0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (12)
  • R250 - R500 (43)
  • R500+ (3,214)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design

Wireless Sensor Networks - From Theory to Applications (Paperback): Ibrahiem M.M.El Emary, S. Ramakrishnan Wireless Sensor Networks - From Theory to Applications (Paperback)
Ibrahiem M.M.El Emary, S. Ramakrishnan
R1,730 Discovery Miles 17 300 Ships in 12 - 17 working days

Although there are many books available on WSNs, most are low-level, introductory books. The few available for advanced readers fail to convey the breadth of knowledge required for those aiming to develop next-generation solutions for WSNs. Filling this void, Wireless Sensor Networks: From Theory to Applications supplies comprehensive coverage of WSNs. In order to provide the wide-ranging guidance required, the book brings together the contributions of domain experts working in the various subfields of WSNs worldwide. This edited volume examines recent advances in WSN technologies and considers the theoretical problems in WSN, including issues with monitoring, routing, and power control. It also details methodologies that can provide solutions to these problems. The book's 25 chapters are divided into seven parts: Data Collection Physical Layer and Interfacing Routing and Transport Protocols Energy-Saving Approaches Mobile and Multimedia WSN Data Storage and Monitoring Applications The book examines applications of WSN across a range of fields, including health, military, transportation, and mining. Addressing the main challenges in applying WSNs across all phases of our life, it explains how WSNs can assist in community development. Complete with a list of references at the end of each chapter, this book is ideal for senior undergraduate and postgraduate students, researchers, scholars, academics, industrial researchers, and practicing engineers working on WSNs. The text assumes that readers possess a foundation in computer networks, wireless communication, and basic electronics.

Game Theory in Communication Networks - Cooperative Resolution of Interactive Networking Scenarios (Paperback): Josephina... Game Theory in Communication Networks - Cooperative Resolution of Interactive Networking Scenarios (Paperback)
Josephina Antoniou, Andreas Pitsillides
R1,461 Discovery Miles 14 610 Ships in 12 - 17 working days

A mathematical tool for scientists and researchers who work with computer and communication networks, Game Theory in Communication Networks: Cooperative Resolution of Interactive Networking Scenarios addresses the question of how to promote cooperative behavior in interactive situations between heterogeneous entities in communication networking scenarios. It explores network design and management from a theoretical perspective, using game theory and graph theory to analyze strategic situations and demonstrate profitable behaviors of the cooperative entities. The book promotes the use of Game Theory to address important resource management and security issues found in next generation communications networks, particularly heterogeneous networks, for cases where cooperative interactive networking scenarios can be formulated. It provides solutions for representative mechanisms that need improvement by presenting a theoretical step-by-step approach. The text begins with a presentation of theory that can be used to promote cooperation for the entities in a particular interactive situation. Next, it examines two-player interaction as well as interactions between multiple players. The final chapter presents and examines a performance evaluation framework based on MATLAB (R). Each chapter begins by introducing basic theory for dealing with a particular interactive situation and illustrating how particular aspects of game theory can be used to formulate and solve interactive situations that appear in communication networks regularly. The second part of each chapter presents example scenarios that demonstrate the applicability and power of the theory-illustrating a number of cooperative interactions and discussing how they could be addressed within the theoretical framework presented in the first part of the chapter. The book also includes simulation code that can be downloaded so you can use some or all of the proposed models to improve your own network designs. Specific topics covered include network selection, user-network interaction, network synthesis, and context-aware security provisioning.

Wireless Sensor Networks - Current Status and Future Trends (Paperback): Shafiullah Khan, Al-Sakib Khan Pathan, Nabil Ali... Wireless Sensor Networks - Current Status and Future Trends (Paperback)
Shafiullah Khan, Al-Sakib Khan Pathan, Nabil Ali Alrajeh
R1,575 Discovery Miles 15 750 Ships in 12 - 17 working days

Wireless sensor networks (WSNs) utilize fast, cheap, and effective applications to imitate the human intelligence capability of sensing on a wider distributed scale. But acquiring data from the deployment area of a WSN is not always easy and multiple issues arise, including the limited resources of sensor devices run with one-time batteries. Additional WSN concerns include the external environment, routing, data aggregation, and ensuring quality of service (QoS) and security. Solutions have been developed for various types of application scenarios, but many problems still remain as open research challenges. Wireless Sensor Networks: Current Status and Future Trends covers the various issues associated with WSNs, including their structure, activities, and applications. Bringing together the contributions of researchers and experts in the field, this book explores: Applications of WSNs, data-centric storage, environmental forest monitoring, and the fundamentals of wireless body area networks Mobile medium access control (MAC) protocols, cooperative diversity sensor systems, and WSNs operating in IEEE 802.11 networks Location and position estimation in WSNs, techniques used in localization algorithms, and localization schemes Energy-centric simulation and design space exploration The fundamentals of MAC protocols and specific requirements and problems Protocols and data gathering Privacy and security issues in WSNs, solutions based on watermarking, and proposed work on intrusion detection systems (IDS) in WSNs Reviewing current trends in research and development as well as future expectations in the relevant areas, this book is a valuable reference for students, graduates, academics, researchers of computer science, and engineers, whether working in professional organizations or research institutions.

Computer Technology and Computer Programming - Research and Strategies (Paperback): James L. Antonakos Computer Technology and Computer Programming - Research and Strategies (Paperback)
James L. Antonakos
R2,543 Discovery Miles 25 430 Ships in 12 - 17 working days

This title includes a number of Open Access chapters. Covering a broad range of new topics in computer technology and programming, this volume discusses encryption techniques, SQL generation, Web 2.0 technologies, and visual sensor networks. It also examines reconfigurable computing, video streaming, animation techniques, and more. Readers will learn about an educational tool and game to help students learn computer programming. The book also explores a new medical technology paradigm centered on wireless technology and cloud computing designed to overcome the problems of increasing health technology costs.

Business Process Reengineering - An ICT Approach (Paperback): Heru Susanto, Fang-Yie Leu, Chin Kang Chen Business Process Reengineering - An ICT Approach (Paperback)
Heru Susanto, Fang-Yie Leu, Chin Kang Chen
R2,530 Discovery Miles 25 300 Ships in 12 - 17 working days

This volume shows how ICT (information and communications technology) can play the role of a driver of business process reengineering (BPR). ICT can aid in enabling improvement in BPR activity cycles as it provides many components that enhance performance that can lead to competitive advantages. IT can interface with BPR to improve business processes in terms of communication, inventory management, data management, management information systems, customer relationship management, computer-aided design, computer-aided manufacturing (CAM), and computer-aided engineering. This volume explores these issues in depth.

Handbook on Mobile and Ubiquitous Computing - Status and Perspective (Paperback): Laurence T. Yang, Evi Syukur, Seng W Loke Handbook on Mobile and Ubiquitous Computing - Status and Perspective (Paperback)
Laurence T. Yang, Evi Syukur, Seng W Loke
R1,532 Discovery Miles 15 320 Ships in 12 - 17 working days

Consolidating recent research in the area, the Handbook on Mobile and Ubiquitous Computing: Status and Perspective illustrates the design, implementation, and deployment of mobile and ubiquitous systems, particularly in mobile and ubiquitous environments, modeling, database components, and wireless infrastructures. Supplying an overarching perspective, the book is ideal for researchers, graduate students, and industry practitioners in computer science and engineering interested in recent developments in mobile and ubiquitous computing. It discusses new trends in intelligent systems, reviews sensory input and multimedia information, and examines embedded real-time systems. With coverage that spans security, privacy, and trust, the book is divided into six parts: Mobile and Ubiquitous Computing-illustrates the concepts, design, implementation, and deployment of mobile and ubiquitous systems Smart Environments and Agent Systems-discusses a new trend toward intelligent systems that are completely connected, proactive, intuitive, and constantly available Human-Computer Interaction and Multimedia Computing-describes guidelines for designing multisensory input and output for mobile devices Security, Privacy, and Trust Management-presents an approach to dynamically establish trust between a system and its mobile client in a flexible manner using a multi-agent negotiation mechanism Embedded Real-Time Systems-introduces novel work on how mobile, ubiquitous, and intelligence computing can be realized Networking Sensing and Communications-covers challenges, designs, and prototype solutions for establishing, managing, and maintaining current sensor networks in mobile and ubiquitous computing environments Containing the contributions of more than 70 researchers, practitioners, and academics from around the world, the book brings together the latest research on the subject to provide an understanding of the issues being addressed in the field. Filled with extensive references in each chapter, it provides you with the tools to participate in the design, implementation, and deployment of systems that are connected, proactive, intuitive, and constantly available.

TensorFlow 2.0 in Action (Paperback): Thushan Ganegedara TensorFlow 2.0 in Action (Paperback)
Thushan Ganegedara
R1,296 Discovery Miles 12 960 Ships in 12 - 17 working days

TensorFlow is a one-stop solution for building, monitoring, optimizing,and deploying your models. This practical guide to building deep learning models with the new features of TensorFlow 2.0is filled with engaging projects, simple language, and coverage of the latest algorithms. TensorFlow 2.0 in Action teaches you to use the new features of TensorFlow 2.0 to create advanced deep learning models. You'll learn by building hands-on projects including an image classifier that can recognize objects, a French-to-English machine translator, and even a neural network that can write fiction. You'll dive into the details of modern deep learning techniques including both transformer and attention models, and learn how pretrained models can solve your tricky data science- problems. TensorFlow is the go-to framework for putting deep learning into production. Created by Google, this ground breaking tool handles repetitive low-level operations and frees you up to focus on innovating your AIs.TensorFlow encompasses almost every element of a deep learning pipeline-aone-stop solution for building, monitoring, optimizing, and deploying your models.

Designing Security Architecture Solutions (Paperback): J. Ramachandran Designing Security Architecture Solutions (Paperback)
J. Ramachandran
R2,010 R1,513 Discovery Miles 15 130 Save R497 (25%) Ships in 7 - 13 working days

The first guide to tackle security architecture at the software engineering level
Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with AT&T Business's renowned Network Services organization explores system security architecture from a software engineering perspective. He explains why strong security must be a guiding principle of the development process and identifies a common set of features found in most security products, explaining how they can and should impact the development cycle. The book also offers in-depth discussions of security technologies, cryptography, database security, application and operating system security, and more.

Green Internet of Things (Hardcover): Bandana Mahapatra, Anand Nayyar Green Internet of Things (Hardcover)
Bandana Mahapatra, Anand Nayyar
R1,531 Discovery Miles 15 310 Ships in 9 - 15 working days

Green Internet of Things (IoT) envisions the concept of reducing the energy consumption of IoT devices and making the environment safe. Considering this factor, this book focuses on both the theoretical and implementation aspects in green computing, next-generation networks or networks that can be utilized in providing green systems through IoT-enabling technologies, that is, the technology behind its architecture and building components. It also encompasses design concepts and related advanced computing in detail. * Highlights the elements and communication technologies in Green IoT * Discusses technologies, architecture and components surrounding Green IoT * Describes advanced computing technologies in terms of smart world, data centres and other related hardware for Green IoT * Elaborates energy-efficient Green IoT Design for real-time implementations * Covers pertinent applications in building smart cities, healthcare devices, efficient energy harvesting and so forth This short-form book is aimed at students, researchers in IoT, clean technologies, computer science and engineering cum Industry R&D researchers.

An In-Depth Guide to Mobile Device Forensics (Paperback): Chuck Easttom An In-Depth Guide to Mobile Device Forensics (Paperback)
Chuck Easttom
R1,414 Discovery Miles 14 140 Ships in 12 - 17 working days

Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.

Probabilistic Data Structures for Blockchain-Based Internet of Things Applications (Hardcover): Neeraj Kumar, Arzoo Miglani Probabilistic Data Structures for Blockchain-Based Internet of Things Applications (Hardcover)
Neeraj Kumar, Arzoo Miglani
R3,918 Discovery Miles 39 180 Ships in 12 - 17 working days

This book covers theory and practical knowledge of Probabilistic data structures (PDS) and Blockchain (BC) concepts. It introduces the applicability of PDS in BC to technology practitioners and explains each PDS through code snippets and illustrative examples. Further, it provides references for the applications of PDS to BC along with implementation codes in python language for various PDS so that the readers can gain confidence using hands on experience. Organized into five sections, the book covers IoT technology, fundamental concepts of BC, PDS and algorithms used to estimate membership query, cardinality, similarity and frequency, usage of PDS in BC based IoT and so forth.

Software Engineering Practice - A Case Study Approach (Paperback): Thomas B. Hilburn, Massood Towhidnejad Software Engineering Practice - A Case Study Approach (Paperback)
Thomas B. Hilburn, Massood Towhidnejad
R2,076 Discovery Miles 20 760 Ships in 12 - 17 working days

This book is a broad discussion covering the entire software development lifecycle. It uses a comprehensive case study to address each topic and features the following: A description of the development, by the fictional company Homeowner, of the DigitalHome (DH) System, a system with "smart" devices for controlling home lighting, temperature, humidity, small appliance power, and security A set of scenarios that provide a realistic framework for use of the DH System material Just-in-time training: each chapter includes mini tutorials introducing various software engineering topics that are discussed in that chapter and used in the case study A set of case study exercises that provide an opportunity to engage students in software development practice, either individually or in a team environment. Offering a new approach to learning about software engineering theory and practice, the text is specifically designed to: Support teaching software engineering, using a comprehensive case study covering the complete software development lifecycle Offer opportunities for students to actively learn about and engage in software engineering practice Provide a realistic environment to study a wide array of software engineering topics including agile development Software Engineering Practice: A Case Study Approach supports a student-centered, "active" learning style of teaching. The DH case study exercises provide a variety of opportunities for students to engage in realistic activities related to the theory and practice of software engineering. The text uses a fictitious team of software engineers to portray the nature of software engineering and to depict what actual engineers do when practicing software engineering. All the DH case study exercises can be used as team or group exercises in collaborative learning. Many of the exercises have specific goals related to team building and teaming skills. The text also can be used to support the professional development or certification of practicing software engineers. The case study exercises can be integrated with presentations in a workshop or short course for professionals.

From Computing to Computational Thinking (Paperback): Paul S. Wang From Computing to Computational Thinking (Paperback)
Paul S. Wang
R2,058 Discovery Miles 20 580 Ships in 12 - 17 working days

Computational Thinking (CT) involves fundamental concepts and reasoning, distilled from computer science and other computational sciences, which become powerful general mental tools for solving problems, increasing efficiency, reducing complexity, designing procedures, or interacting with humans and machines. An easy-to-understand guidebook, From Computing to Computational Thinking gives you the tools for understanding and using CT. It does not assume experience or knowledge of programming or of a programming language, but explains concepts and methods for CT with clarity and depth. Successful applications in diverse disciplines have shown the power of CT in problem solving. The book uses puzzles, games, and everyday examples as starting points for discussion and for connecting abstract thinking patterns to real-life situations. It provides an interesting and thought-provoking way to gain general knowledge about modern computing and the concepts and thinking processes underlying modern digital technologies.

Embedded Software Development for Safety-Critical Systems (Hardcover): Chris Hobbs Embedded Software Development for Safety-Critical Systems (Hardcover)
Chris Hobbs
R3,632 Discovery Miles 36 320 Ships in 12 - 17 working days

"I highly recommend Mr. Hobbs' book." - Stephen Thomas, PE, Founder and Editor of FunctionalSafetyEngineer.com Safety-critical devices, whether medical, automotive, or industrial, are increasingly dependent on the correct operation of sophisticated software. Many standards have appeared in the last decade on how such systems should be designed and built. Developers, who previously only had to know how to program devices for their industry, must now understand remarkably esoteric development practices and be prepared to justify their work to external auditors. Embedded Software Development for Safety-Critical Systems discusses the development of safety-critical systems under the following standards: IEC 61508; ISO 26262; EN 50128; and IEC 62304. It details the advantages and disadvantages of many architectural and design practices recommended in the standards, ranging from replication and diversification, through anomaly detection to the so-called "safety bag" systems. Reviewing the use of open-source components in safety-critical systems, this book has evolved from a course text used by QNX Software Systems for a training module on building embedded software for safety-critical devices, including medical devices, railway systems, industrial systems, and driver assistance devices in cars. Although the book describes open-source tools for the most part, it also provides enough information for you to seek out commercial vendors if that's the route you decide to pursue. All of the techniques described in this book may be further explored through hundreds of learned articles. In order to provide you with a way in, the author supplies references he has found helpful as a working software developer. Most of these references are available to download for free.

Virtual Aesthetics in Architecture - Designing in Mixed Realities (Paperback): Sara Eloy, Anette Kreutzberg, Ioanna Symeonidou Virtual Aesthetics in Architecture - Designing in Mixed Realities (Paperback)
Sara Eloy, Anette Kreutzberg, Ioanna Symeonidou
R1,182 Discovery Miles 11 820 Ships in 12 - 17 working days

- Explores how mixed, virtual and augmented reality technologies can enable designers to create immersive experiences and expand the aesthetic potential of the medium - Curated selection of projects and essays by leading international architects and designers, including those from Zaha Hadid Architects and MVRDV- Illustrated with over 150 images

Handbook on Networked Multipoint Multimedia Conferencing and Multistream Immersive Telepresence using SIP - Scalable... Handbook on Networked Multipoint Multimedia Conferencing and Multistream Immersive Telepresence using SIP - Scalable Distributed Applications and Media Control over Internet (Hardcover)
Radhika Ranjan Roy
R5,503 Discovery Miles 55 030 Ships in 12 - 17 working days

Handbook on Networked Multipoint Multimedia Conferencing and Multistream Immsersive Telepresence using SIP: Scalable Distributed Applications and Media Control over Internet is the first book to put together all IETF request for comments (RFCs), and the internet drafts standards related to the multipoint conferencing and immersive telepresence. This book includes mandatory and optional texts of all standards in a chronological and systematic way almost with one-to-one integrity from the beginning to end, allowing the reader to understand all aspects of the highly complex real-time applications. It is a book that network designers, software developers, product manufacturers, implementers, interoperability testers, professionals, professors, and researchers will find to be immensely useful. Practitioners and engineers in all spectrums who are concentrating on building the real-time, scalable, interoperable multipoint applications, can use this book to make informed choices based on technical standards in the market place, on all proprietary non-scalable and non-interposable products. This book will provide focus and foundation for these decision makers.

Virtual Aesthetics in Architecture - Designing in Mixed Realities (Hardcover): Sara Eloy, Anette Kreutzberg, Ioanna Symeonidou Virtual Aesthetics in Architecture - Designing in Mixed Realities (Hardcover)
Sara Eloy, Anette Kreutzberg, Ioanna Symeonidou
R4,073 Discovery Miles 40 730 Ships in 12 - 17 working days

- Explores how mixed, virtual and augmented reality technologies can enable designers to create immersive experiences and expand the aesthetic potential of the medium - Curated selection of projects and essays by leading international architects and designers, including those from Zaha Hadid Architects and MVRDV- Illustrated with over 150 images

Open Systems Dependability - Dependability Engineering for Ever-Changing Systems, Second Edition (Hardcover, 2nd edition):... Open Systems Dependability - Dependability Engineering for Ever-Changing Systems, Second Edition (Hardcover, 2nd edition)
Mario Tokoro
R3,046 Discovery Miles 30 460 Ships in 12 - 17 working days

The book describes a fundamentally new approach to software dependability, considering a software system as an ever-changing system due to changes in service objectives, users' requirements, standards and regulations, and to advances in technology. Such a system is viewed as an Open System since its functions, structures, and boundaries are constantly changing. Thus, the approach to dependability is called Open Systems Dependability. The DEOS technology realizes Open Systems Dependability. It puts more emphasis on stakeholders' agreement and accountability achievement for business/service continuity than in elemental technologies.

Multisensor Data Fusion - From Algorithms and Architectural Design to Applications (Hardcover): Hassen Fourati Multisensor Data Fusion - From Algorithms and Architectural Design to Applications (Hardcover)
Hassen Fourati
R4,707 Discovery Miles 47 070 Ships in 12 - 17 working days

Multisensor Data Fusion: From Algorithms and Architectural Design to Applications covers the contemporary theory and practice of multisensor data fusion, from fundamental concepts to cutting-edge techniques drawn from a broad array of disciplines. Featuring contributions from the world's leading data fusion researchers and academicians, this authoritative book: Presents state-of-the-art advances in the design of multisensor data fusion algorithms, addressing issues related to the nature, location, and computational ability of the sensors Describes new materials and achievements in optimal fusion and multisensor filters Discusses the advantages and challenges associated with multisensor data fusion, from extended spatial and temporal coverage to imperfection and diversity in sensor technologies Explores the topology, communication structure, computational resources, fusion level, goals, and optimization of multisensor data fusion system architectures Showcases applications of multisensor data fusion in fields such as medicine, transportation's traffic, defense, and navigation Multisensor Data Fusion: From Algorithms and Architectural Design to Applications is a robust collection of modern multisensor data fusion methodologies. The book instills a deeper understanding of the basics of multisensor data fusion as well as a practical knowledge of the problems that can be faced during its execution.

How Things Work - The Computer Science Edition (Paperback): Charles F. Bowman How Things Work - The Computer Science Edition (Paperback)
Charles F. Bowman
R1,535 Discovery Miles 15 350 Ships in 12 - 17 working days

It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.

The Green Computing Book - Tackling Energy Efficiency at Large Scale (Paperback): Wu-chun Feng The Green Computing Book - Tackling Energy Efficiency at Large Scale (Paperback)
Wu-chun Feng
R1,431 Discovery Miles 14 310 Ships in 12 - 17 working days

State-of-the-Art Approaches to Advance the Large-Scale Green Computing Movement Edited by one of the founders and lead investigator of the Green500 list, The Green Computing Book: Tackling Energy Efficiency at Large Scale explores seminal research in large-scale green computing. It begins with low-level, hardware-based approaches and then traverses up the software stack with increasingly higher-level, software-based approaches. In the first chapter, the IBM Blue Gene team illustrates how to improve the energy efficiency of a supercomputer by an order of magnitude without any system performance loss in parallelizable applications. The next few chapters explain how to enhance the energy efficiency of a large-scale computing system via compiler-directed energy optimizations, an adaptive run-time system, and a general prediction performance framework. The book then explores the interactions between energy management and reliability and describes storage system organization that maximizes energy efficiency and reliability. It also addresses the need for coordinated power control across different layers and covers demand response policies in computing centers. The final chapter assesses the impact of servers on data center costs.

Parallel Algorithms (Paperback): Henri Casanova, Arnaud Legrand, Yves Robert Parallel Algorithms (Paperback)
Henri Casanova, Arnaud Legrand, Yves Robert
R1,431 Discovery Miles 14 310 Ships in 12 - 17 working days

Focusing on algorithms for distributed-memory parallel architectures, Parallel Algorithms presents a rigorous yet accessible treatment of theoretical models of parallel computation, parallel algorithm design for homogeneous and heterogeneous platforms, complexity and performance analysis, and essential notions of scheduling. The book extracts fundamental ideas and algorithmic principles from the mass of parallel algorithm expertise and practical implementations developed over the last few decades. In the first section of the text, the authors cover two classical theoretical models of parallel computation (PRAMs and sorting networks), describe network models for topology and performance, and define several classical communication primitives. The next part deals with parallel algorithms on ring and grid logical topologies as well as the issue of load balancing on heterogeneous computing platforms. The final section presents basic results and approaches for common scheduling problems that arise when developing parallel algorithms. It also discusses advanced scheduling topics, such as divisible load scheduling and steady-state scheduling. With numerous examples and exercises in each chapter, this text encompasses both the theoretical foundations of parallel algorithms and practical parallel algorithm design.

Computer Architecture - Fundamentals and Principles of Computer Design, Second Edition (Paperback, 2nd edition): Joseph D.... Computer Architecture - Fundamentals and Principles of Computer Design, Second Edition (Paperback, 2nd edition)
Joseph D. Dumas II
R1,841 Discovery Miles 18 410 Ships in 12 - 17 working days

Not only does almost everyone in the civilized world use a personal computer, smartphone, and/or tablet on a daily basis to communicate with others and access information, but virtually every other modern appliance, vehicle, or other device has one or more computers embedded inside it. One cannot purchase a current-model automobile, for example, without several computers on board to do everything from monitoring exhaust emissions, to operating the anti-lock brakes, to telling the transmission when to shift, and so on. Appliances such as clothes washers and dryers, microwave ovens, refrigerators, etc. are almost all digitally controlled. Gaming consoles like Xbox, PlayStation, and Wii are powerful computer systems with enhanced capabilities for user interaction. Computers are everywhere, even when we don't see them as such, and it is more important than ever for students who will soon enter the workforce to understand how they work. This book is completely updated and revised for a one-semester upper level undergraduate course in Computer Architecture, and suitable for use in an undergraduate CS, EE, or CE curriculum at the junior or senior level. Students should have had a course(s) covering introductory topics in digital logic and computer organization. While this is not a text for a programming course, the reader should be familiar with computer programming concepts in at least one language such as C, C++, or Java. Previous courses in operating systems, assembly language, and/or systems programming would be helpful, but are not essential.

Enterprise Level Security 1 & 2 (Hardcover): Kevin Foltz, William R. Simpson Enterprise Level Security 1 & 2 (Hardcover)
Kevin Foltz, William R. Simpson
R3,174 Discovery Miles 31 740 Ships in 12 - 17 working days

* The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. * The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. * This is a unique approach to end-to-end security and fills a niche in the market.

LTE Cellular Narrowband Internet of Things (NB-IoT) - Practical Projects for the Cloud and Data Visualization (Hardcover):... LTE Cellular Narrowband Internet of Things (NB-IoT) - Practical Projects for the Cloud and Data Visualization (Hardcover)
Hossam Fattah
R3,499 Discovery Miles 34 990 Ships in 12 - 17 working days

NB-IoT is the Internet of Things (IoT) technology used for cellular communication. NB-IoT devices deliver much better capability and performance, such as: increased area coverage of up to one kilometer; a massive number of devices-up to 200,000-per a single base-station area; longer battery lifetime of ten years; and better indoor and outdoor coverage for areas with weak signal, such as underground garages. The cellular NB-IoT technology is a challenging technology to use and understand. With more than 30 projects presented in this book, covering many use cases and scenarios, this book provides hands-on and practical experience of how to use the cellular NB-IoT for smart applications using Arduino (TM), Amazon Cloud, Google Maps, and charts. The book starts by explaining AT commands used to configure the NB-IoT modem; data serialization and deserialization; how to set up the cloud for connecting NB-IoT devices; setting up rules, policy, security certificates, and a NoSQL database on the cloud; how to store and read data in the cloud; how to use Google Maps to visualize NB-IoT device geo-location; and how to use charts to visualize sensor datasets. Projects for Arduino are presented in four parts. The first part explains how to connect the device to the mobile operator and cellular network; perform communication using different network protocols, such as TCP, HTTP, SSL, or MQTT; how to use GPS for geo-location applications; and how to upgrade NB-IoT modem firmware over the air. The second part explains the microcontroller unit and how to build and run projects, such as a 7-segment display or a real-time clock. The third part explains how NB-IoT can be used with sensor devices, such as ultrasonic and environmental sensors. Finally, the fourth part explains how NB-IoT can be used to control actuators, such as stepper motors and relays. This book is a unique resource for understanding practical uses of the NB-IoT technology and serves as a handbook for technical and non-technical readers who are looking for practicing and exercising the cellular NB-IoT technology. The book can be used by engineers, students, researchers, system integrators, mobile operators' technical staff, and electronics enthusiasts. To download the software which can be used with the book, go to: https://github.com/5ghub/NB-IoT About the Author: Hossam Fattah is a technology expert in 4G/5G wireless systems and networking. He received his Ph.D. in Electrical and Computer Engineering from University of British Columbia, Vancouver, Canada in 2003. He received his Master of Applied Science in Electrical and Computer Engineering from University of Victoria, Victoria, Canada in 2000. He completed his B.Sc. degree in Computers and Systems Engineering from Al-Azhar University, Cairo, Egypt in 1995. Between 2003 and 2011, he was in academia and industry, including Texas A&M University. Between 2011 and 2013, he was with Spirent Communications, NJ, USA. Since 2013, he has been with Microsoft, USA. He is also an affiliate associate professor at University of Washington, Tacoma, WA, USA, teaching graduate courses on IoT and distributed systems and collaborating on 5G research and innovations. He has had many patents and technical publications in conferences and journals. He is a registered professional Engineer with the Association of Professional Engineers, British Columbia, Canada. He is the author of the recent book 5G LTE Narrowband Internet of Things (NB-IoT). His research interest is in wireless communications and radio networks and protocols, cellular quality of service, radio resource management, traffic and packet scheduling, network analytics, and mobility.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Asynchronous On-Chip Networks and…
Wei Song, Guangda Zhang Hardcover R2,355 Discovery Miles 23 550
Enterprise Level Security 1 & 2
Kevin Foltz, William R. Simpson Paperback R1,394 Discovery Miles 13 940
Concepts of Artificial Intelligence and…
Deepshikha Agarwal, Khushboo Tripathi, … Hardcover R3,638 Discovery Miles 36 380
The Adventurous and Practical Journey to…
FANAP Studies & Research Center Hardcover R2,971 Discovery Miles 29 710
Edge-AI in Healthcare - Trends and…
Sonali Vyas, Akanksha Upadhyaya, … Hardcover R2,593 Discovery Miles 25 930
The Auditor's Guide to Blockchain…
Shaun Aghili Hardcover R2,993 Discovery Miles 29 930
Parallel Computing
Moreshwar R. Bhujade Hardcover R1,038 Discovery Miles 10 380
Digital Blood on Their Hands - The…
Andrew Jenkinson Paperback R865 Discovery Miles 8 650
Cloud-based Multi-Modal Information…
Srinidhi Hiriyannaiah, Siddesh G.M., … Hardcover R2,678 Discovery Miles 26 780
Designing Switch/Routers - Fundamental…
James Aweya Paperback R3,625 Discovery Miles 36 250

 

Partners