe’s Digital Negative (DNG) specification. The Library of Congress also maintains a complete tag list, along with significant additional information on the sustainability of numerous digital file formats at http://www.digitalpreservation.gov/formats/content/tiff_tags.shtml.
    [Show full text]
  • Beginning Julia Programming for Engineers and Scientists — Sandeep Nagar Beginning Julia Programming for Engineers and Scientists
    فقط کتاب مرجع معتبر دانلود کتاب های تخصصی Faghatketab.ir Beginning Julia Programming For Engineers and Scientists — Sandeep Nagar Beginning Julia Programming For Engineers and Scientists Sandeep Nagar Beginning Julia Programming: For Engineers and Scientists Sandeep Nagar New York, USA ISBN-13 (pbk): 978-1-4842-3170-8 ISBN-13 (electronic): 978-1-4842-3171-5 https://doi.org/10.1007/978-1-4842-3171-5 Library of Congress Control Number: 2017959880 Copyright © 2017 by Sandeep Nagar This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made.
    [Show full text]
  • TIFF ª Revision 6.0
    TIFF ™ Revision 6.0 Final — June 3, 1992 Author/Editor/Arbitrator: Steve Carlsen, Principal Engineer, Aldus Corporation Aldus Developers Desk Aldus Corporation 411 First Avenue South Seattle, WA 98104-2871 CompuServe: GO ALDSVC, Message Section #10 Applelink: Aldus Developers Icon For a copy of the TIFF 6.0 specification, call (206) 628-6593. If you have questions about the contents of this specification, see page 8. TIFF 6.0 Specification Final—June 3, 1992 Copyright © 1986-1988, 1992 Aldus Corporation. Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage and the Aldus copyright notice appears. If the major- ity of the document is copied or redistributed, it must be distributed verbatim, without repagination or reformatting. To copy otherwise requires specific permis- sion from the Aldus Corporation. Licenses and Trademarks Aldus and PageMaker are registered trademarks and TIFF is a trademark of Aldus Corporation. Apple and Macintosh are registered trademarks of Apple Computer, Inc. MS-DOS is a registered trademark of Microsoft Corporation. UNIX is a trademark of Bell Laboratories. CompuServe is a registered trademark of CompuServe Inc. PostScript is a registered trademark of Adobe Systems Inc. and all references to PostScript in this document are references to either the PostScript interpreter or language. Kodak and PhotoYCC are trademarks of Eastman Kodak Company. Rather than put a trademark symbol in every occurrence of other trademarked names, we state that we are using the names only in an editorial fashion, and to the benefit of the trademark owner, with no intention of infringement of the trade- mark.
    [Show full text]
  • Project 1 (Percolation) Checklist Prologue
    Project 1 (Percolation) Checklist Prologue Project goal: write a program to estimate the percolation threshold of a system Files project1.pdf (project description) project1.zip (starter files for the exercises/problems, report.txt file for the project report, run_tests file to test your solutions, and test data files) Exercises Exercise 1. (Great Circle Distance) Write a program GreatCircle.java that takes four doubles x1, y1, x2, and y2 representing the latitude and longitude in degrees of two points on earth as command-line arguments and writes the great-circle distance (in km) between them, given by the equation d = 111 arccos(sin(x1) sin(x2) + cos(x1) cos(x2) cos(y1 − y2)): & ~/workspace/project1 $ java GreatCircle 48.87 -2.33 37.8 -122.4 8701.389543238289 Exercises L GreatCircle.java package edu.umb.cs210.p1; import stdlib.StdOut; public class GreatCircle { // calculates the great circle distance given two sets of coordinates protected static double calculateGreatCircleDistance(String[] args) { // Get angles lat1, lon1, lat2, and lon2 from command line as // doubles. ... // Convert the angles to radians. ... // Calculate great-circle distanced. ... // Returnd. ... } // Entry point.[DONOTEDIT] public static void main(String[] args) { StdOut.println(GreatCircle.calculateGreatCircleDistance(args)); } } Exercises Exercise 2. (Counting Primes) Implement the static method isPrime() in PrimeCounter.java that takes an integer argument x and returns true if it is prime and false otherwise. Also implement the static method primes() that takes an integer argument N and returns the number of primes less than or equalp to N. Recall that a number x is prime if it is not divisible by any number i 2 [2; x].
    [Show full text]