Explore chapters and articles related to this topic
War of Control Hijacking
Published in Uzzal Sharma, Parmanand Astya, Anupam Baliyan, Salah-ddine Krit, Vishal Jain, Mohammad Zubair Khan, Advancing Computational Intelligence Techniques for Security Systems Design, 2023
Ragini Karwayun, Monika Sainger
The stack is a very popular data structure that acts as an array of data items with two key operations: push, which inserts an item to the array, and pop, which deletes the topmost based on the LIFO (Last In First Out) method.
Teaching Speaking in Indian ESL Classrooms
Published in S. Mekala, R Geetha, Contemporary ELT Strategies in Engineering Pedagogy, 2022
Example: Read-aloud taskA computer program is a collection of instructions to perform a specific task. For this, a computer program may need to store data, retrieve data, and perform computations on the data. A data structure is a named location that can be used to store and organize data. An algorithm is a collection of steps to solve a particular problem. Learning data structures and algorithms allow us to write efficient and optimized computer programs.This text may be read aloud and then extended as a meaning generating activity. A read-aloud task is tightly controlled and does not allow for free interpretation by the student.
Intermediate GPSS
Published in Zaven A. Karian, Edward J. Dudewicz, Modern Statistical, Systems, and GPSS Simulation, 2020
Zaven A. Karian, Edward J. Dudewicz
As the GPSS processor steps through a GPSS program, in addition to generating code, it assigns block numbers sequentially to every block in the program and places a transaction on the FEC whenever it encounters a GENERATE block. The creation and deletion of transactions are managed through the use of a stack that contains all the transactions that potentially could enter the simulation. The stack is a linked-list data structure that is operated as a LIFO (last in, first out) system. As we saw in Section 1.5, a stack is a special case of a priority queue. Each implementation of GPSS must cope with a fixed memory size by imposing a limit on the maximum number of transactions that can be made available. This limit is typically between 100 and 200. Every transaction carries with it a sequentially assigned identification number starting with 1. To create a transaction, a transaction is “popped off” the stack and placed on the FEC. There need not be a great deal of data movement associated with this process, since the movement of a transaction from the top of the stack to the FEC can be accomplished through the use of pointers. When a transaction needs to be removed from the simulation, it is “pushed down” on the stack.
Grid k-d tree approach for point location in polyhedral data sets – application to explicit MPC
Published in International Journal of Control, 2020
In addition to the BST data structure mentioned above, other data structures have been applied to the point location problem. The hash table is a data structure used to implement an associative array where the time complexity is O(1). A two-stage algorithm was proposed which combines the direct search method with the hash table (Bayat, Johansen, & Jalali, 2011). In this approach, the hash table divides the whole state space into many grids in which the number of affine control laws differs greatly, it then locates the corresponding partition using the direct search method, which produces a fairly low online computation efficiency. To improve online searching efficiency a two-level hash table structure and grid-BST structure based on the hash table method have been used. (Zhang, Xiu, Xie, & Hu, 2016). Other data structures are also used to solve the point location problem in EMPC, namely, quardtree, graph, connected graph, etc. (Herceg, Jones, Kvasnica, & Morari, 2015; Herceg, Mariethoz, & Morari, 2013; Jafargholi, Peyrl, Zanarini, & Herceg, 2014; Oberdieck, Diangelakis, & Pistikopoulos, 2017).