![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design
In practice, many different people with backgrounds in many different disciplines contribute to the design of an enterprise. Anyone who makes decisions to change the current enterprise to achieve some preferred structure is considered a designer. What is problematic is how to use the knowledge of separate aspects of the enterprise to achieve a globally optimized enterprise. The synthesis of knowledge from many disciplines to design an enterprise defines the field of enterprise engineering. Because enterprise systems are exceedingly complex, encompassing many independent domains of study, students must first be taught how to think about enterprise systems. Specifically written for advanced and intermediate courses and modules, Design of Enterprise Systems: Theory, Architecture, and Methods takes a system-theoretical perspective of the enterprise. It describes a systematic approach, called the enterprise design method, to design the enterprise. The design method demonstrates the principles, models, methods, and tools needed to design enterprise systems. The author uses the enterprise system design methodology to organize the chapters to mimic the completion of an actual project. Thus, the book details the enterprise engineering process from initial conceptualization of an enterprise to its final design. Pedagogical tools available include: For instructors: PowerPoint (R) slides for each chapter Project case studies that can be assigned as long-term projects to accompany the text Quiz questions for each chapter Business Process Analyzer software available for download For students: Templates, checklists, forms, and models to support enterprise engineering activities The book fills a need for greater design content in engineering curricula by describing how to design enterprise systems. Inclusion of design is also critical for business students, since they must realize the import their decisions may have on the long-term design of the enterprises they work with. The book's practical focus and project-based approach coupled with the pedagogical tools gives students the knowledge and skills they need to lead enterprise engineering projects.
This book provides applications of machine learning in healthcare systems and seeks to close the gap between engineering and medicine. It will combine the design and problem-solving skills of engineering with health sciences, in order to advance healthcare treatment. The book will include areas such as diagnosis, monitoring, and therapy. The book will provide real-world case studies, gives a detailed exploration of applications in healthcare systems, offers multiple perspectives on a variety of disciplines, while also letting the reader know how to avoid some of the consequences of old methods with data sharing. The book can be used as a reference for practitioners, researchers and for students at basic and intermediary levels in Computer Science, Electronics and Communications.
The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration. The book, DDoS Attacks - Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show the implications associated with them. Features: Covers topics that describe taxonomies of the DDoS attacks in detail, recent trends and classification of defensive mechanisms on the basis of deployment location, the types of defensive action, and the solutions offering economic incentives. Introduces chapters discussing the various types of DDoS attack associated with different layers of security, an attacker's motivations, and the importance of incentives and liabilities in any defensive solution. Illustrates the role of fair resource-allocation schemes, separate payment mechanisms for attackers and legitimate users, negotiation models on cost and types of resources, and risk assessments and transfer mechanisms. DDoS Attacks - Classification, Attacks, Challenges, and Countermeasures is designed for the readers who have an interest in the cybersecurity domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals who are focusing on developing defensive schemes and applications for detecting or mitigating the DDoS attacks, and faculty members across different universities.
Modelling Transitions shows what computational, formal and data-driven approaches can and could mean for sustainability transitions research, presenting the state-of-the-art and exploring what lies beyond. Featuring contributions from many well-known authors, this book presents the various benefits of modelling for transitions research. More than just taking stock, it also critically examines what modelling of transformative change means and could mean for transitions research and for other disciplines that study societal changes. This includes identifying a variety of approaches currently not part of the portfolios of transitions modellers. Far from only singing praise, critical methodological and philosophical introspection are key aspects of this important book. This book speaks to modellers and non-modellers alike who value the development of robust knowledge on transitions to sustainability, including colleagues in congenial fields. Be they students, researchers or practitioners, everyone interested in transitions should find this book relevant as reference, resource and guide.
Wireless Sensor Networks and the Internet of Things: Future Directions and Applications explores a wide range of important and real-time issues and applications in this ever-advancing field. Different types of WSN and IoT technologies are discussed in order to provide a strong framework of reference, and the volume places an emphasis on solutions to the challenges of protection, conservation, evaluation, and implementation of WSN and IoT that lead to low-cost products, energy savings, low carbon usage, higher quality, and global competitiveness. The volume is divided into four sections that cover: Wireless sensor networks and their relevant applications Smart monitoring and control systems with the Internet of Things Attacks, threats, vulnerabilities, and defensive measures for smart systems Research challenges and opportunities This collection of chapters on an important and diverse range of issues presents case studies and applications of cutting-edge technologies of WSN and IoT that will be valuable for academic communities in computer science, information technology, and electronics, including cyber security, monitoring, and data collection. The informative material presented here can be applied to many sectors, including agriculture, energy and power, resource management, biomedical and health care, business management, and others.
The healthcare industry is on the cutting edge of voice-user interface (VUI) design and making great progress to improve patient care through developing technologies, literally transforming the voice of the industry. The advantages of VUI extend far beyond simple conveniences for patients or a healthcare employee's saved phone call. VUI has a profound impact on care improvement. Just like a person, a well-designed VUI can use tone of voice, inflection and other elements in conversation to shape behaviors or calm nerves. With VUI, physicians and patients become empowered to make informed decisions about healthcare. The use of voice technology across smart speakers, IoT, clinical and home devices, and wearables for improving the patient experience and clinical outcomes was recently identified as one of most significant emerging technologies in healthcare. Smart speakers are the #1 selling consumer item in the world and major competition is heating up between Amazon Alexa, Apple Siri, Microsoft Cortana, Google Voice Assistant, and a host of other specialty platforms specific to healthcare. From Orbita and Macadamia to voice-enabled robotics from Pillo, Intuitive, Vivify, and RealView Imaging, voice technology is pervasive across the gamut of levels of devices. Voice technology is not just pervasive in smart speakers and smart phones - it is finding its way into wearables, vehicles, homes, and even consumer and clinical medical devices. We even have smart jewelry emerging with health, wellness, and safety features built in. Best of all, this trend spans intergenerational health and wellness that goes beyond clinical care into long term health and wellbeing and the potential for increased patient engagement. In this book, the editors review information from the top thought-leaders in this space and examine real-world case studies of the outcomes and potential of voice technology in healthcare. Topics include a market survey, clinical use cases, home health use cases, health and wellness topics - fitness, nutrition, and wellbeing; next generation fitness facilities; voice and wearables in smart, connected communities; voice technology in social companions/robots; voice technology in the future surgical suites; a roadmap for the future from top technology; standards in voice technology; and the future of voice technology and artificial intelligence.
Originally published in 1995 Time and Logic examines understanding and application of temporal logic, presented in computational terms. The emphasis in the book is on presenting a broad range of approaches to computational applications. The techniques used will also be applicable in many cases to formalisms beyond temporal logic alone, and it is hoped that adaptation to many different logics of program will be facilitated. Throughout, the authors have kept implementation-orientated solutions in mind. The book begins with an introduction to the basic ideas of temporal logic. Successive chapters examine particular aspects of the temporal theoretical computing domain, relating their applications to familiar areas of research, such as stochastic process theory, automata theory, established proof systems, model checking, relational logic and classical predicate logic. This is an essential addition to the library of all theoretical computer scientists. It is an authoritative work which will meet the needs both of those familiar with the field and newcomers to it.
Most of the business sectors consider the Digital Twin concept as the next big thing in the industry. A current state analysis of their digital counterparts helps in the prediction of the future of physical assets. Organizations obtain better insights on their product performance through the implementation of Digital Twins, and the applications of the technology are frequently in sectors such as manufacturing, automobile, retail, health care, smart cities, industrial IoT, etc. This book explores the latest developments and covers the significant challenges, issues, and advances in Digital Twin Technology. It will be an essential resource for anybody involved in related industries, as well as anybody interested in learning more about this nascent technology. This book includes: The future, present, and past of Digital Twin Technology. Digital twin technologies across the Internet of Drones, which developed various perceptive and autonomous capabilities, towards different control strategies such as object detection, navigation, security, collision avoidance, and backup. These approaches help to deal with the expansive growth of big data solutions. The recent digital twin concept in agriculture, which offers the vertical framing by IoT installation development to enhance the problematic food supply situation. It also allows for significant energy savings practices. It is highly required to overcome those challenges in developing advanced imaging methods of disease detection & prediction to achieve more accuracy in large land areas of crops. The welfare of upcoming archetypes such as digitalization in forensic analysis. The ideas of digital twin have arisen to style the corporeal entity and associated facts reachable software and customers over digital platforms. Wind catchers as earth building: Digital Twins vs. green sustainable architecture.
This book provides comprehensive coverage of Network-on-Chip (NoC) security vulnerabilities and state-of-the-art countermeasures, with contributions from System-on-Chip (SoC) designers, academic researchers and hardware security experts. Readers will gain a clear understanding of the existing security solutions for on-chip communication architectures and how they can be utilized effectively to design secure and trustworthy systems.
This book discusses design techniques, layout details and measurements of several key analog building blocks that currently limit the performance of 5G and E-Band transceivers implemented in deep-scaled CMOS. The authors present recent developments in low-noise quadrature VCOs and tunable inductor-less frequency dividers. Moreover, the design of low-loss broadband transformer-based filters that realize inter-stage matching, power division/combining and impedance transformation is discussed in great detail. The design and measurements of a low-noise amplifier, a downconverter and a highly-linear power amplifier that leverage the proposed techniques are shown. All the prototypes were realized in advanced nanometer scaled CMOS technologies without RF thick to metal option.
"Heterogeneous Computing with OpenCL "teaches OpenCL and parallel programming for complex systems that may include a variety of device architectures: multi-core CPUs, GPUs, and fully-integrated Accelerated Processing Units (APUs) such as AMD Fusion technology. Designed to work on multiple platforms and with wide industry support, OpenCL will help you more effectively program for a heterogeneous future. Written by leaders in the parallel computing and OpenCL
communities, this book will give you hands-on OpenCL experience to
address a range of fundamental parallel algorithms. The authors
explore memory spaces, optimization techniques, graphics
interoperability, extensions, and debugging and profiling. Intended
to support a parallel programming course, "Heterogeneous Computing
with OpenCL" includes detailed examples throughout, plus additional
online exercises and other supporting materials.
A survey of microwave technology tailored for professionals in wireless communications RF Technologies for Low Power Wireless Communications updates recent developments in wireless communications from a hardware design standpoint and offers specialized coverage of microwave technology with a focus on the low power wireless units required in modern wireless systems. It explores results of recent research that focused on a holistic, integrated approach to the topics of materials, devices, circuits, modulation, and architectures rather than the more traditional approach of research into isolated topical areas. Twelve chapters deal with various fundamental research aspects of low power wireless electronics written by world-class experts in each field. The first chapter offers an overview of wireless architecture and performance, followed by detailed coverage of:
With a clear focus and expert contributors, RF Technologies for Low Power Wireless Communications will be of interest to a wide range of electrical engineering disciplines working in wireless technologies.
Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud computing services have proven to be of significant importance, and promote quickly deployable and scalable IT solutions with reduced infrastructure costs. However, utilization of cloud also raises concerns such as security, privacy, latency, and governance, that keep it from turning into the predominant option for critical frameworks. As such, there is an urgent need to identify these concerns and to address them. Cloud Security: Concepts, Applications and Perspectives is a comprehensive work with substantial technical details for introducing the state-of-the-art research and development on various approaches for security and privacy of cloud services; novel attacks on cloud services; cloud forensics; novel defenses for cloud service attacks; and cloud security analysis. It discusses the present techniques and methodologies, and provides a wide range of examples and illustrations to effectively show the concepts, applications, and perspectives of security in cloud computing. This highly informative book will prepare readers to exercise better protection by understanding the motivation of attackers and to deal with them to mitigate the situation. In addition, it covers future research directions in the domain. This book is suitable for professionals in the field, researchers, students who are want to carry out research in the field of computer and cloud security, faculty members across universities, and software developers engaged in software development in the field.
Applied Soft Computing and Embedded System Applications in Solar Energy deals with energy systems and soft computing methods from a wide range of approaches and application perspectives. The authors examine how embedded system applications can deal with the smart monitoring and controlling of stand-alone and grid-connected solar photovoltaic (PV) systems for increased efficiency. Growth in the area of artificial intelligence with embedded system applications has led to a new era in computing, impacting almost all fields of science and engineering. Soft computing methods implemented to energy-related problems regularly face data-driven issues such as problems of optimization, classification, clustering, or prediction. The authors offer real-time implementation of soft computing and embedded system in the area of solar energy to address the issues with microgrid and smart grid projects (both renewable and non-renewable generations), energy management, and power regulation. They also discuss and examine alternative solutions for energy capacity assessment, energy efficiency systems design, as well as other specific smart grid energy system applications. The book is intended for students, professionals, and researchers in electrical and computer engineering fields, working on renewable energy resources, microgrids, and smart grid projects. Examines the integration of hardware with stand-alone PV panels and real-time monitoring of factors affecting the efficiency of the PV panels Offers real-time implementation of soft computing and embedded system in the area of solar energy Discusses how soft computing plays a huge role in the prediction of efficiency of stand-alone and grid-connected solar PV systems Discusses how embedded system applications with smart monitoring can control and enhance the efficiency of stand-alone and grid-connected solar PV systems Explores swarm intelligence techniques for solar PV parameter estimation Dr. Rupendra Kumar Pachauri is Assistant Professor - Selection Grade in the Department of Electrical and Electronics Engineering, University of Petroleum and Energy Studies (UPES), Dehradun, India. Dr. Jitendra Kumar Pandey is Professor & Head of R&D in the University of Petroleum and Energy Studies (UPES), Dehradun, India. Mr. Abhishek Sharma is working as a research scientist in the research and development department (UPES, India). Dr. Om Prakash Nautiyal is working as a scientist in Uttarakhand Science Education & Research Centre (USERC), Department of Information and Science Technology, Govt. of Uttarakhand, Dehradun, India. Prof. Mangey Ram is working as a Research Professor at Graphic Era Deemed to be University, Dehradun, India.
This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.
This book summarizes the key scientific outcomes of the Horizon 2020 research project TULIPP: Towards Ubiquitous Low-power Image Processing Platforms. The main focus lies on the development of high-performance, energy-efficient embedded systems for the growing range of increasingly complex image processing applications. The holistic TULIPP approach is described in the book, which addresses hardware platforms, programming tools and embedded operating systems. Several of the results are available as open-source hardware/software for the community. The results are evaluated with several use cases taken from real-world applications in key domains such as Unmanned Aerial Vehicles (UAVs), robotics, space and medicine. Discusses the development of high-performance, energy-efficient embedded systems for the growing range of increasingly complex image processing applications; Covers the hardware architecture of embedded image processing systems, novel methods, tools and libraries for programming those systems as well as embedded operating systems to manage those systems; Demonstrates results with several challenging applications, such as medical systems, robotics, drones and automotive.
As we continue to build faster and fast. er computers, their performance is be coming increasingly dependent on the memory hierarchy. Both the clock speed of the machine and its throughput per clock depend heavily on the memory hierarchy. The time to complet. e a cache acce88 is oft. en the factor that det. er mines the cycle time. The effectiveness of the hierarchy in keeping the average cost of a reference down has a major impact on how close the sustained per formance is to the peak performance. Small changes in the performance of the memory hierarchy cause large changes in overall system performance. The strong growth of ruse machines, whose performance is more tightly coupled to the memory hierarchy, has created increasing demand for high performance memory systems. This trend is likely to accelerate: the improvements in main memory performance will be small compared to the improvements in processor performance. This difference will lead to an increasing gap between prOCe880r cycle time and main memory acce. time. This gap must be closed by improving the memory hierarchy. Computer architects have attacked this gap by designing machines with cache sizes an order of magnitude larger than those appearing five years ago. Microproce880r-based RISe systems now have caches that rival the size of those in mainframes and supercomputers."
This book introduces readers to the latest advances in sensing technology for a broad range of non-volatile memories (NVMs). Challenges across the memory technologies are highlighted and their solutions in mature technology are discussed, enabling innovation of sensing technologies for future NVMs. Coverage includes sensing techniques ranging from well-established NVMs such as hard disk, flash, Magnetic RAM (MRAM) to emerging NVMs such as ReRAM, STTRAM, FeRAM and Domain Wall Memory will be covered.
This book focuses primarily on both technical and business aspects needed to select, design, develop and deploy control application (or product) successfully for multiple components in building systems. Designing and deploying a control application require multiple steps such as sensing, system dynamics modelling, algorithms, and testing. This may involve choosing an appropriate methodology and technique at multiple stages during the development process. Understanding the pros and cons of such techniques, most importantly being aware of practically possible approaches in the entire ecosystem, is critical in choosing the best framework and system application for different parts of building systems. Providing a wide overview of the state-of art in controls and building systems, providing guidance on developing an end-to-end system in relation to business fundamentals (distribution channels, stakeholders, marketing, supply-chain and financial management), the book is ideal for fourth-year control/mechanical/electrical engineering undergraduates, graduate students, and practitioners including business leaders concerned with smart building technology.
New computational design tools have evolved rapidly and been increasingly applied in the field of design in recent years, complimenting and even replacing the traditional design media and approaches. Design as both the process and product are changing due to the emergence and adoption of these new technologies. Understanding and assessing the impact of these new computational design environments on design and designers is important for advancing design in the contemporary context. Do these new computational environments support or hinder design creativity? How do those tools facilitate designers' thinking? Such knowledge is also important for the future development of design technologies. Research shows that design is never a mysterious non-understandable process, for example, one general view is that design process shares a common analysis-synthesis-evaluation model, during which designers interact between design problem and solution spaces. Understanding designers' thinking in different environments is the key to design research, education and practice. This book focuses on emerging computational design environments, whose impact on design and designers have not been comprehensively and systematically studied. It comprises three parts. The history and recent developments of computational design technologies are introduced in Part I. The main categories of technologies cover from computer-aided drafting and modelling tools, to visual programming and scripting tools for algorithmic design, to advanced interfaces and platforms for interactions between designers, between designers and computers, and between the virtual environment and the physical reality. To critically explore design thinking, especially in these new computational design environments, formal approaches to studying design thinking and design cognition are introduced and compared in Part II, drawing on literature and studies from the 70s to the current era. Part III concludes the book by exploring the impact of different computational design technologies on design and designers, using a series of case studies conducted by the author team building on their close collaboration over the past five years. The book offers new insights into designers' thinking in the rapidly evolving computational design environments, which have not been critically and systematically studied and reported in the current literature. The book is meant for design researchers, educators and students, professional practitioners and consultants, as well as people who are interested in computational design in general.
Fueled by ubiquitous computing ambitions, the edge is at the center of confluence of many emergent technological trends such as hardware-rooted trust and code integrity, 5G, data privacy and sovereignty, blockchains and distributed ledgers, ubiquitous sensors and drones, autonomous systems and real-time stream processing. Hardware and software pattern maturity have reached a tipping point so that scenarios like smart homes, smart factories, smart buildings, smart cities, smart grids, smart cars, smart highways are in reach of becoming a reality. While there is a great desire to bring born-in-the-cloud patterns and technologies such as zero-downtime software and hardware updates/upgrades to the edge, developers and operators alike face a unique set of challenges due to environmental differences such as resource constraints, network availability and heterogeneity of the environment. The first part of the book discusses various edge computing patterns which the authors have observed, and the reasons why these observations have led them to believe that there is a need for a new architectural paradigm for the new problem domain. Edge computing is examined from the app designer and architect's perspectives. When they design for edge computing, they need a new design language that can help them to express how capabilities are discovered, delivered and consumed, and how to leverage these capabilities regardless of location and network connectivity. Capability-Oriented Architecture is designed to provide a framework for all of these. This book is for everyone who is interested in understanding what ubiquitous and edge computing means, why it is growing in importance and its opportunities to you as a technologist or decision maker. The book covers the broad spectrum of edge environments, their challenges and how you can address them as a developer or an operator. The book concludes with an introduction to a new architectural paradigm called capability-based architecture, which takes into consideration the capabilities provided by an edge environment. .
Provides a structured look, at the unique characteristic for smart sensor networks to resolving the issues of many real-world applications in a broad range of areas such as Smart Healthcare, Engineering, Scientific Research, Social Media, Industrial Automation and more Offers a systematic look at the unique characteristics of AI based wireless sensor networks through their usage in a broad range of areas Delivers recent trends and core concepts in both analytics and application in smart sensor networks using AI Explores the development and application of AI and evolutionary computing as applied to wireless sensor networks Focuses on stepwise discussion, exhaustive literature review, detailed analysis and discussion, rigorous experimentation result and an application-oriented approach.
- Explores how mixed, virtual and augmented reality technologies can enable designers to create immersive experiences and expand the aesthetic potential of the medium - Curated selection of projects and essays by leading international architects and designers, including those from Zaha Hadid Architects and MVRDV- Illustrated with over 150 images
This book serves as a practical guide for practicing engineers who need to design embedded systems for high-speed data acquisition and control systems. A minimum amount of theory is presented, along with a review of analog and digital electronics, followed by detailed explanations of essential topics in hardware design and software development. The discussion of hardware focuses on microcontroller design (ARM microcontrollers and FPGAs), techniques of embedded design, high speed data acquisition (DAQ) and control systems. Coverage of software development includes main programming techniques, culminating in the study of real-time operating systems. All concepts are introduced in a manner to be highly-accessible to practicing engineers and lead to the practical implementation of an embedded board that can be used in various industrial fields as a control system and high speed data acquisition system. |
You may like...
Children Who Murder - A Psychological…
Robert V. Heckel, David M. Shumaker
Hardcover
R2,555
Discovery Miles 25 550
AutoCAD Electrical 2023 Black Book…
Gaurav Verma, Matt Weber
Hardcover
R1,464
Discovery Miles 14 640
Restorative Justice for Juveniles…
Allison Morris, Gabrielle Maxwell
Hardcover
R3,188
Discovery Miles 31 880
Transforming Research Methods In The…
Sumaya Laher, Angelo Fynn, …
Paperback
R899
Discovery Miles 8 990
E-Government Website Development…
Ed Downey, Carl D. Ekstrom, …
Hardcover
R4,618
Discovery Miles 46 180
Adolescent Reputations and Risk…
Annemaree Carroll, Stephen Houghton, …
Hardcover
R2,655
Discovery Miles 26 550
|