![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design
The use of data science and urban analytics has become a defining feature of smart cities. This timely book is a clear guide to the use of social media data for urban analytics. The book presents the foundations of urban analytics with social media data, along with real-world applications and insights on the platforms we use today. It looks at social media analytics platforms, cyberphysical data analytics platforms, crowd detection platforms, City-as-a-Platform, and city-as-a-sensor for platform urbanism. The book provides examples to illustrate how we apply and analyse social media data to determine disaster severity, assist authorities with pandemic policy, and capture public perception of smart cities. This will be a useful reference for those involved with and researching social, data, and urban analytics and informatics.
An understanding of modern computer logic-incorporating core knowledge of number systems, number conversions, Boolean algebra, memories, and logic circuits-is fundamental to further study of computer architectures, system software, and computer networks. Computer Logic: Design Principles and Applications introduces and describes the relevant concepts, principles and applications of modern computer logic design. The book is self-contained, with an introductory chapter that concisely covers the history of computing devices, as well as number systems, number conversions, signed and unsigned integers, external code, and digital and digitizing concepts. Dedicated chapters on Boolean algebra, transistor circuits, combinatorial logic circuits, and sequential logic circuits round off the work. The emphasis is on design and applications. Topics and features: * Explains Boolean Algebra and logic design essentials in clear fashion * Includes modern topics, such as Unicode, Exclusive Or Theorems, unipolar transistors, copper technology, flash memory, Hardware Descriptive Language, and logic simulation software tools * Thorough coverage of combinatorial logic and provides numerous design examples, such as gates, decoders and encoders, comparators, carry-save and carry-propagated adders, multiplication trees, and programmable logic arrays * Provides chapter-by-chapter summary points, supplementary examples, and exercises * Sequential logic presented, with numerous design examples, such as flip-flops, counters, shift registers, sequencers, and excitation tables With its well-focused approach and clarity of presentation, this new text/reference is an excellent resource for advanced students and practitioners in computer science, computer engineering, and electrical engineering. Anyone seeking to develop a solid grounding in computer logic, circuit design, and logic design will find the book an essential and practical learning tool.
Expert advice from several industrial professionals who have worked for some of the world's biggest tech and interactive companies. Best practices that not only prepare writers on how to apply their craft to new fields, but also prepare them for the common ambiguity they will find in corporate and start-up environments. Breakdown of platforms that shows how tech capabilities can fulfill content expectations and how content can fulfill tech expectations. Basic storytelling mechanics customized to today's popular technologies and traditional gaming platforms.
With the evolution of technology and sudden growth in the number of smart vehicles, traditional Vehicular Ad hoc NETworks (VANETs) face several technical challenges in deployment and management due to less flexibility, scalability, poor connectivity, and inadequate intelligence. VANETs have raised increasing attention from both academic research and industrial aspects resulting from their important role in driving assistant system. Vehicular Ad Hoc Networks focuses on recent advanced technologies and applications that address network protocol design, low latency networking, context-aware interaction, energy efficiency, resource management, security, human-robot interaction, assistive technology and robots, application development, and integration of multiple systems that support Vehicular Networks and smart interactions. Simulation is a key tool for the design and evaluation of Intelligent Transport Systems (ITS) that take advantage of communication-capable vehicles in order to provide valuable safety, traffic management, and infotainment services. It is widely recognized that simulation results are only significant when realistic models are considered within the simulation tool chain. However, quite often research works on the subject are based on simplistic models unable to capture the unique characteristics of vehicular communication networks. The support that different simulation tools offer for such models is discussed, as well as the steps that must be undertaken to fine-tune the model parameters in order to gather realistic results. Moreover, the book provides handy hints and references to help determine the most appropriate tools and models. This book will promote best simulation practices in order to obtain accurate results.
Expert advice from several industrial professionals who have worked for some of the world's biggest tech and interactive companies. Best practices that not only prepare writers on how to apply their craft to new fields, but also prepare them for the common ambiguity they will find in corporate and start-up environments. Breakdown of platforms that shows how tech capabilities can fulfill content expectations and how content can fulfill tech expectations. Basic storytelling mechanics customized to today's popular technologies and traditional gaming platforms.
With the rapid development of cloud computing and digital transformation, well-designed cloud-based architecture is always in urgent need. Illustrated by project cases from the Chinese technology company Alibaba, this book elaborates how to design a cloud-based application system and build them on the cloud. Cloud computing is far from being just a resource provider; it offers database, storage and container services that can help to leverage key advantages for business growth. Based on this notion, authors from the Alibaba Cloud Global Technology Services introduce new concepts and cutting-edge technology in the field, including cloud-native, high-availability and disaster tolerance design on cloud, business middle office, data middle office, and enterprise digital transformation. Resting upon Alibaba's years of practice and achievements in the field of cloud technology, the volume also elucidates the methodology and practice solutions of digital construction, including methodology, product tools, technical processes, architecture design, cloud application capacity assessment and optimization, etc. The book will appeal to researchers, students, and especially IT practitioners, professionals, and managers interested in cloud computing, digital transformation, cloud migration, business middle office, data middle office, as well as the Alibaba Cloud itself.
Heterogeneous Computing Architectures: Challenges and Vision provides an updated vision of the state-of-the-art of heterogeneous computing systems, covering all the aspects related to their design: from the architecture and programming models to hardware/software integration and orchestration to real-time and security requirements. The transitions from multicore processors, GPU computing, and Cloud computing are not separate trends, but aspects of a single trend-mainstream; computers from desktop to smartphones are being permanently transformed into heterogeneous supercomputer clusters. The reader will get an organic perspective of modern heterogeneous systems and their future evolution.
High Performance Parallelism Pearls shows how to leverage parallelism on processors and coprocessors with the same programming - illustrating the most effective ways to better tap the computational potential of systems with Intel Xeon Phi coprocessors and Intel Xeon processors or other multicore processors. The book includes examples of successful programming efforts, drawn from across industries and domains such as chemistry, engineering, and environmental science. Each chapter in this edited work includes detailed explanations of the programming techniques used, while showing high performance results on both Intel Xeon Phi coprocessors and multicore processors. Learn from dozens of new examples and case studies illustrating "success stories" demonstrating not just the features of these powerful systems, but also how to leverage parallelism across these heterogeneous systems.
The main goal of Internet of Things (IoT) is to make secure, reliable, and fully automated smart environments. However, there are many technological challenges in deploying IoT. This includes connectivity and networking, timeliness, power and energy consumption dependability, security and privacy, compatibility and longevity, and network/protocol standards. Internet of Things and Secure Smart Environments: Successes and Pitfalls provides a comprehensive overview of recent research and open problems in the area of IoT research. Features: Presents cutting edge topics and research in IoT Includes contributions from leading worldwide researchers Focuses on IoT architectures for smart environments Explores security, privacy, and trust Covers data handling and management (accumulation, abstraction, storage, processing, encryption, fast retrieval, security, and privacy) in IoT for smart environments This book covers state-of-the-art problems, presents solutions, and opens research directions for researchers and scholars in both industry and academia.
"Collaboration with Cloud Computing "discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous
examples and case studies, author Ric Messier discusses: The
evolving nature of information securityThe risks, rewards, and
security considerations when implementing SaaS, cloud computing and
VoIP Social media and security risks in the enterprise The risks
and rewards of allowing remote connectivity and accessibility to
the enterprise network
Asynchronous On-Chip Networks and Fault-Tolerant Techniques is the first comprehensive study of fault-tolerance and fault-caused deadlock effects in asynchronous on-chip networks, aiming to overcome these drawbacks and ensure greater reliability of applications. As a promising alternative to the widely used synchronous on-chip networks for multicore processors, asynchronous on-chip networks can be vulnerable to faults even if they can deliver the same performance with much lower energy and area compared with their synchronous counterparts - faults can not only corrupt data transmission but also cause a unique type of deadlock. By adopting a new redundant code along with a dynamic fault detection and recovery scheme, the authors demonstrate that asynchronous on-chip networks can be efficiently hardened to tolerate both transient and permanent faults and overcome fault-caused deadlocks. This book will serve as an essential guide for researchers and students studying interconnection networks, fault-tolerant computing, asynchronous system design, circuit design and on-chip networking, as well as for professionals interested in designing fault-tolerant and high-throughput asynchronous circuits.
This book introduces a generic and systematic design-time/run-time methodology for handling the dynamic nature of modern embedded systems, without adding large safety margins in the design. The techniques introduced can be utilized on top of most existing static mapping methodologies to deal effectively with dynamism and to increase drastically their efficiency. This methodology is based on the concept of system scenarios, which group system behaviors that are similar from a multi-dimensional cost perspective, such as resource requirements, delay, and energy consumption. Readers will be enabled to design systems capable to adapt to current inputs, improving system quality and/or reducing cost, possibly learning on-the-fly during execution. Provides an effective solution to deal with dynamic system design Includes a broad survey of the state-of-the-art approaches in this domain Enables readers to design for substantial cost improvements (e.g. energy reductions), by exploiting system scenarios Demonstrates how the methodology has been applied effectively on various, real design problems in the embedded system context
This book provides comprehensive coverage of the recent advances in
symbolic analysis techniques for design automation of nanometer
VLSI systems. The presentation is organized in parts of
fundamentals, basic implementation methods and applications for
VLSI design. Topics emphasized include statistical timing and
crosstalk analysis, statistical and parallel analysis, performance
bound analysis and behavioral modeling for analog integrated
circuits . Among the recent advances, the Binary Decision Diagram
(BDD) based approaches are studied in depth. The BDD-based
hierarchical symbolic analysis approaches, have essentially broken
the analog circuit size barrier.
Cyber-Physical Systems: A Comprehensive Guide explores the complete sys-tem perspective, underlying theories, modelling, and the applications of Cyber Physical Systems (CPS). It aims to cover all topics ranging from discussion of ru-diments of the system, efficient management, to recent research challenges and issues. Editors aim to present the book in a self-sufficient manner and to achieve this, the book has been edited to include all the aspects of CPS. The book fo-cuses on the concept map of CPS including latest technological interventions; issues, challenges, and the integration of CPS with IoT & Big Data Analytics. This aims to bring together unique contributions on cyber-physical systems research and education with applications in industrial, agriculture, and medical domains. The main aim of the book is to provide a roadmap to the latest advancements to provide optimal solutions in the field of CPS. Features * Coverage of rudiments of the subject * Discussion of recent advancements in the associated field * Considers an audience of diverse domains * Suitable for students (both UG and PG level) and researchers in the field of CPS This book aims to present the emergence of Cyber Physical Systems in response to revolutionary advancements in IoT. While discussing the associated challenges, it also endeavors to devise efficient models which are competent to address these challenges. This book aims to cater to researchers and academicians working in the related field of CPS.
This book examines research topics in IoT and Cloud and Fog computing. The contributors address major issues and challenges in IoT-based solutions proposed for the Cloud. The authors discuss Cloud smart and energy efficient services in applications such as healthcare, traffic, and farming systems. Targeted readers are from varying disciplines who are interested in designing and deploying the Cloud applications. The book can be helpful to Cloud-based IoT service providers, Cloud-based IoT service consumers, and Cloud service developers in general for getting the state-of-the-art knowledge in the emerging IoT area. The book also provides a strong foundation for researchers to advance further in this domain. Presents a variety of research related to IoT and Cloud computing; Provides the industry with new and innovative operational ideas; Pertinent to academics, researchers, and practitioners around the world.
An introductory text to computer architecture, this comprehensive volume covers the concepts from logic gates to advanced computer architecture. It comes with a full spectrum of exercises and web-downloadable support materials, including assembler and simulator, which can be used in the context of different courses. The authors also make available a hardware description, which can be used in labs and assignments, for hands-on experimentation with an actual, simple processor.This unique compendium is a useful reference for undergraduates, graduates and professionals majoring in computer engineering, circuits and systems, software engineering, biomedical engineering and aerospace engineering.Related Link(s)
The Art of Timing Closure is written using a hands-on approach to describe advanced concepts and techniques using Multi-Mode Multi-Corner (MMMC) for an advanced ASIC design implementation. It focuses on the physical design, Static Timing Analysis (STA), formal and physical verification. The scripts in this book are based on Cadence (R) Encounter System (TM). However, if the reader uses a different EDA tool, that tool's commands are similar to those shown in this book. The topics covered are as follows: Data Structures Multi-Mode Multi-Corner Analysis Design Constraints Floorplan and Timing Placement and Timing Clock Tree Synthesis Final Route and Timing Design Signoff Rather than go into great technical depth, the author emphasizes short, clear descriptions which are implemented by references to authoritative manuscripts. It is the goal of this book to capture the essence of physical design and timing analysis at each stage of the physical design, and to show the reader that physical design and timing analysis engineering should be viewed as a single area of expertise. This book is intended for anyone who is involved in ASIC design implementation -- starting from physical design to final design signoff. Target audiences for this book are practicing ASIC design implementation engineers and students undertaking advanced courses in ASIC design.
This title includes a number of Open Access chapters. Model-driven engineering (MDE) is the automatic production of software from simplified models of structure and functionality. It mainly involves the automation of the routine and technologically complex programming tasks, thus allowing developers to focus on the true value-adding functionality that the system needs to deliver. This book serves an overview of some of the core topics in MDE. The volume is broken into two sections offering a selection of papers that helps the reader not only understand the MDE principles and techniques, but also learn from practical examples. Also covered are the following topics: * MDE for software product lines * Formal methods for model transformation correctness * Metamodeling with Eclipse eCore * Metamodeling with UML profiles * Test cases generation This easily accessible reference volume offers a comprehensive guide to this rapidly expanding field. Edited by experienced writers with experience in both research and the practice of software engineering, Model-Driven Engineering of Information Systems: Principles, Techniques and Practice is an authoritative and easy-to-use reference, ideal for both researchers in the field and students who wish to gain an overview to this important field of study.
Every day, millions of people are unaware of the amazing processes that take place when using their phones, connecting to broadband internet, watching television, or even the most basic action of flipping on a light switch. Advances are being continually made in not only the transmission of this data but also in the new methods of receiving it. These advancements come from many different sources and from engineers who have engaged in research, design, development, and implementation of electronic equipment used in communications systems. This volume addresses a selection of important current advancements in the electronics and communications engineering fields, focusing on signal processing, chip design, and networking technology. The sections in the book cover: Microwave and antennas Communications systems Very large-scale integration Embedded systems Intelligent control and signal processing systems
In the 5G era, edge computing and new ecosystems of mobile microservices enable new business models, strategies, and competitive advantage. Focusing on microservices, this book introduces the essential concepts, technologies, and trade-offs in the edge computing architectural stack, providing for widespread adoption and dissemination. The book elucidates the concepts, architectures, well-defined building blocks, and prototypes for mobile microservice platforms and pervasive application development, as well as the implementation and configuration of service middleware and AI-based microservices. A goal-oriented service composition model is then proposed by the author, allowing for an economic assessment of connected, smart mobile services. Based on this model, costs can be minimized through statistical workload aggregation effects or backhaul data transport reduction, and customer experience and safety can be enhanced through reduced response times. This title will be a useful guide for students and IT professionals to get started with microservices and when studying the use of microservices in pervasive applications. It will also appeal to researchers and students studying software architecture and service-oriented computing, and especially those interested in edge computing, pervasive computing, the Internet of Things, and mobile microservices.
The Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises' advances and business intelligence. These enterprises need to deal with gazillions of bytes of data, and in today's age of General Data Protection Regulation, enterprises are required to ensure privacy and security of large-scale data collections. However, the increased connectivity and devices used to facilitate IoE are continually creating more room for cybercriminals to find vulnerabilities in enterprise systems and flaws in their corporate governance. Ensuring cybersecurity and corporate governance for enterprises should not be an afterthought or present a huge challenge. In recent times, the complex diversity of cyber-attacks has been skyrocketing, and zero-day attacks, such as ransomware, botnet, and telecommunication attacks, are happening more frequently than before. New hacking strategies would easily bypass existing enterprise security and governance platforms using advanced, persistent threats. For example, in 2020, the Toll Group firm was exploited by a new crypto-attack family for violating its data privacy, where an advanced ransomware technique was launched to exploit the corporation and request a huge figure of monetary ransom. Even after applying rational governance hygiene, cybersecurity configuration and software updates are often overlooked when they are most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of enterprises has become wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of this network. In this context, this book addresses the cybersecurity and cooperate governance challenges associated with enterprises, which will provide a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area. This book serves as a single source of reference for acquiring the knowledge on the technology, process, and people involved in next-generation privacy and security.
The book emphasizes the predictive models of Big Data, Genetic Algorithm, and IoT with a case study. The book illustrates the predictive models with integrated fuel consumption models for smart and safe traveling. The text is a coordinated amalgamation of research contributions and industrial applications in the field of Intelligent Transportation Systems. The advanced predictive models and research results were achieved with the case studies, deployed in real transportation environments. Features: Provides a smart traffic congestion avoidance system with an integrated fuel consumption model. Predicts traffic in short-term and regular. This is illustrated with a case study. Efficient Traffic light controller and deviation system in accordance with the traffic scenario. IoT based Intelligent Transport Systems in a Global perspective. Intelligent Traffic Light Control System and Ambulance Control System. Provides a predictive framework that can handle the traffic on abnormal days, such as weekends, festival holidays. Bunch of solutions and ideas for smart traffic development in smart cities. This book focuses on advanced predictive models along with offering an efficient solution for smart traffic management system. This book will give a brief idea of the available algorithms/techniques of big data, IoT, and genetic algorithm and guides in developing a solution for smart city applications. This book will be a complete framework for ITS domain with the advanced concepts of Big Data Analytics, Genetic Algorithm and IoT. This book is primarily aimed at IT professionals. Undergraduates, graduates and researchers in the area of computer science and information technology will also find this book useful.
Covering both the fundamentals and the in-depth topics related to Verilog digital design, both students and experts can benefit from reading this book by gaining a comprehensive understanding of how modern electronic products are designed and implemented. Principles of Verilog Digital Design contains many hands-on examples accompanied by RTL codes that together can bring a beginner into the digital design realm without needing too much background in the subject area. This book has a particular focus on how to transform design concepts into physical implementations using architecture and timing diagrams. Common mistakes a beginner or even an experienced engineer can make are summarized and addressed as well. Beyond the legal details of Verilog codes, the book additionally presents what uses Verilog codes have through some pertinent design principles. Moreover, students reading this book will gain knowledge about system-level design concepts. Several ASIC designs are illustrated in detail as well. In addition to design principles and skills, modern design methodology and how it is carried out in practice today are explored in depth as well.
Wireless Sensor Networks and the Internet of Things: Future Directions and Applications explores a wide range of important and real-time issues and applications in this ever-advancing field. Different types of WSN and IoT technologies are discussed in order to provide a strong framework of reference, and the volume places an emphasis on solutions to the challenges of protection, conservation, evaluation, and implementation of WSN and IoT that lead to low-cost products, energy savings, low carbon usage, higher quality, and global competitiveness. The volume is divided into four sections that cover: Wireless sensor networks and their relevant applications Smart monitoring and control systems with the Internet of Things Attacks, threats, vulnerabilities, and defensive measures for smart systems Research challenges and opportunities This collection of chapters on an important and diverse range of issues presents case studies and applications of cutting-edge technologies of WSN and IoT that will be valuable for academic communities in computer science, information technology, and electronics, including cyber security, monitoring, and data collection. The informative material presented here can be applied to many sectors, including agriculture, energy and power, resource management, biomedical and health care, business management, and others.
Introducing strong foundations to practical Cyber-Physical Systems Leveraging CPS for pandemic affected society Ensuring Secured and Privacy aware CPS for Sensitive Data in a pandemic situation Providing methodologies to deploy CPS in industries affect by a pandemic |
You may like...
Rethinking Cultural Criticism - New…
Nete Norgaard Kristensen, Unni From, …
Hardcover
R2,886
Discovery Miles 28 860
Democracy Works - Re-Wiring Politics To…
Greg Mills, Olusegun Obasanjo, …
Paperback
A Manifesto For Social Change - How To…
Moeletsi Mbeki, Nobantu Mbeki
Paperback
(4)
|