![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems
This book offers ideas to help improve digital technologies and increase their efficiency during implementation and application for researchers and practitioners. The outstanding position of the book among others is that it dwells with cyber-physical systems' progress and proposes ideas and finding around digital tools and technologies and their application. A distinguished contribution is in presenting results on Digital Twins development and application, enhancing approaches of communication and information transferring between cyber-physical systems connected within the Internet of things platforms, computer linguistic as a part of cyber-physical systems, intelligent cybersecurity and computer vision systems. The target audience of this book also includes practitioners and experts, as well as state authorities and representatives of manufacturing and industry who are interested in creating and implementing of cyber-physical systems in framework of digitalization projects.
This textbook teaches students techniques for the design of advanced digital systems using Field Programmable Gate Arrays (FPGAs). The authors focus on communication between FPGAs and peripheral devices (such as EEPROM, analog-to-digital converters, sensors, digital-to-analog converters, displays etc.) and in particular state machines and timed state machines for the implementation of serial communication protocols, such as UART, SPI, I(2)C, and display protocols, such as VGA, HDMI. VHDL is used as the programming language and all topics are covered in a structured, step-by-step manner.
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide
links from the authors, commentary and updates. *Provides relevant information including some of the latest OS X threats *Easily accessible to those without any prior OS X experience *Useful tips and strategies for exploiting and compromising OS X systems *Includes discussion of defensive and countermeasure applications and how to use them *Covers mobile IOS vulnerabilities
This book describes a new design approach for energy-efficient, Domain-Specific Instruction set Processor (DSIP) architectures for the wireless baseband domain. The innovative techniques presented enable co-design of algorithms, architectures and technology, for efficient implementation of the most advanced technologies. To demonstrate the feasibility of the author's design approach, case studies are included for crucial functionality of advanced wireless systems with increased computational performance, flexibility and reusability. Designers using this approach will benefit from reduced development/product costs and greater scalability to future process technology nodes.
In this book, the subject is developed from basics of components involved. Each concept is clearly depicted through illustrations. Programming has been carried out in C programming with Linux background. A set of quiz and review questions has been presented at the end of each chapter. The book covers various topics from the basic building blocks, design methodologies, modeling of embedded systems to layered approach in embedded systems, microcontrollers. The aim in writing this book is to make the readers aware of what an embedded system is all about, how it is constructed, challenges faced in this field and coding for it. The reader who is totally new to this subject can definitely opt for this book to get a feel for the subject.
This book gathers outstanding research papers presented at the International Joint Conference on Advances in Computational Intelligence (IJCACI 2020), organized by Daffodil International University (DIU) and Jahangirnagar University (JU) in Bangladesh and South Asian University (SAU) in India. These proceedings present novel contributions in the areas of computational intelligence and offer valuable reference material for advanced research. The topics covered include collective intelligence, soft computing, optimization, cloud computing, machine learning, intelligent software, robotics, data science, data security, big data analytics, and signal and natural language processing.
Designers of high-speed integrated circuits face a bewildering
array of choices and too often spend frustrating days tweaking
gates to meet speed targets. "Logical Effort: Designing Fast CMOS
Circuits" makes high speed design easier and more methodical,
providing a simple and broadly applicable method for estimating the
delay resulting from factors such as topology, capacitance, and
gate sizes. The brainchild of circuit and computer graphics pioneers Ivan
Sutherland and Bob Sproull, "logical effort" will change the way
you approach design challenges. This book begins by equipping you
with a sound understanding of the method's essential procedures and
concepts-so you can start using it immediately. Later chapters
explore the theory and finer points of the method and detail its
specialized applications.
This book presents architectural solutions of wireless network and its variations. It basically deals with modeling, analysis, design and enhancement of different architectural parts of wireless network. The main aim of this book is to enhance the applications of wireless network by reducing and controlling its architectural issues. The book discusses efficiency and robustness of wireless network as a platform for communication and data transmission and also discusses some challenges and security issues such as limited hardware resources, unreliable communication, dynamic topology of some wireless networks, vulnerability and unsecure environment. This book is edited for users, academicians and researchers of wireless network. Broadly, topics include modeling of security enhancements, optimization model for network lifetime, modeling of aggregation systems and analyzing of troubleshooting techniques.
As the future of software development in a global environment continues to be influenced by the areas of service oriented architecture (SOA) and cloud computing, many legacy applications will need to migrate these environments to take advantage of the benefits offered by the service environment. Migrating Legacy Applications: Challenges in Service Oriented Architecture and Cloud Computing Environments presents a closer look at the partnership between service oriented architecture and cloud computing environments while analyzing potential solutions to challenges related to the migration of legacy applications. This reference is essential for students and university scholars alike.
This book presents best selected papers presented at the 4th International Conference on Smart Computing and Informatics (SCI 2020), held at the Department of Computer Science and Engineering, Vasavi College of Engineering (Autonomous), Hyderabad, Telangana, India. It presents advanced and multi-disciplinary research towards the design of smart computing and informatics. The theme is on a broader front which focuses on various innovation paradigms in system knowledge, intelligence and sustainability that may be applied to provide realistic solutions to varied problems in society, environment and industries. The scope is also extended towards the deployment of emerging computational and knowledge transfer approaches, optimizing solutions in various disciplines of science, technology and health care.
Prepare for the updated version of Microsoft Exam AZ-900 and help demonstrate your real-world knowledge of cloud services and how they can be provided with Microsoft Azure, including high-level concepts that apply throughout Azure, and key concepts specific to individual services. Designed for professionals in both non-technical or technical roles, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Fundamentals level. Focus on the expertise measured by these objectives: Describe cloud concepts Describe Azure architecture and services Describe Azure management and governance This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you want to show foundational knowledge of cloud services and their delivery with Microsoft Azure About the Exam Exam AZ-900 focuses on knowledge needed to describe cloud computing; the benefits of using cloud services; cloud service types; core Azure architectural components; Azure compute, networking, and storage services; Azure identity, access, and security; Azure cost management; Azure features and tools for governance and compliance, and for managing and deploying resources; and Azure monitoring tools. About Microsoft Certification Passing this exam fulfills your requirements for the Microsoft Certified: Azure Fundamentals credential, validating your basic knowledge of cloud services and how those services are provided with Azure. Whether you're new to the fi eld or a seasoned professional, demonstrating this knowledge can help you jump-start your career and prepare you to dive deeper into the many technical opportunities Azure offers.
Despite their widespread impact, computer networks that provide the foundation for the World Wide Web and Internet have many limitations. These networks are vulnerable to security threats, break easily, and have a limited ability to respond to changing conditions. Recent research on overcoming these limitations has used biological systems for inspiration, resulting in the development of biologically-inspired computer networks. These networks are designed and developed using principles that are commonly found in natural and biological systems. Biologically Inspired Networking and Sensing: Algorithms and Architectures offers current perspectives and trends in biologically-inspired networking, exploring various approaches aimed at improving network paradigms. Research contained within this compendium of papers and surveys introduces studies in the fields of communication networks, performance modeling, and distributed computing, as well as new advances in networking.
Intelligent systems are rapidly becoming a central focus of study for researchers as they have the ability to learn and adapt during their existence in order to achieve certain goals and objectives. Intelligent Systems for Automated Learning and Adaptation: Emerging Trends and Applications presents methodologies, architectures, and approaches on experiential automated learning. This critical mass of sought after research assembles the most intriguing and innovative applications, advancements, and leading studies on the methodology of intellectual computing.
This book presents Dual Mode Logic (DML), a new design paradigm for digital integrated circuits. DML logic gates can operate in two modes, each optimized for a different metric. Its on-the-fly switching between these operational modes at the gate, block and system levels provide maximal E-D optimization flexibility. Each highly detailed chapter has multiple illustrations showing how the DML paradigm seamlessly implements digital circuits that dissipate less energy while simultaneously improving performance and reducing area without a significant compromise in reliability. All the facets of the DML methodology are covered, starting from basic concepts, through single gate optimization, general module optimization, design trade-offs and new ways DML can be integrated into standard design flows using standard EDA tools. DML logic is compatible with numerous applications but is particularly advantageous for ultra-low power, reliable high performance systems, and advanced scaled technologies Written in language accessible to students and design engineers, each topic is oriented toward immediate application by all those interested in an alternative to CMOS logic. Describes a novel, promising alternative to conventional CMOS logic, known as Dual Mode Logic (DML), with which a single gate can be operated selectively in two modes, each optimized for a different metric (e.g., energy consumption, performance, size); Demonstrates several techniques at the architectural level, which can result in high energy savings and improved system performance; Focuses on the tradeoffs between power, area and speed including optimizations at the transistor and gate level, including alternatives to DML basic cells; Illustrates DML efficiency for a variety of VLSI applications.
This book describes how we can design and make efficient processors for high-performance computing, AI, and data science. Although there are many textbooks on the design of processors we do not have a widely accepted definition of the efficiency of a general-purpose computer architecture. Without a definition of the efficiency, it is difficult to make scientific approach to the processor design. In this book, a clear definition of efficiency is given and thus a scientific approach for processor design is made possible. In chapter 2, the history of the development of high-performance processor is overviewed, to discuss what quantity we can use to measure the efficiency of these processors. The proposed quantity is the ratio between the minimum possible energy consumption and the actual energy consumption for a given application using a given semiconductor technology. In chapter 3, whether or not this quantity can be used in practice is discussed, for many real-world applications. In chapter 4, general-purpose processors in the past and present are discussed from this viewpoint. In chapter 5, how we can actually design processors with near-optimal efficiencies is described, and in chapter 6 how we can program such processors. This book gives a new way to look at the field of the design of high-performance processors.
This book is the sixth volume of the successful book series on Robot Operating System: The Complete Reference. The objective of the book is to provide the reader with comprehensive coverage of the Robot Operating Systems (ROS) and the latest trends and contributed systems. ROS is currently considered as the primary development framework for robotics applications. There are seven chapters organized into three parts. Part I presents two chapters on the emerging ROS 2.0 framework; in particular, ROS 2.0 is become increasingly mature to be integrated into the industry. The first chapter from Amazon AWS deals with the challenges that ROS 2 developers will face as they transition their system to be commercial-grade. The second chapter deals with reactive programming for both ROS1 and ROS. In Part II, two chapters deal with advanced robotics, namely on the usage of robots in farms, and the second deals with platooning systems. Part III provides three chapters on ROS navigation. The first chapter deals with the use of deep learning for ROS navigation. The second chapter presents a detailed tuning guide on ROS navigation and the last chapter discusses SLAM for ROS applications. I believe that this book is a valuable companion for ROS users and developers to learn more ROS capabilities and features.
|
![]() ![]() You may like...
Rescue of Companies - The Role of…
Winfried F. Schmitz, Joren De Wachter, …
Hardcover
R10,781
Discovery Miles 107 810
Law and Economics of Mergers and…
Steven Davidoff Solomon, Claire A. Hill
Hardcover
R22,329
Discovery Miles 223 290
Due Diligence and Corporate Governance
Linda S. Spedding
Paperback
Laws Affecting Business Transactions in…
Guanghua Yu, Minkang Gu
Hardcover
R10,044
Discovery Miles 100 440
Pettet, Lowry & Reisberg's Company Law…
John Lowry, Arad Reisberg, …
Paperback
R1,813
Discovery Miles 18 130
|