![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design
High Performance Parallelism Pearls Volume 2 offers another set of examples that demonstrate how to leverage parallelism. Similar to Volume 1, the techniques included here explain how to use processors and coprocessors with the same programming - illustrating the most effective ways to combine Xeon Phi coprocessors with Xeon and other multicore processors. The book includes examples of successful programming efforts, drawn from across industries and domains such as biomed, genetics, finance, manufacturing, imaging, and more. Each chapter in this edited work includes detailed explanations of the programming techniques used, while showing high performance results on both Intel Xeon Phi coprocessors and multicore processors. Learn from dozens of new examples and case studies illustrating "success stories" demonstrating not just the features of Xeon-powered systems, but also how to leverage parallelism across these heterogeneous systems.
This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, "Hybrid Encryption Algorithms over Wireless Communication Channels", examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik's cube is used afterwards in order to maximize the number of permutations. Transmission of images and videos is vital in today's communications systems. Hence, an effective encryption and modulation schemes are a must. The author adopts Orthogonal Frequency Division Multiplexing (OFDM), as the multicarrier transmission choice for wideband communications. For completeness, the author addresses the sensitivity of the encrypted data to the wireless channel impairments, and the effect of channel equalization on the received images and videos quality. Complete simulation experiments with MATLAB (R) codes are included. The book will help the reader obtain the required understanding for selecting the suitable encryption method that best fulfills the application requirements.
Discusses the design goals and key features switch/router manufacturers consider when designing their products Explains the design and architectural considerations, as well as the typical processes and steps used to build practical switch/routers Describes the components of a switch/router that are used in configuring, managing, and monitoring it Discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design Describes typical networking applications of switch/routers, particularly, in enterprise and Internet service provider (ISP) networks
Parallel algorithms Made Easy The complexity of today's applications coupled with the widespread use of parallel computing has made the design and analysis of parallel algorithms topics of growing interest. This volume fills a need in the field for an introductory treatment of parallel algorithms—appropriate even at the undergraduate level, where no other textbooks on the subject exist. It features a systematic approach to the latest design techniques, providing analysis and implementation details for each parallel algorithm described in the book. Introduction to Parallel Algorithms covers foundations of parallel computing; parallel algorithms for trees and graphs; parallel algorithms for sorting, searching, and merging; and numerical algorithms. This remarkable book:
This book enables universities to offer parallel algorithm courses at the senior undergraduate level in computer science and engineering. It is also an invaluable text/reference for graduate students, scientists, and engineers in computer science, mathematics, and engineering.
Unique selling point: * Systematically introduces the basic knowledge and state-of-the-art on UDHNs Core audience: * Researchers, engineers and postgraduates working on UDHNs Place in the market: * Includes the latest case studies and applications
By the end of this book, the reader will understand: the difficulties of finding a needle in a haystack; creative solutions to address the problem; unique ways of engineering features and solving the problem of the lack of data (e.g. synthetic data). Additionally, the reader will be able to: avoid mistakes resulting from a lack of understanding; search for appropriate methods of feature engineering; locate the relevant technological solutions within the general context of decision-making.
High Speed Digital Design discusses the major factors to consider in designing a high speed digital system and how design concepts affect the functionality of the system as a whole. It will help you understand why signals act so differently on a high speed digital system, identify the various problems that may occur in the design, and research solutions to minimize their impact and address their root causes. The authors offer a strong foundation that will help you get high speed digital system designs right the first time. Taking a systems design approach, High Speed Digital Design offers a progression from fundamental to advanced concepts, starting with transmission line theory, covering core concepts as well as recent developments. It then covers the challenges of signal and power integrity, offers guidelines for channel modeling, and optimizing link circuits. Tying together concepts presented throughout the book, the authors present Intel processors and chipsets as real-world design examples.
This book focusses on the Internet of Things (IoT) and Data Mining for Modern Engineering and Healthcare Applications and the recent technological advancements in Microwave Engineering, Communication and applicability of newly developed Solid State Technologies in Bio-medical Engineering and Health-Care. The Reader will be able to know the recent advancements in Microwave Engineering including novel techniques in Microwave Antenna Design and various aspects of Microwave Propagation. This book aims to showcase, the various aspects of Communication, Networking, Data Mining, Computational Biology, Bioinformatics, Bio-Statistics and Machine Learning. In this book, recent trends in Solid State Technologies, VLSI and applicability of modern Electronic Devices in Bio-informatics and Health-Care is focused. Furthermore, this book showcases the modern optimization techniques in Power System Engineering, Machine Design and Power Systems. This Book highlights the Internet of Things (IoT) and Data Mining for Modern Engineering and Healthcare Applications and the recent technological advancements in Microwave Engineering, Communication and applicability of newly developed Solid State Technologies in Bio-medical Engineering and Health-Care for day-to-day applications. Societal benefits of Microwave Technologies for smooth and hustle-free life are also areas of major focus. Microwave Engineering includes recent advancements and novel techniques in Microwave Antenna Design and various aspects of Microwave Propagation. Day-to-Day applicability of modern communication and networking technologies are a matter of prime concern. This book aims to showcase, the various aspects of Communication, Networking, Data Mining, Computational Biology, Bioinformatics, Bio-Statistics and Machine Learning. Role of Solid Sate Engineering in development of modern electronic gadgets are discussed. In this book, recent trends in Solid State Technologies, VLSI and applicability of modern Electronic Devices in Bio-informatics and Biosensing Devices for Smart Health care are also discussed. Features: This book features Internet of Things (IoT) and Data Mining for Modern Engineering and Healthcare Applications and the recent technological advancements in Microwave Engineering, Communication and applicability of newly developed Solid State Technologies in Bio-medical Engineering and Smart Health-Care Technologies Showcases the novel techniques in Internet of Things (IoT) integrated Microwave Antenna Design and various aspects of Microwave Communication Highlights the role of Internet of Things (IoT) various aspects of Communication, Networking, Data Mining, Computational Biology, Bioinformatics, Bio-Statistics and Machine Learning Reviews the role of Internet of Things (IoT) in Solid State Technologies, VLSI and applicability of modern Electronic Devices in Bio-informatics and Health-Care In this book, role of Internet of Things (IoT) in Power System Engineering, Optics, RF and Microwave Energy Harvesting and Smart Biosensing Technologies are also highlighted
* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.
A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.
* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.
1) Provides a levelling approach, bringing students at all stages of programming experience to the same point 2) Focuses Python, a general language, to an engineering and scientific context 3) Uses a classroom tested, practical approach to teaching programming 4) Teaches students and professionals how to use Python to solve engineering calculations such as differential and algebraic equations
A comprehensive overview of the current evolution of research in algorithms, architectures and compilation for parallel systems is provided by this publication. The contributions focus specifically on domains where embedded systems are required, either oriented to application-specific or to programmable realisations. These are crucial in domains such as audio, telecom, instrumentation, speech, robotics, medical and automotive processing, image and video processing, TV, multimedia, radar and sonar. The book will be of particular interest to the academic community because of the detailed descriptions of research results presented. In addition, many contributions feature the "real-life" applications that are responsible for driving research and the impact of their specific characteristics on the methodologies is assessed. The publication will also be of considerable value to senior design engineers and CAD managers in the industrial arena, who wish either to anticipate the evolution of commercially available design tools or to utilize the presented concepts in their own R&D programmes.
Given their tremendous success in commercial applications, machine learning (ML) models are increasingly being considered as alternatives to science-based models in many disciplines. Yet, these "black-box" ML models have found limited success due to their inability to work well in the presence of limited training data and generalize to unseen scenarios. As a result, there is a growing interest in the scientific community on creating a new generation of methods that integrate scientific knowledge in ML frameworks. This emerging field, called scientific knowledge-guided ML (KGML), seeks a distinct departure from existing "data-only" or "scientific knowledge-only" methods to use knowledge and data at an equal footing. Indeed, KGML involves diverse scientific and ML communities, where researchers and practitioners from various backgrounds and application domains are continually adding richness to the problem formulations and research methods in this emerging field. Knowledge Guided Machine Learning: Accelerating Discovery using Scientific Knowledge and Data provides an introduction to this rapidly growing field by discussing some of the common themes of research in KGML using illustrative examples, case studies, and reviews from diverse application domains and research communities as book chapters by leading researchers. KEY FEATURES First-of-its-kind book in an emerging area of research that is gaining widespread attention in the scientific and data science fields Accessible to a broad audience in data science and scientific and engineering fields Provides a coherent organizational structure to the problem formulations and research methods in the emerging field of KGML using illustrative examples from diverse application domains Contains chapters by leading researchers, which illustrate the cutting-edge research trends, opportunities, and challenges in KGML research from multiple perspectives Enables cross-pollination of KGML problem formulations and research methods across disciplines Highlights critical gaps that require further investigation by the broader community of researchers and practitioners to realize the full potential of KGML
In this era of 5G digital communication, the implementation of industry 4.0 is the need of the hour. The main aim of this industrial revolution is to completely automate the industry for better productivity, correct decision making and increased efficiency. All the concepts of industry 4.0 can only be implemented with the help of Cyber Physical System aka CPS. This is a smart system in which complete mechanism is monitored and controlled by computer-based algorithms. Confidentiality, Integrity and Availability are the three major concern for providing the add on security to any organization or a system. It has become a biggest challenge among the security professionals to secure these cyber physical systems. Hackers and bad guys are planning various kinds of attacks on daily basis on these systems. This book addresses the various security and privacy issues involved in the cyber physical system. There is need to explore the interdisciplinary analysis to ensure the resilience of these systems including different types of cyber threats to these systems. The book highlights the importance of security in preventing, detecting, characterizing and mitigating different types of cyber threats on CPS. The book offers a simple to understand various organized chapters related to the CPS and their security for graduate students, faculty, research scholars and industry professionals. The book offers comprehensive coverage of the most essential topics, including: Cyber Physical Systems and Industrial Internet of Things (IIoT) Role of Internet of Things and their security issues in Cyber Physical Systems. Role of Big data analytic to develop real time solution for CPS. DDoS attacks and their solutions in CPS. Emulator Mininet for simulating CPS. Spark-based DDoS Classification System for Cyber-Physical Systems
This book will serve as a guide in understanding workflow scheduling techniques on computing systems such as Cluster, Supercomputers, Grid computing, Cloud computing, Edge computing, Fog computing, and the practical realization of such methods. It offers a whole new perspective and holistic approach in understanding computing systems' workflow scheduling. Expressing and exposing approaches for various process-centric cloud-based applications give a full coverage of most systems' energy consumption, reliability, resource utilization, cost, and application stochastic computation. By combining theory with application and connecting mathematical concepts and models with their resource management targets, this book will be equally accessible to readers with both Computer Science and Engineering backgrounds. It will be of great interest to students and professionals alike in the field of computing system design, management, and application. This book will also be beneficial to the general audience and technology enthusiasts who want to expand their knowledge on computer structure.
Most emerging applications in imaging and machine learning must perform immense amounts of computation while holding to strict limits on energy and power. To meet these goals, architects are building increasingly specialized compute engines tailored for these specific tasks. The resulting computer systems are heterogeneous, containing multiple processing cores with wildly different execution models. Unfortunately, the cost of producing this specialized hardware-and the software to control it-is astronomical. Moreover, the task of porting algorithms to these heterogeneous machines typically requires that the algorithm be partitioned across the machine and rewritten for each specific architecture, which is time consuming and prone to error. Over the last several years, the authors have approached this problem using domain-specific languages (DSLs): high-level programming languages customized for specific domains, such as database manipulation, machine learning, or image processing. By giving up generality, these languages are able to provide high-level abstractions to the developer while producing high-performance output. The purpose of this book is to spur the adoption and the creation of domain-specific languages, especially for the task of creating hardware designs. In the first chapter, a short historical journey explains the forces driving computer architecture today. Chapter 2 describes the various methods for producing designs for accelerators, outlining the push for more abstraction and the tools that enable designers to work at a higher conceptual level. From there, Chapter 3 provides a brief introduction to image processing algorithms and hardware design patterns for implementing them. Chapters 4 and 5 describe and compare Darkroom and Halide, two domain-specific languages created for image processing that produce high-performance designs for both FPGAs and CPUs from the same source code, enabling rapid design cycles and quick porting of algorithms. The final section describes how the DSL approach also simplifies the problem of interfacing between application code and the accelerator by generating the driver stack in addition to the accelerator configuration. This book should serve as a useful introduction to domain-specialized computing for computer architecture students and as a primer on domain-specific languages and image processing hardware for those with more experience in the field.
This book provides a comprehensive overview of blockchain for 6G-enabled network-based applications. Following the key services of blockchain technology, this book will be instrumental to ideate and understand the necessities, challenges, and various case studies of different 6G-based applications. The emphasis is on understanding the contributions of blockchain technology in 6G-enabled applications, and its aim is to give insights into evolution, research directions, challenges, and the ways to empower 6G applications through blockchain. The book consistently emphasizes the missing connection between blockchain and 6G-enabled network applications. The entire ecosystem between these two futuristic technologies is explained in a comprehensive manner. The book constitutes a one-stop guide to students, researchers, and industry professionals. The book progresses from a general introduction toward more technical aspects while remaining easy to understand throughout. Comprehensive elaboration of material is supplemented with examples and diagrams, followed by easily understandable approaches with regard to technical information given thereon. Blockchain and its applications in 6G-enabled applications can drive many powerful solutions to real-world technical, scientific, and social problems. This book presents the most recent and exciting advances in blockchain for 6G-enabled network applications. Overall, this book is a complete outlet and is designed exclusively for professionals, scientists, technologists, developers, designers, and researchers in network technologies around blockchain integration with IoT, blockchain technology, information technology, and 6G-enabled industrial applications. Secondary readers include professionals involved in policy making and administration, security of public data and law, network policy developers, blockchain technology experts, regulators, and decision makers in government administrations.
The Internet of Things (IoT) is an interconnection of several devices, networks, technologies, and human resources to achieve a common goal. A variety of IoT-based applications are being used in different sectors and have succeeded in providing huge benefits to the users. As a revolution, IoT overtook the entire global landscape with its presence in almost every sector, including smart cities, smart grid, intelligent transportation, healthcare, education, and so on. This technological revolution also moved to the machines, converting them into intelligent computers that can make real-time decisions and communicate with each other, forming an Internet of Systems/Machines. The use of secure light-weight protocols will help us in developing environment-friendly and energy-efficient IoT systems. IoT is an emerging and recent area of research, adopted for many applications, and there is a need to investigate further challenges in all aspects of it. This book will provide information on fundamentals, architectures, communication protocols, use of AI, existing applications, and emerging research trends in IoT. It follows a theoretical approach to describe the fundamentals for beginners as well as a practical approach with the implementation of case studies for intermediate and advanced readers. The book will be beneficial for academicians, researchers, developers, and engineers who work in or are interested in fields related to IoT. This book serves as a reference for graduate and postgraduate courses in computer science, computer engineering, and information technology streams.
This book provides a unified overview of network-on-chip router micro-architecture, the corresponding design opportunities and challenges, and existing solutions to overcome these challenges. The discussion focuses on the heart of a NoC, the NoC router, and how it interacts with the rest of the system. Coverage includes both basic and advanced design techniques that cover the entire router design space including router organization, flow control, pipelined operation, buffering architectures, as well as allocators' structure and algorithms. Router micro-architectural options are presented in a step-by-step manner beginning from the basic design principles. Even highly sophisticated design alternatives are categorized and broken down to simpler pieces that can be understood easily and analyzed. This book is an invaluable reference for system, architecture, circuit, and EDA researchers and developers, who are interested in understanding the overall picture of NoC routers' architecture, the associated design challenges, and the available solutions.
An understanding of modern computer logic-incorporating core knowledge of number systems, number conversions, Boolean algebra, memories, and logic circuits-is fundamental to further study of computer architectures, system software, and computer networks. Computer Logic: Design Principles and Applications introduces and describes the relevant concepts, principles and applications of modern computer logic design. The book is self-contained, with an introductory chapter that concisely covers the history of computing devices, as well as number systems, number conversions, signed and unsigned integers, external code, and digital and digitizing concepts. Dedicated chapters on Boolean algebra, transistor circuits, combinatorial logic circuits, and sequential logic circuits round off the work. The emphasis is on design and applications. Topics and features: * Explains Boolean Algebra and logic design essentials in clear fashion * Includes modern topics, such as Unicode, Exclusive Or Theorems, unipolar transistors, copper technology, flash memory, Hardware Descriptive Language, and logic simulation software tools * Thorough coverage of combinatorial logic and provides numerous design examples, such as gates, decoders and encoders, comparators, carry-save and carry-propagated adders, multiplication trees, and programmable logic arrays * Provides chapter-by-chapter summary points, supplementary examples, and exercises * Sequential logic presented, with numerous design examples, such as flip-flops, counters, shift registers, sequencers, and excitation tables With its well-focused approach and clarity of presentation, this new text/reference is an excellent resource for advanced students and practitioners in computer science, computer engineering, and electrical engineering. Anyone seeking to develop a solid grounding in computer logic, circuit design, and logic design will find the book an essential and practical learning tool.
Introduces edge computing, hardware for edge computing AI, edge virtualization techniques Explores edge intelligence and deep learning applications, training and optimization Explains machine learning algorithms for edge Reviews AI on IoT Discusses future edge computing needs
Network infrastructures are growing rapidly to meet the needs of business, but the required repolicing and reconfiguration provide challenges that need to be addressed. The software-defined network (SDN) is the future generation of Internet technology that can help meet these challenges of network management. This book includes quantitative research, case studies, conceptual papers, model papers, review papers, and theoretical backing on SDN. This book investigates areas where SDN can help other emerging technologies deliver more efficient services, such as IoT, industrial IoT, NFV, big data, blockchain, cloud computing, and edge computing. The book demonstrates the many benefits of SDNs, such as reduced costs, ease of deployment and management, better scalability, availability, flexibility and fine-grained control of traffic, and security. The book demonstrates the many benefits of SDN, such as reduced costs, ease of deployment and management, better scalability, availability, flexibility and fine-grained control of traffic, and security. Chapters in the volume address: Design considerations for security issues and detection methods State-of-the-art approaches for mitigating DDos attacks using SDN Big data using Apache Hadoop for processing and analyzing large amounts of data Different tools used for attack simulation Network policies and policy management approaches that are widely used in the context of SDN Dynamic flow tables, or static flow table management A new four-tiered architecture that includes cloud, SDN-controller, and fog computing Architecture for keeping computing resources available near the industrial IoT network through edge computing The impact of SDN as an innovative approach for smart city development More. The book will be a valuable resource for SDN researchers as well as academicians, research scholars, and students in the related areas. |
You may like...
Fundamentals of Spatial Information…
Robert Laurini, Derek Thompson
Hardcover
R1,451
Discovery Miles 14 510
Conversations With A Gentle Soul
Ahmed Kathrada, Sahm Venter
Paperback
(3)
The Legend Of Zola Mahobe - And The…
Don Lepati, Nikolaos Kirkinis
Paperback
(1)R382 Discovery Miles 3 820
|