0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (9)
  • R250 - R500 (38)
  • R500+ (3,150)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design

Biologically Inspired Cooperative Computing - IFIP 19th World Computer Congress, TC 10: 1st IFIP International Conference on... Biologically Inspired Cooperative Computing - IFIP 19th World Computer Congress, TC 10: 1st IFIP International Conference on Biologically Inspired Cooperative Computing, August 21-24, 2006, Santiago, Chile (Hardcover, 2006 ed.)
Yi Pan, Franz J. Rammig, Hartmut Schmeck, Mauricio Solar
R2,999 Discovery Miles 29 990 Ships in 10 - 15 working days

In the world of information technology, it is no longer the computer in the classical sense where the majority of IT applications is executed; computing is everywhere. More than 20 billion processors have already been fabricated and the majority of them can be assumed to still be operational. At the same time, virtually every PC worldwide is connected via the Internet. This combination of traditional and embedded computing creates an artifact of a complexity, heterogeneity, and volatility unmanageable by classical means. Each of our technical artifacts with a built-in processor can be seen as a ''Thing that Thinks," a term introduced by MIT's Thinglab. It can be expected that in the near future these billions of Things that Think will become an ''Internet of Things," a term originating from ETH Zurich. This means that we will be constantly surrounded by a virtual "organism" of Things that Think. This organism needs novel, adequate design, evolution, and management means which is also one of the core challenges addressed by the recent German priority research program on Organic Computing.

Building Machine Learning Pipelines (Paperback): Hannes Hapke Building Machine Learning Pipelines (Paperback)
Hannes Hapke; Contributions by Catherine Nelson
R1,552 R1,361 Discovery Miles 13 610 Save R191 (12%) Ships in 12 - 19 working days

Companies are spending billions on machine learning projects, but it's money wasted if the models can't be deployed effectively. In this practical guide, Hannes Hapke and Catherine Nelson walk you through the steps of automating a machine learning pipeline using the TensorFlow ecosystem. You'll learn the techniques and tools that will cut deployment time from days to minutes, so that you can focus on developing new models rather than maintaining legacy systems. Data scientists, machine learning engineers, and DevOps engineers will discover how to go beyond model development to successfully productize their data science projects, while managers will better understand the role they play in helping to accelerate these projects. Understand the steps to build a machine learning pipeline Build your pipeline using components from TensorFlow Extended Orchestrate your machine learning pipeline with Apache Beam, Apache Airflow, and Kubeflow Pipelines Work with data using TensorFlow Data Validation and TensorFlow Transform Analyze a model in detail using TensorFlow Model Analysis Examine fairness and bias in your model performance Deploy models with TensorFlow Serving or TensorFlow Lite for mobile devices Learn privacy-preserving machine learning techniques

Architectural Wireless Networks Solutions and Security Issues (Paperback, 1st ed. 2021): Santosh Kumar Das, Sourav Samanta,... Architectural Wireless Networks Solutions and Security Issues (Paperback, 1st ed. 2021)
Santosh Kumar Das, Sourav Samanta, Nilanjan Dey, Bharat S. Patel, Aboul Ella Hassanien
R5,101 Discovery Miles 51 010 Ships in 10 - 15 working days

This book presents architectural solutions of wireless network and its variations. It basically deals with modeling, analysis, design and enhancement of different architectural parts of wireless network. The main aim of this book is to enhance the applications of wireless network by reducing and controlling its architectural issues. The book discusses efficiency and robustness of wireless network as a platform for communication and data transmission and also discusses some challenges and security issues such as limited hardware resources, unreliable communication, dynamic topology of some wireless networks, vulnerability and unsecure environment. This book is edited for users, academicians and researchers of wireless network. Broadly, topics include modeling of security enhancements, optimization model for network lifetime, modeling of aggregation systems and analyzing of troubleshooting techniques.

Green Internet of Things (Hardcover): Bandana Mahapatra, Anand Nayyar Green Internet of Things (Hardcover)
Bandana Mahapatra, Anand Nayyar
R1,675 Discovery Miles 16 750 Ships in 12 - 19 working days

Green Internet of Things (IoT) envisions the concept of reducing the energy consumption of IoT devices and making the environment safe. Considering this factor, this book focuses on both the theoretical and implementation aspects in green computing, next-generation networks or networks that can be utilized in providing green systems through IoT-enabling technologies, that is, the technology behind its architecture and building components. It also encompasses design concepts and related advanced computing in detail. * Highlights the elements and communication technologies in Green IoT * Discusses technologies, architecture and components surrounding Green IoT * Describes advanced computing technologies in terms of smart world, data centres and other related hardware for Green IoT * Elaborates energy-efficient Green IoT Design for real-time implementations * Covers pertinent applications in building smart cities, healthcare devices, efficient energy harvesting and so forth This short-form book is aimed at students, researchers in IoT, clean technologies, computer science and engineering cum Industry R&D researchers.

Intelligent Vehicular Networks and Communications - Fundamentals, Architectures and Solutions (Paperback): Anand Paul, Naveen... Intelligent Vehicular Networks and Communications - Fundamentals, Architectures and Solutions (Paperback)
Anand Paul, Naveen Chilamkurti, Alfred Daniel, Seungmin Rho
R1,751 Discovery Miles 17 510 Ships in 12 - 19 working days

Intelligent Vehicular Network and Communications: Fundamentals, Architectures and Solutions begins with discussions on how the transportation system has transformed into today's Intelligent Transportation System (ITS). It explores the design goals, challenges, and frameworks for modeling an ITS network, discussing vehicular network model technologies, mobility management architectures, and routing mechanisms and protocols. It looks at the Internet of Vehicles, the vehicular cloud, and vehicular network security and privacy issues. The book investigates cooperative vehicular systems, a promising solution for addressing current and future traffic safety needs, also exploring cooperative cognitive intelligence, with special attention to spectral efficiency, spectral scarcity, and high mobility. In addition, users will find a thorough examination of experimental work in such areas as Controller Area Network protocol and working function of On Board Unit, as well as working principles of roadside unit and other infrastructural nodes. Finally, the book examines big data in vehicular networks, exploring various business models, application scenarios, and real-time analytics, concluding with a look at autonomous vehicles.

Navigation Design and SEO for Content-Intensive Websites - A Guide for an Efficient Digital Communication (Paperback): Mario... Navigation Design and SEO for Content-Intensive Websites - A Guide for an Efficient Digital Communication (Paperback)
Mario Perez-Montoro, Lluis Codina
R1,535 Discovery Miles 15 350 Ships in 12 - 19 working days

Navigation Design and SEO for Content-Intensive Websites: A Guide for an Efficient Digital Communication presents the characteristics and principal guidelines for the analysis and design of efficient navigation and information access systems on content-intensive websites, such as magazines and other media publications. Furthermore, the book aims to present the tools of information processing, including information architecture (IA) and content categorization systems, so that such designs can ensure a good navigation experience based on the semantic relations between content items. The book also presents best practices in the design of information access systems with regard to their main structures, including search query forms and search result pages. Finally, the book describes the foundations of search engine optimization (SEO), emphasizing SEO oriented to publications focused on communication and the coverage of current affairs, including images and videos.

Information Security Science - Measuring the Vulnerability to Data Compromises (Paperback): Carl Young Information Security Science - Measuring the Vulnerability to Data Compromises (Paperback)
Carl Young
R1,586 Discovery Miles 15 860 Ships in 12 - 19 working days

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation. This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.

Big Data - Principles and Paradigms (Paperback): Rajkumar Buyya, Rodrigo N. Calheiros, Amir Vahid Dastjerdi Big Data - Principles and Paradigms (Paperback)
Rajkumar Buyya, Rodrigo N. Calheiros, Amir Vahid Dastjerdi
R1,809 Discovery Miles 18 090 Ships in 12 - 19 working days

Big Data: Principles and Paradigms captures the state-of-the-art research on the architectural aspects, technologies, and applications of Big Data. The book identifies potential future directions and technologies that facilitate insight into numerous scientific, business, and consumer applications. To help realize Big Data's full potential, the book addresses numerous challenges, offering the conceptual and technological solutions for tackling them. These challenges include life-cycle data management, large-scale storage, flexible processing infrastructure, data modeling, scalable machine learning, data analysis algorithms, sampling techniques, and privacy and ethical issues.

Viruses, Hardware and Software Trojans - Attacks and Countermeasures (Paperback, 1st ed. 2020): Anatoly Belous, Vitali Saladukha Viruses, Hardware and Software Trojans - Attacks and Countermeasures (Paperback, 1st ed. 2020)
Anatoly Belous, Vitali Saladukha
R3,281 Discovery Miles 32 810 Ships in 10 - 15 working days

This book provides readers with a valuable reference on cyber weapons and, in particular, viruses, software and hardware Trojans. The authors discuss in detail the most dangerous computer viruses, software Trojans and spyware, models of computer Trojans affecting computers, methods of implementation and mechanisms of their interaction with an attacker - a hacker, an intruder or an intelligence agent. Coverage includes Trojans in electronic equipment such as telecommunication systems, computers, mobile communication systems, cars and even consumer electronics. The evolutionary path of development of hardware Trojans from "cabinets", "crates" and "boxes" to the microcircuits (IC) is also discussed. Readers will benefit from the detailed review of the major known types of hardware Trojans in chips, principles of their design, mechanisms of their functioning, methods of their introduction, means of camouflaging and detecting, as well as methods of protection and counteraction.

Secrets of a Cyber Security Architect (Hardcover): Brook S. E. Schoenfield Secrets of a Cyber Security Architect (Hardcover)
Brook S. E. Schoenfield
R1,982 Discovery Miles 19 820 Ships in 12 - 19 working days

Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"? Cyber security is a big, messy, multivariate, multidimensional arena. A reasonable "defense-in-depth" requires many technologies; smart, highly skilled people; and deep and broad analysis, all of which must come together into some sort of functioning whole, which is often termed a security architecture. Secrets of a Cyber Security Architect is about security architecture in practice. Expert security architects have dozens of tricks of their trade in their kips. In this book, author Brook S. E. Schoenfield shares his tips and tricks, as well as myriad tried and true bits of wisdom that his colleagues have shared with him. Creating and implementing a cyber security architecture can be hard, complex, and certainly frustrating work. This book is written to ease this pain and show how to express security requirements in ways that make the requirements more palatable and, thus, get them accomplished. It also explains how to surmount individual, team, and organizational resistance. The book covers: What security architecture is and the areas of expertise a security architect needs in practice The relationship between attack methods and the art of building cyber defenses Why to use attacks and how to derive a set of mitigations and defenses Approaches, tricks, and manipulations proven successful for practicing security architecture Starting, maturing, and running effective security architecture programs Secrets of the trade for the practicing security architecture Tricks to surmount typical problems Filled with practical insight, Secrets of a Cyber Security Architect is the desk reference every security architect needs to thwart the constant threats and dangers confronting every digitally connected organization.

A Synergistic Framework for Hardware IP Privacy and Integrity Protection (Paperback, 1st ed. 2020): Meng Li, David Z. Pan A Synergistic Framework for Hardware IP Privacy and Integrity Protection (Paperback, 1st ed. 2020)
Meng Li, David Z. Pan
R2,849 Discovery Miles 28 490 Ships in 10 - 15 working days

This book proposes a synergistic framework to help IP vendors to protect hardware IP privacy and integrity from design, optimization, and evaluation perspectives. The proposed framework consists of five interacting components that directly target at the primary IP violations. All the five algorithms are developed based on rigorous mathematical modeling for primary IP violations and focus on different stages of IC design, which can be combined to provide a formal security guarantee.

ASIC Design and Synthesis - RTL Design Using Verilog (Paperback, 1st ed. 2021): Vaibbhav Taraate ASIC Design and Synthesis - RTL Design Using Verilog (Paperback, 1st ed. 2021)
Vaibbhav Taraate
R4,119 Discovery Miles 41 190 Ships in 10 - 15 working days

This book describes simple to complex ASIC design practical scenarios using Verilog. It builds a story from the basic fundamentals of ASIC designs to advanced RTL design concepts using Verilog. Looking at current trends of miniaturization, the contents provide practical information on the issues in ASIC design and synthesis using Synopsys DC and their solution. The book explains how to write efficient RTL using Verilog and how to improve design performance. It also covers architecture design strategies, multiple clock domain designs, low-power design techniques, DFT, pre-layout STA and the overall ASIC design flow with case studies. The contents of this book will be useful to practicing hardware engineers, students, and hobbyists looking to learn about ASIC design and synthesis.

The Fourth Terminal - Benefits of Body-Biasing Techniques for FDSOI Circuits and Systems (Paperback, 1st ed. 2020): Sylvain... The Fourth Terminal - Benefits of Body-Biasing Techniques for FDSOI Circuits and Systems (Paperback, 1st ed. 2020)
Sylvain Clerc, Thierry Di Gilio, Andreia Cathelin
R3,656 Discovery Miles 36 560 Ships in 10 - 15 working days

This book discusses the advantages and challenges of Body-Biasing for integrated circuits and systems, together with the deployment of the design infrastructure needed to generate this Body-Bias voltage. These new design solutions enable state of the art energy efficiency and system flexibility for the latest applications, such as Internet of Things and 5G communications.

Towards Ubiquitous Low-power Image Processing Platforms (Paperback, 1st ed. 2021): Magnus Jahre, Diana Goehringer, Philippe... Towards Ubiquitous Low-power Image Processing Platforms (Paperback, 1st ed. 2021)
Magnus Jahre, Diana Goehringer, Philippe Millet
R3,606 Discovery Miles 36 060 Ships in 10 - 15 working days

This book summarizes the key scientific outcomes of the Horizon 2020 research project TULIPP: Towards Ubiquitous Low-power Image Processing Platforms. The main focus lies on the development of high-performance, energy-efficient embedded systems for the growing range of increasingly complex image processing applications. The holistic TULIPP approach is described in the book, which addresses hardware platforms, programming tools and embedded operating systems. Several of the results are available as open-source hardware/software for the community. The results are evaluated with several use cases taken from real-world applications in key domains such as Unmanned Aerial Vehicles (UAVs), robotics, space and medicine. Discusses the development of high-performance, energy-efficient embedded systems for the growing range of increasingly complex image processing applications; Covers the hardware architecture of embedded image processing systems, novel methods, tools and libraries for programming those systems as well as embedded operating systems to manage those systems; Demonstrates results with several challenging applications, such as medical systems, robotics, drones and automotive.

Street Coder (Paperback): Sedat Kapanoglu Street Coder (Paperback)
Sedat Kapanoglu
R1,289 Discovery Miles 12 890 Ships in 12 - 19 working days

Software development isn't an "ivory tower" exercise.Street coders get the job done by prioritizing tasks, making quick decisions, and knowing which rules to break. Street Coder: Rules to break and how to break themis a programmer's survival guide, full of tips, tricks, and hacks that will make you a more efficient programmer. This book's rebel mindset challenges status quo thinking and exposes the important skills you need on the job. You'll learnthe crucial importance of algorithms and data structures, turn programming chores into programming pleasures, and shatter dogmatic principles keeping you from your full potential. Every new coder starts out with a lot of theory; the "streetsmarts" come with experience. To be successful, you need to know how toput theory into action, understand why "best practices" are the best, and know when to go rogue and break the unbreakable rules.

Privacy and Security Challenges in Cloud Computing - A Holistic Approach (Hardcover): T. Ananth Kumar, T. S. Arun Samuel, R.... Privacy and Security Challenges in Cloud Computing - A Holistic Approach (Hardcover)
T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy
R4,028 Discovery Miles 40 280 Ships in 12 - 19 working days

This reference text discusses various security techniques and challenges for cloud data protection from both software and hardware aspects. The text provides readers with an overview of cloud computing, beginning with historical perspectives on mainframe computers and early networking protocols, moving to current issues such as security of hardware and networks, performance, evolving IoT areas, edge computing, etc. It also deals with threat detection and incident response in cloud security. It covers important topics including operational security agitations in cloud computing, cyber artificial intelligence (AI) platform for cloud security, and security concerns of virtualization in cloud computing. The book will serve as a useful resource for graduate students and professionals in the fields of electrical engineering, electronics engineering, computer science, and information technology.

Artificial Intelligence and Cybersecurity - Advances and Innovations (Hardcover): Ishaani Priyadarshini, Rohit Sharma Artificial Intelligence and Cybersecurity - Advances and Innovations (Hardcover)
Ishaani Priyadarshini, Rohit Sharma
R5,069 Discovery Miles 50 690 Ships in 12 - 19 working days

Provides advanced system implementation for Smart Cities using Artificial Intelligence Addresses the complete functional framework workflow in Artificial Intelligence Explores basic and high-level concepts, thus servicing as a manual for those in the industry while also helping beginners Based on the latest technologies, and covering the major challenges, issues, and advances in Artificial Intelligence and Cybersecurity Discusses intelligent data management and automated systems through Artificial Intelligence and Cyber Security

Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems (Hardcover, 1st ed. 2020): Marilyn Wolf, Dimitrios... Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems (Hardcover, 1st ed. 2020)
Marilyn Wolf, Dimitrios Serpanos
R2,382 Discovery Miles 23 820 Ships in 10 - 15 working days

This book provides the first comprehensive view of safe and secure CPS and IoT systems. The authors address in a unified manner both safety (physical safety of operating equipment and devices) and computer security (correct and sound information), which are traditionally separate topics, practiced by very different people. Offers readers a unified view of safety and security, from basic concepts through research challenges; Provides a detailed comparison of safety and security methodologies; Describes a comprehensive threat model including attacks, design errors, and faults; Identifies important commonalities and differences in safety and security engineering.

R in Action (Paperback): Robert Kabacoff R in Action (Paperback)
Robert Kabacoff
R1,723 R1,304 Discovery Miles 13 040 Save R419 (24%) Ships in 12 - 19 working days

Built specifically for statistical computing and graphics, the R language, along with its amazing collection of libraries and tools, is one of the most powerful tools you can use to tackle data analysis for business, research, and other data-intensive domains. This revised and expanded third edition of R in Action covers the new tidy verse approach to data analysis and R's state-of-the-art graphing capabilities with the ggplot2 package. R in Action, Third Edition teaches you to use the R language, including the popular tidy verse packages, through hands-on examples relevant to scientific, technical, and business developers. Focusing on practical solutions to real-world data challenges, R expert RobKabacoff takes you on a crash course in statistics, from dealing with messy and incomplete data to creating stunning visualisations. The R language is the most powerful platform you can choose for modern data analysis. Free and open source, R's community has created thousands of modules to tackle challenges from data-crunching to presentation. R's graphical capabilities are also state-of-the-art, with a comprehensive and powerful feature set available for data visualization. R runs on all major operating systems and is used by businesses, researchers, and organizations worldwide.

Hardware Architectures for Post-Quantum Digital Signature Schemes (Paperback, 1st ed. 2021): Deepraj Soni, Kanad Basu, Mohammed... Hardware Architectures for Post-Quantum Digital Signature Schemes (Paperback, 1st ed. 2021)
Deepraj Soni, Kanad Basu, Mohammed Nabeel, Najwa Aaraj, Marc Manzano, …
R3,089 Discovery Miles 30 890 Ships in 10 - 15 working days

This book explores C-based design, implementation, and analysis of post-quantum cryptography (PQC) algorithms for signature generation and verification. The authors investigate NIST round 2 PQC algorithms for signature generation and signature verification from a hardware implementation perspective, especially focusing on C-based design, power-performance-area-security (PPAS) trade-offs and design flows targeting FPGAs and ASICs. Describes a comprehensive set of synthesizable c code base as well as the hardware implementations for the different types of PQC algorithms including lattice-based, code-based, and multivariate-based; Demonstrates the hardware (FPGA and ASIC) and hardware-software optimizations and trade-offs of the NIST round 2 signature-based PQC algorithms; Enables designers to build hardware implementations that are resilient to a variety of side-channels.

Models, Methods, and Tools for Complex Chip Design - Selected Contributions from FDL 2012 (Hardcover, 2014 ed.): Jan Haase Models, Methods, and Tools for Complex Chip Design - Selected Contributions from FDL 2012 (Hardcover, 2014 ed.)
Jan Haase
R4,951 Discovery Miles 49 510 Ships in 12 - 19 working days

This book brings together a selection of the best papers from the fifteenth edition of the Forum on specification and Design Languages Conference (FDL), which was held in September 2012 at Vienna University of Technology, Vienna, Austria. FDL is a well-established international forum devoted to dissemination of research results, practical experiences and new ideas in the application of specification, design and verification languages to the design, modeling and verification of integrated circuits, complex hardware/software embedded systems, and mixed-technology systems.

Grokking Continuous Delivery (Paperback): Christie Wilson Grokking Continuous Delivery (Paperback)
Christie Wilson
R1,283 Discovery Miles 12 830 Ships in 12 - 19 working days

Build and use systems that safely automate software delivery from testing through release with this jargon-busting guide to Continuous Delivery pipelines. In Grokking Continuous Delivery you will learn how to: Design effective CD pipelines for new and legacy projects Keep your software projects release-ready Maintain effective tests Scale CD across multiple applications Ensure pipelines give the right signals at the right time Use version control as the source of truth Safely automate deployments with metrics Describe CD in a way that makes sense to your colleagues Grokking Continuous Delivery teaches you the design and purpose of continuous delivery systems that you can use with any language or stack. You'll learn directly from your mentor Christie Wilson, Google engineer and co-creator of the Tekton CI/CD framework. Using crystal-clear, well-illustrated examples, Christie lays out the practical nuts and bolts of continuous delivery for developers and pipeline designers. In each chapter, you'll uncover the proper approaches to solve the real-world challenges of setting up a CD pipeline. With this book as your roadmap, you'll have a clear plan for bringing CD to your team without the need for costly trial-and-error experimentation. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology Keep your codebase release-ready. A continuous delivery pipeline automates version control, testing, and deployment with minimal developer intervention. Master the tools and practices of continuous delivery, and you'll be able to add features and push updates quickly and consistently. About the book Grokking Continuous Delivery is a friendly guide to setting up and working with a continuous delivery pipeline. Each chapter takes on a different scenario you'll face when setting up a CD system, with real-world examples like automated scaling and testing legacy applications. Taking a tool-agnostic approach, author Christie Wilson guides you each step of the way with illustrations, crystal-clear explanations, and practical exercises to lock in what you're learning. What's inside Design effective CD pipelines for new and legacy projects Ensure your pipelines give the right signals at the right times Version control as the source of truth Safely automate deployments About the reader For software engineers who want to add CD to their development process. About the author Christie Wilson is a software engineer at Google, where she co-created Tekton, a cloud-native CI/CD platform built on Kubernetes. Table of Contents PART 1 Introducing continuous delivery 1 Welcome to Grokking Continuous Delivery 2 A basic pipeline PART 2 Keeping software in a deliverable state at all times 3 Version control is the only way to roll 4 Use linting effectively 5 Dealing with noisy tests 6 Speeding up slow test suites 7 Give the right signals at the right times PART 3 Making delivery easy 8 Easy delivery starts with version control 9 Building securely and reliably 10 Deploying confidently PART 4 CD design 11 Starter packs: From zero to CD 12 Scripts are code, too 13 Pipeline design

Digital Design Using VHDL - A Systems Approach (Hardcover): William J. Dally, R. Curtis Harting, Tor M. Aamodt Digital Design Using VHDL - A Systems Approach (Hardcover)
William J. Dally, R. Curtis Harting, Tor M. Aamodt
R2,159 Discovery Miles 21 590 Ships in 12 - 19 working days

This introductory textbook provides students with a system-level perspective and the tools they need to understand, analyze and design digital systems. Going beyond the design of simple combinational and sequential modules, it shows how such modules are used to build complete systems, reflecting real-world digital design. All the essential topics are covered, including design and analysis of combinational and sequential modules, as well as system timing and synchronization. It also teaches how to write VHDL-2008 HDL in a productive and maintainable style that enables CAD tools to do much of the tedious work. A complete introduction to digital design is given through clear explanations, extensive examples and online VHDL files. The teaching package is completed with lecture slides, labs and a solutions manual for instructors. Assuming no previous digital knowledge, this textbook is ideal for undergraduate digital design courses that will prepare students for modern digital practice.

Supercomputing - 6th Russian Supercomputing Days, RuSCDays 2020, Moscow, Russia, September 21-22, 2020, Revised Selected Papers... Supercomputing - 6th Russian Supercomputing Days, RuSCDays 2020, Moscow, Russia, September 21-22, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Vladimir Voevodin, Sergey Sobolev
R2,986 Discovery Miles 29 860 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 6th Russian Supercomputing Days, RuSCDays 2020, held in Moscow, Russia, in September 2020.* The 51 revised full and 4 revised short papers presented were carefully reviewed and selected from 106 submissions. The papers are organized in the following topical sections: parallel algorithms; supercomputer simulation; HPC, BigData, AI: architectures, technologies, tools; and distributed and cloud computing. * The conference was held virtually due to the COVID-19 pandemic.

Model and Design of Improved Current Mode Logic Gates - Differential and Single-ended (Paperback, 1st ed. 2020): Kirti Gupta,... Model and Design of Improved Current Mode Logic Gates - Differential and Single-ended (Paperback, 1st ed. 2020)
Kirti Gupta, Neeta Pandey, Maneesha Gupta
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

This book presents MOSFET-based current mode logic (CML) topologies, which increase the speed, and lower the transistor count, supply voltage and power consumption. The improved topologies modify the conventional PDN, load, and the current source sections of the basic CML gates. Electronic system implementation involves embedding digital and analog circuits on a single die shifting towards mixed-mode circuit design. The high-resolution, low-power and low-voltage analog circuits are combined with high-frequency complex digital circuits, and the conventional static CMOS logic generates large current spikes during the switching (also referred to as digital switching noise), which degrade the resolution of the sensitive analog circuits via supply line and substrate coupling. This problem is exacerbated further with scaling down of CMOS technology due to higher integration levels and operating frequencies. In the literature, several methods are described to reduce the propagation of the digital switching noise. However, in high-resolution applications, these methods are not sufficient. The conventional CMOS static logic is no longer an effective solution, and therefore an alternative with reduced current spikes or that draws a constant supply current must be selected. The current mode logic (CML) topology, with its unique property of requiring constant supply current, is a promising alternative to the conventional CMOS static logic.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
A Textbook of Data Structures and…
Vijayalakshmi P Hardcover R3,817 Discovery Miles 38 170
Advances in Interdisciplinary Research…
P.K. Kapur, Gurinder Singh, … Hardcover R2,967 Discovery Miles 29 670
Numerical Nonsmooth Optimization - State…
Adil M. Bagirov, Manlio Gaudioso, … Hardcover R5,239 Discovery Miles 52 390
Technology for Success - Computer…
Mark Ciampa, Jill West, … Paperback  (1)
R1,305 R1,213 Discovery Miles 12 130
The Statistical Stability Phenomenon
Igor I. Gorban Hardcover R4,831 R3,687 Discovery Miles 36 870
Design Mind for Data Visualization…
J. Storm Hardcover R1,215 Discovery Miles 12 150
Advances in Algebraic Quantum Field…
Romeo Brunetti, Claudio Dappiaggi, … Hardcover R4,149 Discovery Miles 41 490
FORTRAN 90 for Scientists and Engineers
Brian Hahn Paperback R1,440 Discovery Miles 14 400
Stochastic Optimal Control in Infinite…
Giorgio Fabbri, Fausto Gozzi, … Hardcover R6,564 Discovery Miles 65 640
Bio/Recursion - Exploring CS and…
Shawn T. O'Neil Hardcover R1,559 R1,289 Discovery Miles 12 890

 

Partners