0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (13)
  • R250 - R500 (37)
  • R500+ (3,075)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design

Parallel Optimization - Theory, Algorithms and Applications (Hardcover, Reissue): Yair Censor, Stavros A. Zenios Parallel Optimization - Theory, Algorithms and Applications (Hardcover, Reissue)
Yair Censor, Stavros A. Zenios
R6,136 Discovery Miles 61 360 Ships in 10 - 15 working days

This book offers a unique pathway to methods of parallel optimization by introducing parallel computing ideas and techniques into both optimization theory, and into some numerical algorithms for large-scale optimization problems. The presentation is based on the recent understanding that rigorous mathematical analysis of algorithms, parallel computing techniques, and "hands-on" experimental work on real-world problems must go hand in hand in order to achieve the greatest advantage from novel parallel computing architectures. The three parts of the book thus bring together relevant theory, careful study of algorithms, and modelling of significant real world problems. The problem domains include: image reconstruction, radiation therapy treatment planning, transportation problems, portfolilo management, and matrix estimation. This text can be used both as a reference for researchers and as a text for advanced graduate courses.

Hardware Security and Trust - Design and Deployment of Integrated Circuits in a Threatened Environment (Hardcover, 1st ed.... Hardware Security and Trust - Design and Deployment of Integrated Circuits in a Threatened Environment (Hardcover, 1st ed. 2017)
Nicolas Sklavos, Ricardo Chaves, Giorgio Di Natale, Francesco Regazzoni
R4,008 Discovery Miles 40 080 Ships in 10 - 15 working days

This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to address the conflict between testability and security, the authors describe innovative design-for-testability (DFT) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing, commercial tools. Secure protocols are discussed, which protect access to necessary test infrastructures and enable the design of secure access controllers.

Securing Social Networks in Cyberspace (Hardcover): Al-Sakib Khan Pathan Securing Social Networks in Cyberspace (Hardcover)
Al-Sakib Khan Pathan
R2,816 Discovery Miles 28 160 Ships in 10 - 15 working days

This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues, and family; sharing and posting information; managing audio, video, and photos; and all other aspects of using social media sites both professionally and personally. In the setting of the Internet of Things (IoT) that can connect millions of devices at any one time, the security of such actions is paramount. Securing Social Networks in Cyberspace discusses user privacy and trust, location privacy, protecting children, managing multimedia content, cyberbullying, and much more. Current state-of-the-art defense mechanisms that can bring long-term solutions to tackling these threats are considered in the book. This book can be used as a reference for an easy understanding of complex cybersecurity issues in social networking platforms and services. It is beneficial for academicians and graduate-level researchers. General readers may find it beneficial in protecting their social-media-related profiles.

Trusted Computing for Embedded Systems (Hardcover, 2015 ed.): Bernard Candaele, Dimitrios Soudris, Iraklis Anagnostopoulos Trusted Computing for Embedded Systems (Hardcover, 2015 ed.)
Bernard Candaele, Dimitrios Soudris, Iraklis Anagnostopoulos
R4,276 R3,475 Discovery Miles 34 750 Save R801 (19%) Ships in 10 - 15 working days

This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. * Enables readers to address a variety of security threats to embedded hardware and software; * Describes design of secure wireless sensor networks, to address secure authentication of trusted portable devices for embedded systems; * Presents secure solutions for the design of smart-grid applications and their deployment in large-scale networked and systems.

Virtual Aesthetics in Architecture - Designing in Mixed Realities (Hardcover): Sara Eloy, Anette Kreutzberg, Ioanna Symeonidou Virtual Aesthetics in Architecture - Designing in Mixed Realities (Hardcover)
Sara Eloy, Anette Kreutzberg, Ioanna Symeonidou
R4,506 Discovery Miles 45 060 Ships in 10 - 15 working days

- Explores how mixed, virtual and augmented reality technologies can enable designers to create immersive experiences and expand the aesthetic potential of the medium - Curated selection of projects and essays by leading international architects and designers, including those from Zaha Hadid Architects and MVRDV- Illustrated with over 150 images

An In-Depth Guide to Mobile Device Forensics (Paperback): Chuck Easttom An In-Depth Guide to Mobile Device Forensics (Paperback)
Chuck Easttom
R1,551 Discovery Miles 15 510 Ships in 10 - 15 working days

Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.

How Things Work - The Computer Science Edition (Hardcover): Charles F. Bowman How Things Work - The Computer Science Edition (Hardcover)
Charles F. Bowman
R3,937 Discovery Miles 39 370 Ships in 10 - 15 working days

It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.

Machine Learning for Model Order Reduction (Hardcover, 1st ed. 2018): Khaled Salah Mohamed Machine Learning for Model Order Reduction (Hardcover, 1st ed. 2018)
Khaled Salah Mohamed
R3,106 Discovery Miles 31 060 Ships in 18 - 22 working days

This Book discusses machine learning for model order reduction, which can be used in modern VLSI design to predict the behavior of an electronic circuit, via mathematical models that predict behavior. The author describes techniques to reduce significantly the time required for simulations involving large-scale ordinary differential equations, which sometimes take several days or even weeks. This method is called model order reduction (MOR), which reduces the complexity of the original large system and generates a reduced-order model (ROM) to represent the original one. Readers will gain in-depth knowledge of machine learning and model order reduction concepts, the tradeoffs involved with using various algorithms, and how to apply the techniques presented to circuit simulations and numerical analysis. Introduces machine learning algorithms at the architecture level and the algorithm levels of abstraction; Describes new, hybrid solutions for model order reduction; Presents machine learning algorithms in depth, but simply; Uses real, industrial applications to verify algorithms.

How Things Work - The Computer Science Edition (Paperback): Charles F. Bowman How Things Work - The Computer Science Edition (Paperback)
Charles F. Bowman
R1,584 Discovery Miles 15 840 Ships in 10 - 15 working days

It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.

Smart Computing - Proceedings of the 1st International Conference on Smart Machine Intelligence and Real-Time Computing... Smart Computing - Proceedings of the 1st International Conference on Smart Machine Intelligence and Real-Time Computing (SmartCom 2020), 26-27 June 2020, Pauri, Garhwal, Uttarakhand, India (Hardcover)
Mohammad Ayoub Khan, Sanjay Gairola, Bhola Jha, Pushkar Praveen
R7,978 Discovery Miles 79 780 Ships in 10 - 15 working days

The field of SMART technologies is an interdependent discipline. It involves the latest burning issues ranging from machine learning, cloud computing, optimisations, modelling techniques, Internet of Things, data analytics, and Smart Grids among others, that are all new fields. It is an applied and multi-disciplinary subject with a focus on Specific, Measurable, Achievable, Realistic & Timely system operations combined with Machine intelligence & Real-Time computing. It is not possible for any one person to comprehensively cover all aspects relevant to SMART Computing in a limited-extent work. Therefore, these conference proceedings address various issues through the deliberations by distinguished Professors and researchers. The SMARTCOM 2020 proceedings contain tracks dedicated to different areas of smart technologies such as Smart System and Future Internet, Machine Intelligence and Data Science, Real-Time and VLSI Systems, Communication and Automation Systems. The proceedings can be used as an advanced reference for research and for courses in smart technologies taught at graduate level.

Fundamentals of Graphics Using MATLAB (Paperback): Ranjan Parekh Fundamentals of Graphics Using MATLAB (Paperback)
Ranjan Parekh
R1,517 Discovery Miles 15 170 Ships in 10 - 15 working days

This book introduces fundamental concepts and principles of 2D and 3D graphics and is written for undergraduate and postgraduate students of computer science, graphics, multimedia, and data science. It demonstrates the use of MATLAB (R) programming for solving problems related to graphics and discusses a variety of visualization tools to generate graphs and plots. The book covers important concepts like transformation, projection, surface generation, parametric representation, curve fitting, interpolation, vector representation, and texture mapping, all of which can be used in a wide variety of educational and research fields. Theoretical concepts are illustrated using a large number of practical examples and programming codes, which can be used to visualize and verify the results. Key Features: Covers fundamental concepts and principles of 2D and 3D graphics Demonstrates the use of MATLAB (R) programming for solving problems on graphics Provides MATLAB (R) codes as answers to specific numerical problems Provides codes in a simple copy and execute format for the novice learner Focuses on learning through visual representation with extensive use of graphs and plots Helps the reader gain in-depth knowledge about the subject matter through practical examples Contains review questions and practice problems with answers for self-evaluation

Uncoded Multimedia Transmission (Hardcover): Feng Wu, Chong Luo, Hancheng Lu Uncoded Multimedia Transmission (Hardcover)
Feng Wu, Chong Luo, Hancheng Lu
R3,510 Discovery Miles 35 100 Ships in 10 - 15 working days

An uncoded multimedia transmission (UMT) system is one that skips quantization and entropy coding in compression and all subsequent binary operations, including channel coding and bit-to-symbol mapping of modulation. By directly transmitting non-binary symbols with amplitude modulation, the uncoded system avoids the annoying cliff effect observed in the coded transmission system. This advantage makes uncoded transmission more suited to both unicast in varying channel conditions and multicast to heterogeneous users. Particularly, in the first part of Uncoded Multimedia Transmission, we consider how to improve the efficiency of uncoded transmission and make it on par with coded transmission. We then address issues and challenges regarding how to better utilize temporal and spatial correlation of images and video in the uncoded transmission, to achieve the optimal transmission performance. Next, we investigate the resource allocation problem for uncoded transmission, including subchannel, bandwidth and power allocation. By properly allocating these resources, uncoded transmission can achieve higher efficiency and more robust performance. Subsequently, we consider the image and video delivery in MIMO broadcasting networks with diverse channel quality and varying numbers of antennas across receivers. Finally, we investigate the cases where uncoded transmission can be used in conjunction with digital transmission for a balanced efficiency and adaptation capability. This book is the very first monograph in the general area of uncoded multimedia transmission written in a self-contained format. It addresses both the fundamentals and the applications of uncoded transmission. It gives a systematic introduction to the fundamental theory and concepts in this field, and at the same time, also presents specific applications that reveal the great potential and impacts for the technologies generated from the research in this field. By concentrating several important studies and developments currently taking place in the field of uncoded transmission in a single source, this book can reduce the time and cost required to learn and improve skills and knowledge in the field. The authors have been actively working in this field for years, and this book is the final essence of their years of long research in this field. The book may be used as a collection of research notes for researchers in this field, a reference book for practitioners or engineers, as well as a textbook for a graduate advanced seminar in this field or any related fields. The references collected in this book may be used as further reading lists or references for the readers.

Embedded Systems - A Hardware-Software Co-Design Approach - Unleash the Power of Arduino! (Hardcover, 1st ed. 2021): Bashir I... Embedded Systems - A Hardware-Software Co-Design Approach - Unleash the Power of Arduino! (Hardcover, 1st ed. 2021)
Bashir I Morshed
R1,897 Discovery Miles 18 970 Ships in 10 - 15 working days

This textbook introduces the concept of embedded systems with exercises using Arduino Uno. It is intended for advanced undergraduate and graduate students in computer science, computer engineering, and electrical engineering programs. It contains a balanced discussion on both hardware and software related to embedded systems, with a focus on co-design aspects. Embedded systems have applications in Internet-of-Things (IoT), wearables, self-driving cars, smart devices, cyberphysical systems, drones, and robotics. The hardware chapter discusses various microcontrollers (including popular microcontroller hardware examples), sensors, amplifiers, filters, actuators, wired and wireless communication topologies, schematic and PCB designs, and much more. The software chapter describes OS-less programming, bitmath, polling, interrupt, timer, sleep modes, direct memory access, shared memory, mutex, and smart algorithms, with lots of C-code examples for Arduino Uno. Other topics discussed are prototyping, testing, verification, reliability, optimization, and regulations. Appropriate for courses on embedded systems, microcontrollers, and instrumentation, this textbook teaches budding embedded system programmers practical skills with fun projects to prepare them for industry products. Introduces embedded systems for wearables, Internet-of-Things (IoT), robotics, and other smart devices; Offers a balanced focus on both hardware and software co-design of embedded systems; Includes exercises, tutorials, and assignments.

Approximate Computing Techniques - From Component- to Application-Level (Hardcover, 1st ed. 2022): Alberto Bosio, Daniel... Approximate Computing Techniques - From Component- to Application-Level (Hardcover, 1st ed. 2022)
Alberto Bosio, Daniel Menard, Olivier Sentieys
R3,378 Discovery Miles 33 780 Ships in 10 - 15 working days

This book serves as a single-source reference to the latest advances in Approximate Computing (AxC), a promising technique for increasing performance or reducing the cost and power consumption of a computing system. The authors discuss the different AxC design and validation techniques, and their integration. They also describe real AxC applications, spanning from mobile to high performance computing and also safety-critical applications.

IP Routing Protocols - Two-Volume Set (Paperback): James Aweya IP Routing Protocols - Two-Volume Set (Paperback)
James Aweya
R4,530 Discovery Miles 45 300 Ships in 10 - 15 working days

This two-volume book describes the most common IP routing protocols used today, explaining the underlying concepts of each protocol and how the protocol components and processes fit within the typical router. Unlike other books, this title is not vendor focused. Volume 1 discusses fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). Volume 2 focuses on link-state routing protocols (OSPF and IS-IS) and the only path-vector routing protocol in use today (BGP). The volumes explain the types of databases each routing protocol uses, how the databases are constructed and managed, and how the various protocol components and processes, relate and interact with the databases. They also describe the routing protocols from a systems perspective, recognizing the most important routing and packet forwarding components and functions of a router. An illustrated description of IP routing protocols is given using real-world network examples. The books are presented from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and real-world examples. The discussion is presented in a simple style to make it comprehensible and appealing to undergraduate and graduate level students, research and practicing engineers, scientists, IT personnel, and network engineers.

IP Routing Protocols - Two-Volume Set (Hardcover): James Aweya IP Routing Protocols - Two-Volume Set (Hardcover)
James Aweya
R10,932 Discovery Miles 109 320 Ships in 10 - 15 working days

This two-volume book describes the most common IP routing protocols used today, explaining the underlying concepts of each protocol and how the protocol components and processes fit within the typical router. Unlike other books, this title is not vendor focused. Volume 1 discusses fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). Volume 2 focuses on link-state routing protocols (OSPF and IS-IS) and the only path-vector routing protocol in use today (BGP). The volumes explain the types of databases each routing protocol uses, how the databases are constructed and managed, and how the various protocol components and processes, relate and interact with the databases. They also describe the routing protocols from a systems perspective, recognizing the most important routing and packet forwarding components and functions of a router. An illustrated description of IP routing protocols is given using real-world network examples. The books are presented from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and real-world examples. The discussion is presented in a simple style to make it comprehensible and appealing to undergraduate and graduate level students, research and practicing engineers, scientists, IT personnel, and network engineers.

LTE Cellular Narrowband Internet of Things (NB-IoT) - Practical Projects for the Cloud and Data Visualization (Hardcover):... LTE Cellular Narrowband Internet of Things (NB-IoT) - Practical Projects for the Cloud and Data Visualization (Hardcover)
Hossam Fattah
R3,530 Discovery Miles 35 300 Ships in 10 - 15 working days

NB-IoT is the Internet of Things (IoT) technology used for cellular communication. NB-IoT devices deliver much better capability and performance, such as: increased area coverage of up to one kilometer; a massive number of devices-up to 200,000-per a single base-station area; longer battery lifetime of ten years; and better indoor and outdoor coverage for areas with weak signal, such as underground garages. The cellular NB-IoT technology is a challenging technology to use and understand. With more than 30 projects presented in this book, covering many use cases and scenarios, this book provides hands-on and practical experience of how to use the cellular NB-IoT for smart applications using Arduino (TM), Amazon Cloud, Google Maps, and charts. The book starts by explaining AT commands used to configure the NB-IoT modem; data serialization and deserialization; how to set up the cloud for connecting NB-IoT devices; setting up rules, policy, security certificates, and a NoSQL database on the cloud; how to store and read data in the cloud; how to use Google Maps to visualize NB-IoT device geo-location; and how to use charts to visualize sensor datasets. Projects for Arduino are presented in four parts. The first part explains how to connect the device to the mobile operator and cellular network; perform communication using different network protocols, such as TCP, HTTP, SSL, or MQTT; how to use GPS for geo-location applications; and how to upgrade NB-IoT modem firmware over the air. The second part explains the microcontroller unit and how to build and run projects, such as a 7-segment display or a real-time clock. The third part explains how NB-IoT can be used with sensor devices, such as ultrasonic and environmental sensors. Finally, the fourth part explains how NB-IoT can be used to control actuators, such as stepper motors and relays. This book is a unique resource for understanding practical uses of the NB-IoT technology and serves as a handbook for technical and non-technical readers who are looking for practicing and exercising the cellular NB-IoT technology. The book can be used by engineers, students, researchers, system integrators, mobile operators' technical staff, and electronics enthusiasts. To download the software which can be used with the book, go to: https://github.com/5ghub/NB-IoT About the Author: Hossam Fattah is a technology expert in 4G/5G wireless systems and networking. He received his Ph.D. in Electrical and Computer Engineering from University of British Columbia, Vancouver, Canada in 2003. He received his Master of Applied Science in Electrical and Computer Engineering from University of Victoria, Victoria, Canada in 2000. He completed his B.Sc. degree in Computers and Systems Engineering from Al-Azhar University, Cairo, Egypt in 1995. Between 2003 and 2011, he was in academia and industry, including Texas A&M University. Between 2011 and 2013, he was with Spirent Communications, NJ, USA. Since 2013, he has been with Microsoft, USA. He is also an affiliate associate professor at University of Washington, Tacoma, WA, USA, teaching graduate courses on IoT and distributed systems and collaborating on 5G research and innovations. He has had many patents and technical publications in conferences and journals. He is a registered professional Engineer with the Association of Professional Engineers, British Columbia, Canada. He is the author of the recent book 5G LTE Narrowband Internet of Things (NB-IoT). His research interest is in wireless communications and radio networks and protocols, cellular quality of service, radio resource management, traffic and packet scheduling, network analytics, and mobility.

Reconfigurable Computing Systems Engineering - Virtualization of Computing Architecture (Paperback): Lev Kirischian Reconfigurable Computing Systems Engineering - Virtualization of Computing Architecture (Paperback)
Lev Kirischian
R1,623 Discovery Miles 16 230 Ships in 10 - 15 working days

Reconfigurable Computing Systems Engineering: Virtualization of Computing Architecture describes the organization of reconfigurable computing system (RCS) architecture and discusses the pros and cons of different RCS architecture implementations. Providing a solid understanding of RCS technology and where it's most effective, this book: Details the architecture organization of RCS platforms for application-specific workloads Covers the process of the architectural synthesis of hardware components for system-on-chip (SoC) for the RCS Explores the virtualization of RCS architecture from the system and on-chip levels Presents methodologies for RCS architecture run-time integration according to mode of operation and rapid adaptation to changes of multi-parametric constraints Includes illustrative examples, case studies, homework problems, and references to important literature A solutions manual is available with qualifying course adoption. Reconfigurable Computing Systems Engineering: Virtualization of Computing Architecture offers a complete road map to the synthesis of RCS architecture, exposing hardware design engineers, system architects, and students specializing in designing FPGA-based embedded systems to novel concepts in RCS architecture organization and virtualization.

Interconnections for Computer Communications and Packet Networks (Paperback): Roberto Rojas-Cessa Interconnections for Computer Communications and Packet Networks (Paperback)
Roberto Rojas-Cessa
R2,104 Discovery Miles 21 040 Ships in 10 - 15 working days

This book introduces different interconnection networks applied to different systems. Interconnection networks are used to communicate processing units in a multi-processor system, routers in communication networks, and servers in data centers. Queuing techniques are applied to interconnection networks to support a higher utilization of resources. There are different queuing strategies, and these determine not only the performance of the interconnection network, but also the set of requirements to make them work effectively and their cost. Routing algorithms are used to find routes to destinations and directions in what information travels. Additional properties, such as avoiding deadlocks and congestion, are sought. Effective routing algorithms need to be paired up with these networks. The book will introduce the most relevant interconnection networks, queuing strategies, and routing algorithm. It discusses their properties and how these leverage the performance of the whole interconnection system. In addition, the book covers additional topics for memory management and congestion avoidance, used to extract higher performance from the interconnection network.

What is a Logical System? (Hardcover, New): D. M. Gabbay What is a Logical System? (Hardcover, New)
D. M. Gabbay
R5,312 Discovery Miles 53 120 Ships in 10 - 15 working days

This superb collection of papers focuses on a fundamental question in logic and computation: What is a logical system? With contributions from leading researchers--including Ian Hacking, Robert Kowalski, Jim Lambek, Neil Tennent, Arnon Avron, L. Farinas del Cerro, Kosta Dosen, and Solomon Feferman--the book presents a wide range of views on how to answer such a question, reflecting current, mainstream approaches to logic and its applications. Written to appeal to a diverse audience of readers, What is a Logical System? will excite discussion among students, teachers, and researchers in mathematics, logic, computer science, philosophy, and linguistics.

Smart Proxy Modeling - Artificial Intelligence and Machine Learning in Numerical Simulation (Hardcover): Shahab D. Mohaghegh Smart Proxy Modeling - Artificial Intelligence and Machine Learning in Numerical Simulation (Hardcover)
Shahab D. Mohaghegh
R3,019 Discovery Miles 30 190 Ships in 9 - 17 working days

Numerical simulation models are used in all engineering disciplines for modeling physical phenomena to learn how the phenomena work, and to identify problems and optimize behavior. Smart Proxy Models provide an opportunity to replicate numerical simulations with very high accuracy and can be run on a laptop within a few minutes, thereby simplifying the use of complex numerical simulations, which can otherwise take tens of hours. This book focuses on Smart Proxy Modeling and provides readers with all the essential details on how to develop Smart Proxy Models using Artificial Intelligence and Machine Learning, as well as how it may be used in real-world cases. Covers replication of highly accurate numerical simulations using Artificial Intelligence and Machine Learning Details application in reservoir simulation and modeling and computational fluid dynamics Includes real case studies based on commercially available simulators Smart Proxy Modeling is ideal for petroleum, chemical, environmental, and mechanical engineers, as well as statisticians and others working with applications of data-driven analytics.

Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access... Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access Control (Hardcover)
R. Thandeeswaran, Thinagaran Perumal, Kun Ma, N. Jeyanthi
R2,094 Discovery Miles 20 940 Ships in 10 - 15 working days

A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.

Hardware Supply Chain Security - Threat Modelling, Emerging Attacks and Countermeasures (Hardcover, 1st ed. 2021): Basel Halak Hardware Supply Chain Security - Threat Modelling, Emerging Attacks and Countermeasures (Hardcover, 1st ed. 2021)
Basel Halak
R3,118 Discovery Miles 31 180 Ships in 18 - 22 working days

This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems.

Software Engineering Practice - A Case Study Approach (Paperback): Thomas B. Hilburn, Massood Towhidnejad Software Engineering Practice - A Case Study Approach (Paperback)
Thomas B. Hilburn, Massood Towhidnejad
R2,274 Discovery Miles 22 740 Ships in 10 - 15 working days

This book is a broad discussion covering the entire software development lifecycle. It uses a comprehensive case study to address each topic and features the following: A description of the development, by the fictional company Homeowner, of the DigitalHome (DH) System, a system with "smart" devices for controlling home lighting, temperature, humidity, small appliance power, and security A set of scenarios that provide a realistic framework for use of the DH System material Just-in-time training: each chapter includes mini tutorials introducing various software engineering topics that are discussed in that chapter and used in the case study A set of case study exercises that provide an opportunity to engage students in software development practice, either individually or in a team environment. Offering a new approach to learning about software engineering theory and practice, the text is specifically designed to: Support teaching software engineering, using a comprehensive case study covering the complete software development lifecycle Offer opportunities for students to actively learn about and engage in software engineering practice Provide a realistic environment to study a wide array of software engineering topics including agile development Software Engineering Practice: A Case Study Approach supports a student-centered, "active" learning style of teaching. The DH case study exercises provide a variety of opportunities for students to engage in realistic activities related to the theory and practice of software engineering. The text uses a fictitious team of software engineers to portray the nature of software engineering and to depict what actual engineers do when practicing software engineering. All the DH case study exercises can be used as team or group exercises in collaborative learning. Many of the exercises have specific goals related to team building and teaming skills. The text also can be used to support the professional development or certification of practicing software engineers. The case study exercises can be integrated with presentations in a workshop or short course for professionals.

Energy Limits in Computation - A Review of Landauer's Principle, Theory and Experiments (Hardcover, 1st ed. 2019): Craig... Energy Limits in Computation - A Review of Landauer's Principle, Theory and Experiments (Hardcover, 1st ed. 2019)
Craig S. Lent, Alexei O. Orlov, Wolfgang Porod, Gregory L. Snider
R4,226 Discovery Miles 42 260 Ships in 10 - 15 working days

This book is a single-source reference to the issues involved in the Landauer principle, which has gained new prominence recently, due to the large amount of heat generated by today's computers. If Landauer's principle is correct, there may be ways to build computers that dissipate far less power (corresponding to heat generated) than today's computers. This book brings together all sides of the discussions regarding Landauer's principle, both theoretical and experimental, empowering readers to gain better understanding of dissipation in computation, and the limits if any to progress in computation related to energy dissipation. It represents the best and most thorough examination of the important issue of Landauer's principle that is available in one volume. Provides an in-depth investigation of the Landauer principle and how it relates to the possible existence of lower bounds on dissipation in computation; Gathers together both sides of the discussion: those who agree with Landauer and his conclusions, and those who think that Landauer was not correct, offering fresh perspective on the issues in the new light of experiments; Offers insight into the future of silicon CMOS and the limits if any to progress in computation related to energy dissipation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CSS and HTML for beginners - A Beginners…
Ethan Hall Hardcover R1,027 R881 Discovery Miles 8 810
The System Designer's Guide to VHDL-AMS…
Peter J Ashenden, Gregory D. Peterson, … Paperback R2,281 Discovery Miles 22 810
Constraint Decision-Making Systems in…
Santosh Kumar Das, Nilanjan Dey Hardcover R6,687 Discovery Miles 66 870
Clean Architecture - A Craftsman's Guide…
Robert Martin Paperback  (1)
R860 R619 Discovery Miles 6 190
Cyber-Physical Systems for Social…
Maya Dimitrova, Hiroaki Wagatsuma Hardcover R6,528 Discovery Miles 65 280
Advances in Delay-Tolerant Networks…
Joel J. P. C. Rodrigues Paperback R4,669 Discovery Miles 46 690
Learn Quantum Computing with Python and…
Robert Loredo Paperback R1,022 Discovery Miles 10 220
Intelligent Applications for…
Kandarpa Kumar Sarma, Manash Pratim Sarma, … Hardcover R6,324 Discovery Miles 63 240
Quantum Computing, Second Edition - A…
Hafiz Md. Hasan Babu Hardcover R3,271 Discovery Miles 32 710
Systems Engineering Neural Networks
A Migliaccio Hardcover R2,817 Discovery Miles 28 170

 

Partners