Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design
Covering both the fundamentals and the in-depth topics related to Verilog digital design, both students and experts can benefit from reading this book by gaining a comprehensive understanding of how modern electronic products are designed and implemented. Principles of Verilog Digital Design contains many hands-on examples accompanied by RTL codes that together can bring a beginner into the digital design realm without needing too much background in the subject area. This book has a particular focus on how to transform design concepts into physical implementations using architecture and timing diagrams. Common mistakes a beginner or even an experienced engineer can make are summarized and addressed as well. Beyond the legal details of Verilog codes, the book additionally presents what uses Verilog codes have through some pertinent design principles. Moreover, students reading this book will gain knowledge about system-level design concepts. Several ASIC designs are illustrated in detail as well. In addition to design principles and skills, modern design methodology and how it is carried out in practice today are explored in depth as well.
Introducing strong foundations to practical Cyber-Physical Systems Leveraging CPS for pandemic affected society Ensuring Secured and Privacy aware CPS for Sensitive Data in a pandemic situation Providing methodologies to deploy CPS in industries affect by a pandemic
A one-of-a-kind survey of the field of Reconfigurable Computing Gives a comprehensive introduction to a discipline that offers a 10X-100X acceleration of algorithms over microprocessors Discusses the impact of reconfigurable hardware on a wide range of applications: signal and image processing, network security, bioinformatics, and supercomputing Includes the history of the field as well as recent advances Includes an extensive bibliography of primary sources
This textbook teaches students techniques for the design of advanced digital systems using System-on-Chip (SoC) Field Programmable Gate Arrays (FPGAs). The author demonstrates design of custom hardware components for the FPGA fabric using VHDL, with implementation of custom hardware-software interfaces. Readers gain hands-on experience by writing programs and Linux device drivers in C to interact with custom hardware. This textbook enables laboratory experience in the design of custom digital systems using SoC FPGAs, emphasizing computational tasks such as digital signal processing, audio, or video processing.
"The more we know about smart and intelligent systems and their use, the more productive organizations can become, and the more quality of life will improve."-Gavriel Salvendy, President Academy of Science, Engineering and Medicine of Florida, University Distinguished Professor University of Central Florida" "Robots, drones, self-driving cars, and personal assistants are only some of the 'intelligent' and 'smart' systems which are populating our world and changing the way we use technology to carry out our everyday activities, bringing about both exciting opportunities for human-technology symbiosis, as well as compelling design and development challenges. Through a carefully selected choice of chapters, authored by top scientists in the field, this book, edited by Abbas Moallem, sheds light on fundamental aspects of intelligent and smart systems, investigating the role and impact of affective and psychophysiological computing, machine learning, cybersecurity, agent transparency, and human-agent teaming in the shaping of this new interaction paradigm, as well as the human factors involved in their application in critical domains such as health, education, and manufacturing in the emerging technological landscape."-Constantine Stephanidis, Professor of Computer Science, University of Crete, Distinguished member of Foundation for Research and Technology - Hellas (FORTH) In today's digital world, the words "smart" and intelligent" are now used to label devices, machinery, systems, and even environments. What is a "smart" system? Is "smart" synonymous with "intelligent"? If not, what does an "intelligent system" mean? Are all smart systems intelligent? This book tries to answer these questions by summarizing the existing research in various areas and providing new research findings. Smart and Intelligent Systems: The Human Elements in Artificial Intelligence, Robotics, and Cybersecurity presents new areas of smart and intelligent system design. It defines smart and intelligent systems, offers a human factors approach, discusses networking applications, and combines the human element with smart and intelligent systems. This book is perfect for engineering students in data sciences and artificial intelligence and practitioners at all levels in the fields of human factors and ergonomics, systems engineering, computer science, software engineering, and robotics.
1. An up-to-date reference on Red Hat 8 with comparisons to Red Hat's 7 and 6 when warranted. 2. A combination of how to use and administer Linux and operating systems concepts (making this text unique to Linux textbooks) written in an easy-to-read manner. 3. Improved chapters on computer networks, regular expressions and scripting. Revised and additional examples to support the concepts in these chapters. 4. Comparisons between Red Hat Linux and other Linux distributions when such comparisons will be useful. 5. A set of ancillary material including a complete lab manual, text bank, power point notes, glossary of terms, instructor's manual and supplemental readings. The supplemental readings will allow for a smaller book while still retaining all of the important content. 6. Improved chapter reviews, added end-of-section activities, additional tables, improved figures (where possible) and "did you know" boxes inserted to provide useful facts.
The agile transformation is an act of transforming an organization's form or nature gradually to one that can embrace and thrive in a flexible, collaborative, self-organizing, and fast-changing environment. It seems like most of the companies starting an agile transformation never reach the goal of agility, but there are those few that truly become agile and reap incredible benefits by utilizing DevOps as well. This book introduces the theory and practice of the "double-flywheels model" of Continuous Delivery 2.0: Discovery Loop, which allows information technology (IT) organizations to help businesses figure out the most efficacious ways to develop. Additionally, it explores applications of the Verification Loop that allows IT organizations to deliver value quickly and safely with high quality. Along the way, the book provides an array of insights and case studies that dive into all the aspects of software delivery, and how to implement Continuous Delivery in the most economical way for long-run business development. Features Organization culture and software architecture Business requirement management Pipeline and tooling Branching and releasing strategy Automation strategy Configuration and artefacts management Deployment and production healthy The case studies at the end of the book-scenarios in which the author was personally involved-are explored in depth and meticulously detailed in order to represent typical agile transition scenarios that will benefit all readers.
This book offers a comprehensive overview of basic communication and networking technologies. It focuses on emerging technologies, such as Software-Defined Network (SDN)-based ad hoc networks, 5G, Machine Learning, and Deep Learning solutions for communication and networking, Cloud Computing, etc. It also includes discussions on practical and innovative applications, including Network Security, Smart Cities, e-health, and Intelligent Systems. Future Trends in 5G and 6G: Challenges, Architecture, and Applications addresses several key issues in SDN energy-efficient systems, the Internet of Things, Big Data, Cloud Computing and Virtualization, Machine Learning, Deep Learning, Cryptography, and 6G wireless technology and its future. It provides students, researchers, and practicing engineers with an expert guide to the fundamental concepts, challenges, architecture, applications, and state-of-the-art developments in communication and networking.
This book presents the state-of-the-art and breakthrough innovations in design automation for cyber-physical systems.The authors discuss various aspects of cyber-physical systems design, including modeling, co-design, optimization, tools, formal methods, validation, verification, and case studies. Coverage includes a survey of the various existing cyber-physical systems functional design methodologies and related tools will provide the reader unique insights into the conceptual design of cyber-physical systems.
Modelling Transitions shows what computational, formal and data-driven approaches can and could mean for sustainability transitions research, presenting the state-of-the-art and exploring what lies beyond. Featuring contributions from many well-known authors, this book presents the various benefits of modelling for transitions research. More than just taking stock, it also critically examines what modelling of transformative change means and could mean for transitions research and for other disciplines that study societal changes. This includes identifying a variety of approaches currently not part of the portfolios of transitions modellers. Far from only singing praise, critical methodological and philosophical introspection are key aspects of this important book. This book speaks to modellers and non-modellers alike who value the development of robust knowledge on transitions to sustainability, including colleagues in congenial fields. Be they students, researchers or practitioners, everyone interested in transitions should find this book relevant as reference, resource and guide.
Cyberspace is changing the face of crime. For criminals it has become a place for rich collaboration and learning, not just within one country; and a place where new kinds of crimes can be carried out, and a vehicle for committing conventional crimes with unprecedented range, scale, and speed. Law enforcement faces a challenge in keeping up and dealing with this new environment. The news is not all bad - collecting and analyzing data about criminals and their activities can provide new levels of insight into what they are doing and how they are doing it. However, using data analytics requires a change of process and new skills that (so far) many law enforcement organizations have had difficulty leveraging. Cyberspace, Data Analytics, and Policing surveys the changes that cyberspace has brought to criminality and to policing with enough technical content to expose the issues and suggest ways in which law enforcement organizations can adapt. Key Features: Provides a non-technical but robust overview of how cyberspace enables new kinds of crime and changes existing crimes. Describes how criminals exploit the ability to communicate globally to learn, form groups, and acquire cybertools. Describes how law enforcement can use the ability to collect data and apply analytics to better protect society and to discover and prosecute criminals. Provides examples from open-source data of how hot spot and intelligence-led policing can benefit law enforcement. Describes how law enforcement can exploit the ability to communicate globally to collaborate in dealing with trans-national crime.
Thanks to rapid technological developments in terms of Computational Intelligence, smart tools have been playing active roles in daily life. It is clear that the 21st century has brought about many advantages in using high-level computation and communication solutions to deal with real-world problems; however, more technologies bring more changes to society. In this sense, the concept of smart cities has been a widely discussed topic in terms of society and Artificial Intelligence-oriented research efforts. The rise of smart cities is a transformation of both community and technology use habits, and there are many different research orientations to shape a better future. The objective of this book is to focus on Explainable Artificial Intelligence (XAI) in smart city development. As recently designed, advanced smart systems require intense use of complex computational solutions (i.e., Deep Learning, Big Data, IoT architectures), the mechanisms of these systems become 'black-box' to users. As this means that there is no clear clue about what is going on within these systems, anxieties regarding ensuring trustworthy tools also rise. In recent years, attempts have been made to solve this issue with the additional use of XAI methods to improve transparency levels. This book provides a timely, global reference source about cutting-edge research efforts to ensure the XAI factor in smart city-oriented developments. The book includes both positive and negative outcomes, as well as future insights and the societal and technical aspects of XAI-based smart city research efforts. This book contains nineteen contributions beginning with a presentation of the background of XAI techniques and sustainable smart-city applications. It then continues with chapters discussing XAI for Smart Healthcare, Smart Education, Smart Transportation, Smart Environment, Smart Urbanization and Governance, and Cyber Security for Smart Cities.
As technology continues to advance and the interconnection of various devices makes our lives easier, it also puts us at further risk of privacy and security threats. Phones can connect to household devices to help set alarms, turn on or off the lights, and even preheat ovens. The Internet of Things (IoT) is this symbiotic interplay of smart devices that collect data and make intelligent decisions. However, the lack of an intrinsic security measure within IoT makes it especially vulnerable to privacy and security threats. Blockchain and IoT Integration highlights how Blockchain, an encrypted, distributed computer filing system, can be used to help protect IoT against such privacy and security breaches. The merger of IoT and blockchain technology is a step towards creating a verifiable, secure, and permanent method of recording data processed by "smart" machines. The text explores the platforms and applications of blockchain-enabled IoT as well as helps clarify how to strengthen the IoT security found in healthcare systems as well as private homes. Other highlights of the book include: Overview of the blockchain architecture Blockchain to secure IoT data Blockchain to secure drug supply chain and combat counterfeits Blockchain IoT concepts for smart grids, smart cities, and smart homes A biometric-based blockchain enabled payment system IoT for smart healthcare monitoring systems
Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.
Reviews IoT software architecture and middleware, data processing and management, security, privacy and reliability, architectures, protocols, technologies, algorithms, and smart objects, sensors, and actuators Explores IoT as it applies to energy, including energy efficiency and management, intelligent energy management, smart energy through blockchain and energy-efficient/aware routing/scheduling challenges and issues Examines IoT as it applies to healthcare including biomedical image and signal analysis, and disease prediction and diagnosis Examines IoT as it applies to smart industry including architecture, blockchain, and Industry 4.0 Discusses different ways to create a better IoT network or IoT platform
Parallel Language and Compiler Research in Japan offers the international community an opportunity to learn in-depth about key Japanese research efforts in the particular software domains of parallel programming and parallelizing compilers. These are important topics that strongly bear on the effectiveness and affordability of high performance computing systems. The chapters of this book convey a comprehensive and current depiction of leading edge research efforts in Japan that focus on parallel software design, development, and optimization that could be obtained only through direct and personal interaction with the researchers themselves.
Provides a structured look, at the unique characteristic for smart sensor networks to resolving the issues of many real-world applications in a broad range of areas such as Smart Healthcare, Engineering, Scientific Research, Social Media, Industrial Automation and more Offers a systematic look at the unique characteristics of AI based wireless sensor networks through their usage in a broad range of areas Delivers recent trends and core concepts in both analytics and application in smart sensor networks using AI Explores the development and application of AI and evolutionary computing as applied to wireless sensor networks Focuses on stepwise discussion, exhaustive literature review, detailed analysis and discussion, rigorous experimentation result and an application-oriented approach.
This book introduces Open Core Protocol (OCP) not as a conventional hardware communications protocol but as a meta-protocol: a means for describing and capturing the communications requirements of an IP core, and mapping them to a specific set of signals with known semantics. Readers will learn the capabilities of OCP as a semiconductor hardware interface specification that allows different System-On-Chip (SoC) cores to communicate. The OCP methodology presented enables intellectual property designers to design core interfaces in standard ways. This facilitates reusing OCP-compliant cores across multiple SoC designs which, in turn, drastically reduces design times, support costs, and overall cost for electronics/SoCs."
Most of the business sectors consider the Digital Twin concept as the next big thing in the industry. A current state analysis of their digital counterparts helps in the prediction of the future of physical assets. Organizations obtain better insights on their product performance through the implementation of Digital Twins, and the applications of the technology are frequently in sectors such as manufacturing, automobile, retail, health care, smart cities, industrial IoT, etc. This book explores the latest developments and covers the significant challenges, issues, and advances in Digital Twin Technology. It will be an essential resource for anybody involved in related industries, as well as anybody interested in learning more about this nascent technology. This book includes: The future, present, and past of Digital Twin Technology. Digital twin technologies across the Internet of Drones, which developed various perceptive and autonomous capabilities, towards different control strategies such as object detection, navigation, security, collision avoidance, and backup. These approaches help to deal with the expansive growth of big data solutions. The recent digital twin concept in agriculture, which offers the vertical framing by IoT installation development to enhance the problematic food supply situation. It also allows for significant energy savings practices. It is highly required to overcome those challenges in developing advanced imaging methods of disease detection & prediction to achieve more accuracy in large land areas of crops. The welfare of upcoming archetypes such as digitalization in forensic analysis. The ideas of digital twin have arisen to style the corporeal entity and associated facts reachable software and customers over digital platforms. Wind catchers as earth building: Digital Twins vs. green sustainable architecture.
Originally published in 1995 Time and Logic examines understanding and application of temporal logic, presented in computational terms. The emphasis in the book is on presenting a broad range of approaches to computational applications. The techniques used will also be applicable in many cases to formalisms beyond temporal logic alone, and it is hoped that adaptation to many different logics of program will be facilitated. Throughout, the authors have kept implementation-orientated solutions in mind. The book begins with an introduction to the basic ideas of temporal logic. Successive chapters examine particular aspects of the temporal theoretical computing domain, relating their applications to familiar areas of research, such as stochastic process theory, automata theory, established proof systems, model checking, relational logic and classical predicate logic. This is an essential addition to the library of all theoretical computer scientists. It is an authoritative work which will meet the needs both of those familiar with the field and newcomers to it.
The healthcare industry is on the cutting edge of voice-user interface (VUI) design and making great progress to improve patient care through developing technologies, literally transforming the voice of the industry. The advantages of VUI extend far beyond simple conveniences for patients or a healthcare employee's saved phone call. VUI has a profound impact on care improvement. Just like a person, a well-designed VUI can use tone of voice, inflection and other elements in conversation to shape behaviors or calm nerves. With VUI, physicians and patients become empowered to make informed decisions about healthcare. The use of voice technology across smart speakers, IoT, clinical and home devices, and wearables for improving the patient experience and clinical outcomes was recently identified as one of most significant emerging technologies in healthcare. Smart speakers are the #1 selling consumer item in the world and major competition is heating up between Amazon Alexa, Apple Siri, Microsoft Cortana, Google Voice Assistant, and a host of other specialty platforms specific to healthcare. From Orbita and Macadamia to voice-enabled robotics from Pillo, Intuitive, Vivify, and RealView Imaging, voice technology is pervasive across the gamut of levels of devices. Voice technology is not just pervasive in smart speakers and smart phones - it is finding its way into wearables, vehicles, homes, and even consumer and clinical medical devices. We even have smart jewelry emerging with health, wellness, and safety features built in. Best of all, this trend spans intergenerational health and wellness that goes beyond clinical care into long term health and wellbeing and the potential for increased patient engagement. In this book, the editors review information from the top thought-leaders in this space and examine real-world case studies of the outcomes and potential of voice technology in healthcare. Topics include a market survey, clinical use cases, home health use cases, health and wellness topics - fitness, nutrition, and wellbeing; next generation fitness facilities; voice and wearables in smart, connected communities; voice technology in social companions/robots; voice technology in the future surgical suites; a roadmap for the future from top technology; standards in voice technology; and the future of voice technology and artificial intelligence.
Wireless Sensor Networks and the Internet of Things: Future Directions and Applications explores a wide range of important and real-time issues and applications in this ever-advancing field. Different types of WSN and IoT technologies are discussed in order to provide a strong framework of reference, and the volume places an emphasis on solutions to the challenges of protection, conservation, evaluation, and implementation of WSN and IoT that lead to low-cost products, energy savings, low carbon usage, higher quality, and global competitiveness. The volume is divided into four sections that cover: Wireless sensor networks and their relevant applications Smart monitoring and control systems with the Internet of Things Attacks, threats, vulnerabilities, and defensive measures for smart systems Research challenges and opportunities This collection of chapters on an important and diverse range of issues presents case studies and applications of cutting-edge technologies of WSN and IoT that will be valuable for academic communities in computer science, information technology, and electronics, including cyber security, monitoring, and data collection. The informative material presented here can be applied to many sectors, including agriculture, energy and power, resource management, biomedical and health care, business management, and others.
Modern systems are an intertwined mesh of human process, physical security, and technology. Attackers are aware of this, commonly leveraging a weakness in one form of security to gain control over an otherwise protected operation. To expose these weaknesses, we need a single unified model that can be used to describe all aspects of the system on equal terms. Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems - from padlocks, to phishing, to enterprise software architecture. We discuss how weakness in one part of a system creates vulnerability in another, all the while applying standards and frameworks used in the cybersecurity world. Our goal: to analyze the security of the entire system - including people, processes, and technology - using a single model. We begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity. Lastly, we discuss how to operate a secure system based on the NIST Cybersecurity Framework (CSF) concepts of "identify, protect, detect, respond, and recover." Other topics covered in this book include the NIST National Vulnerability Database (NVD), MITRE Common Vulnerability Scoring System (CVSS), Microsoft's Security Development Lifecycle (SDL), and the MITRE ATT&CK Framework.
Provides insight into the skill set that requires leveraging strength to move further to act as a good data analyst Discusses how big data along with deep learning holds the potential to significantly increase data understanding and in turn, helps to make decisions Covers the numerous potential applications in healthcare, education, communications, media, and the entertainment industry Offers innovative platforms for integrating big data and deep learning Presents issues related to adequate data storage, sematic indexing, data tagging, and fast information retrieval from big data |
You may like...
Constraint Decision-Making Systems in…
Santosh Kumar Das, Nilanjan Dey
Hardcover
R7,041
Discovery Miles 70 410
Grammatical and Syntactical Approaches…
Juhyun Lee, Michael J. Ostwald
Hardcover
R5,608
Discovery Miles 56 080
|