![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design
The book is based on the best papers of IEEE IRI 2018 and IEEE FMI 2018, Salt Lake City, July, 2018. They have been enhanced and modified suitably for publication. The book comprises recent works covering several aspects of reuse in intelligent systems - including Scientific Theory and Technology-Based Applications. New data analytic algorithms, technologies, and tools are sought to be able to manage, integrate, and utilize large amounts of data despite hardware, software, and/or bandwidth constraints; to construct models yielding important data insights, and to create visualizations to aid in presenting and understanding the data. Furthermore, it addresses the representation, cleansing, generalization, validation, and reasoning strategies for the scientifically-sound and cost-effective advancement of all kinds of intelligent systems - including all software and hardware aspects. The book addresses problems such as, how to optimally select the information/data sets for reuse and how to optimize the integration of existing information/knowledge with new, developing information/knowledge sources!
A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity. Although much of the focus is on technical concepts, managerial issues related to enterprise network and security planning and design are explained from a practitioner's perspective. Because of the critical importance of cybersecurity in today's enterprise networks, security-related issues are explained throughout the book, and four chapters are dedicated to fundamental knowledge. Challenging concepts are explained so readers can follow through with careful reading. This book is written for those who are self-studying or studying information systems or computer science in a classroom setting. If used for a course, it has enough material for a semester or a quarter. FEATURES Provides both theoretical and practical hands-on knowledge and learning experiences for computer networking and cybersecurity Offers a solid knowledge base for those preparing for certificate tests, such as CompTIA and CISSP Takes advantage of actual cases, examples, industry products, and services so students can relate concepts and theories to practice Explains subjects in a systematic and practical manner to facilitate understanding Includes practical exercise questions that can be individual or group assignments within or without a classroom Contains several information-rich screenshots, figures, and tables carefully constructed to solidify concepts and enhance visual learning The text is designed for students studying information systems or computer science for the first time. As a textbook, this book includes hands-on assignments based on the Packet Tracer program, an excellent network design and simulation tool from Cisco. Instructor materials also are provided, including PowerPoint slides, solutions for exercise questions, and additional chapter questions from which to build tests.
In practice, many different people with backgrounds in many different disciplines contribute to the design of an enterprise. Anyone who makes decisions to change the current enterprise to achieve some preferred structure is considered a designer. What is problematic is how to use the knowledge of separate aspects of the enterprise to achieve a globally optimized enterprise. The synthesis of knowledge from many disciplines to design an enterprise defines the field of enterprise engineering. Because enterprise systems are exceedingly complex, encompassing many independent domains of study, students must first be taught how to think about enterprise systems. Specifically written for advanced and intermediate courses and modules, Design of Enterprise Systems: Theory, Architecture, and Methods takes a system-theoretical perspective of the enterprise. It describes a systematic approach, called the enterprise design method, to design the enterprise. The design method demonstrates the principles, models, methods, and tools needed to design enterprise systems. The author uses the enterprise system design methodology to organize the chapters to mimic the completion of an actual project. Thus, the book details the enterprise engineering process from initial conceptualization of an enterprise to its final design. Pedagogical tools available include: For instructors: PowerPoint (R) slides for each chapter Project case studies that can be assigned as long-term projects to accompany the text Quiz questions for each chapter Business Process Analyzer software available for download For students: Templates, checklists, forms, and models to support enterprise engineering activities The book fills a need for greater design content in engineering curricula by describing how to design enterprise systems. Inclusion of design is also critical for business students, since they must realize the import their decisions may have on the long-term design of the enterprises they work with. The book's practical focus and project-based approach coupled with the pedagogical tools gives students the knowledge and skills they need to lead enterprise engineering projects.
Google's Programmable Search Engines (PSEs, previously called Custom Search Engines) provide search opportunities that are unavailable with any other tool. PSEs have advanced settings and search operators that are not supported by "regular" Google. With PSEs, it is possible to perform filtered searches within parts of the web as if they were databases! While lots of professionals use existing PSEs to source for talent or with other research goals, few people have experience creating them. Even fewer know about powerful PSE-only search operators. The main reason PSEs are not as popular as they should be is that it is not easy to get educated on PSE creation. There is little information online and no books (other than this one) on the subject. Even less info is available on the "structured" operators that allow for filtered searches. The first of its kind, this book hopes to popularize these fun and powerful tools so that many more people can include PSEs in their work. Key Features: A detailed introduction to creating PSEs, including info absent in Google's help A "hack" for creating PSEs that look for profiles in seconds An introduction to advanced PSE-only search operators allowed to perform filtered searches of parts of the web A "hack" for expanding Google's search limits to 500 terms Use cases, examples, and approaches that would be educational for those doing online research This book will be of interest to researchers, OSINT specialists, investigative journalists, Competitive Intelligence people, recruiters, and Sourcers, to name a few categories, and to the general public interested in how to search better.
Machine learning approaches has the capability to learn and adapt to the constantly evolving demands of large Internet-of-energy (IoE) network. The focus of this book is on using the machine learning approaches to present various solutions for IoE network in smart cities to solve various research gaps such as demand response management, resource management and effective utilization of the underlying ICT network. It provides in-depth knowledge to build the technical understanding for the reader to pursue various research problems in this field. Moreover, the example problems in smart cities and their solutions using machine learning are provided as relatable to the real-life scenarios. Aimed at Graduate Students, Researchers in Computer Science, Electrical Engineering, Telecommunication Engineering, Internet of Things, Machine Learning, Green computing, Smart Grid, this book: Covers all aspects of Internet of Energy (IoE) and smart cities including research problems and solutions. Points to the solutions provided by machine learning to optimize the grids within a smart city set-up. Discusses relevant IoE design principles and architecture. Helps to automate various services in smart cities for energy management. Includes case studies to show the effectiveness of the discussed schemes.
This book introduces readers to the latest advances in sensing technology for a broad range of non-volatile memories (NVMs). Challenges across the memory technologies are highlighted and their solutions in mature technology are discussed, enabling innovation of sensing technologies for future NVMs. Coverage includes sensing techniques ranging from well-established NVMs such as hard disk, flash, Magnetic RAM (MRAM) to emerging NVMs such as ReRAM, STTRAM, FeRAM and Domain Wall Memory will be covered.
This book focuses primarily on both technical and business aspects needed to select, design, develop and deploy control application (or product) successfully for multiple components in building systems. Designing and deploying a control application require multiple steps such as sensing, system dynamics modelling, algorithms, and testing. This may involve choosing an appropriate methodology and technique at multiple stages during the development process. Understanding the pros and cons of such techniques, most importantly being aware of practically possible approaches in the entire ecosystem, is critical in choosing the best framework and system application for different parts of building systems. Providing a wide overview of the state-of art in controls and building systems, providing guidance on developing an end-to-end system in relation to business fundamentals (distribution channels, stakeholders, marketing, supply-chain and financial management), the book is ideal for fourth-year control/mechanical/electrical engineering undergraduates, graduate students, and practitioners including business leaders concerned with smart building technology.
This book focuses primarily on both technical and business aspects needed to select, design, develop and deploy control application (or product) successfully for multiple components in building systems. Designing and deploying a control application require multiple steps such as sensing, system dynamics modelling, algorithms, and testing. This may involve choosing an appropriate methodology and technique at multiple stages during the development process. Understanding the pros and cons of such techniques, most importantly being aware of practically possible approaches in the entire ecosystem, is critical in choosing the best framework and system application for different parts of building systems. Providing a wide overview of the state-of art in controls and building systems, providing guidance on developing an end-to-end system in relation to business fundamentals (distribution channels, stakeholders, marketing, supply-chain and financial management), the book is ideal for fourth-year control/mechanical/electrical engineering undergraduates, graduate students, and practitioners including business leaders concerned with smart building technology.
This book aims to bring together leading academic scientists, researchers, and research scholars to exchange and share their experiences and research results on all aspects of Artificial Intelligence. The book provides a premier interdisciplinary platform to present practical challenges and adopted solutions. The book addresses the complete functional framework workflow in Artificial Intelligence technology. It explores the basic and high-level concepts and can serve as a manual for the industry for beginners and the more advanced. It covers intelligent and automated systems and its implications to the real-world, and offers data acquisition and case studies related to data-intensive technologies in AI-based applications. The book will be of interest to researchers, professionals, scientists, professors, students of computer science engineering, electronics and communications, as well as information technology.
The Internet of Energy (IoE), with the integration of advanced information and communication technologies (ICT), has led to a transformation of traditional networks to smart systems. Internet of Energy Handbook provides updated knowledge in the field of energy management with an Internet of Things (IoT) perspective. Features Explains the technological developments for energy management leading to a reduction in energy consumption through topics like smart energy systems, smart sensors, communication, techniques, and utilization Includes dedicated sections covering varied aspects related to renewable sources of energy, power distribution, and generation Incorporates energy efficiency, optimization, and sensor technologies Covers multidisciplinary aspects in computational intelligence and IoT Discusses building energy management aspects including temperature, humidity, the number of persons involved, and light intensity This handbook is aimed at graduate students, researchers, and professionals interested in power systems, IoT, smart grids, electrical engineering, and transmission.
Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud computing services have proven to be of significant importance, and promote quickly deployable and scalable IT solutions with reduced infrastructure costs. However, utilization of cloud also raises concerns such as security, privacy, latency, and governance, that keep it from turning into the predominant option for critical frameworks. As such, there is an urgent need to identify these concerns and to address them. Cloud Security: Concepts, Applications and Perspectives is a comprehensive work with substantial technical details for introducing the state-of-the-art research and development on various approaches for security and privacy of cloud services; novel attacks on cloud services; cloud forensics; novel defenses for cloud service attacks; and cloud security analysis. It discusses the present techniques and methodologies, and provides a wide range of examples and illustrations to effectively show the concepts, applications, and perspectives of security in cloud computing. This highly informative book will prepare readers to exercise better protection by understanding the motivation of attackers and to deal with them to mitigate the situation. In addition, it covers future research directions in the domain. This book is suitable for professionals in the field, researchers, students who are want to carry out research in the field of computer and cloud security, faculty members across universities, and software developers engaged in software development in the field.
Applied Soft Computing and Embedded System Applications in Solar Energy deals with energy systems and soft computing methods from a wide range of approaches and application perspectives. The authors examine how embedded system applications can deal with the smart monitoring and controlling of stand-alone and grid-connected solar photovoltaic (PV) systems for increased efficiency. Growth in the area of artificial intelligence with embedded system applications has led to a new era in computing, impacting almost all fields of science and engineering. Soft computing methods implemented to energy-related problems regularly face data-driven issues such as problems of optimization, classification, clustering, or prediction. The authors offer real-time implementation of soft computing and embedded system in the area of solar energy to address the issues with microgrid and smart grid projects (both renewable and non-renewable generations), energy management, and power regulation. They also discuss and examine alternative solutions for energy capacity assessment, energy efficiency systems design, as well as other specific smart grid energy system applications. The book is intended for students, professionals, and researchers in electrical and computer engineering fields, working on renewable energy resources, microgrids, and smart grid projects. Examines the integration of hardware with stand-alone PV panels and real-time monitoring of factors affecting the efficiency of the PV panels Offers real-time implementation of soft computing and embedded system in the area of solar energy Discusses how soft computing plays a huge role in the prediction of efficiency of stand-alone and grid-connected solar PV systems Discusses how embedded system applications with smart monitoring can control and enhance the efficiency of stand-alone and grid-connected solar PV systems Explores swarm intelligence techniques for solar PV parameter estimation Dr. Rupendra Kumar Pachauri is Assistant Professor - Selection Grade in the Department of Electrical and Electronics Engineering, University of Petroleum and Energy Studies (UPES), Dehradun, India. Dr. Jitendra Kumar Pandey is Professor & Head of R&D in the University of Petroleum and Energy Studies (UPES), Dehradun, India. Mr. Abhishek Sharma is working as a research scientist in the research and development department (UPES, India). Dr. Om Prakash Nautiyal is working as a scientist in Uttarakhand Science Education & Research Centre (USERC), Department of Information and Science Technology, Govt. of Uttarakhand, Dehradun, India. Prof. Mangey Ram is working as a Research Professor at Graphic Era Deemed to be University, Dehradun, India.
"Network and System Security" provides focused coverage of
network and system security technologies. It explores practical
solutions to a wide range of network and systems security issues.
Chapters are authored by leading experts in the field and address
the immediate and long-term challenges in the authors respective
areas of expertise. Coverage includes building a secure
organization, cryptography, system intrusion, UNIX and Linux
security, Internet security, intranet security, LAN security;
wireless network security, cellular network security, RFID
security, and more.
This book provides readers with a single-source reference to static-single assignment (SSA)-based compiler design. It is the first (and up to now only) book that covers in a deep and comprehensive way how an optimizing compiler can be designed using the SSA form. After introducing vanilla SSA and its main properties, the authors describe several compiler analyses and optimizations under this form. They illustrate how compiler design can be made simpler and more efficient, thanks to the SSA form. This book also serves as a valuable text/reference for lecturers, making the teaching of compilers simpler and more effective. Coverage also includes advanced topics, such as code generation, aliasing, predication and more, making this book a valuable reference for advanced students and practicing engineers.
This book provides comprehensive coverage of the recent advances in
symbolic analysis techniques for design automation of nanometer
VLSI systems. The presentation is organized in parts of
fundamentals, basic implementation methods and applications for
VLSI design. Topics emphasized include statistical timing and
crosstalk analysis, statistical and parallel analysis, performance
bound analysis and behavioral modeling for analog integrated
circuits . Among the recent advances, the Binary Decision Diagram
(BDD) based approaches are studied in depth. The BDD-based
hierarchical symbolic analysis approaches, have essentially broken
the analog circuit size barrier.
This book presents, in an integrated form, both the analysis and synthesis of three different types of hidden Markov models. Unlike other books on the subject, it is generic and does not focus on a specific theme, e.g. speech processing. Moreover, it presents the translation of hidden Markov models' concepts from the domain of formal mathematics into computer codes using MATLAB (R). The unique feature of this book is that the theoretical concepts are first presented using an intuition-based approach followed by the description of the fundamental algorithms behind hidden Markov models using MATLAB (R). This approach, by means of analysis followed by synthesis, is suitable for those who want to study the subject using a more empirical approach. Key Selling Points: Presents a broad range of concepts related to Hidden Markov Models (HMM), from simple problems to advanced theory Covers the analysis of both continuous and discrete Markov chains Discusses the translation of HMM concepts from the realm of formal mathematics into computer code Offers many examples to supplement mathematical notation when explaining new concepts
This multi-contributed handbook focuses on the latest workings of IoT (internet of Things) and Big Data. As the resources are limited, it's the endeavor of the authors to support and bring the information into one resource. The book is divided into 4 sections that covers IoT and technologies, the future of Big Data, algorithms, and case studies showing IoT and Big Data in various fields such as health care, manufacturing and automation. Features Focuses on the latest workings of IoT and Big Data Discusses the emerging role of technologies and the fast-growing market of Big Data Covers the movement toward automation with hardware, software, and sensors, and trying to save on energy resources Offers the latest technology on IoT Presents the future horizons on Big Data
Originally published in 1995, Large Deviations for Performance Analysis consists of two synergistic parts. The first half develops the theory of large deviations from the beginning, through recent results on the theory for processes with boundaries, keeping to a very narrow path: continuous-time, discrete-state processes. By developing only what is needed for the applications, the theory is kept to a manageable level, both in terms of length and in terms of difficulty. Within its scope, the treatment is detailed, comprehensive and self-contained. As the book shows, there are sufficiently many interesting applications of jump Markov processes to warrant a special treatment. The second half is a collection of applications developed at Bell Laboratories. The applications cover large areas of the theory of communication networks: circuit switched transmission, packet transmission, multiple access channels, and the M/M/1 queue. Aspects of parallel computation are covered as well including, basics of job allocation, rollback-based parallel simulation, assorted priority queueing models that might be used in performance models of various computer architectures, and asymptotic coupling of processors. These applications are thoroughly analysed using the tools developed in the first half of the book.
This title includes a number of Open Access chapters. Model-driven engineering (MDE) is the automatic production of software from simplified models of structure and functionality. It mainly involves the automation of the routine and technologically complex programming tasks, thus allowing developers to focus on the true value-adding functionality that the system needs to deliver. This book serves an overview of some of the core topics in MDE. The volume is broken into two sections offering a selection of papers that helps the reader not only understand the MDE principles and techniques, but also learn from practical examples. Also covered are the following topics: * MDE for software product lines * Formal methods for model transformation correctness * Metamodeling with Eclipse eCore * Metamodeling with UML profiles * Test cases generation This easily accessible reference volume offers a comprehensive guide to this rapidly expanding field. Edited by experienced writers with experience in both research and the practice of software engineering, Model-Driven Engineering of Information Systems: Principles, Techniques and Practice is an authoritative and easy-to-use reference, ideal for both researchers in the field and students who wish to gain an overview to this important field of study.
This title includes a number of Open Access chapters. Data structure and software engineering is an integral part of computer science. This volume presents new approaches and methods to knowledge sharing, brain mapping, data integration, and data storage. The author describes how to manage an organization's business process and domain data and presents new software and hardware testing methods. The book introduces a game development framework used as a learning aid in a software engineering at the university level. It also features a review of social software engineering metrics and methods for processing business information. It explains how to use Pegasys to create and manage sequence analysis workflows.
Every day, millions of people are unaware of the amazing processes that take place when using their phones, connecting to broadband internet, watching television, or even the most basic action of flipping on a light switch. Advances are being continually made in not only the transmission of this data but also in the new methods of receiving it. These advancements come from many different sources and from engineers who have engaged in research, design, development, and implementation of electronic equipment used in communications systems. This volume addresses a selection of important current advancements in the electronics and communications engineering fields, focusing on signal processing, chip design, and networking technology. The sections in the book cover: Microwave and antennas Communications systems Very large-scale integration Embedded systems Intelligent control and signal processing systems
Cloud Data Center Network Architectures and Technologies has been written with the support of Huawei's vast technical knowledge and experience in the data center network (DCN) field, as well as its understanding of customer service requirements. This book describes in detail the architecture design, technical implementation, planning and design, and deployment suggestions for cloud DCNs based on the service challenges DCNs encounter. It starts by describing the overall architecture and technical evolution of DCNs, with the aim of helping readers understand the development of DCNs. It then proceeds to explain the design and implementation of cloud DCNs, including the service model of a single data center (DC), construction of physical and logical networks of DCs, construction of multiple DCNs, and security solutions of DCs. Next, this book dives deep into practices of cloud DCN deployment based on real-world cases to help readers better understand how to build cloud DCNs. Finally, this book introduces DCN openness and some of the hottest forward-looking technologies. In summary, you can use this book as a reference to help you to build secure, reliable, efficient, and open cloud DCNs. It is intended for technical professionals of enterprises, research institutes, information departments, and DCs, as well as teachers and students of computer network-related majors in colleges and universities. Authors Lei Zhang Mr. Zhang is the Chief Architect of Huawei's DCN solution. He has more than 20 years' experience in network product and solution design, as well as a wealth of expertise in product design and development, network planning and design, and network engineering project implementation. He has led the design and deployment of more than 10 large-scale DCNs for Fortune Global 500 companies worldwide. Le Chen Mr. Chen is a Huawei DCN Solution Documentation Engineer with eight years' experience in developing documents related to DCN products and solutions. He has participated in the design and delivery of multiple large-scale enterprise DCNs. Mr. Chen has written many popular technical document series, such as DCN Handbook and BGP Topic.
This book discusses design techniques, layout details and measurements of several key analog building blocks that currently limit the performance of 5G and E-Band transceivers implemented in deep-scaled CMOS. The authors present recent developments in low-noise quadrature VCOs and tunable inductor-less frequency dividers. Moreover, the design of low-loss broadband transformer-based filters that realize inter-stage matching, power division/combining and impedance transformation is discussed in great detail. The design and measurements of a low-noise amplifier, a downconverter and a highly-linear power amplifier that leverage the proposed techniques are shown. All the prototypes were realized in advanced nanometer scaled CMOS technologies without RF thick to metal option.
The Healthcare industry is one of the largest and rapidly developing industries. Over the last few years, healthcare management is changing from disease centered to patient centered. While on one side the analysis of healthcare data plays an important role in healthcare management, but on the other side the privacy of a patient's record must be of equal concern. This book uses a research-oriented approach and focuses on privacy-based healthcare tools and technologies. It offers details on privacy laws with real-life case studies and examples, and addresses privacy issues in newer technologies such as Cloud, Big Data, and IoT. It discusses the e-health system and preserving its privacy, and the use of wearable technologies for patient monitoring, data streaming and sharing, and use of data analysis to provide various health services. This book is written for research scholars, academicians working in healthcare and data privacy domains, as well as researchers involved with healthcare law, and those working at facilities in security and privacy domains. Students and industry professionals, as well as medical practitioners might also find this book of interest.
The book comprises a new method of solving the integral equation of Leontovich, the most rigorous and most effective equation for the current in thin linear antennas. The book describes the features of the new method in its application in various types of antennas. It considers new ways of analyzing antennas, in particular in the calculation of an antenna gain based on main radiation patterns and the calculation of the directional characteristics of radiators with known distribution of current amplitude. The method of electrostatic analogy proposed by the author, provides the base for comparison of electromagnetic fields of high-frequency currents and electrostatic charges located on linear conductors to improve the directional characteristics of log-periodic and director-type antennas. A new approach to the analysis of the electrical characteristics of a microstrip antenna, which allows expansion of its operation range, is substantiated and developed. New results of antenna synthesis are obtained. The second part of the book is devoted to specific types of antennas (the author had a significant role in their creation). Particular attention is given to ship antennas for different frequency ranges. The book is intended for professionals, working in electrodynamics and those working on development, placement and exploitation of antennas. It will be useful for lecturers (university-level professors), teachers, students of radio engineering and researchers working in various fields of radio electronics and interested in an in-depth study of theoretical problems and designs f antennas. It can also be used for short university courses. |
![]() ![]() You may like...
Advances in Delay-Tolerant Networks…
Joel J. P. C. Rodrigues
Paperback
R4,844
Discovery Miles 48 440
Creativity in Load-Balance Schemes for…
Alberto Garcia-Robledo, Arturo Diaz Perez, …
Hardcover
R4,279
Discovery Miles 42 790
|