0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (11)
  • R250 - R500 (41)
  • R500+ (3,219)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design

Computer Architecture - Software Aspects, Coding, and Hardware (Hardcover): John Y. Hsu Computer Architecture - Software Aspects, Coding, and Hardware (Hardcover)
John Y. Hsu
R2,300 Discovery Miles 23 000 Ships in 10 - 15 working days

With the new developments in computer architecture, fairly recent publications can quickly become outdated. Computer Architecture: Software Aspects, Coding, and Hardware takes a modern approach. This comprehensive, practical text provides that critical understanding of a central processor by clearly detailing fundamentals, and cutting edge design features. With its balanced software/hardware perspective and its description of Pentium processors, the book allows readers to acquire practical PC software experience. The text presents a foundation-level set of ideas, design concepts, and applications that fully meet the requirements of computer organization and architecture courses.

The book features a "bottom up" computer design approach, based upon the author's thirty years experience in both academe and industry. By combining computer engineering with electrical engineering, the author describes how logic circuits are designed in a CPU. The extensive coverage of a micprogrammed CPU and new processor design features gives the insight of current computer development.

Computer Architecture: Software Aspects, Coding, and Hardware presents a comprehensive review of the subject, from beginner to advanced levels. Topics include:


o Two's complement numbers o Integer overflow
o Exponent overflow and underflow o Looping
o Addressing modes o Indexing
o Subroutine linking o I/O structures
o Memory mapped I/O o Cycle stealing
o Interrupts o Multitasking
o Microprogrammed CPU o Multiplication tree
o Instruction queue o Multimedia instructions
o Instruction cache o Virtual memory
o Data cache o Alpha chip
o Interprocessor communications o Branch prediction
o Speculative loading o Register stack
o JAVA virtual machine o Stack machine principles

Network and Data Security for Non-Engineers (Hardcover): Frank M. Groom, Kevin Groom, Stephan S. Jones Network and Data Security for Non-Engineers (Hardcover)
Frank M. Groom, Kevin Groom, Stephan S. Jones
R5,198 Discovery Miles 51 980 Ships in 12 - 17 working days

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.

The End of Error - Unum Computing (Hardcover): John L. Gustafson The End of Error - Unum Computing (Hardcover)
John L. Gustafson
R5,520 Discovery Miles 55 200 Ships in 12 - 17 working days

The Future of Numerical Computing Written by one of the foremost experts in high-performance computing and the inventor of Gustafson's Law, The End of Error: Unum Computing explains a new approach to computer arithmetic: the universal number (unum). The unum encompasses all IEEE floating-point formats as well as fixed-point and exact integer arithmetic. This new number type obtains more accurate answers than floating-point arithmetic yet uses fewer bits in many cases, saving memory, bandwidth, energy, and power. A Complete Revamp of Computer Arithmetic from the Ground Up Richly illustrated in color, this groundbreaking book represents a fundamental change in how to perform calculations automatically. It illustrates how this novel approach can solve problems that have vexed engineers and scientists for decades, including problems that have been historically limited to serial processing. Suitable for Anyone Using Computers for Calculations The book is accessible to anyone who uses computers for technical calculations, with much of the book only requiring high school math. The author makes the mathematics interesting through numerous analogies. He clearly defines jargon and uses color-coded boxes for mathematical formulas, computer code, important descriptions, and exercises.

CoCo - The Colorful History of Tandy's Underdog Computer (Hardcover): Boisy G Pitre, Bill Loguidice CoCo - The Colorful History of Tandy's Underdog Computer (Hardcover)
Boisy G Pitre, Bill Loguidice
R5,487 Discovery Miles 54 870 Ships in 12 - 17 working days

CoCo: The Colorful History of Tandy's Underdog Computer is the first book to document the complete history of the Tandy Color Computer (CoCo), a popular 8-bit PC series from the 1980s that competed against the era's biggest names, including the Apple II, IBM PC, and Commodore 64. The book takes you inside the interesting stories and people behind this unique, underdog computer. Both noted computer science and technology advocates, authors Pitre and Loguidice reveal the story of a pivotal period in the home computing revolution from the perspective of Tandy's CoCo. As these computers were sold in Radio Shack stores throughout the United States and other countries, they provide a critical point of reference for key events in the unprecedented evolutionary period for the PC industry in the 1980s. The book also features first-hand accounts from the people who created and promoted the CoCo, from the original Tandy executives and engineers to today's active product creators and information keepers. The CoCo impacted many lives, and this book leaves no stone unturned in recounting this fascinating slice of the PC revolution that is still in play today. From early telecommunications experiments to engineering and budgetary challenges, it covers all the aspects that made the CoCo a truly personal, useful computing experience in as small and inexpensive a package as possible.

Building an Information Security Awareness Program (Hardcover): Mark B. Desman Building an Information Security Awareness Program (Hardcover)
Mark B. Desman
R4,898 Discovery Miles 48 980 Ships in 12 - 17 working days

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.

Securing and Controlling Cisco Routers (Hardcover): Peter T. Davis Securing and Controlling Cisco Routers (Hardcover)
Peter T. Davis
R4,966 Discovery Miles 49 660 Ships in 12 - 17 working days

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.

Network and Application Security - Fundamentals and Practices (Hardcover): Debashis Ganguly Network and Application Security - Fundamentals and Practices (Hardcover)
Debashis Ganguly
R5,480 Discovery Miles 54 800 Ships in 12 - 17 working days

To deal with security issues effectively, knowledge of theories alone is not sufficient. Practical experience is essential. Helpful for beginners and industry practitioners, this book develops a concrete outlook, providing readers with basic concepts and an awareness of industry standards and best practices. Chapters address cryptography and network security, system-level security, and applications for network security. The book also examines application level attacks, practical software security, and securing application-specific networks. Ganguly Debashis speaks about Network and Application Security

Defense against the Black Arts - How Hackers Do What They Do and How to Protect against It (Hardcover): Jesse Varsalone,... Defense against the Black Arts - How Hackers Do What They Do and How to Protect against It (Hardcover)
Jesse Varsalone, Matthew McFadden
R5,518 Discovery Miles 55 180 Ships in 12 - 17 working days

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Among the many things you'll learn: How to get into a Windows operating system without having the username or password Vulnerabilities associated with passwords and how to keep them out of the hands of hackers How hackers use the techniques of computer forensic examiners to wreak havoc on individuals and companies Hiding one's IP address to avoid detection Manipulating data to and from a web page or application for nefarious reasons How to find virtually anything on the internet How hackers research the targets they plan to attack How network defenders collect traffic across the wire to indentify intrusions Using Metasploit to attack weaknesses in systems that are unpatched or have poorly implemented security measures The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks. It also covers techniques utilized by hackers to attack modern operating systems, such as Windows 7, Windows Vista, and Mac OS X. The author explores a number of techniques that hackers can use to exploit physical access, network access, and wireless vectors. Using screenshots to clarify procedures, this practical manual uses step-by-step examples and relevant analogies to facilitate u

Enterprise Systems Backup and Recovery - A Corporate Insurance Policy (Hardcover): Preston Deguise Enterprise Systems Backup and Recovery - A Corporate Insurance Policy (Hardcover)
Preston Deguise
R4,907 Discovery Miles 49 070 Ships in 12 - 17 working days

The success of information backup systems does not rest on IT administrators alone. Rather, a well-designed backup system comes about only when several key factors coalesce business involvement, IT acceptance, best practice designs, enterprise software, and reliable hardware. Enterprise Systems Backup and Recovery: A Corporate Insurance Policy provides organizations with a comprehensive understanding of the principles and features involved in effective enterprise backups. Instead of focusing on any individual backup product, this book recommends corporate procedures and policies that need to be established for comprehensive data protection. It provides relevant information to any organization, regardless of which operating systems or applications are deployed, what backup system is in place, or what planning has been done for business continuity. It explains how backup must be included in every phase of system planning, development, operation, and maintenance. It also provides techniques for analyzing and improving current backup system performance. After reviewing the concepts in this book, organizations will be able to answer these questions with respect to their enterprise: What features and functionality should be expected in a backup environment? What terminology and concepts are unique to backup software, and what can be related to other areas? How can a backup system be monitored successfully? How can the performance of a backup system be improved? What features are just "window dressing" and should be ignored, as opposed to those features that are relevant? Backup and recovery systems touch on just about every system in an organization. Properly implemented, they can provide an enterprise with greater assurance that its information is safe. By utilizing the

Software Mistakes and Tradeoffs (Paperback): Tomasz Lelek, Jon Skeet Software Mistakes and Tradeoffs (Paperback)
Tomasz Lelek, Jon Skeet
R1,059 Discovery Miles 10 590 Ships in 12 - 17 working days

In Software Mistakes and Tradeoffs you'll learn from costly mistakes that Tomasz Lelek and Jon Skeet have encountered over their impressive careers. You'll explore real-world scenarios where poor understanding of tradeoffs lead to major problems down the road, to help you make better design decisions. Plus, with a little practice, you'll be able to avoid the pitfalls that trip up even the most experienced developers. Software Mistakes and Tradeoffs teaches you how to make better decisions about designing, planning, and implementing applications. You'll analyse real-world scenarios where the wrong tradeoff decisions were made, and discover what could have been done differently. The book lays out the pros and cons of different approaches and explores evergreen patterns that will always be relevant to software design. Code performance versus simplicity. Delivery speed versus duplication. Flexibility versus maintain ability-everydecision you make in software engineering involves balancing tradeoffs. Often, decisions that look good at the design stage can prove problematic in practice.This book reveals the questions you need to be asking to make the right decisions for your own software tradeoffs.

Designing Green Networks and Network Operations - Saving Run-the-Engine Costs (Paperback): Daniel Minoli Designing Green Networks and Network Operations - Saving Run-the-Engine Costs (Paperback)
Daniel Minoli
R2,190 Discovery Miles 21 900 Ships in 12 - 17 working days

In recent years, socio-political trends toward environmental responsibility and the pressing need to reduce Run-the-Engine (RTE) costs have resulted in the concept of Green IT. Although a significant amount of energy is used to operate routing, switching, and transmission equipment, comparatively less attention has been paid to Green Networking. A clear and concise introduction to green networks and green network operations, Designing Green Networks and Network Operations: Saving Run-the-Engine Costs guides you through the techniques available to achieve efficiency goals for corporate and carrier networks, including deploying more efficient hardware, blade form-factor routers and switches, and pursuing consolidation, virtualization, and network and cloud computing. The book: Delineates techniques to minimize network power, cooling, floor space, and online storage while optimizing service performance, capacity, and availability Discusses virtualization, network computing, and Web services as approaches for green data centers and networks Emphasizes best practices and compliance with international standards for green operations Extends the green data center techniques to the networking environment Incorporates green principles in the intranet, extranet, and the entire IT infrastructures Reviews networking, power management, HVAC and CRAC basics Presents methodical steps toward a seamless migration to Green IT and Green Networking

Location-Based Services Handbook - Applications, Technologies, and Security (Paperback): Syed Ahson, Mohammad Ilyas Location-Based Services Handbook - Applications, Technologies, and Security (Paperback)
Syed Ahson, Mohammad Ilyas
R2,053 Discovery Miles 20 530 Ships in 12 - 17 working days

Location-Based Services Handbook: Applications, Technologies, and Security is a comprehensive reference containing all aspects of essential technical information on location-based services (LBS) technology. With broad coverage ranging from basic concepts to research-grade material, it presents a much-needed overview of technologies for positioning and localizing, including range- and proximity-based localization methods, and environment-based location estimation methods. Featuring valuable contributions from field experts around the world, this book addresses existing and future directions of LBS technology, exploring how it can be used to optimize resource allocation and improve cooperation in wireless networks. It is a self-contained, comprehensive resource that presents: A detailed description of the wireless location positioning technology used in LBS Coverage of the privacy and protection procedure for cellular networks-and its shortcomings An assessment of threats presented when location information is divulged to unauthorized parties Important IP Multimedia Subsystem and IMS-based presence service proposals The demand for navigation services is predicted to rise by a combined annual growth rate of more than 104 percent between 2008 and 2012, and many of these applications require efficient and highly scalable system architecture and system services to support dissemination of location-dependent resources and information to a large and growing number of mobile users. This book offers tools to aid in determining the optimal distance measurement system for a given situation by assessing factors including complexity, accuracy, and environment. It provides an extensive survey of existing literature and proposes a novel, widely applicable, and highly scalable architecture solution. Organized into three major sections-applications, technologies, and security-this material fully covers various location-based applications and the impact they will have on the future.

Energy Efficient Hardware-Software Co-Synthesis Using Reconfigurable Hardware (Paperback): Jingzhao Ou, Viktor K. Prasanna Energy Efficient Hardware-Software Co-Synthesis Using Reconfigurable Hardware (Paperback)
Jingzhao Ou, Viktor K. Prasanna
R2,190 Discovery Miles 21 900 Ships in 12 - 17 working days

Rapid energy estimation for energy efficient applications using field-programmable gate arrays (FPGAs) remains a challenging research topic. Energy dissipation and efficiency have prevented the widespread use of FPGA devices in embedded systems, where energy efficiency is a key performance metric. Helping overcome these challenges, Energy Efficient Hardware-Software Co-Synthesis Using Reconfigurable Hardware offers solutions for the development of energy efficient applications using FPGAs. The book integrates various high-level abstractions for describing hardware and software platforms into a single, consistent application development framework, enabling users to construct, simulate, and debug systems. Based on these high-level concepts, it proposes an energy performance modeling technique to capture the energy dissipation behavior of both the reconfigurable hardware platform and the target applications running on it. The authors also present a dynamic programming-based algorithm to optimize the energy performance of an application running on a reconfigurable hardware platform. They then discuss an instruction-level energy estimation technique and a domain-specific modeling technique to provide rapid and fairly accurate energy estimation for hardware-software co-designs using reconfigurable hardware. The text concludes with example designs and illustrative examples that show how the proposed co-synthesis techniques lead to a significant amount of energy reduction. This book explores the advantages of using reconfigurable hardware for application development and looks ahead to future research directions in the field. It outlines the range of aspects and steps that lead to an energy efficient hardware-software application synthesis using FPGAs.

Energy-Aware Memory Management for Embedded Multimedia Systems - A Computer-Aided Design Approach (Paperback): Florin Balasa,... Energy-Aware Memory Management for Embedded Multimedia Systems - A Computer-Aided Design Approach (Paperback)
Florin Balasa, Dhiraj K. Pradhan
R2,207 Discovery Miles 22 070 Ships in 12 - 17 working days

Energy-Aware Memory Management for Embedded Multimedia Systems: A Computer-Aided Design Approach presents recent computer-aided design (CAD) ideas that address memory management tasks, particularly the optimization of energy consumption in the memory subsystem. It explains how to efficiently implement CAD solutions, including theoretical methods and novel algorithms. The book covers various energy-aware design techniques, including data-dependence analysis techniques, memory size estimation methods, extensions of mapping approaches, and memory banking approaches. It shows how these techniques are used to evaluate the data storage of an application, reduce dynamic and static energy consumption, design energy-efficient address generation units, and much more. Providing an algebraic framework for memory management tasks, this book illustrates how to optimize energy consumption in memory subsystems using CAD solutions. The algorithmic style of the text should help electronic design automation (EDA) researchers and tool developers create prototype software tools for system-level exploration, with the goal to ultimately obtain an optimized architectural solution of the memory subsystem.

Scientific Computing with Multicore and Accelerators (Paperback): Jakub Kurzak, David A. Bader, Jack Dongarra Scientific Computing with Multicore and Accelerators (Paperback)
Jakub Kurzak, David A. Bader, Jack Dongarra
R2,210 Discovery Miles 22 100 Ships in 12 - 17 working days

The hybrid/heterogeneous nature of future microprocessors and large high-performance computing systems will result in a reliance on two major types of components: multicore/manycore central processing units and special purpose hardware/massively parallel accelerators. While these technologies have numerous benefits, they also pose substantial performance challenges for developers, including scalability, software tuning, and programming issues. Researchers at the Forefront Reveal Results from Their Own State-of-the-Art Work Edited by some of the top researchers in the field and with contributions from a variety of international experts, Scientific Computing with Multicore and Accelerators focuses on the architectural design and implementation of multicore and manycore processors and accelerators, including graphics processing units (GPUs) and the Sony Toshiba IBM (STI) Cell Broadband Engine (BE) currently used in the Sony PlayStation 3. The book explains how numerical libraries, such as LAPACK, help solve computational science problems; explores the emerging area of hardware-oriented numerics; and presents the design of a fast Fourier transform (FFT) and a parallel list ranking algorithm for the Cell BE. It covers stencil computations, auto-tuning, optimizations of a computational kernel, sequence alignment and homology, and pairwise computations. The book also evaluates the portability of drug design applications to the Cell BE and illustrates how to successfully exploit the computational capabilities of GPUs for scientific applications. It concludes with chapters on dataflow frameworks, the Charm++ programming model, scan algorithms, and a portable intracore communication framework. Explores the New Computational Landscape of Hybrid Processors By offering insight into the process of constructing and effectively using the technology, this volume provides a thorough and practical introduction to the area of hybrid computing. It discusses introductory concepts and simple examples of parallel computing, logical and performance debugging for parallel computing, and advanced topics and issues related to the use and building of many applications.

Cloud Computing and Software Services - Theory and Techniques (Paperback): Syed A. Ahson, Mohammad Ilyas Cloud Computing and Software Services - Theory and Techniques (Paperback)
Syed A. Ahson, Mohammad Ilyas
R2,191 Discovery Miles 21 910 Ships in 12 - 17 working days

Whether you're already in the cloud, or determining whether or not it makes sense for your organization, Cloud Computing and Software Services: Theory and Techniques provides the technical understanding needed to develop and maintain state-of-the-art cloud computing and software services. From basic concepts and recent research findings to future directions, it gathers the insight of 50 experts from around to present a global perspective on the range of technical topics related to cloud computing and Software as a Service (SaaS). The book also: Reviews real cases and applications of cloud computing Discusses the infrastructure cloud and Infrastructure as a Service (IaaS) Considers data- and compute-intensive environments Examines security and reliability in the cloud Witten in a manner that makes this complex subject easy to understand, this is an ideal one-stop reference for anyone interested in cloud computing. The accessible language and wealth of illustrations also make it suitable for academic and research-oriented settings. The comprehensive coverage supplies you with the understanding of cloud computing technologies and trends in parallel computing needed to establish and maintain effective and efficient computing and software services.

TV White Space Spectrum Technologies - Regulations, Standards, and Applications (Paperback): Rashid Abdelhaleem Saeed, Stephen... TV White Space Spectrum Technologies - Regulations, Standards, and Applications (Paperback)
Rashid Abdelhaleem Saeed, Stephen J. Shellhammer
R2,229 Discovery Miles 22 290 Ships in 12 - 17 working days

Although sophisticated wireless radio technologies make it possible for unlicensed wireless devices to take advantage of un-used broadcast TV spectra, those looking to advance the field have lacked a book that covers cognitive radio in TV white spaces (TVWS). Filling this need, TV White Space Spectrum Technologies: Regulations, Standards and Applications explains how white space technology can be used to enable the additional spectrum access that is so badly needed. Providing a comprehensive overview and analysis of the topics related to TVWS, this forward-looking reference contains contributions from key industry players, standards developers, and researchers from around the world in TV white space, dynamic spectrum access, and cognitive radio fields. It supplies an extensive survey of new technologies, applications, regulations, and open research areas in TVWS. The book is organized in four parts: Regulations and Profiles-Covers regulations, spectrum policies, channelization, and system requirements Standards-Examines TVWS standards efforts in different standard-developing organizations, with emphasis on the IEEE 802.22 wireless network standard Coexistence-Presents coexistence techniques between all potential TVWS standards, technologies, devices, and service providers, with emphasis on the Federal Communications Commission's (FCC) recent regulations and policies, and IEEE 802.19 coexistence study group efforts Important Aspects-Considers spectrum allocation, use cases, and security issues in the TVWS network This complete reference includes coverage of system requirements, collaborative sensing, spectrum sharing, privacy, and interoperability. Suggesting a number of applications that can be deployed to provide new services to users, including broadband Internet applications, the book highlights potential business opportunities and addresses the deployment challenges that are likely to arise.

Local Area Network Handbook, Sixth Edition - Handbook (Hardcover, 6th edition): John P. Slone Local Area Network Handbook, Sixth Edition - Handbook (Hardcover, 6th edition)
John P. Slone
R4,953 R3,913 Discovery Miles 39 130 Save R1,040 (21%) Ships in 12 - 17 working days

Today's enterprise cannot effectively function without a network, and today's enterprise network is almost always based on LAN technology. In a few short years, LANs have become an essential element of today's business environment. This time in the spotlight, while well deserved, has not come without a price. Businesses now insist that LANs deliver vast and ever-increasing quantities of business-critical information and that they do it efficiently, flawlessly, without fail, and most of all, securely. Today's network managers must consistently deliver this level of performance, and must do so while keeping up with ever changing, ever increasing demands without missing a beat. At the same time, today's IT managers must deliver business-critical information systems in an environment that has undergone radical paradigm shifts in such widely varied fields as computer architecture, operating systems, application development, and security.

The Local Area Networks Handbook focuses on this collective environment, in which networking and information technology work together to create LAN-based enterprise networks. Topics have been selected and organized with this in mind, providing both depth and breadth of coverage. The handbook will provide you not only an understanding of how LANs work and how to go about selecting and implementing LAN products, but also of how to leverage LAN capabilities for the benefit of your enterprise.

Making Them Move - Mechanics, Control & Animation of Articulated Figures (Hardcover): Norman Badler, Brian Barsky, David Zeltzer Making Them Move - Mechanics, Control & Animation of Articulated Figures (Hardcover)
Norman Badler, Brian Barsky, David Zeltzer
R3,536 Discovery Miles 35 360 Ships in 12 - 17 working days

Current computer graphics hardware and software make it possible to synthesize near photo-realistic images, but the simulation of natural-looking motion of articulated figures remains a difficultand challenging task. Skillfully rendered animation of humans, animals, and robots can delight and move us, but simulating their realistic motion holds great promise for many other applications as well, including ergonomic engineering design, clinical diagnosis of pathological movements, rehabilitation therapy, and biomechanics.Making Them Move presents the work of leading researchers in computer graphics, psychology, robotics and mechanical engineering who were invited to attend the Workshop on the Mechanics, Control and Animation of ArticulatedFigures held at the MIT Media Lab in April 1989. The book explores biological and robotic motor control, as well as state-of-the-art computergraphics techniques for simulating human and animal figures in a natural and physically realistic manner.

Neuro-Fuzzy Equalizers for Mobile Cellular Channels (Paperback): K.C. Raveendranathan Neuro-Fuzzy Equalizers for Mobile Cellular Channels (Paperback)
K.C. Raveendranathan
R1,681 Discovery Miles 16 810 Ships in 12 - 17 working days

Equalizers are present in all forms of communication systems. Neuro-Fuzzy Equalizers for Mobile Cellular Channels details the modeling of a mobile broadband communication channel and designing of a neuro-fuzzy adaptive equalizer for it. This book focuses on the concept of the simulation of wireless channel equalizers using the adaptive-network-based fuzzy inference system (ANFIS). The book highlights a study of currently existing equalizers for wireless channels. It discusses several techniques for channel equalization, including the type-2 fuzzy adaptive filter (type-2 FAF), compensatory neuro-fuzzy filter (CNFF), and radial basis function (RBF) neural network. Neuro-Fuzzy Equalizers for Mobile Cellular Channels starts with a brief introduction to channel equalizers, and the nature of mobile cellular channels with regard to the frequency reuse and the resulting CCI. It considers the many channel models available for mobile cellular channels, establishes the mobile indoor channel as a Rayleigh fading channel, presents the channel equalization problem, and focuses on various equalizers for mobile cellular channels. The book discusses conventional equalizers like LE and DFE using a simple LMS algorithm and transversal equalizers. It also covers channel equalization with neural networks and fuzzy logic, and classifies various equalizers.This being a fairly new branch of study, the book considers in detail the concept of fuzzy logic controllers in noise cancellation problems and provides the fundamental concepts of neuro-fuzzy. The final chapter offers a recap and explores venues for further research. This book also establishes a common mathematical framework of the equalizers using the RBF model and develops a mathematical model for ultra-wide band (UWB) channels using the channel co-variance matrix (CCM). Introduces the novel concept of the application of adaptive-network-based fuzzy inference system (ANFIS) in the design of wireless channel equalizers Provides model ultra-wide band (UWB) channels using channel co-variance matrix Offers a formulation of a unified radial basis function (RBF) framework for ANFIS-based and fuzzy adaptive filter (FAF) Type II, as well as compensatory neuro-fuzzy equalizers Includes extensive use of MATLAB (R) as the simulation tool in all the above cases

High-Speed Photonics Interconnects (Paperback): Lukas Chrostowski, Krzysztof Iniewski High-Speed Photonics Interconnects (Paperback)
Lukas Chrostowski, Krzysztof Iniewski
R2,426 Discovery Miles 24 260 Ships in 12 - 17 working days

Dramatic increases in processing power have rapidly scaled on-chip aggregate bandwidths into the Tb/s range. This necessitates a corresponding increase in the amount of data communicated between chips, so as not to limit overall system performance. To meet the increasing demand for interchip communication bandwidth, researchers are investigating the use of high-speed optical interconnect architectures. Unlike their electrical counterparts, optical interconnects offer high bandwidth and negligible frequency-dependent loss, making possible per-channel data rates of more than 10 Gb/s. High-Speed Photonics Interconnects explores some of the groundbreaking technologies and applications that are based on photonics interconnects. From the Evolution of High-Speed I/O Circuits to the Latest in Photonics Interconnects Packaging and Lasers Featuring contributions by experts from academia and industry, the book brings together in one volume cutting-edge research on various aspects of high-speed photonics interconnects. Contributors delve into a wide range of technologies, from the evolution of high-speed input/output (I/O) circuits to recent trends in photonics interconnects packaging. The book discusses the challenges associated with scaling I/O data rates and current design techniques. It also describes the major high-speed components, channel properties, and performance metrics. The book exposes readers to a myriad of applications enabled by photonics interconnects technology. Learn about Optical Interconnect Technologies Suitable for High-Density Integration with CMOS Chips This richly illustrated work details how optical interchip communication links have the potential to fully leverage increased data rates provided through complementary metal-oxide semiconductor (CMOS) technology scaling at suitable power-efficiency levels. Keeping the mathematics to a minimum, it gives engineers, researchers, graduate students, and entrepreneurs a comprehensive overview of the dynamic landscape of high-speed photonics interconnects.

End-to-End Adaptive Congestion Control in TCP/IP Networks (Paperback): Christos N. Houmkozlis, George A. Rovithakis End-to-End Adaptive Congestion Control in TCP/IP Networks (Paperback)
Christos N. Houmkozlis, George A. Rovithakis
R2,352 Discovery Miles 23 520 Ships in 12 - 17 working days

Establishing adaptive control as an alternative framework to design and analyze Internet congestion controllers, End-to-End Adaptive Congestion Control in TCP/IP Networks employs a rigorously mathematical approach coupled with a lucid writing style to provide extensive background and introductory material on dynamic systems stability and neural network approximation; alongside future internet requests for congestion control architectures. Designed to operate under extreme heterogeneous, dynamic, and time-varying network conditions, the developed controllers must also handle network modeling structural uncertainties and uncontrolled traffic flows acting as external perturbations. The book also presents a parallel examination of specific adaptive congestion control, NNRC, using adaptive control and approximation theory, as well as extensions toward cooperation of NNRC with application QoS control. Features: Uses adaptive control techniques for congestion control in packet switching networks Employs a rigorously mathematical approach with lucid writing style Presents simulation experiments illustrating significant operational aspects of the method; including scalability, dynamic behavior, wireless networks, and fairness Applies to networked applications in the music industry, computers, image trading, and virtual groups by techniques such as peer-to-peer, file sharing, and internet telephony Contains working examples to highlight and clarify key attributes of the congestion control algorithms presented Drawing on the recent research efforts of the authors, the book offers numerous tables and figures to increase clarity and summarize the algorithms that implement various NNRC building blocks. Extensive simulations and comparison tests analyze its behavior and measure its performance through monitoring vital network quality metrics. Divided into three parts, the book offers a review of computer networks and congestion control, presents an adaptive congestion control framework as an alternative to optimization methods, and provides appendices related to dynamic systems through universal neural network approximators.

Microservice Patterns - With examples in Java (Paperback): Chris Richardson Microservice Patterns - With examples in Java (Paperback)
Chris Richardson
R1,125 Discovery Miles 11 250 Ships in 12 - 17 working days

Description All aspects of software development and deployment become painfully slow. The solution is to adopt the microservice architecture. This architecture accelerates software development and enables continuous delivery and deployment of complex software applications. Microservice Patterns teaches enterprise developers and architects how to build applications with the microservice architecture. This book also teaches readers how to refactor a monolithic application to a microservice architecture. Key features * In-depth guide * Practical examples * Step-by-step instructions Audience Readers should be familiar with the basics of enterprise application architecture, design, and implementation. About the technology Microservice architecture accelerates software development and enables continuous delivery and deployment of complex software applications. Author biography Chris Richardson is a developer and architect. He is a Java Champion, a JavaOne rock star and the author of POJOs in Action, which describes how to build enterprise Java applications with frameworks such as Spring and Hibernate. Chris was also the founder of the original CloudFoundry.com, an early Java PaaS for Amazon EC2. Today, he is a recognized thought leader in microservices. Chris is the creator of http://microservices.io , a website describing how to develop and deploy microservices. He provides microservices consulting and training and is working on his third startup http://eventuate.io , an application platform for developing microservices.

Encyclopedia of Microcomputers - Volume 21 - Index (Hardcover, illustrated edition): Allen Kent, James G. Williams Encyclopedia of Microcomputers - Volume 21 - Index (Hardcover, illustrated edition)
Allen Kent, James G. Williams
R9,834 Discovery Miles 98 340 Ships in 12 - 17 working days

This volume contains information about the automatic acquisition of biographic knowledge from encyclopedic texts, Web interaction and the navigation problem in hypertext.

Inside Multi-Media Case Based Instruction (Hardcover): Roger C. Schank Inside Multi-Media Case Based Instruction (Hardcover)
Roger C. Schank
R3,731 Discovery Miles 37 310 Ships in 12 - 17 working days

The fourth in the "Inside" series, this volume includes four theses completed under the editor's direction at the Institute for the Learning Sciences at Northwestern University. This series bridges the gap between Schank's books introducing (for a popular audience) the theories behind his work in artificial intelligence (AI) and the many articles and books written by Schank and other AI researchers for their colleagues and students. The series will be of interest to graduate students in AI and professionals in other academic fields who seek the retraining necessary to join the AI effort or to understand it at the professional level.
This volume elaborates the Case-Based Teaching Architecture. A central tenet of this architecture is the importance of acquiring cases, and being able to retrieve and use those cases to solve new problems. The theses address the problems of building case bases, indexing large amounts of data contained within those case bases, and retrieving information on a need-to-know basis. They also reflect the work of researchers at the Institute to design tools that enable software programs to be built more effectively and efficiently.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Research Advances in Intelligent…
Anshul Verma, Pradeepika Verma, … Hardcover R3,034 Discovery Miles 30 340
The Architecture of Computer Hardware…
I Englander Paperback R4,268 R677 Discovery Miles 6 770
Rust Atomics and Locks - Low-Level…
Mara Bos Paperback R1,097 R962 Discovery Miles 9 620
Edge-AI in Healthcare - Trends and…
Sonali Vyas, Akanksha Upadhyaya, … Hardcover R2,644 Discovery Miles 26 440
Designing Switch/Routers - Fundamental…
James Aweya Paperback R3,696 Discovery Miles 36 960
Quick Recursion
David Matuszek Paperback R753 Discovery Miles 7 530
Parallel Computing
Moreshwar R. Bhujade Hardcover R1,057 Discovery Miles 10 570
Enterprise Level Security 1 & 2
Kevin Foltz, William R. Simpson Paperback R1,421 Discovery Miles 14 210
Cloud Computing in Medical Imaging
Ayman El-Baz, Jasjit S. Suri Hardcover R4,280 Discovery Miles 42 800
Designing Switch/Routers - Fundamental…
James Aweya Hardcover R8,792 Discovery Miles 87 920

 

Partners