![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design
Network routing can be broadly categorized into Internet routing,
PSTN routing, and telecommunication transport network routing. This
book systematically considers these routing paradigms, as well as
their interoperability. The authors discuss how algorithms,
protocols, analysis, and operational deployment impact these
approaches. A unique feature of the book is consideration of both
macro-state and micro-state in routing; that is, how routing is
accomplished at the level of networks and how routers or switches
are designed to enable efficient routing.
Smart Grid: Networking, Data Management, and Business Models delivers a comprehensive overview of smart grid communications, discussing the latest advances in the technology, the related cyber security issues, and the best ways to manage user demand and pricing. Comprised of 16 chapters authored by world-renowned experts, this book: Considers the use of cognitive radio and software-defined networking in the smart grid Explores the space of attacks in the energy management process, the need for a smart grid simulator, and the management issues that arise around smart cities Describes a real-time pricing scheme that aims to reduce the peak-to-average load ratio Explains how to realize low-carbon economies and the green smart grid through the pervasive management of demand Presents cutting-edge research on microgrids, electric vehicles, and energy trading in the smart grid Thus, Smart Grid: Networking, Data Management, and Business Models provides a valuable reference for utility operators, telecom operators, communications engineers, power engineers, electric vehicle original equipment manufacturers (OEMs), electric vehicle service providers, university professors, researchers, and students.
How do you detangle a monolithic system and migrate it to a microservice architecture? How do you do it while maintaining business-as-usual? As a companion to Sam Newman's extremely popular Building Microservices, this new book details a proven method for transitioning an existing monolithic system to a microservice architecture. With many illustrative examples, insightful migration patterns, and a bevy of practical advice to transition your monolith enterprise into a microservice operation, this practical guide covers multiple scenarios and strategies for a successful migration, from initial planning all the way through application and database decomposition. You'll learn several tried and tested patterns and techniques that you can use as you migrate your existing architecture. Ideal for organizations looking to transition to microservices, rather than rebuild Helps companies determine whether to migrate, when to migrate, and where to begin Addresses communication, integration, and the migration of legacy systems Discusses multiple migration patterns and where they apply Provides database migration examples, along with synchronization strategies Explores application decomposition, including several architectural refactoring patterns Delves into details of database decomposition, including the impact of breaking referential and transactional integrity, new failure modes, and more
The richly illustrated Interactive Web-Based Data Visualization with R, plotly, and shiny focuses on the process of programming interactive web graphics for multidimensional data analysis. It is written for the data analyst who wants to leverage the capabilities of interactive web graphics without having to learn web programming. Through many R code examples, you will learn how to tap the extensive functionality of these tools to enhance the presentation and exploration of data. By mastering these concepts and tools, you will impress your colleagues with your ability to quickly generate more informative, engaging, and reproducible interactive graphics using free and open source software that you can share over email, export to pdf, and more. Key Features: Convert static ggplot2 graphics to an interactive web-based form Link, animate, and arrange multiple plots in standalone HTML from R Embed, modify, and respond to plotly graphics in a shiny app Learn best practices for visualizing continuous, discrete, and multivariate data Learn numerous ways to visualize geo-spatial data This book makes heavy use of plotly for graphical rendering, but you will also learn about other R packages that support different phases of a data science workflow, such as tidyr, dplyr, and tidyverse. Along the way, you will gain insight into best practices for visualization of high-dimensional data, statistical graphics, and graphical perception. The printed book is complemented by an interactive website where readers can view movies demonstrating the examples and interact with graphics.
The book provides a bottom-up approach to understanding how a computer works and how to use computing to solve real-world problems. It covers the basics of digital logic through the lens of computer organization and programming. The reader should be able to design his or her own computer from the ground up at the end of the book. Logic simulation with Verilog is used throughout, assembly languages are introduced and discussed, and the fundamentals of computer architecture and embedded systems are touched upon, all in a cohesive design-driven framework suitable for class or self-study.
Based upon the authors' experience in designing and deploying an embedded Linux system with a variety of applications, Embedded Linux System Design and Development contains a full embedded Linux system development roadmap for systems architects and software programmers. Explaining the issues that arise out of the use of Linux in embedded systems, the book facilitates movement to embedded Linux from traditional real-time operating systems, and describes the system design model containing embedded Linux. This book delivers practical solutions for writing, debugging, and profiling applications and drivers in embedded Linux, and for understanding Linux BSP architecture. It enables you to understand: various drivers such as serial, I2C and USB gadgets; uClinux architecture and its programming model; and the embedded Linux graphics subsystem. The text also promotes learning of methods to reduce system boot time, optimize memory and storage, and find memory leaks and corruption in applications. This volume benefits IT managers in planning to choose an embedded Linux distribution and in creating a roadmap for OS transition. It also describes the application of the Linux licensing model in commercial products.
Modelling Transitions shows what computational, formal and data-driven approaches can and could mean for sustainability transitions research, presenting the state-of-the-art and exploring what lies beyond. Featuring contributions from many well-known authors, this book presents the various benefits of modelling for transitions research. More than just taking stock, it also critically examines what modelling of transformative change means and could mean for transitions research and for other disciplines that study societal changes. This includes identifying a variety of approaches currently not part of the portfolios of transitions modellers. Far from only singing praise, critical methodological and philosophical introspection are key aspects of this important book. This book speaks to modellers and non-modellers alike who value the development of robust knowledge on transitions to sustainability, including colleagues in congenial fields. Be they students, researchers or practitioners, everyone interested in transitions should find this book relevant as reference, resource and guide.
The popularity of serial communications demands that additional serial port interfaces be developed to meet the expanding requirements of users. The Windows Serial Port Programming Handbook illustrates the principles and methods of developing various serial port interfaces using multiple languages. This comprehensive, hands-on, and practical guide to serial interface programming enables you to develop sophisticated interfaces and apply them in real-world applications. Each chapter addresses a language and how it can be applied in the development of serial port interfaces. The seven languages discussed are: ANSI C Visual C++ Visual Basic LabVIEW MATLAB Smalltalk Java Step by step and line by line, the Handbook clearly explains the interfacing techniques used for each different language in the serial port communication. Examples from actual systems have been compiled and debugged, with detailed source code for each included on an accompanying CD-ROM.
This book covers the history and recent developments of stochastic computing. Stochastic computing (SC) was first introduced in the 1960s for logic circuit design, but its origin can be traced back to von Neumann's work on probabilistic logic. In SC, real numbers are encoded by random binary bit streams, and information is carried on the statistics of the binary streams. SC offers advantages such as hardware simplicity and fault tolerance. Its promise in data processing has been shown in applications including neural computation, decoding of error-correcting codes, image processing, spectral transforms and reliability analysis. There are three main parts to this book. The first part, comprising Chapters 1 and 2, provides a history of the technical developments in stochastic computing and a tutorial overview of the field for both novice and seasoned stochastic computing researchers. In the second part, comprising Chapters 3 to 8, we review both well-established and emerging design approaches for stochastic computing systems, with a focus on accuracy, correlation, sequence generation, and synthesis. The last part, comprising Chapters 9 and 10, provides insights into applications in machine learning and error-control coding.
This books aims to present fundamental aspects of optical communication techniques and advanced modulation techniques and extensive applications of optical communications systems and networks employing single-mode optical fibers as the transmission system. New digital techqniues such as chromatic dispersion, polarization mode dispersion, nonlinear phase distortion effects, etc. will be discussed. Practical models for practice and understanding the behavior and dynamics of the devices and systems will be included.
This classic reference work is a comprehensive guide to the design, evaluation, and use of reliable computer systems. It includes case studies of reliable systems from manufacturers, such as Tandem, Stratus, IBM, and Digital. It covers special systems such as the Galileo Orbiter fault protection system and AT&T telephone switching system processors.
Detailing the advantages and limitations of multi-carrier communication, this book proposes possible solutions for these limitations. Multi-Carrier Communication Systems with Examples in MATLAB (R): A New Perspective addresses the two primary drawbacks of orthogonal frequency division multiplexing (OFDM) communication systems: the high sensitivity to carrier frequency offsets and phase noise, and the high peak-to-average power ratio (PAPR) of the transmitted signals. Presenting a new interleaving scheme for multicarrier communication, the book starts with a detailed overview of multi-carrier systems such as OFDM, multi-carrier code division multiple access (MC-CDMA), and single-carrier frequency division multiple access (SC-FDMA) systems. From there, it proposes a new way to deal with the frequency-selective fading channel: the single-carrier with frequency domain equalization (SC-FDE) scheme. The second part of the book examines the performance of the continuous phase modulation (CPM)-based OFDM (CPM-OFDM) system. It proposes a CPM-based single-carrier frequency domain equalization (CPM-SC-FDE) structure for broadband wireless communication systems. In the third part of the book, the author proposes a chaotic interleaving scheme for both CPM-OFDM and the CPM-SC-FDE systems. A comparison between the proposed chaotic interleaving and the conventional block interleaving is also performed in this part. The final part of the book presents efficient image transmission techniques over multi-carrier systems such as OFDM, MC-CDMA, and SC-FDMA. It details a new approach for efficient image transmission over OFDM and MC-CDMA systems using chaotic interleaving that transmits images over wireless channels efficiently. The book studies the performance of discrete cosine transform-based single-carrier frequency division multiple access (DCT-SC-FDMA) with image transmission. It also proposes a CPM-based DCT-SC-FDMA structure for efficient image transmission. The book includes MATLAB (R) simulations along with MATLAB code so you can practice carrying out your own extensive simulations.
Scalable and Secure Internet Services and Architecture provides an in-depth analysis of many key scaling technologies. Topics include: server clusters and load balancing; QoS-aware resource management; server capacity planning; Web caching and prefetching; P2P overlay network; mobile code and security; and mobility support for adaptive grid computing. The author discusses each topic by first defining a problem, then reviewing current representative approaches for solving it. He then describes in detail the underlying principles of the technologies and the application of these principles, along with balanced coverage of concepts and engineering trade-offs. The book demonstrates the effectiveness of the technologies via rigorous mathematical modeling and analysis, simulation, and practical implementations. It blends technologies in a unified framework for scalable and secure Internet services, delivering a systematic treatment based upon the author's cutting-edge research experience. This volume describes in breadth and depth advanced scaling technologies that support media streaming, e-commerce, grid computing, personalized content delivery, distributed file sharing, network management, and other Internet applications.
Computer systems have become an important element of the world economy, with billions of dollars spent each year on development, manufacture, operation, and maintenance. Combining coverage of computer system reliability, safety, usability, and other related topics into a single volume, Computer System Reliability: Safety and Usability eliminates the need to consult many different and diverse sources in the hunt for the information required to design better computer systems. After presenting introductory aspects of computer system reliability such as safety, usability-related facts and figures, terms and definitions, and sources for obtaining useful information on computer system reliability, safety, and usability, the book: Reviews mathematical concepts considered useful to understanding subsequent chapters Presents various introductory aspects of reliability, safety, and usability and computer system reliability basics Covers software reliability assessment and improvement methods Discusses important aspects of software quality and human error and software bugs in computer systems Highlights software safety and Internet reliability Details important aspects of software usability including the need for considering usability during the software development phase, software usability engineering process, software usability inspection methods, software usability test methods, and guidelines for conducting software usability testing Elucidates web usability facts and figures, common design errors, web page design, tools for evaluating web usability, and questions to evaluate website message communication effectiveness Examines important aspects of computer system life cycle costing Written by systems reliability expert B.S. Dhillon, the book is accessible to all levels of readership, making it useful to beginners and seasoned professiona
The complexity of modern chip design requires extensive use of specialized software throughout the process. To achieve the best results, a user of this software needs a high-level understanding of the underlying mathematical models and algorithms. In addition, a developer of such software must have a keen understanding of relevant computer science aspects, including algorithmic performance bottlenecks and how various algorithms operate and interact. This book introduces and compares the fundamental algorithms that are used during the IC physical design phase, wherein a geometric chip layout is produced starting from an abstract circuit design. This updated second edition includes recent advancements in the state-of-the-art of physical design, and builds upon foundational coverage of essential and fundamental techniques. Numerous examples and tasks with solutions increase the clarity of presentation and facilitate deeper understanding. A comprehensive set of slides is available on the Internet for each chapter, simplifying use of the book in instructional settings. "This improved, second edition of the book will continue to serve the EDA and design community well. It is a foundational text and reference for the next generation of professionals who will be called on to continue the advancement of our chip design tools and design the most advanced micro-electronics." Dr. Leon Stok, Vice President, Electronic Design Automation, IBM Systems Group "This is the book I wish I had when I taught EDA in the past, and the one I'm using from now on." Dr. Louis K. Scheffer, Howard Hughes Medical Institute "I would happily use this book when teaching Physical Design. I know of no other work that's as comprehensive and up-to-date, with algorithmic focus and clear pseudocode for the key algorithms. The book is beautifully designed!" Prof. John P. Hayes, University of Michigan "The entire field of electronic design automation owes the authors a great debt for providing a single coherent source on physical design that is clear and tutorial in nature, while providing details on key state-of-the-art topics such as timing closure." Prof. Kurt Keutzer, University of California, Berkeley "An excellent balance of the basics and more advanced concepts, presented by top experts in the field." Prof. Sachin Sapatnekar, University of Minnesota
If you look around you will find that all computer systems, from your portable devices to the strongest supercomputers, are heterogeneous in nature. The most obvious heterogeneity is the existence of computing nodes of different capabilities (e.g. multicore, GPUs, FPGAs, ...). But there are also other heterogeneity factors that exist in computing systems, like the memory system components, interconnection, etc. The main reason for these different types of heterogeneity is to have good performance with power efficiency. Heterogeneous computing results in both challenges and opportunities. This book discusses both. It shows that we need to deal with these challenges at all levels of the computing stack: from algorithms all the way to process technology. We discuss the topic of heterogeneous computing from different angles: hardware challenges, current hardware state-of-the-art, software issues, how to make the best use of the current heterogeneous systems, and what lies ahead. The aim of this book is to introduce the big picture of heterogeneous computing. Whether you are a hardware designer or a software developer, you need to know how the pieces of the puzzle fit together. The main goal is to bring researchers and engineers to the forefront of the research frontier in the new era that started a few years ago and is expected to continue for decades. We believe that academics, researchers, practitioners, and students will benefit from this book and will be prepared to tackle the big wave of heterogeneous computing that is here to stay.
If you look around you will find that all computer systems, from your portable devices to the strongest supercomputers, are heterogeneous in nature. The most obvious heterogeneity is the existence of computing nodes of different capabilities (e.g. multicore, GPUs, FPGAs, ...). But there are also other heterogeneity factors that exist in computing systems, like the memory system components, interconnection, etc. The main reason for these different types of heterogeneity is to have good performance with power efficiency. Heterogeneous computing results in both challenges and opportunities. This book discusses both. It shows that we need to deal with these challenges at all levels of the computing stack: from algorithms all the way to process technology. We discuss the topic of heterogeneous computing from different angles: hardware challenges, current hardware state-of-the-art, software issues, how to make the best use of the current heterogeneous systems, and what lies ahead. The aim of this book is to introduce the big picture of heterogeneous computing. Whether you are a hardware designer or a software developer, you need to know how the pieces of the puzzle fit together. The main goal is to bring researchers and engineers to the forefront of the research frontier in the new era that started a few years ago and is expected to continue for decades. We believe that academics, researchers, practitioners, and students will benefit from this book and will be prepared to tackle the big wave of heterogeneous computing that is here to stay.
The increasing adoption of Business Process Management (BPM) has inspired pioneering software architects and developers to effectively leverage BPM-based software and process-centric architecture (PCA) to create software systems that enable essential business processes. Reflecting this emerging trend and evolving field, Process-Centric Architecture for Enterprise Software Systems provides a complete and accessible introduction explaining this architecture. The text presents, in detail, the analysis and design principles used in process-centric architecture. Illustrative examples demonstrate how to architect and design enterprise systems based on the business processes central to your organization. It covers the architectural aspects of business process management, the evolution of IT systems in enterprises, the importance of a business process focus, the role of workflows, business rules, enterprise application integration, and business process modeling languages such as WS-BPEL and BPML. It also investigates: Fundamental concepts of process-centric architecture style The PCA approach to architecting enterprise IT systems Business process driven applications and integration Two case studies that illustrate how to architect and design enterprise applications based on PCA SOA in the context of process-centric architecture Standards, technologies, and infrastructure behind PCA Explaining how to architect enterprise systems using a BPMS technology platform, J2EE components, and Web services, this forward-looking book will empower you to create systems centered on business processes and make today's enterprise processes successful and agile.
This book describes a unique approach to bring robotic technology into elders' daily lives. Low cost components and low cost robotic assistants are effectively combined to offer high quality services to elders and people in need. The book presents in a comprehensive way how technology can be used for developing a new healthcare paradigm where high quality services are offered at home, thus reducing the ever-increasing hospitalization cost of the elders and the people with chronic diseases.
Originally published in 1995, Large Deviations for Performance Analysis consists of two synergistic parts. The first half develops the theory of large deviations from the beginning, through recent results on the theory for processes with boundaries, keeping to a very narrow path: continuous-time, discrete-state processes. By developing only what is needed for the applications, the theory is kept to a manageable level, both in terms of length and in terms of difficulty. Within its scope, the treatment is detailed, comprehensive and self-contained. As the book shows, there are sufficiently many interesting applications of jump Markov processes to warrant a special treatment. The second half is a collection of applications developed at Bell Laboratories. The applications cover large areas of the theory of communication networks: circuit switched transmission, packet transmission, multiple access channels, and the M/M/1 queue. Aspects of parallel computation are covered as well including, basics of job allocation, rollback-based parallel simulation, assorted priority queueing models that might be used in performance models of various computer architectures, and asymptotic coupling of processors. These applications are thoroughly analysed using the tools developed in the first half of the book.
This book introduces the FPGA technology used in the laboratory sessions, and provides a step-by-step guide for designing and simulation of digital circuits. It utilizes the VHDL language, which is one of the most common language used to describe the design of digital systems. The Quartus II, Xilinx ISE 14.7 and ModelSim software are used to process the VHDL code and make simulations, and then the Altera and Xilinx FPGA platforms are employed to implement the simulated digital designs. The book is composed of four parts. The first part of this book has two chapters and covers various aspects: FPGA architectures, ASIC vs FPGA comparison, FPGA design flow and basic VHDL concepts necessary to describe the design of digital systems. The second part of the book includes three chapters that deal with the design of digital circuits such as combinational logic circuits, sequential logic circuits and finite state machines. The third part of the book is reserved for laboratory projects carried out on the FPGA platform. It is a largely hands-on lab class for design digital circuits and implementing their designs on the Altera FPGA platform. Finally, the fourth part of this work is devoted to recent applications carried out on FPGAs, in particular advanced techniques in renewable energy systems. The book is primarily intended for students, scholars, and industrial practitioners interested in the design of modern digital systems.
Provides a truly accessible introduction and a fully integrated approach to fuzzy systems and neural networks—the definitive text for students and practicing engineers Researchers are already applying neural networks and fuzzy systems in series, from the use of fuzzy inputs and outputs for neural networks to the employment of individual neural networks to quantify the shape of a fuzzy membership function. But the integration of these two fields into a "neurofuzzy" technology holds even greater potential benefits in reducing computing time and optimizing results. Fuzzy and Neural Approaches in Engineering presents a detailed examination of the fundamentals of fuzzy systems and neural networks and then joins them synergistically—combining the feature extraction and modeling capabilities of the neural network with the representation capabilities of fuzzy systems. Exploring the value of relating genetic algorithms and expert systems to fuzzy and neural technologies, this forward-thinking text highlights an entire range of dynamic possibilities within soft computing. With examples specifically designed to illuminate key concepts and overcome the obstacles of notation and overly mathematical presentations often encountered in other sources, plus tables, figures, and an up-to-date bibliography, this unique work is both an important reference and a practical guide to neural networks and fuzzy systems.
This book presents as formal papers nearly all of the lectures given at the NATO advanced summer institute on Computer Architecture held at St. Raphael, France from September 12th - 24th 1976. It was not possible to include an important paper by G. Amdahl on the 470V6 System, nor papers by Mde. A. Recoque on distributed processing, Messrs. A. Maison and G. Debruyne on LSI technology, and K. Bowden. Computer architecture is a very diverse and expanding subject, consequently it was decided to limit the scope of the School to five main subject areas. These were: specific computer architectures, language orientated machines, associative processing, computer networks and specification and design methods. In addition an overall emphasis was placed on distributed and parallel processing and the need for an integrated hardware-software approach to design. Though some introductory material is included, this book is primarily intended for workers in the field of computer science and engineering who wish to update themselves on current topics in computer architecture. The main work of the School is well reflected in the collected papers, but it is impossible to convey the benefits obtained from the discussion groups and the continuous dialogue that was maintained throughout the School. The Editors would like to acknowledge with thanks the support of the NATO Scientific Affairs Division, who financed the School, and the European Research Office of the U.S. Army and the National Science Foundation for providing travel grants.
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooperation to develop. Bringing together expertise from technology-oriented sciences, law, philosophy, and social sciences, Managing Trust in Cyberspace addresses fundamental issues underpinning computational trust models and covers trust management processes for dynamic open systems and applications in a tutorial style that aids in understanding. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book also presents a walk-through of online identity management and examines using trust and argumentation in recommender systems. It concludes with a comprehensive survey of anti-forensics for network security and a review of password security and protection. Researchers and practitioners in fields such as distributed computing, Internet technologies, networked systems, information systems, human computer interaction, human behavior modeling, and intelligent informatics especially benefit from a discussion of future trust management research directions including pervasive and ubiquitous computing, wireless ad-hoc and sensor networks, cloud computing, social networks, e-services, P2P networks, near-field communications (NFC), electronic knowledge management, and nano-communication networks. |
You may like...
|