![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design
Originally published in 1995 Time and Logic examines understanding and application of temporal logic, presented in computational terms. The emphasis in the book is on presenting a broad range of approaches to computational applications. The techniques used will also be applicable in many cases to formalisms beyond temporal logic alone, and it is hoped that adaptation to many different logics of program will be facilitated. Throughout, the authors have kept implementation-orientated solutions in mind. The book begins with an introduction to the basic ideas of temporal logic. Successive chapters examine particular aspects of the temporal theoretical computing domain, relating their applications to familiar areas of research, such as stochastic process theory, automata theory, established proof systems, model checking, relational logic and classical predicate logic. This is an essential addition to the library of all theoretical computer scientists. It is an authoritative work which will meet the needs both of those familiar with the field and newcomers to it.
Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.
New computational design tools have evolved rapidly and been increasingly applied in the field of design in recent years, complimenting and even replacing the traditional design media and approaches. Design as both the process and product are changing due to the emergence and adoption of these new technologies. Understanding and assessing the impact of these new computational design environments on design and designers is important for advancing design in the contemporary context. Do these new computational environments support or hinder design creativity? How do those tools facilitate designers' thinking? Such knowledge is also important for the future development of design technologies. Research shows that design is never a mysterious non-understandable process, for example, one general view is that design process shares a common analysis-synthesis-evaluation model, during which designers interact between design problem and solution spaces. Understanding designers' thinking in different environments is the key to design research, education and practice. This book focuses on emerging computational design environments, whose impact on design and designers have not been comprehensively and systematically studied. It comprises three parts. The history and recent developments of computational design technologies are introduced in Part I. The main categories of technologies cover from computer-aided drafting and modelling tools, to visual programming and scripting tools for algorithmic design, to advanced interfaces and platforms for interactions between designers, between designers and computers, and between the virtual environment and the physical reality. To critically explore design thinking, especially in these new computational design environments, formal approaches to studying design thinking and design cognition are introduced and compared in Part II, drawing on literature and studies from the 70s to the current era. Part III concludes the book by exploring the impact of different computational design technologies on design and designers, using a series of case studies conducted by the author team building on their close collaboration over the past five years. The book offers new insights into designers' thinking in the rapidly evolving computational design environments, which have not been critically and systematically studied and reported in the current literature. The book is meant for design researchers, educators and students, professional practitioners and consultants, as well as people who are interested in computational design in general.
This book provides a unified overview of network-on-chip router micro-architecture, the corresponding design opportunities and challenges, and existing solutions to overcome these challenges. The discussion focuses on the heart of a NoC, the NoC router, and how it interacts with the rest of the system. Coverage includes both basic and advanced design techniques that cover the entire router design space including router organization, flow control, pipelined operation, buffering architectures, as well as allocators' structure and algorithms. Router micro-architectural options are presented in a step-by-step manner beginning from the basic design principles. Even highly sophisticated design alternatives are categorized and broken down to simpler pieces that can be understood easily and analyzed. This book is an invaluable reference for system, architecture, circuit, and EDA researchers and developers, who are interested in understanding the overall picture of NoC routers' architecture, the associated design challenges, and the available solutions.
Most of the business sectors consider the Digital Twin concept as the next big thing in the industry. A current state analysis of their digital counterparts helps in the prediction of the future of physical assets. Organizations obtain better insights on their product performance through the implementation of Digital Twins, and the applications of the technology are frequently in sectors such as manufacturing, automobile, retail, health care, smart cities, industrial IoT, etc. This book explores the latest developments and covers the significant challenges, issues, and advances in Digital Twin Technology. It will be an essential resource for anybody involved in related industries, as well as anybody interested in learning more about this nascent technology. This book includes: The future, present, and past of Digital Twin Technology. Digital twin technologies across the Internet of Drones, which developed various perceptive and autonomous capabilities, towards different control strategies such as object detection, navigation, security, collision avoidance, and backup. These approaches help to deal with the expansive growth of big data solutions. The recent digital twin concept in agriculture, which offers the vertical framing by IoT installation development to enhance the problematic food supply situation. It also allows for significant energy savings practices. It is highly required to overcome those challenges in developing advanced imaging methods of disease detection & prediction to achieve more accuracy in large land areas of crops. The welfare of upcoming archetypes such as digitalization in forensic analysis. The ideas of digital twin have arisen to style the corporeal entity and associated facts reachable software and customers over digital platforms. Wind catchers as earth building: Digital Twins vs. green sustainable architecture.
Modern systems are an intertwined mesh of human process, physical security, and technology. Attackers are aware of this, commonly leveraging a weakness in one form of security to gain control over an otherwise protected operation. To expose these weaknesses, we need a single unified model that can be used to describe all aspects of the system on equal terms. Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems - from padlocks, to phishing, to enterprise software architecture. We discuss how weakness in one part of a system creates vulnerability in another, all the while applying standards and frameworks used in the cybersecurity world. Our goal: to analyze the security of the entire system - including people, processes, and technology - using a single model. We begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity. Lastly, we discuss how to operate a secure system based on the NIST Cybersecurity Framework (CSF) concepts of "identify, protect, detect, respond, and recover." Other topics covered in this book include the NIST National Vulnerability Database (NVD), MITRE Common Vulnerability Scoring System (CVSS), Microsoft's Security Development Lifecycle (SDL), and the MITRE ATT&CK Framework.
An understanding of modern computer logic-incorporating core knowledge of number systems, number conversions, Boolean algebra, memories, and logic circuits-is fundamental to further study of computer architectures, system software, and computer networks. Computer Logic: Design Principles and Applications introduces and describes the relevant concepts, principles and applications of modern computer logic design. The book is self-contained, with an introductory chapter that concisely covers the history of computing devices, as well as number systems, number conversions, signed and unsigned integers, external code, and digital and digitizing concepts. Dedicated chapters on Boolean algebra, transistor circuits, combinatorial logic circuits, and sequential logic circuits round off the work. The emphasis is on design and applications. Topics and features: * Explains Boolean Algebra and logic design essentials in clear fashion * Includes modern topics, such as Unicode, Exclusive Or Theorems, unipolar transistors, copper technology, flash memory, Hardware Descriptive Language, and logic simulation software tools * Thorough coverage of combinatorial logic and provides numerous design examples, such as gates, decoders and encoders, comparators, carry-save and carry-propagated adders, multiplication trees, and programmable logic arrays * Provides chapter-by-chapter summary points, supplementary examples, and exercises * Sequential logic presented, with numerous design examples, such as flip-flops, counters, shift registers, sequencers, and excitation tables With its well-focused approach and clarity of presentation, this new text/reference is an excellent resource for advanced students and practitioners in computer science, computer engineering, and electrical engineering. Anyone seeking to develop a solid grounding in computer logic, circuit design, and logic design will find the book an essential and practical learning tool.
The opportunistic network is an emerging and recent area of research. To make this research area more adaptable for practical and industrial use, there is a need to further investigate several research challenges in all aspects of opportunistic networks. Therefore, Opportunistic Networks: Fundamentals, Applications and Emerging Trends provides theoretical, algorithmic, simulation, and implementation-based research developments related to fundamentals, applications, and emerging research trends in opportunistic networks. The book follows a theoretical approach to describe fundamentals to beginners and incorporates a practical approach depicting the implementation of real-life applications to intermediate and advanced readers. This book is beneficial for academicians, researchers, developers, and engineers who work in or are interested in the fields related to opportunistic networks, delay tolerant networks, and intermittently connected ad hoc networks. This book also serves as a reference book for graduate and postgraduate courses in computer science, computer engineering, and information technology streams.
This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.
This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.
Cloud Computing and Big Data technologies have become the new descriptors of the digital age. The global amount of digital data has increased more than nine times in volume in just five years and by 2030 its volume may reach a staggering 65 trillion gigabytes. This explosion of data has led to opportunities and transformation in various areas such as healthcare, enterprises, industrial manufacturing and transportation. New Cloud Computing and Big Data tools endow researchers and analysts with novel techniques and opportunities to collect, manage and analyze the vast quantities of data. In Cloud and Big Data Analytics, the two areas of Swarm Intelligence and Deep Learning are a developing type of Machine Learning techniques that show enormous potential for solving complex business problems. Deep Learning enables computers to analyze large quantities of unstructured and binary data and to deduce relationships without requiring specific models or programming instructions. This book introduces the state-of-the-art trends and advances in the use of Machine Learning in Cloud and Big Data Analytics. The book will serve as a reference for Data Scientists, systems architects, developers, new researchers and graduate level students in Computer and Data science. The book will describe the concepts necessary to understand current Machine Learning issues, challenges and possible solutions as well as upcoming trends in Big Data Analytics.
This book provides applications of machine learning in healthcare systems and seeks to close the gap between engineering and medicine. It will combine the design and problem-solving skills of engineering with health sciences, in order to advance healthcare treatment. The book will include areas such as diagnosis, monitoring, and therapy. The book will provide real-world case studies, gives a detailed exploration of applications in healthcare systems, offers multiple perspectives on a variety of disciplines, while also letting the reader know how to avoid some of the consequences of old methods with data sharing. The book can be used as a reference for practitioners, researchers and for students at basic and intermediary levels in Computer Science, Electronics and Communications.
Machine learning approaches has the capability to learn and adapt to the constantly evolving demands of large Internet-of-energy (IoE) network. The focus of this book is on using the machine learning approaches to present various solutions for IoE network in smart cities to solve various research gaps such as demand response management, resource management and effective utilization of the underlying ICT network. It provides in-depth knowledge to build the technical understanding for the reader to pursue various research problems in this field. Moreover, the example problems in smart cities and their solutions using machine learning are provided as relatable to the real-life scenarios. Aimed at Graduate Students, Researchers in Computer Science, Electrical Engineering, Telecommunication Engineering, Internet of Things, Machine Learning, Green computing, Smart Grid, this book: Covers all aspects of Internet of Energy (IoE) and smart cities including research problems and solutions. Points to the solutions provided by machine learning to optimize the grids within a smart city set-up. Discusses relevant IoE design principles and architecture. Helps to automate various services in smart cities for energy management. Includes case studies to show the effectiveness of the discussed schemes.
Fueled by ubiquitous computing ambitions, the edge is at the center of confluence of many emergent technological trends such as hardware-rooted trust and code integrity, 5G, data privacy and sovereignty, blockchains and distributed ledgers, ubiquitous sensors and drones, autonomous systems and real-time stream processing. Hardware and software pattern maturity have reached a tipping point so that scenarios like smart homes, smart factories, smart buildings, smart cities, smart grids, smart cars, smart highways are in reach of becoming a reality. While there is a great desire to bring born-in-the-cloud patterns and technologies such as zero-downtime software and hardware updates/upgrades to the edge, developers and operators alike face a unique set of challenges due to environmental differences such as resource constraints, network availability and heterogeneity of the environment. The first part of the book discusses various edge computing patterns which the authors have observed, and the reasons why these observations have led them to believe that there is a need for a new architectural paradigm for the new problem domain. Edge computing is examined from the app designer and architect's perspectives. When they design for edge computing, they need a new design language that can help them to express how capabilities are discovered, delivered and consumed, and how to leverage these capabilities regardless of location and network connectivity. Capability-Oriented Architecture is designed to provide a framework for all of these. This book is for everyone who is interested in understanding what ubiquitous and edge computing means, why it is growing in importance and its opportunities to you as a technologist or decision maker. The book covers the broad spectrum of edge environments, their challenges and how you can address them as a developer or an operator. The book concludes with an introduction to a new architectural paradigm called capability-based architecture, which takes into consideration the capabilities provided by an edge environment. .
This book introduces readers to the latest advances in sensing technology for a broad range of non-volatile memories (NVMs). Challenges across the memory technologies are highlighted and their solutions in mature technology are discussed, enabling innovation of sensing technologies for future NVMs. Coverage includes sensing techniques ranging from well-established NVMs such as hard disk, flash, Magnetic RAM (MRAM) to emerging NVMs such as ReRAM, STTRAM, FeRAM and Domain Wall Memory will be covered.
This book focuses primarily on both technical and business aspects needed to select, design, develop and deploy control application (or product) successfully for multiple components in building systems. Designing and deploying a control application require multiple steps such as sensing, system dynamics modelling, algorithms, and testing. This may involve choosing an appropriate methodology and technique at multiple stages during the development process. Understanding the pros and cons of such techniques, most importantly being aware of practically possible approaches in the entire ecosystem, is critical in choosing the best framework and system application for different parts of building systems. Providing a wide overview of the state-of art in controls and building systems, providing guidance on developing an end-to-end system in relation to business fundamentals (distribution channels, stakeholders, marketing, supply-chain and financial management), the book is ideal for fourth-year control/mechanical/electrical engineering undergraduates, graduate students, and practitioners including business leaders concerned with smart building technology.
This book focuses primarily on both technical and business aspects needed to select, design, develop and deploy control application (or product) successfully for multiple components in building systems. Designing and deploying a control application require multiple steps such as sensing, system dynamics modelling, algorithms, and testing. This may involve choosing an appropriate methodology and technique at multiple stages during the development process. Understanding the pros and cons of such techniques, most importantly being aware of practically possible approaches in the entire ecosystem, is critical in choosing the best framework and system application for different parts of building systems. Providing a wide overview of the state-of art in controls and building systems, providing guidance on developing an end-to-end system in relation to business fundamentals (distribution channels, stakeholders, marketing, supply-chain and financial management), the book is ideal for fourth-year control/mechanical/electrical engineering undergraduates, graduate students, and practitioners including business leaders concerned with smart building technology.
This book explains how AI and Machine Learning can be applied to help businesses solve problems, support critical thinking and ultimately create customer value and increase profit. By considering business strategies, business process modeling, quality assurance, cybersecurity, governance and big data and focusing on functions, processes, and people's behaviors it helps businesses take a truly holistic approach to business optimization. It contains practical examples that make it easy to understand the concepts and apply them. It is written for practitioners (consultants, senior executives, decision-makers) dealing with real-life business problems on a daily basis, who are keen to develop systematic strategies for the application of AI/ML/BD technologies to business automation and optimization, as well as researchers who want to explore the industrial applications of AI and higher-level students.
The Internet of Energy (IoE), with the integration of advanced information and communication technologies (ICT), has led to a transformation of traditional networks to smart systems. Internet of Energy Handbook provides updated knowledge in the field of energy management with an Internet of Things (IoT) perspective. Features Explains the technological developments for energy management leading to a reduction in energy consumption through topics like smart energy systems, smart sensors, communication, techniques, and utilization Includes dedicated sections covering varied aspects related to renewable sources of energy, power distribution, and generation Incorporates energy efficiency, optimization, and sensor technologies Covers multidisciplinary aspects in computational intelligence and IoT Discusses building energy management aspects including temperature, humidity, the number of persons involved, and light intensity This handbook is aimed at graduate students, researchers, and professionals interested in power systems, IoT, smart grids, electrical engineering, and transmission.
This book aims to bring together leading academic scientists, researchers, and research scholars to exchange and share their experiences and research results on all aspects of Artificial Intelligence. The book provides a premier interdisciplinary platform to present practical challenges and adopted solutions. The book addresses the complete functional framework workflow in Artificial Intelligence technology. It explores the basic and high-level concepts and can serve as a manual for the industry for beginners and the more advanced. It covers intelligent and automated systems and its implications to the real-world, and offers data acquisition and case studies related to data-intensive technologies in AI-based applications. The book will be of interest to researchers, professionals, scientists, professors, students of computer science engineering, electronics and communications, as well as information technology.
Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud computing services have proven to be of significant importance, and promote quickly deployable and scalable IT solutions with reduced infrastructure costs. However, utilization of cloud also raises concerns such as security, privacy, latency, and governance, that keep it from turning into the predominant option for critical frameworks. As such, there is an urgent need to identify these concerns and to address them. Cloud Security: Concepts, Applications and Perspectives is a comprehensive work with substantial technical details for introducing the state-of-the-art research and development on various approaches for security and privacy of cloud services; novel attacks on cloud services; cloud forensics; novel defenses for cloud service attacks; and cloud security analysis. It discusses the present techniques and methodologies, and provides a wide range of examples and illustrations to effectively show the concepts, applications, and perspectives of security in cloud computing. This highly informative book will prepare readers to exercise better protection by understanding the motivation of attackers and to deal with them to mitigate the situation. In addition, it covers future research directions in the domain. This book is suitable for professionals in the field, researchers, students who are want to carry out research in the field of computer and cloud security, faculty members across universities, and software developers engaged in software development in the field.
Applied Soft Computing and Embedded System Applications in Solar Energy deals with energy systems and soft computing methods from a wide range of approaches and application perspectives. The authors examine how embedded system applications can deal with the smart monitoring and controlling of stand-alone and grid-connected solar photovoltaic (PV) systems for increased efficiency. Growth in the area of artificial intelligence with embedded system applications has led to a new era in computing, impacting almost all fields of science and engineering. Soft computing methods implemented to energy-related problems regularly face data-driven issues such as problems of optimization, classification, clustering, or prediction. The authors offer real-time implementation of soft computing and embedded system in the area of solar energy to address the issues with microgrid and smart grid projects (both renewable and non-renewable generations), energy management, and power regulation. They also discuss and examine alternative solutions for energy capacity assessment, energy efficiency systems design, as well as other specific smart grid energy system applications. The book is intended for students, professionals, and researchers in electrical and computer engineering fields, working on renewable energy resources, microgrids, and smart grid projects. Examines the integration of hardware with stand-alone PV panels and real-time monitoring of factors affecting the efficiency of the PV panels Offers real-time implementation of soft computing and embedded system in the area of solar energy Discusses how soft computing plays a huge role in the prediction of efficiency of stand-alone and grid-connected solar PV systems Discusses how embedded system applications with smart monitoring can control and enhance the efficiency of stand-alone and grid-connected solar PV systems Explores swarm intelligence techniques for solar PV parameter estimation Dr. Rupendra Kumar Pachauri is Assistant Professor - Selection Grade in the Department of Electrical and Electronics Engineering, University of Petroleum and Energy Studies (UPES), Dehradun, India. Dr. Jitendra Kumar Pandey is Professor & Head of R&D in the University of Petroleum and Energy Studies (UPES), Dehradun, India. Mr. Abhishek Sharma is working as a research scientist in the research and development department (UPES, India). Dr. Om Prakash Nautiyal is working as a scientist in Uttarakhand Science Education & Research Centre (USERC), Department of Information and Science Technology, Govt. of Uttarakhand, Dehradun, India. Prof. Mangey Ram is working as a Research Professor at Graphic Era Deemed to be University, Dehradun, India.
This book provides comprehensive coverage of the recent advances in
symbolic analysis techniques for design automation of nanometer
VLSI systems. The presentation is organized in parts of
fundamentals, basic implementation methods and applications for
VLSI design. Topics emphasized include statistical timing and
crosstalk analysis, statistical and parallel analysis, performance
bound analysis and behavioral modeling for analog integrated
circuits . Among the recent advances, the Binary Decision Diagram
(BDD) based approaches are studied in depth. The BDD-based
hierarchical symbolic analysis approaches, have essentially broken
the analog circuit size barrier.
In practice, many different people with backgrounds in many different disciplines contribute to the design of an enterprise. Anyone who makes decisions to change the current enterprise to achieve some preferred structure is considered a designer. What is problematic is how to use the knowledge of separate aspects of the enterprise to achieve a globally optimized enterprise. The synthesis of knowledge from many disciplines to design an enterprise defines the field of enterprise engineering. Because enterprise systems are exceedingly complex, encompassing many independent domains of study, students must first be taught how to think about enterprise systems. Specifically written for advanced and intermediate courses and modules, Design of Enterprise Systems: Theory, Architecture, and Methods takes a system-theoretical perspective of the enterprise. It describes a systematic approach, called the enterprise design method, to design the enterprise. The design method demonstrates the principles, models, methods, and tools needed to design enterprise systems. The author uses the enterprise system design methodology to organize the chapters to mimic the completion of an actual project. Thus, the book details the enterprise engineering process from initial conceptualization of an enterprise to its final design. Pedagogical tools available include: For instructors: PowerPoint (R) slides for each chapter Project case studies that can be assigned as long-term projects to accompany the text Quiz questions for each chapter Business Process Analyzer software available for download For students: Templates, checklists, forms, and models to support enterprise engineering activities The book fills a need for greater design content in engineering curricula by describing how to design enterprise systems. Inclusion of design is also critical for business students, since they must realize the import their decisions may have on the long-term design of the enterprises they work with. The book's practical focus and project-based approach coupled with the pedagogical tools gives students the knowledge and skills they need to lead enterprise engineering projects.
The book is based on the best papers of IEEE IRI 2018 and IEEE FMI 2018, Salt Lake City, July, 2018. They have been enhanced and modified suitably for publication. The book comprises recent works covering several aspects of reuse in intelligent systems - including Scientific Theory and Technology-Based Applications. New data analytic algorithms, technologies, and tools are sought to be able to manage, integrate, and utilize large amounts of data despite hardware, software, and/or bandwidth constraints; to construct models yielding important data insights, and to create visualizations to aid in presenting and understanding the data. Furthermore, it addresses the representation, cleansing, generalization, validation, and reasoning strategies for the scientifically-sound and cost-effective advancement of all kinds of intelligent systems - including all software and hardware aspects. The book addresses problems such as, how to optimally select the information/data sets for reuse and how to optimize the integration of existing information/knowledge with new, developing information/knowledge sources! |
![]() ![]() You may like...
Purchasing and supply management
J.A. Badenhorst-Weiss, J.O. Cilliers, …
Paperback
![]() R821 Discovery Miles 8 210
Nonlinear, Tunable and Active…
Ilya V. Shadrivov, Mikhail Lapine, …
Hardcover
|