To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Confidently analyze, interpret and act on financial data with this practical introduction to the fundamentals of financial data science. Master the fundamentals with step-by-step introductions to core topics will equip you with a solid foundation for applying data science techniques to real-world complex financial problems. Extract meaningful insights as you learn how to use data to lead informed, data-driven decisions, with over 50 examples and case studies and hands-on Matlab and Python code. Explore cutting-edge techniques and tools in machine learning for financial data analysis, including deep learning and natural language processing. Accessible to readers without a specialized background in finance or machine learning, and including coverage of data representation and visualization, data models and estimation, principal component analysis, clustering methods, optimization tools, mean/variance portfolio optimization and financial networks, this is the ideal introduction for financial services professionals, and graduate students in finance and data science.
This book offers a rich analysis of many aspects of human rights law in the UK and the European legal framework while also including critiques of human rights and the varying conceptions of rights. This book has the advantage of engaging with both Strasbourg caselaw, domestic jurisprudence and the academic scholarship. The issues covered are the right to life, the prohibition of torture, inhuman and degrading treatment, abortion and assisted dying, modern slavery and human trafficking, terrorism, immigration, privacy, hate speech, protest, religion, equality and non-discrimination.
Master the art of data converter design with this definitive textbook, a detailed and accessible introduction ideal for students and practicing engineers. Razavi's distinctive and intuitive pedagogical approach, building up from elementary components to complex systems. Step-by-step transistor-level designs and simulations offer a practical hands-on understanding of key design concepts. Comprehensive coverage of essential topics including sampling circuits, comparator design, digital-to-analog converters, flash topologies, SAR and pipelined architectures, time-interleaved converters, and oversampling systems. Over 250 examples pose thought-provoking questions, reinforcing core concepts and helping students develop confidence. Over 350 end-of-chapter homework problems to test student understanding, with solutions available for course instructors. Developed by leading author Behzad Razavi, and addressing all the principles and design concepts essential to today's engineers, this is the ideal text for senior undergraduate and graduate-level students and professional engineers who aspire to excel in data converter analysis and design.
Labour Law, now in its third edition, is a well established text which offers a comprehensive and critical account of the subject by a team of prominent labour lawyers. It examines both collective labour relations and individual employment rights, including equality law, and does so while having full regard to the international labour standards as well as the implications of Brexit. Case studies and reports from government and other public agencies illuminate the text to show how the law works in practice, ensuring that students acquire not only a sophisticated knowledge of the law but also an appreciation of its purpose and the complexity of the issues which it addresses.
Teaching fundamental design concepts and the challenges of emerging technology, this textbook prepares students for a career designing the computer systems of the future. Self-contained yet concise, the material can be taught in a single semester, making it perfect for use in senior undergraduate and graduate computer architecture courses. This edition has a more streamlined structure, with the reliability and other technology background sections now included in the appendix. New material includes a chapter on GPUs, providing a comprehensive overview of their microarchitectures; sections focusing on new memory technologies and memory interfaces, which are key to unlocking the potential of parallel computing systems; deeper coverage of memory hierarchies including DRAM architectures, compression in memory hierarchies and an up-to-date coverage of prefetching. Practical examples demonstrate concrete applications of definitions, while the simple models and codes used throughout ensure the material is accessible to a broad range of computer engineering/science students.
International security is an ambiguous concept – it has many meanings to many people. Without an idea of how the world works, or how security is defined and achieved, it is impossible to create effective policies to provide security. This textbook clarifies the concept of security, the debates around it, how it is defined, and how it is pursued. Tracking scholarly approaches within security studies against empirical developments in international affairs, historical and contemporary security issues are examined through various theoretical and conceptual models. Chapters cover a wide range of topics, including war and warfare, political violence and terrorism, cyber security, environmental security, energy security, economic security, and global public health. Students are supported by illustrative vignettes, bolded key terms and an end-of-book glossary, maps, box features, discussion questions, and further reading suggestions, and instructors have access to adaptable lecture slides.
While an understanding of electronic principles is vitally important for scientists and engineers working across many disciplines, the breadth of the subject can make it daunting. This textbook offers a concise and practical introduction to electronics, suitable for a one-semester undergraduate course as well as self-guided students. Beginning with the basics of general circuit laws and resistor circuits to ease students into the subject, the textbook then covers a wide range of topics, from passive circuits to semiconductor-based analog circuits and basic digital circuits. Exercises are provided at the end of each chapter, and answers to select questions are included at the end of the book. The complete solutions manual is available for instructors to download, together with eight laboratory exercises that parallel the text. Now in its second edition, the text has been updated and expanded with additional topic coverage and exercises.
A logical and clear exposition of hierarchy and locality by a leading figure in the field, Continuing Syntax takes students from an introductory level of syntactic theory to an understanding of cutting-edge research in the field. A comprehensive range of topics is covered, including configurationality, head-movement, clause structure, nominal structure, subjacency, barriers and phases, ensuring that students have a thorough understanding of all the main components of contemporary theory. The many example sentences, extensive glossary, end-of-chapter exercises and annotated further reading lists allow readers to embed and extend their knowledge as they progress through the book. A self-contained work ideal for intermediate-level students, this volume also builds on the author's Beginning Syntax, and lays the foundation for a third volume, Comparing Syntax, which introduces formal syntactic typology.
• To understand the working principle of support vector machine (SVM).
• To comprehend the rules for identification of correct hyperplane.
• To understand the concept of support vectors, maximized margin, positive and negative hyperplanes.
• To apply an SVM classifier for a linear and non-linear dataset.
• To understand the process of mapping data points to higher dimensional space.
• To comprehend the working principle of the SVM Kernel.
• To highlight the applications of SVM.
10.1 Support Vector Machines
Support vector machines (SVMs) are supervised machine learning (ML) models used to solve regression and classification problems. However, it is widely used for solving classification problems. The main goal of SVM is to segregate the n-dimensional space into labels or classes by defining a decision boundary or hyperplanes. In this chapter, we shall explore SVM for solving classification problems.
10.1.1 SVM Working Principle
SVM Working Principle | Parteek Bhatia, https://youtu.be/UhzBKrIKPyE
To understand the working principle of the SVM classifier, we will take a standard ML problem where we want a machine to distinguish between a peach and an apple based on their size and color.
Let us suppose the size of the fruit is represented on the X-axis and the color of the fruit is on the Y-axis. The distribution of the dataset of apple and peach is shown in Figure 10.1.
To classify it, we must provide the machine with some sample stock of fruits and label each of the fruits in the stock as an “apple” or “peach”. For example, we have a labeled dataset of some 100 fruits with corresponding labels, i.e., “apple” or “peach”. When this data is fed into a machine, it will analyze these fruits and train itself. Once the training is completed, if some new fruit comes into the stock, the machine will classify whether it is an “apple” or a “peach”.
Most of the traditional ML algorithms would learn by observing the perfect apples and perfect peaches in the stock, i.e., they will train themselves by observing the ideal apples of stock (apples which are very much like apples in terms of their size and color) and the perfect peaches of stock (peaches which are very much like peaches in terms of their size and color). These standard samples are likely to be found in the heart of stock. The heart of the stock is shown in Figure 10.2.
After careful study of this chapter, students should be able to do the following:
LO1: Identify stress concentration in machine members.
LO2: Explain stress concentration from the theory of elasticity approach.
LO3: Calculate stress concentration due to a circular hole in a plate.
LO4: Analyze stress concentration due to an elliptical hole in a plate.
LO5: Evaluate notch sensitivity.
LO6: Create designs for reducing stress concentration.
9.1 INTRODUCTION [LO1]
Stresses given by relatively simple equations in the strength of materials for structures or machine members are based on the assumed continuity of the elastic medium. However, the presence of discontinuity destroys the assumed regularity of stress distribution in a member and a sudden increase in stresses occurs in the neighborhood of the discontinuity. In developing machines, it is impossible to avoid abrupt changes in cross-sections, holes, notches, shoulders, etc. Abrupt changes in cross-section also occur at the roots of gear teeth and threads of bolts. Some examples are shown in Figure 9.1.
Any such discontinuity acts as a stress raiser. Ideally, discontinuity in materials such as non-metallic inclusions in metals, casting defects, residual stresses from welding may also act as stress raisers. In this chapter, however, we shall consider only the geometric discontinuity that arises from design considerations of structures or machine parts.
Many theoretical methods and experimental techniques have been developed to determine stress concentrations in different structural and mechanical systems. In order to understand the concept, we shall begin with a plate with a centrally located hole. The plate is subjected to uniformly distributed tensile loading at the ends, as shown in Figure 9.2.
• To define machine learning (ML) and discuss its applications.
• To learn the differences between traditional programming and ML.
• To understand the importance of labeled and unlabeled data and its various usage for ML.
• To understand the working principle of supervised, unsupervised, and reinforcement learnings.
• To understand the key terms like data science, data mining, artificial intelligence, and deep learning.
1.1 Introduction
In today’s data-driven world, information flows through the digital landscape like an untapped river of potential. Within this vast data stream lies the key to unlocking a new era of discovery and innovation. Machine learning (ML), a revolutionary field, acts as the gateway to this wealth of opportunities. With its ability to uncover patterns, make predictive insights, and adapt to evolving information, ML has transformed industries, redefined technology, and opened the door to limitless possibilities. This book is your gateway to the fascinating realm of ML—a journey that empowers you to harness the power of data, enabling you to build intelligent systems, make informed decisions, and explore the boundless possibilities of the digital age.
ML has emerged as the dominant approach for solving problems in the modern world, and its wide-ranging applications have made it an integral part of our lives. Right from search engines to social networking sites, everything is powered by ML algorithms. Your favorite search engine uses ML algorithms to get you the appropriate search results. Smart home assistants like Alexa and Siri use ML to serve us better. The influence of ML in our day-to-day activities is so much that we cannot even realize it. Online shopping sites like Amazon, Flipkart, and Myntra use ML to recommend products. Facebook is using ML to display our feed. Netflix and YouTube are using ML to recommend videos based on our interests.
Data is growing exponentially with the Internet and smartphones, and ML has just made this data more usable and meaningful. Social media, entertainment, travel, mining, medicine, bioinformatics, or any field you could name uses ML in some form.
To understand the role of ML in the modern world, let us first discuss the applications of ML.
After careful study of this chapter, students should be able to do the following:
LO1: Identify the difference between engineering mechanics and the theory of elasticity approach.
LO2: Explain yielding and brittle fracture.
LO3: Describe the stress–strain behavior of common engineering materials.
LO4: Compare hardness, ductility, malleability, toughness, and creep.
LO5: Explain different hardness measurement techniques.
1.1 INTRODUCTION [LO1]
Mechanics is one of the oldest physical sciences, dating back to the times of Aristotle and Archimedes. The subject deals with force, displacement, and motion. The concepts of mechanics have been used to solve many mechanical and structural engineering problems through the ages. Because of its intriguing nature, many great scientists including Sir Isaac Newton and Albert Einstein delved into it for solving intricate problems in their own fields.
Engineering mechanics and mechanics of materials developed over centuries with a few experiment-based postulates and assumptions, particularly to solve engineering problems in designing machines and structural parts. Problems are many and varied. However, in most cases, the requirement is to ensure sufficient strength, stiffness, and stability of the components, and eventually those of the whole machine or structure. In order to do this, we first analyze the forces and stresses at different points in a member, and then select materials of known strength and deformation behavior, to withstand the stress distribution with tolerable deformation and stability limits. The methodology has now developed to the extent of coding that takes into account the whole field stress, strain, deformation behaviors, and material characteristics to predict the probability of failure of a component at the weakest point. Inputs from the theory of elasticity and plasticity, mathematical and computational techniques, material science, and many other branches of science are needed to develop such sophisticated coding.
The theory of elasticity too developed but as an applied mathematics topic, and engineers took very little notice of it until recently, when critical analyses of components in high-speed machinery, vehicles, aerospace technology, and many other applications became necessary. The types of problems considered in both the elementary strength of material and the theory of elasticity are similar, but the approaches are different. The strength of the materials approach is generally simple. Here the emphasis is on finding practical solutions to a problem with simplifying assumptions.
After careful study of this chapter, students should be able to do the following:
LO1: Describe constitutive equations.
LO2: Relate the elastic constants.
LO3: Recognize boundary value problems.
LO4: Explain St. Venant's principle.
LO5: Describe the principle of superposition.
LO6: Illustrate the uniqueness theorem.
LO7: Develop stress function approach.
4.1 CONSTITUTIVE EQUATIONS [LO1]
So far, we have discussed the strain and stress analysis in detail. In this chapter, we shall link the stress and strain by considering the material properties in order to completely describe the elastic, plastic, elasto-plastic, visco-elastic, or other such deformation characteristics of solids. These are known as constitutive equations, or in simpler terms the stress–strain relations. There are endless varieties of materials and loading conditions, and therefore development of a general form of constitutive equation may be challenging. Here we mainly consider linear elastic solids along with their mechanical properties and deformation behavior.
Fundamental relation between stress and strain was first given by Robert Hooke in 1676 in the most simplified manner as, “Force varies as the stretch”. This implies a load–deflection relation that was later interpreted as a stress–strain relation. Following this, we can write P = kδ, where P is the force, δ is the stretch or elongation, and k is the spring constant. This can also be written for linear elastic materials as σ = E∈, where σ is the stress, ∈ is the strain, and E is the modulus of elasticity. For nonlinear elasticity, we may write in a simplistic manner σ = E∈n, where n ≠ 1.
Hooke's Law based on this fundamental relation is given as the stress–strain relation, and in its most general form, stresses are functions of all the strain components as shown in equation (4.1.1).
• To understand the concept of artificial neural network (ANN).
• To comprehend the working of the human brain as an inspiration for the development of neural network.
• To understand the mapping of human brain neurons to an ANN.
• To understand the working of ANN with case studies.
• To understand the role of weights in building ANN.
• To perform forward and backward propagation to train the neural networks.
• To understand different activation functions like threshold function, sigmoid function, rectifier linear unit function, and hyperbolic tangent function.
• To find the optimized value of weights for minimizing the cost function by using the gradient descent approach and stochastic gradient descent algorithm.
• To understand the concept of the mini-batch method.
16.1 Introduction to Artificial Neural Network
Neural networks and deep learning are the buzzwords in modern-day computer science. And, if you think that these are the latest entrants in this field, you probably have a misconception. Neural networks have been around for quite some time, and they have only started picking up now, putting up a huge positive impact on computer science.
Artificial neural network (ANN) was invented in the 1960s and 1970s. It became a part of common tech talks, and people started thinking that this machine learning (ML) technique would solve all the complex problems that were challenging the researchers during that time. But sooner, the hopes and expectations died off over the next decade.
The decline could not be attributed to some loopholes in neural networks, but the major reason for the decline was the “technology” itself. The technology back then was not up to the right standard to facilitate neural networks as they needed a lot of data for training and huge computation resources for building the model. During that time, both data and computing power were scarce. Hence, the resulting neural network remained only on paper rather than taking centerstage of the machine to solve some real-world problems.
Later on, at the beginning of the 21st century, we saw a lot of improvements in storage techniques resulting in reduced cost per gigabyte of storage. Humanity witnessed a huge rise in big data due to the Internet boom and smartphones.
• To implement the k-means clustering algorithm in Python.
• To determining the ideal number of clusters by implementing its code.
• To understand how to visualize clusters using plots.
• To create the dendrogram and find the optimal number of clusters for agglomerative hierarchical clustering.
• To compare results of k-means clustering with agglomerative hierarchical clustering.
• To implement clustering through various case studies.
13.1 Implementation of k-means Clustering and Hierarchical Clustering
In the previous chapter, we discussed various clustering algorithms. We learned that clustering algorithms are broadly classified into partitioning methods, hierarchical methods, and density-based methods. The k-means clustering algorithm follows partitioning method; agglomerative and divisive algorithms follow the hierarchical method, while DBSCAN is based on density-based clustering methods.
In this chapter, we will implement each of these algorithms by considering various case studies by following a step-by-step approach. You are advised to perform all these steps on your own on the mentioned databases stated in this chapter.
The k-means algorithm is considered a partitioning method and an unsupervised machine learning (ML) algorithm used to identify clusters of data items in a dataset. It is one of the most prominent ML algorithms, and its implementation in Python is quite straightforward. This chapter will consider three case studies, i.e., customers shopping in the mall dataset, the U.S. arrests dataset, and a popular Iris dataset. We will understand the significance of k-means clustering techniques to implement it in Python through these case studies. Along with the clustering of data items, we will also discuss the ways to find out the optimal number of clusters. To compare the results of the k-means algorithm, we will also implement hierarchical clustering for these problems.
We will kick-start the implementation of the k-means algorithm in Spyder IDE using the following steps.
Step 1: Importing the libraries and the dataset—The dataset for the respective case study would be downloaded, and then the required libraries would be imported.
Step 2: Finding the optimal number of clusters—We will find the optimal number of clusters by the elbow method for the given dataset.
Step 3: Fitting k-means to the dataset—A k-means model will be prepared by training the model over the acquired dataset.
Step 4: Visualizing the clusters—The clusters formed by the k-means model would then be visualized in the form of scatter plots.
After careful study of this chapter, students should be able to do the following:
LO1: Describe stresses and displacements for a rotating disk.
LO2: Compare the stress distribution in a flat disk with and without a central hole.
LO3: Illustrate the stress distribution in a disk of variable thickness.
LO4: Design the rotating disk of uniform stress.
7.1 INTRODUCTION [LO1]
The problems of stresses and deformations in disks rotating at high speeds are important in the design of both gas and steam turbines, generators and many such rotating machinery in industry. As discussed in earlier chapters, this is another example of axisymmetric problems in polar coordinates. Although the theoretical treatment of a flat disk is simpler, in many industrial applications, disks are tapered. They are usually thicker near the hub, and their theoretical analysis is slightly more involved. We shall first take up the analysis for flat disks.
In the case of rotating disks with centrifugal force as body force, the equation of equilibrium reduces to as in equation (6.1.3).
Combining this with displacement equations, we have, as in equation (6.1.5), a general equation for determining the stress distribution in axisymmetric problems. This is given as
This is a nonhomogeneous differential equation. The associated homogeneous equation (complementary equation) is
The solution of this equation is Lame's equation as discussed in Chapter 6, equation (6.2.3), and taking into consideration the particular solution, the solution to equation (7.1.2) turns out to be
We may also determine the radial displacement from equation (6.2.11), and this is given as
We may therefore write the stresses and displacement for the rotating disk under one bracket as
With these introductory basic equations, we shall now set out to discuss the stress distribution and displacement in rotating disks.
• To comprehend the concept of association mining and its applications.
• To understand the role of support, confidence, and lift.
• To understand the naive algorithm for finding association mining rules, its limits, and improvements.
• To learn about different ways to store transaction database storage.
• To understand and apply the Apriori algorithm to identify the association mining rules.
14.1 Introduction to Association Rule Mining
Association rule mining is a rule-based technique to discover the relation between the attributes of a dataset. It is used to find the relation between the sales of item X and item Y. It is often called a “market basket” analysis, as shown in Figure 14.1. Here, the market analyst examines the items that consumers often purchase together to find the relation between the sale of item X and item Y.
In other words, when customers visit a store, they may buy a certain type of items together during a shopping trip. For example, as shown in Figure 14.1, a database of customer’s transactions (e.g., shopping baskets) is shown where each transaction consists of a set of items (e.g., products) purchased during a visit, machine learning (ML) engineers can use association mining for finding out a group of items which are frequently purchased together (customers purchasing behavior). This is also referred to as an analysis of customer purchasing behavior. For example, “IF one buys bread, THEN there is a high probability of buying butter with it”, as it is common that people who buy bread often buy butter with it. The store manager can use this information and arrange the items accordingly to increase sales and the overall efficiency of the store.
Let us consider a situation where the store manager feels that there is a lot of rush and customers always complain about the slow working of his store. He is exploring different ways to improve the efficiency of his store. He performed an association analysis and prepared a list of associated items like bread and butter. He may decide to put all these associated items together on the same shelf or near each other so that customers can find them quickly, reducing their shopping time. It will also improve the overall efficiency of the store and the sale of the products. To further improve the shopping experience of his customers, he can create different combos and put sales over these combos.
• To know the inspiration behind the genetic algorithm.
• To understand the concept of natural selection, recombination, and mutation.
• To understand the correlation between nature and genetic algorithm.
• To formulate the mathematic representation of genes and fitness theory.
• To implement natural selection through roulette wheel.
• To implement recombination or crossover.
• To implement the process of mutation.
• To understand the elitism and its implementation.
• To discuss the advantages and disadvantages of genetic algorithms.
22.1 Intuition of Genetic Algorithm
Genetic algorithm (GA) is inspired by nature, and it plays a vital role in the field of machine learning (ML). It selects the best-optimized solution from all available possible solutions or candidates. As nature selects the best possible candidates using the theory of evolution, in the same way, the GA selects the best possible solution from the available solutions.
One of the applications of GAs in ML is to select the global minima from all possible (local) minima by using natural selection. In earlier chapters, we learned that during the training of an artificial neural network, the main goal is to obtain the weights with a minimum cost function value. The gradient descent algorithm is commonly used to find the local minima of the cost function. But, we must find the global minima to reach the optimal weights. A GA can be used to find the global minima out of all available local minima or possible solutions. In this case, the set of possible local minima becomes the population containing possible candidates.
In this chapter, we will discuss inspiration from nature which is the main driving concept in working of GAs and their implementation. To get a good idea about the GA, we will discuss the basics of natural selection by revisiting the theory of evolution in the next section.
22.2 The Inspiration behind Genetic Algorithm
The concepts discussed in this chapter are also available in the form of the free online Udemy Course, Genetic Algorithm for Machine Learning by Parteek Bhatia,
The GA is one of the first and most well-regarded evolutionary algorithms in computer science literature. John Holland, a researcher at the University of Michigan, gave this algorithm in the 1970s, but it became popular in the ‘90s.