Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design
Electrical Engineering Modeling for Reliability Analysis Markov Modeling for Reliability, Maintainability, Safety, and Supportability Analyses of Complex Computer Systems IEEE Press Series on Engineering of Complex Computer Systems Phillip A. Laplante and Alexander D. Stoyen, Series Editors Markov modeling has long been accepted as a fundamental and powerful technique for the fault tolerance analysis of mission-critical applications. However, the elaborate computations required have often made Markov modeling too time-consuming to be of practical use on these complex systems. With this hands-on tool, designers can use the Markov modeling technique to analyze the safety, reliability, maintainability, and cost-effectiveness factors in the full range of complex systems in use today. Featuring groundbreaking simulation software and a comprehensive reference manual, Modeling for Reliability Analysis helps system designers surmount the mathematical computations that have previously prevented effective reliability analysis. The text and software compose a valuable self-study tool that is complete with detailed explanations, examples, and a library of Markov models that can be used for experiments and as derivations for new simulation models. The book details how these analyses are conducted, while providing hands-on instructions on how to develop reliability models for the full range of system configurations. Computer-Aided Rate Modeling and Simulation (CARMS) software is an integrated modeling tool that includes a diagram-based environment for model setup, a spreadsheet-like interface for data entry, an expert system link for automatic model construction, and an interactive graphic interfacefor displaying simulation results.
Kickstart your emotion analysis journey with this hands-on, step-by-step guide to data science success Key Features * Discover the ins and outs of the end-to-end emotional analysis workflow * Explore the use of various ML models to derive meaningful insights from all sorts of data * Hone your craft by building and tweaking complex emotion analysis models in practical projects Book Description The AI winter has long thawed, but many organizations are still failing to harness the power of machine learning (ML). If you want to tap that potential and add value to your own business with cutting-edge emotion analysis, you've found what you need in this trusty guide. In Machine Learning for Emotion Analysis, you'll take your foundational data science skills and grow them in the exciting realm of emotion analysis. With its practical approach, you'll be equipped with everything you need to give your company a clear insight into what your customers are thinking. This no-nonsense guide jumps right into the practicalities of emotion analysis, teaching you how to preprocess data, build a serviceable dataset, and ensure top-notch data quality. Once you're set up for success, we get hands-on with complex ML techniques. This is where you go from the intermediate to the advanced, covering deep neural networks, support vector machines, conditional probabilities, and more, as you experience the full breadth of possibilities with emotion analysis. The book finally rounds out with a couple of in-depth use cases - a sort of sandbox for you to experiment with your newly acquired skill set. By the end of this book, you'll be ready to present yourself as a valuable asset to any organization that takes data science seriously. What you will learn * Distinguish between sentiment analysis and emotion analysis * Master the art of data preprocessing and ensure high-quality input * Expand your use of data sources through data transformation * Build models that employ cutting-edge deep learning techniques * Discover how best to tune your models' hyperparameters * Explore the use of KNN, SVM, and DNNs for advanced use cases * Build APIs and integrate your models into existing solutions * Practice your new skills by working on real-world scenarios Who This Book Is For This book is for data scientists and Python developers who want to gain insights into what people are saying about their product, company, brand, governorship, and more. Basic knowledge of machine learning and Python programming knowledge is necessary to grasp the concepts covered.
High Performance Parallelism Pearls Volume 2 offers another set of examples that demonstrate how to leverage parallelism. Similar to Volume 1, the techniques included here explain how to use processors and coprocessors with the same programming - illustrating the most effective ways to combine Xeon Phi coprocessors with Xeon and other multicore processors. The book includes examples of successful programming efforts, drawn from across industries and domains such as biomed, genetics, finance, manufacturing, imaging, and more. Each chapter in this edited work includes detailed explanations of the programming techniques used, while showing high performance results on both Intel Xeon Phi coprocessors and multicore processors. Learn from dozens of new examples and case studies illustrating "success stories" demonstrating not just the features of Xeon-powered systems, but also how to leverage parallelism across these heterogeneous systems.
System-on-chip (SoC) technology is revolutionizing the way computers are designed and used, driving down their cost and making them more pervasive than ever before. However, it's extremely challenging for designers to get their SoC designs right the first time. ARM System Architecture, Second Edition gives system designers an authoritative, inside perspective on SoC design -- and on ARM, the world's #1, fastest-growing SoC platform for mobile phones and information appliances. The insights in this book will be crucial to every system designer and ARM licensee seeking to build more effective SoC designs -- and get them to market more quickly. KEY TOPICS: In contrast to most ARM documentation, this book explains not only what ARM is, but why -- and how you can leverage it most effectively. Expert system designer and ARM specialist Steve Furber introduces the key design challenges associated with SoC systems, including memory hierarchy, caches, memory management, on-chip debug, and production test. Next, he presents state-of-the-art ARM-based solutions for each key problem. Furber reviews the entire ARM processor family, helping designers choose the most appropriate solutions; and covers both the ARM and Thumb programming models, providing real-world guidance for developing applications more quickly and effectively. The book includes a helpful review of the fundamentals of computer architecture, as well as valuable coverage of related topics such as digital signal processing and asynchronous design. MARKET:
This book describes the Splash 2 computing system as designed and
built at the Supercomputing Research Center. This is a novel
attached processor using Xilinx 4010 FPGAs as its processing
elements and whose application programming language is VHDL. This
is the first publication that details the complete Splash 2 project
-- the hardware and software systems, the architecture and their
implementations, and the design process by which the architecture
evolved from an earlier version machine. This text allows you to
understand why the machine has been engineered in the way it has.
In addition to the description of the machine, several applications
are described in detail, permitting the reader to gain an
understanding of the capabilities and the limitations of this kind
of computing device.
"Modeling Enterprise Architecture with TOGAF" explains everything you need to know to effectively model enterprise architecture with The Open Group Architecture Framework (TOGAF), the leading EA standard. This solution-focused reference presents key techniques and illustrative examples to help you model enterprise architecture. This book describes the TOGAF standard and its structure, from the architecture transformation method to governance, and presents enterprise architecture modeling practices with plenty of examples of TOGAF deliverables in the context of a case study. Although widespread and growing quickly, enterprise architecture
is delicate to manage across all its dimensions. Focusing on the
architecture transformation method, TOGAF provides a wide
framework, which covers the repository, governance, and a set of
recognized best practices. The examples featured in this book were
realized using the open source Modelio tool, which includes
extensions for TOGAF.
"Collaboration with Cloud Computing "discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous
examples and case studies, author Ric Messier discusses: The
evolving nature of information securityThe risks, rewards, and
security considerations when implementing SaaS, cloud computing and
VoIP Social media and security risks in the enterprise The risks
and rewards of allowing remote connectivity and accessibility to
the enterprise network
"Network and System Security" provides focused coverage of
network and system security technologies. It explores practical
solutions to a wide range of network and systems security issues.
Chapters are authored by leading experts in the field and address
the immediate and long-term challenges in the authors respective
areas of expertise. Coverage includes building a secure
organization, cryptography, system intrusion, UNIX and Linux
security, Internet security, intranet security, LAN security;
wireless network security, cellular network security, RFID
security, and more.
This proven textbook guides readers to a thorough understanding of the theory and design of operational amplifiers (OpAmps). The core of the book presents systematically the design of operational amplifiers, classifying them into a periodic system of nine main overall configurations, ranging from one gain stage up to four or more stages. This division enables circuit designers to recognize quickly, understand, and choose optimal configurations. Characterization of operational amplifiers is given by macro models and error matrices, together with measurement techniques for their parameters. Definitions are given for four types of operational amplifiers depending on the grounding of their input and output ports. Many famous designs are evaluated in depth, using a carefully structured approach enhanced by numerous figures. In order to reinforce the concepts introduced and facilitate self-evaluation of design skills, the author includes problems with detailed solutions, as well as simulation exercises.
"Heterogeneous Computing with OpenCL "teaches OpenCL and parallel programming for complex systems that may include a variety of device architectures: multi-core CPUs, GPUs, and fully-integrated Accelerated Processing Units (APUs) such as AMD Fusion technology. Designed to work on multiple platforms and with wide industry support, OpenCL will help you more effectively program for a heterogeneous future. Written by leaders in the parallel computing and OpenCL
communities, this book will give you hands-on OpenCL experience to
address a range of fundamental parallel algorithms. The authors
explore memory spaces, optimization techniques, graphics
interoperability, extensions, and debugging and profiling. Intended
to support a parallel programming course, "Heterogeneous Computing
with OpenCL" includes detailed examples throughout, plus additional
online exercises and other supporting materials.
This book constitutes the proceedings of the 33rd International Conference on Architecture of Computing Systems, ARCS 2020, held in Aachen, Germany, in May 2020.* The 12 full papers in this volume were carefully reviewed and selected from 33 submissions. 6 workshop papers are also included. ARCS has always been a conference attracting leading-edge research outcomes in Computer Architecture and Operating Systems, including a wide spectrum of topics ranging from embedded and real-time systems all the way to large-scale and parallel systems. The selected papers focus on concepts and tools for incorporating self-adaptation and self-organization mechanisms in high-performance computing systems. This includes upcoming approaches for runtime modifications at various abstraction levels, ranging from hardware changes to goal changes and their impact on architectures, technologies, and languages. *The conference was canceled due to the COVID-19 pandemic.
In today's workplace, computer and cybersecurity professionals must understand both hardware and software to deploy effective security solutions. This book introduces readers to the fundamentals of computer architecture and organization for security, and provides them with both theoretical and practical solutions to design and implement secure computer systems. Offering an in-depth and innovative introduction to modern computer systems and patent-pending technologies in computer security, the text integrates design considerations with hands-on lessons learned to help practitioners design computer systems that are immune from attacks. Studying computer architecture and organization from a security perspective is a new area. There are many books on computer architectures and many others on computer security. However, books introducing computer architecture and organization with security as the main focus are still rare. This book addresses not only how to secure computer components (CPU, Memory, I/O, and network) but also how to secure data and the computer system as a whole. It also incorporates experiences from the author's recent award-winning teaching and research. The book also introduces the latest technologies, such as trusted computing, RISC-V, QEMU, cache security, virtualization, cloud computing, IoT, and quantum computing, as well as other advanced computing topics into the classroom in order to close the gap in workforce development. The book is chiefly intended for undergraduate and graduate students in computer architecture and computer organization, as well as engineers, researchers, cybersecurity professionals, and middleware designers.
For courses in engineering and technical management System architecture is the study of early decision making in complex systems. This text teaches how to capture experience and analysis about early system decisions, and how to choose architectures that meet stakeholder needs, integrate easily, and evolve flexibly. With case studies written by leading practitioners, from hybrid cars to communications networks to aircraft, this text showcases the science and art of system architecture.
Aimed at electronics industry professionals, this 4th edition of the Boundary Scan Handbook describes recent changes to the IEEE1149.1 Standard Test Access Port and Boundary-Scan Architecture. This updated edition features new chapters on the possible effects of the changes on the work of the practicing test engineers and the new 1149.8.1 standard. Anyone needing to understand the basics of boundary scan and its practical industrial implementation will need this book. Provides an overview of the recent changes to the 1149.1 standard and the effect of the changes on the work of test engineers; Explains the new IEEE 1149.8.1 subsidiary standard and applications; Describes the latest updates on the supplementary IEEE testing standards. In particular, addresses: IEEE Std 1149.1 Digital Boundary-ScanIEEE Std 1149.4 Analog Boundary-ScanIEEE Std 1149.6 Advanced I/O TestingIEEE Std 1149.8.1 Passive Component TestingIEEE Std 1149.1-2013 The 2013 Revision of 1149.1IEEE Std 1532 In-System ConfigurationIEEE Std 1149.6-2015 The 2015 Revision of 1149.6
A one-volume guide to the most essential techniques for designing and building dependable distributed systems Instead of covering a broad range of research works for each dependability strategy, this useful reference focuses on only a selected few (usually the most seminal works, the most practical approaches, or the first publication of each approach), explaining each in depth, usually with a comprehensive set of examples. Each technique is dissected thoroughly enough so that readers who are not familiar with dependable distributed computing can actually grasp the technique after studying the book. Building Dependable Distributed Systems consists of eight chapters. The first introduces the basic concepts and terminology of dependable distributed computing, and also provides an overview of the primary means of achieving dependability. Checkpointing and logging mechanisms, which are the most commonly used means of achieving limited degree of fault tolerance, are described in the second chapter. Works on recovery-oriented computing, focusing on the practical techniques that reduce the fault detection and recovery times for Internet-based applications, are covered in chapter three. Chapter four outlines the replication techniques for data and service fault tolerance. This chapter also pays particular attention to optimistic replication and the CAP theorem. Chapter five explains a few seminal works on group communication systems. Chapter six introduces the distributed consensus problem and covers a number of Paxos family algorithms in depth. The Byzantine generals problem and its latest solutions, including the seminal Practical Byzantine Fault Tolerance (PBFT) algorithm and a number of its derivatives, are introduced in chapter seven. The final chapter details the latest research results surrounding application-aware Byzantine fault tolerance, which represents an important step forward in the practical use of Byzantine fault tolerance techniques. Readership The primary market is networked and distributed computing system designers and developers, software architects, senior software engineers, and technical managers. The book will also prove very useful for upper-level undergraduate and graduate students in computer science and computer engineering interested in dependable computing research.
Programming Language Pragmatics, Fourth Edition, is the most comprehensive programming language textbook available today. It is distinguished and acclaimed for its integrated treatment of language design and implementation, with an emphasis on the fundamental tradeoffs that continue to drive software development. The book provides readers with a solid foundation in the syntax, semantics, and pragmatics of the full range of programming languages, from traditional languages like C to the latest in functional, scripting, and object-oriented programming. This fourth edition has been heavily revised throughout, with expanded coverage of type systems and functional programming, a unified treatment of polymorphism, highlights of the newest language standards, and examples featuring the ARM and x86 64-bit architectures.
Model Driven Architecture (MDA) is a new approach to software
development that helps companies manage large, complex software
projects and save development costs while allowing new technologies
that come along to be readily incorporated. Although it is based on
many long-standing industry precepts and best practices, such as
UML, it is enough of a departure from traditional IT approaches to
require some "proof of the pudding." Real-Life MDA is composed of
six case studies of real companies using MDA that will furnish that
proof. The authors' approach MDA projects by describing all aspects
of the project from the viewpoint of the end-usersfrom the reason
for choosing an MDA approach to the results and benefits. The case
studies are preceded by an introductory chapter and are followed by
a wrap-up chapter summarizing lessons learned.
This book focuses on the theoretical and practical aspects of parallel programming systems for today's high performance multi-core processors and discusses the efficient implementation of key algorithms needed to implement parallel programming models. Such implementations need to take into account the specific architectural aspects of the underlying computer architecture and the features offered by the execution environment. This book briefly reviews key concepts of modern computer architecture, focusing particularly on the performance of parallel codes as well as the relevant concepts in parallel programming models. The book then turns towards the fundamental algorithms used to implement the parallel programming models and discusses how they interact with modern processors. While the book will focus on the general mechanisms, we will mostly use the Intel processor architecture to exemplify the implementation concepts discussed but will present other processor architectures where appropriate. All algorithms and concepts are discussed in an easy to understand way with many illustrative examples, figures, and source code fragments. The target audience of the book is students in Computer Science who are studying compiler construction, parallel programming, or programming systems. Software developers who have an interest in the core algorithms used to implement a parallel runtime system, or who need to educate themselves for projects that require the algorithms and concepts discussed in this book will also benefit from reading it. You can find the source code for this book at https://github.com/parallel-runtimes/lomp.
This textbook provides a hands-on introduction to enterprise architecture management. It guides the reader through the applications of methods and tools to typical business problems by presenting enterprise architecture frameworks and by sharing experiences from industry. The structure of the book represents the typical stages of the journey of an enterprise architect. Chapter 1 addresses the central question of what to achieve with the introduction of an enterprise architecture. Chapter 2 then introduces concepts and visualizations for business architecture that help with understanding the business. In chapter 3 the development of an application architecture is outlined, which provides transparency on information systems and their business context. Next, chapter 4 presents visual tools to analyze, improve and eventually optimize the application landscape. Chapter 5 discusses both traditional organizational as well as collaborative approaches to enterprise architecture management. Eventually, several established enterprise architecture frameworks like TOGAF, Zachmann, ArchiMate, and IAF are described in chapter 6. The book concludes with a summary and an outlook on future research potential in chapter 7. Based on their experiences through several years of teaching, the authors introduce students step-by-step to enterprise architecture development and management. Their book is intended as a guide for master classes at universities and includes lots of exercises and references for further reading.
Break into the powerful world of parallel GPU programming with this down-to-earth, practical guide Designed for professionals across multiple industrial sectors, "Professional CUDA C Programming "presents CUDA -- a parallel computing platform and programming model designed to ease the development of GPU programming -- fundamentals in an easy-to-follow format, and teaches readers how to think in parallel and implement parallel algorithms on GPUs. Each chapter covers a specific topic, and includes workable examples that demonstrate the development process, allowing readers to explore both the "hard" and "soft" aspects of GPU programming. Computing architectures are experiencing a fundamental shift toward scalable parallel computing motivated by application requirements in industry and science. This book demonstrates the challenges of efficiently utilizing compute resources at peak performance, presents modern techniques for tackling these challenges, while increasing accessibility for professionals who are not necessarily parallel programming experts. The CUDA programming model and tools empower developers to write high-performance applications on a scalable, parallel computing platform: the GPU. However, CUDA itself can be difficult to learn without extensive programming experience. Recognized CUDA authorities John Cheng, Max Grossman, and Ty McKercher guide readers through essential GPU programming skills and best practices in "Professional CUDA C Programming," including: CUDA Programming ModelGPU Execution ModelGPU Memory modelStreams, Event and ConcurrencyMulti-GPU ProgrammingCUDA Domain-Specific LibrariesProfiling and Performance Tuning The book makes complex CUDA concepts easy to understand for anyone with knowledge of basic software development with exercises designed to be both readable and high-performance. For the professional seeking entrance to parallel computing and the high-performance computing community, "Professional CUDA C Programming "is an invaluable resource, with the most current information available on the market.
Electrical Engineering Design of High Performance Microprocessor
Circuits This book covers the design of next generation
microprocessors in deep submicron CMOS technologies. The chapters
in Design of High-Performance Microprocessor Circuits were written
by some of the world's leading technologists, designers, and
researchers. All levels of system abstraction are covered, but the
emphasis rests squarely on circuit design. Examples are drawn from
processors designed at AMD, Digital/Compaq, IBM, Intel, MIPS,
Mitsubishi, Motorola, and Toshiba. Each topic of this invaluable
reference stands alone so the chapters can be read in any order.
The following topics are covered in depth:
In 1968 the Advanced Research Projects Agency (ARPA) of the U.S. Department of Defense began implementation of a computer communication network which permits the interconnection of heter ogeneous computers at geographically distributed centres through out the United States. This network has come to be known as the ARPANET and has grown from the initial four node configuration in 1969 to almost forty nodes (including satellite nodes in Hawaii, Norway, and London) in late 1973. The major goal of ARPANET is to achieve resource sharing among the network users. The resources to be shared include not only programs, but also unique facilities such as the powerful ILLIAC IV computer and large global weather data bases that are economically feasible when widely shared. The ARPANEr employs a distributed store-and-forward packet switching approach that is much better suited for computer communications networks than the more conventional circuit-switch ing approach. Reasons favouring packet switching include lower cost, higher capacity, greater reliability and minimal delay. All of these factors are discussed in these Proceedings."
This authoritative and practical introduction to solution architecture is suitable for new entrants to the field but also of benefit to experienced professionals wishing to consolidate their knowledge and skills. Tools and techniques are presented in the context of a framework and life cycle, taking a problem or idea through logical steps to design a holistic, evidence-based solution. There is a focus on collaboration with the business as well as with disciplines such as enterprise architecture. |
You may like...
Discoverability in Digital Repositories…
Liz Woolcott, Ali Shiri
Paperback
R971
Discovery Miles 9 710
Cloud-based Multi-Modal Information…
Srinidhi Hiriyannaiah, Siddesh G.M., …
Hardcover
R2,730
Discovery Miles 27 300
Enterprise Level Security 1 & 2
Kevin Foltz, William R. Simpson
Paperback
R1,421
Discovery Miles 14 210
Edge-AI in Healthcare - Trends and…
Sonali Vyas, Akanksha Upadhyaya, …
Hardcover
R2,644
Discovery Miles 26 440
|