0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (13)
  • R250 - R500 (38)
  • R500+ (3,075)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design

Achievements in European Research on Grid Systems - CoreGRID Integration Workshop 2006 (Selected Papers) (Hardcover, 2008 ed.):... Achievements in European Research on Grid Systems - CoreGRID Integration Workshop 2006 (Selected Papers) (Hardcover, 2008 ed.)
Sergei Gorlatch, Marian Bubak, Thierry Priol
R2,671 Discovery Miles 26 710 Ships in 18 - 22 working days

This volume comprises the edited proceedings of the 2006 CoreGRID Integration Workshop (CGIW'2006), held October 2006 in Krakow, Poland. A ?Network of Excellence? funded by the European Commission's Sixth Framework Program, CoreGRID, aims to strengthen and advance scientific and technological excellence in the area of Grid and Peer-to-Peer technologies by bringing together a critical mass of well-established researchers from 41 European research institutions. Achievements in European Research on Grid Systems covers, though is not limited to, the following topics: knowledge and data management; programming models; system architecture; Grid information, resource and workflow monitoring services; resource management and scheduling; systems, tools and environments; trust and security issues on the Grid. Designed for a professional audience of industry practitioners and researchers, Achievements in European Research on Grid Systems is also suitable for advanced-level students in computer science.

Scalable Shared Memory Multiprocessors (Hardcover, 1992 ed.): Michel Dubois, Shreekant S. Thakkar Scalable Shared Memory Multiprocessors (Hardcover, 1992 ed.)
Michel Dubois, Shreekant S. Thakkar
R4,199 Discovery Miles 41 990 Ships in 18 - 22 working days

The workshop on Scalable Shared Memory Multiprocessors took place on May 26 and 27 1990 at the Stouffer Madison Hotel in Seattle, Washington as a prelude to the 1990 International Symposium on Computer Architecture. About 100 participants listened for two days to the presentations of 22 invited The motivation for this workshop was to speakers, from academia and industry. promote the free exchange of ideas among researchers working on shared-memory multiprocessor architectures. There was ample opportunity to argue with speakers, and certainly participants did not refrain a bit from doing so. Clearly, the problem of scalability in shared-memory multiprocessors is still a wide-open question. We were even unable to agree on a definition of "scalability." Authors had more than six months to prepare their manuscript, and therefore the papers included in this proceedings are refinements of the speakers' presentations, based on the criticisms received at the workshop. As a result, 17 authors contributed to these proceedings. We wish to thank them for their diligence and care. The contributions in these proceedings can be partitioned into four categories 1. Access Order and Synchronization 2. Performance 3. Cache Protocols and Architectures 4. Distributed Shared Memory Particular topics on which new ideas and results are presented in these proceedings include: efficient schemes for combining networks, formal specification of shared memory models, correctness of trace-driven simulations, synchronization, various coherence protocols, ."

Formal Languages, Automata and Numeration Systems Volume 2 (Hardcover): Rigo Formal Languages, Automata and Numeration Systems Volume 2 (Hardcover)
Rigo
R3,765 Discovery Miles 37 650 Ships in 18 - 22 working days

The interplay between words, computability, algebra and arithmetic has now proved its relevance and fruitfulness. Indeed, the cross-fertilization between formal logic and finite automata (such as that initiated by J.R. Buchi) or between combinatorics on words and number theory has paved the way to recent dramatic developments, for example, the transcendence results for the real numbers having a "simple" binary expansion, by B. Adamczewski and Y. Bugeaud. This book is at the heart of this interplay through a unified exposition. Objects are considered with a perspective that comes both from theoretical computer science and mathematics. Theoretical computer science offers here topics such as decision problems and recognizability issues, whereas mathematics offers concepts such as discrete dynamical systems. The main goal is to give a quick access, for students and researchers in mathematics or computer science, to actual research topics at the intersection between automata and formal language theory, number theory and combinatorics on words. The second of two volumes on this subject, this book covers regular languages, numeration systems, formal methods applied to decidability issues about infinite words and sets of numbers.

Dual Mode Logic - A New Paradigm for Digital IC Design (Hardcover, 1st ed. 2021): Itamar Levi, Alexander Fish Dual Mode Logic - A New Paradigm for Digital IC Design (Hardcover, 1st ed. 2021)
Itamar Levi, Alexander Fish
R2,430 Discovery Miles 24 300 Ships in 18 - 22 working days

This book presents Dual Mode Logic (DML), a new design paradigm for digital integrated circuits. DML logic gates can operate in two modes, each optimized for a different metric. Its on-the-fly switching between these operational modes at the gate, block and system levels provide maximal E-D optimization flexibility. Each highly detailed chapter has multiple illustrations showing how the DML paradigm seamlessly implements digital circuits that dissipate less energy while simultaneously improving performance and reducing area without a significant compromise in reliability. All the facets of the DML methodology are covered, starting from basic concepts, through single gate optimization, general module optimization, design trade-offs and new ways DML can be integrated into standard design flows using standard EDA tools. DML logic is compatible with numerous applications but is particularly advantageous for ultra-low power, reliable high performance systems, and advanced scaled technologies Written in language accessible to students and design engineers, each topic is oriented toward immediate application by all those interested in an alternative to CMOS logic. Describes a novel, promising alternative to conventional CMOS logic, known as Dual Mode Logic (DML), with which a single gate can be operated selectively in two modes, each optimized for a different metric (e.g., energy consumption, performance, size); Demonstrates several techniques at the architectural level, which can result in high energy savings and improved system performance; Focuses on the tradeoffs between power, area and speed including optimizations at the transistor and gate level, including alternatives to DML basic cells; Illustrates DML efficiency for a variety of VLSI applications.

Loop Transformations for Restructuring Compilers - The Foundations (Hardcover, 1993 ed.): Utpal Banerjee Loop Transformations for Restructuring Compilers - The Foundations (Hardcover, 1993 ed.)
Utpal Banerjee
R4,184 Discovery Miles 41 840 Ships in 18 - 22 working days

Automatic transformation of a sequential program into a parallel form is a subject that presents a great intellectual challenge and promises great practical rewards. There is a tremendous investment in existing sequential programs, and scientists and engineers continue to write their application programs in sequential languages (primarily in Fortran), but the demand for increasing speed is constant. The job of a restructuring compiler is to discover the dependence structure of a given program and transform the program in a way that is consistent with both that dependence structure and the characteristics of the given machine. Much attention in this field of research has been focused on the Fortran do loop. This is where one expects to find major chunks of computation that need to be performed repeatedly for different values of the index variable. Many loop transformations have been designed over the years, and several of them can be found in any parallelizing compiler currently in use in industry or at a university research facility. Loop Transformations for Restructuring Compilers: The Foundations provides a rigorous theory of loop transformations. The transformations are developed in a consistent mathematical framework using objects like directed graphs, matrices and linear equations. The algorithms that implement the transformations can then be precisely described in terms of certain abstract mathematical algorithms. The book provides the general mathematical background needed for loop transformations (including those basic mathematical algorithms), discusses data dependence, and introduces the major transformations. The next volume will build a detailed theory of looptransformations based on the material developed here. Loop Transformations for Restructuring Compilers: The Foundations presents a theory of loop transformations that is rigorous and yet reader-friendly.

FPGA Based Accelerators for Financial Applications (Hardcover, 1st ed. 2015): Christian De Schryver FPGA Based Accelerators for Financial Applications (Hardcover, 1st ed. 2015)
Christian De Schryver
R3,380 Discovery Miles 33 800 Ships in 18 - 22 working days

This book covers the latest approaches and results from reconfigurable computing architectures employed in the finance domain. So-called field-programmable gate arrays (FPGAs) have already shown to outperform standard CPU- and GPU-based computing architectures by far, saving up to 99% of energy depending on the compute tasks. Renowned authors from financial mathematics, computer architecture and finance business introduce the readers into today's challenges in finance IT, illustrate the most advanced approaches and use cases and present currently known methodologies for integrating FPGAs in finance systems together with latest results. The complete algorithm-to-hardware flow is covered holistically, so this book serves as a hands-on guide for IT managers, researchers and quants/programmers who think about integrating FPGAs into their current IT systems.

Computer Systems and Software Engineering - State-of-the-art (Hardcover, 1992 ed.): Patrick de Wilde, Joos P.L. Vandewalle Computer Systems and Software Engineering - State-of-the-art (Hardcover, 1992 ed.)
Patrick de Wilde, Joos P.L. Vandewalle
R4,246 Discovery Miles 42 460 Ships in 18 - 22 working days

Computer Systems and Software Engineering is a compilation of sixteen state-of-the-art lectures and keynote speeches given at the COMPEURO '92 conference. The contributions are from leading researchers, each of whom gives a new insight into subjects ranging from hardware design through parallelism to computer applications. The pragmatic flavour of the contributions makes the book a valuable asset for both researchers and designers alike. The book covers the following subjects: Hardware Design: memory technology, logic design, algorithms and architecture; Parallel Processing: programming, cellular neural networks and load balancing; Software Engineering: machine learning, logic programming and program correctness; Visualization: the graphical computer interface.

Recent Trends in Blockchain for Information Systems Security and Privacy (Hardcover): Amit Kumar Tyagi, Ajith Abraham Recent Trends in Blockchain for Information Systems Security and Privacy (Hardcover)
Amit Kumar Tyagi, Ajith Abraham
R3,324 Discovery Miles 33 240 Ships in 9 - 17 working days

Blockchain technology is an emerging distributed, decentralized architecture and computing paradigm, which has accelerated the development and application of cloud, fog and edge computing; artificial intelligence; cyber physical systems; social networking; crowdsourcing and crowdsensing; 5g; trust management and finance; and other many useful sectors. Nowadays, the primary blockchain technology uses are in information systems to keep information secure and private. However, many threats and vulnerabilities are facing blockchain in the past decade such 51% attacks, double spending attacks, etc. The popularity and rapid development of blockchain brings many technical and regulatory challenges for research and academic communities. The main goal of this book is to encourage both researchers and practitioners of Blockchain technology to share and exchange their experiences and recent studies between academia and industry. The reader will be provided with the most up-to-date knowledge of blockchain in mainstream areas of security and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and p2p applications are increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book provides a detailed explanation of security and privacy with respect to blockchain for information systems, and will be an essential resource for students, researchers and scientists studying blockchain uses in information systems and those wanting to explore the current state of play.

FPGA Prototyping by SystemVerilog Examples - Xilinx MicroBlaze MCS SoC Edition (Hardcover): PP Chu FPGA Prototyping by SystemVerilog Examples - Xilinx MicroBlaze MCS SoC Edition (Hardcover)
PP Chu
R3,073 Discovery Miles 30 730 Ships in 10 - 15 working days

A hands-on introduction to FPGA prototyping and SoC design This is the successor edition of the popular FPGA Prototyping by Verilog Examples text. It follows the same "learning-by-doing" approach to teach the fundamentals and practices of HDL synthesis and FPGA prototyping. The new edition uses a coherent series of examples to demonstrate the process to develop sophisticated digital circuits and IP (intellectual property) cores, integrate them into an SoC (system on a chip) framework, realize the system on an FPGA prototyping board, and verify the hardware and software operation. The examples start with simple gate-level circuits, progress gradually through the RT (register transfer) level modules, and lead to a functional embedded system with custom I/O peripherals and hardware accelerators. Although it is an introductory text, the examples are developed in a rigorous manner, and the derivations follow the strict design guidelines and coding practices used for large, complex digital systems. The book is completely updated and uses the SystemVerilog language, which "absorbs" the Verilog language. It presents the hardware design in the SoC context and introduces the hardware-software co-design concept. Instead of treating examples as isolated entities, the book integrates them into a single coherent SoC platform that allows readers to explore both hardware and software "programmability" and develop complex and interesting embedded system projects. The new edition: Adds four general-purpose IP cores, which are multi-channel PWM (pulse width modulation) controller, I2C controller, SPI controller, and XADC (Xilinx analog-to-digital converter) controller. Introduces a music synthesizer constructed with a DDFS (direct digital frequency synthesis) module and an ADSR (attack-decay-sustain-release) envelope generator. Expands the original video controller into a complete stream based video subsystem that incorporates a video synchronization circuit, a test-pattern generator, an OSD (on-screen display) controller, a sprite generator, and a frame buffer. Provides a detailed discussion on blocking and nonblocking statements and coding styles. Describes basic concepts of software-hardware co-design with Xilinx MicroBlaze MCS soft-core processor. Provides an overview of bus interconnect and interface circuit. Presents basic embedded system software development. Suggests additional modules and peripherals for interesting and challenging projects. FPGA Prototyping by SystemVerilog Examples makes a natural companion text for introductory and advanced digital design courses and embedded system courses. It also serves as an ideal self-teaching guide for practicing engineers who wish to learn more about this emerging area of interest.

The Fourth Terminal - Benefits of Body-Biasing Techniques for FDSOI Circuits and Systems (Hardcover, 1st ed. 2020): Sylvain... The Fourth Terminal - Benefits of Body-Biasing Techniques for FDSOI Circuits and Systems (Hardcover, 1st ed. 2020)
Sylvain Clerc, Thierry Di Gilio, Andreia Cathelin
R3,366 Discovery Miles 33 660 Ships in 10 - 15 working days

This book discusses the advantages and challenges of Body-Biasing for integrated circuits and systems, together with the deployment of the design infrastructure needed to generate this Body-Bias voltage. These new design solutions enable state of the art energy efficiency and system flexibility for the latest applications, such as Internet of Things and 5G communications.

MOSFET Models for SPICE Simulation including BSIM3v3 & BSIM4 (Hardcover): W. Liu MOSFET Models for SPICE Simulation including BSIM3v3 & BSIM4 (Hardcover)
W. Liu
R5,183 Discovery Miles 51 830 Ships in 18 - 22 working days

An expert guide to understanding and making optimum use of BSIM

Used by more chip designers worldwide than any other comparable model, the Berkeley Short-Channel IGFET Model (BSIM) has, over the past few years, established itself as the de facto standard MOSFET SPICE model for circuit simulation and CMOS technology development. Yet, until now, there have been no independent expert guides or tutorials to supplement the various BSIM manuals currently available. Written by a noted expert in the field, this book fills that gap in the literature by providing a comprehensive guide to understanding and making optimal use of BSIM3 and BSIM4.

Drawing upon his extensive experience designing with BSIM, William Liu provides a brief history of the model, discusses the various advantages of BSIM over other models, and explores the reasons why BSIM3 has been adopted by the majority of circuit manufacturers. He then provides engineers with the detailed practical information and guidance they need to master all of BSIM’s features. He:

  • Summarizes key BSIM3 components
  • Represents the BSIM3 model with equivalent circuits for various operating conditions
  • Provides a comprehensive glossary of modeling terminology
  • Lists alphabetically BSIM3 parameters along with their meanings and relevant equations
  • Explores BSIM3’s flaws and provides improvement suggestions
  • Describes all of BSIM4’s improvements and new features
Computer Vision: Specialized Processors for Real-Time Image Analysis - Workshop Proceedings Barcelona, Spain, September 1991... Computer Vision: Specialized Processors for Real-Time Image Analysis - Workshop Proceedings Barcelona, Spain, September 1991 (Hardcover, 2nd ed.)
Eduard Montseny, Joan Frau
R2,749 Discovery Miles 27 490 Ships in 18 - 22 working days

Computer vision falls short of human vision in two respects: execution time and intelligent interpretation. This book addresses the question of execution time. It is based on a workshop on specialized processors for real-time image analysis, held as part of the activities of an ESPRIT Basic Research Action, the Working Group on Vision. The aim of the book is to examine the state of the art in vision-oriented computers. Two approaches are distinguished: multiprocessor systems and fine-grain massively parallel computers. The development of fine-grain machines has become more important over the last decade, but one of the main conclusions of the workshop is that this does not imply the replacement of multiprocessor machines. The book is divided into four parts. Part 1 introduces different architectures for vision: associative and pyramid processors as examples of fine-grain machines and a workstation with bus-oriented network topology as an example of a multiprocessor system. Parts 2 and 3 deal with the design and development of dedicated and specialized architectures. Part 4 is mainly devoted to applications, including road segmentation, mobile robot guidance and navigation, reconstruction and identification of 3D objects, and motion estimation.

Parallel Architectures for Artificial Neural Networks - Paradigms and Implementations (Hardcover): N. Sundararajan Parallel Architectures for Artificial Neural Networks - Paradigms and Implementations (Hardcover)
N. Sundararajan
R3,150 Discovery Miles 31 500 Ships in 18 - 22 working days

This excellent reference for all those involved in neural networks research and application presents, in a single text, the necessary aspects of parallel implementation for all major artificial neural network models. The book details implementations on varoius processor architectures (ring, torus, etc.) built on different hardware platforms, ranging from large general purpose parallel computers to custom built MIMD machines using transputers and DSPs.
Experts who performed the implementations author the chapters and research results are covered in each chapter. These results are divided into three parts.
Theoretical analysis of parallel implementation schemes on MIMD message passing machines.
Details of parallel implementation of BP neural networks on a general purpose, large, parallel computer.
Four chapters each describing a specific purpose parallel neural computer configuration.
This book is aimed at graduate students and researchers working in artificial neural networks and parallel computing. Graduate level educators can use it to illustrate the methods of parallel computing for ANN simulation. The text is an ideal reference providing lucid mathematical analyses for practitioners in the field.

Principles of High-Performance Processor Design - For High Performance Computing, Deep Neural Networks and Data Science... Principles of High-Performance Processor Design - For High Performance Computing, Deep Neural Networks and Data Science (Hardcover, 1st ed. 2021)
Junichiro Makino
R4,628 Discovery Miles 46 280 Ships in 10 - 15 working days

This book describes how we can design and make efficient processors for high-performance computing, AI, and data science. Although there are many textbooks on the design of processors we do not have a widely accepted definition of the efficiency of a general-purpose computer architecture. Without a definition of the efficiency, it is difficult to make scientific approach to the processor design. In this book, a clear definition of efficiency is given and thus a scientific approach for processor design is made possible. In chapter 2, the history of the development of high-performance processor is overviewed, to discuss what quantity we can use to measure the efficiency of these processors. The proposed quantity is the ratio between the minimum possible energy consumption and the actual energy consumption for a given application using a given semiconductor technology. In chapter 3, whether or not this quantity can be used in practice is discussed, for many real-world applications. In chapter 4, general-purpose processors in the past and present are discussed from this viewpoint. In chapter 5, how we can actually design processors with near-optimal efficiencies is described, and in chapter 6 how we can program such processors. This book gives a new way to look at the field of the design of high-performance processors.

Hardware Architectures for Post-Quantum Digital Signature Schemes (Hardcover, 1st ed. 2021): Deepraj Soni, Kanad Basu, Mohammed... Hardware Architectures for Post-Quantum Digital Signature Schemes (Hardcover, 1st ed. 2021)
Deepraj Soni, Kanad Basu, Mohammed Nabeel, Najwa Aaraj, Marc Manzano, …
R2,880 Discovery Miles 28 800 Ships in 18 - 22 working days

This book explores C-based design, implementation, and analysis of post-quantum cryptography (PQC) algorithms for signature generation and verification. The authors investigate NIST round 2 PQC algorithms for signature generation and signature verification from a hardware implementation perspective, especially focusing on C-based design, power-performance-area-security (PPAS) trade-offs and design flows targeting FPGAs and ASICs. Describes a comprehensive set of synthesizable c code base as well as the hardware implementations for the different types of PQC algorithms including lattice-based, code-based, and multivariate-based; Demonstrates the hardware (FPGA and ASIC) and hardware-software optimizations and trade-offs of the NIST round 2 signature-based PQC algorithms; Enables designers to build hardware implementations that are resilient to a variety of side-channels.

System-on-Chip Security - Validation and Verification (Hardcover, 1st ed. 2020): Farimah Farahmandi, Yuanwen Huang, Prabhat... System-on-Chip Security - Validation and Verification (Hardcover, 1st ed. 2020)
Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra; Contributions by Fareena Saqib, Jim Plusquellic
R2,912 Discovery Miles 29 120 Ships in 18 - 22 working days

This book describes a wide variety of System-on-Chip (SoC) security threats and vulnerabilities, as well as their sources, in each stage of a design life cycle. The authors discuss a wide variety of state-of-the-art security verification and validation approaches such as formal methods and side-channel analysis, as well as simulation-based security and trust validation approaches. This book provides a comprehensive reference for system on chip designers and verification and validation engineers interested in verifying security and trust of heterogeneous SoCs.

Trust Networks for Recommender Systems (Hardcover, Edition. ed.): Patricia Victor, Chris Cornelis, Martine de Cock Trust Networks for Recommender Systems (Hardcover, Edition. ed.)
Patricia Victor, Chris Cornelis, Martine de Cock
R1,415 Discovery Miles 14 150 Ships in 18 - 22 working days

This book describes research performed in the context of trust/distrust propagation and aggregation, and their use in recommender systems. This is a hot research topic with important implications for various application areas. The main innovative contributions of the work are: -new bilattice-based model for trust and distrust, allowing for ignorance and inconsistency -proposals for various propagation and aggregation operators, including the analysis of mathematical properties -Evaluation of these operators on real data, including a discussion on the data sets and their characteristics. -A novel approach for identifying controversial items in a recommender system -An analysis on the utility of including distrust in recommender systems -Various approaches for trust based recommendations (a.o. base on collaborative filtering), an in depth experimental analysis, and proposal for a hybrid approach -Analysis of various user types in recommender systems to optimize bootstrapping of cold start users.

Smart Trajectories - Metamodeling, Reactive Architecture for Analytics, and Smart Applications (Hardcover): Azedine Boulmakoul,... Smart Trajectories - Metamodeling, Reactive Architecture for Analytics, and Smart Applications (Hardcover)
Azedine Boulmakoul, Lamia Karim, Bharat Bhushan
R4,706 Discovery Miles 47 060 Ships in 9 - 17 working days

Highlights developments, discoveries, and practical and advanced experiences related to responsive distributed computing and how it can support the deployment of trajectory-based applications in intelligent systems. Presents metamodeling with new trajectories patterns which are very useful for intelligent transportation systems. Examines the processing aspects of raw trajectories to develop other types of semantic and activity-type and space-time path type trajectories. Discusses Complex Event Processing (CEP), Internet of Things (IoT), Internet of Vehicle (IoV), V2X communication, Big Data Analytics, distributed processing frameworks, and Cloud Computing. Presents a number of case studies to demonstrate smart trajectories related to spatio-temporal events such as traffic congestion, viral contamination, and pedestrian accidents.

The Origins of Digital Computers - Selected Papers (Hardcover, 3rd ed. 1982): B. Randell The Origins of Digital Computers - Selected Papers (Hardcover, 3rd ed. 1982)
B. Randell
R5,467 Discovery Miles 54 670 Ships in 18 - 22 working days
Automated Analysis of Virtual Prototypes at the Electronic System Level - Design Understanding and Applications (Hardcover, 1st... Automated Analysis of Virtual Prototypes at the Electronic System Level - Design Understanding and Applications (Hardcover, 1st ed. 2020)
Mehran Goli, Rolf Drechsler
R2,200 Discovery Miles 22 000 Ships in 18 - 22 working days

This book describes a set of SystemC-based virtual prototype analysis methodologies, including design understanding, verification, security validation, and design space exploration. Readers will gain an overview of the latest research results in the field of Electronic Design Automation (EDA) at the Electronic System Level (ESL). The methodologies discussed enable readers to tackle easily key tasks and applications in the design process.

Hybrid Encryption Algorithms over Wireless Communication Channels (Hardcover): Mai Helmy Shaheen Hybrid Encryption Algorithms over Wireless Communication Channels (Hardcover)
Mai Helmy Shaheen
R3,588 Discovery Miles 35 880 Ships in 9 - 17 working days

This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, "Hybrid Encryption Algorithms over Wireless Communication Channels", examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik's cube is used afterwards in order to maximize the number of permutations. Transmission of images and videos is vital in today's communications systems. Hence, an effective encryption and modulation schemes are a must. The author adopts Orthogonal Frequency Division Multiplexing (OFDM), as the multicarrier transmission choice for wideband communications. For completeness, the author addresses the sensitivity of the encrypted data to the wireless channel impairments, and the effect of channel equalization on the received images and videos quality. Complete simulation experiments with MATLAB (R) codes are included. The book will help the reader obtain the required understanding for selecting the suitable encryption method that best fulfills the application requirements.

Introductory Circuit Theory (Hardcover, 1st ed. 2020): D. Sundararajan Introductory Circuit Theory (Hardcover, 1st ed. 2020)
D. Sundararajan
R1,914 Discovery Miles 19 140 Ships in 10 - 15 working days

This textbook for a one-semester course in Electrical Circuit Theory is written to be concise, understandable, and applicable. Matlab is used throughout, for coding the programs and simulation of the circuits. Every new concept is illustrated with numerous examples and figures, in order to facilitate learning. The simple and clear style of presentation, along with comprehensive coverage, enables students to gain a solid foundation in the subject, along with the ability to apply techniques to real circuit analysis. Written to be accessible to students of varying backgrounds, this textbook presents the analysis of realistic, working circuits Presents concepts in a clear, concise and comprehensive manner, such as the difficult problem of setting up the equilibrium equations of circuits using a systematic approach in a few distinct steps Includes worked examples of functioning circuits, throughout every chapter, with an emphasis on real applications Includes numerous exercises at the end of each chapter Provides program scripts and circuit simulations, using the popular and widely used Matlab software, as supplementary material online

Modeling Enterprise Architecture with TOGAF - A Practical Guide Using UML and BPMN (Paperback): Philippe Desfray, Gilbert... Modeling Enterprise Architecture with TOGAF - A Practical Guide Using UML and BPMN (Paperback)
Philippe Desfray, Gilbert Raymond
R1,129 R1,033 Discovery Miles 10 330 Save R96 (9%) Ships in 10 - 15 working days

"Modeling Enterprise Architecture with TOGAF" explains everything you need to know to effectively model enterprise architecture with The Open Group Architecture Framework (TOGAF), the leading EA standard. This solution-focused reference presents key techniques and illustrative examples to help you model enterprise architecture.

This book describes the TOGAF standard and its structure, from the architecture transformation method to governance, and presents enterprise architecture modeling practices with plenty of examples of TOGAF deliverables in the context of a case study.

Although widespread and growing quickly, enterprise architecture is delicate to manage across all its dimensions. Focusing on the architecture transformation method, TOGAF provides a wide framework, which covers the repository, governance, and a set of recognized best practices. The examples featured in this book were realized using the open source Modelio tool, which includes extensions for TOGAF.
Includes intuitive summaries of the complex TOGAF standard to let you effectively model enterprise architectureUses practical examples to illustrate ways to adapt TOGAF to the needs of your enterprise Provides model examples with Modelio, a free modeling tool, letting you exercise TOGAF modeling immediately using a dedicated tool Combines existing modeling standards with TOGAF

Authentication of Embedded Devices - Technologies, Protocols and Emerging Applications (Hardcover, 1st ed. 2021): Basel Halak Authentication of Embedded Devices - Technologies, Protocols and Emerging Applications (Hardcover, 1st ed. 2021)
Basel Halak
R2,431 Discovery Miles 24 310 Ships in 18 - 22 working days

This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications. The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival. Provides deep insight into the security threats undermining existing integrated circuit authentication techniques; Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems; Offers a comprehensive summary of existing authentication protocols and their limitations; Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption; Includes detailed case studies on the emerging applications of IC authentication schemes.

Languages, Design Methods, and Tools for Electronic System Design - Selected Contributions from FDL 2018 (Hardcover, 1st ed.... Languages, Design Methods, and Tools for Electronic System Design - Selected Contributions from FDL 2018 (Hardcover, 1st ed. 2020)
Tom J. Kazmierski, Sebastian Steinhorst, Daniel Grosse
R1,411 Discovery Miles 14 110 Ships in 18 - 22 working days

This book brings together a selection of the best papers from the twenty-first edition of the Forum on specification and Design Languages Conference (FDL), which took place on September 10-12, 2018, in Munich, Germany. FDL is a well-established international forum devoted to dissemination of research results, practical experiences and new ideas in the application of specification, design and verification languages to the design, modeling and verification of integrated circuits, complex hardware/software embedded systems, and mixed-technology systems. Covers Assertion Based Design, Verification & Debug; Includes language-based modeling and design techniques for embedded systems; Covers design, modeling and verification of mixed physical domain and mixed signal systems that include significant analog parts in electrical and non-electrical domains; Includes formal and semi-formal system level design methods for complex embedded systems based on the Unified Modelling Language (UML) and Model Driven Engineering (MDE).

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Retaining Women in Engineering - The…
Alissa Stavig, Robert Stavig Paperback R1,018 Discovery Miles 10 180
Anton Rubinstein - An Annotated Catalog…
Larry Sitsky Hardcover R2,864 Discovery Miles 28 640
Salmonella - From Genome to Function
Steffen Porwollik Hardcover R5,272 Discovery Miles 52 720
Polymeric Nanocomposites with…
Ayesha Kausar Paperback R4,581 Discovery Miles 45 810
Notable Women in American History - A…
Lynda G. Adamson Hardcover R2,236 Discovery Miles 22 360
Penguin Metal Stamp Pad - Un-inked (147…
R78 Discovery Miles 780
Total Quality Management and Operational…
John S Oakland, Michael A. Turner, … Paperback R1,175 R1,112 Discovery Miles 11 120
Articles Describing Archives and…
Donald L. DeWitt Hardcover R3,440 Discovery Miles 34 400
Digital Project Practice for New Work…
Tobias Endress Hardcover R3,633 Discovery Miles 36 330
Geographers, v. 11 - Biobibliographical…
T.W. Freeman Hardcover R4,006 Discovery Miles 40 060

 

Partners