![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems
This book reviews and presents a number of approaches to Fuzzy-based system safety and reliability assessment. For each proposed approach, it provides case studies demonstrating their applicability, which will enable readers to implement them into their own risk analysis process. The book begins by giving a review of using linguistic terms in system safety and reliability analysis methods and their extension by fuzzy sets. It then progresses in a logical fashion, dedicating a chapter to each approach, including the 2-tuple fuzzy-based linguistic term set approach, fuzzy bow-tie analysis, optimizing the allocation of risk control measures using fuzzy MCDM approach, fuzzy sets theory and human reliability, and emergency decision making fuzzy-expert aided disaster management system. This book will be of interest to professionals and researchers working in the field of system safety and reliability, as well as postgraduate and undergraduate students studying applications of fuzzy systems.
This remarkable anthology allows the pioneers who orchestrated the major breakthroughs in operating system technology to describe their work in their own words. From the batch processing systems of the 1950s to the distributed systems of the 1990s, Tom Kilburn, David Howarth, Bill Lynch, Fernando Corbato, Robert Daley, Sandy Fraser, Dennis Ritchie, Ken Thompson, Edsger Dijkstra, Per Brinch Hansen, Soren Lauesen, Barbara Liskov, Joe Stoy, Christopher Strachey, Butler Lampson, David Redell, Brian Randell, Andrew Tanenbaum, and others describe the systems they designed. The volume details such classic operating systems as the Atlas, B5000, Exec II, Egdon, CTSS, Multics, Titan,Unix, THE, RC 4000, Venus, Boss 2, Solo, OS 6, Alto, Pilot, Star, WFS, Unix United, and Amoeba systems. An introductory essay on the evolution of operating systems summarizes the papers and helps puts them into a larger perspective. This provocative journey captures the historic contributions of operating systems to software design, concurrent programming, graphic user interfaces, file systems, personal computing, and distributed systems. It also fully portrays how operating systems designers think. It's ideal for everybody in the field, from students to professionals, academics to enthusiasts.
A fully updated version covering Windows 8, the latest release of the widely-used Microsoft Operating System. When you're working on your PC and come up against a problem that you are unsure how to solve or want to accomplish something in application that you aren't sure how to do, Brilliant Windows 8 gives you the answers. Brilliant Windows 8 allows you to find the information you need easily and without fuss. It guides you through all tasks and applications using a highly visual, step-by-step approach. It tells you exactly what you need to know, when you need to know it. Spend less time reading and more time doing with a simple step-by-step approach to beginner and intermediate level office tasks. Brilliant guides provide the quick, easy-to-access information that you need - Numbered steps guide you through each task or problem Numerous screenshots illustrate each step Cross reference boxes point you to related tasks and information in the book "Did you know ?..." sections alert you to relevant expert tips, tricks and advice
This book describes digital design techniques with exercises. The concepts and exercises discussed are useful to design digital logic from a set of given specifications. Looking at current trends of miniaturization, the contents provide practical information on the issues in digital design and various design optimization and performance improvement techniques at logic level. The book explains how to design using digital logic elements and how to improve design performance. The book also covers data and control path design strategies, architecture design strategies, multiple clock domain design and exercises , low-power design strategies and solutions at the architecture and logic-design level. The book covers 60 exercises with solutions and will be useful to engineers during the architecture and logic design phase. The contents of this book prove useful to hardware engineers, logic design engineers, students, professionals and hobbyists looking to learn and use the digital design techniques during various phases of design.
A complete and authoritative discussion of systems engineering and neural networks In Systems Engineering Neural Networks, a team of distinguished researchers deliver a thorough exploration of the fundamental concepts underpinning the creation and improvement of neural networks with a systems engineering mindset. In the book, you'll find a general theoretical discussion of both systems engineering and neural networks accompanied by coverage of relevant and specific topics, from deep learning fundamentals to sport business applications. Readers will discover in-depth examples derived from many years of engineering experience, a comprehensive glossary with links to further reading, and supplementary online content. The authors have also included a variety of applications programmed in both Python 3 and Microsoft Excel. The book provides: A thorough introduction to neural networks, introduced as key element of complex systems Practical discussions of systems engineering and forecasting, complexity theory and optimization and how these techniques can be used to support applications outside of the traditional AI domains Comprehensive explorations of input and output, hidden layers, and bias in neural networks, as well as activation functions, cost functions, and back-propagation Guidelines for software development incorporating neural networks with a systems engineering methodology Perfect for students and professionals eager to incorporate machine learning techniques into their products and processes, Systems Engineering Neural Networks will also earn a place in the libraries of managers and researchers working in areas involving neural networks.
This book presents various concepts and applications related to risk-conscious operations management. It also provides an overview of the risk-based engineering - fundamental to the concept of risk-conscious operations management. It presents the reliability concept to support Dependency Modelling, which includes hardware systems structures and components for reliability improvement and risk reduction. The book further develops and builds attributes and model for risk-conscious culture - critical to characterize operational approach to risk and presents human factor modelling, where it works on developing an approach for human error precursor analysis. This book will be useful for students, researchers, academicians and professionals working on identifying risk and reliability issues in complex safety and mission critical systems. It will also be beneficial for industry risk-and-reliability experts and operational safety staff working in the complex engineering systems.
The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. The author is an IT security and auditing expert and the book covers all five exam domains. This effective self-study system features chapter learning objectives, in-depth explanations of each topic, and accurate practice questions. Each chapter includes exam tips that highlight key exam information, hands-on exercises, a summary that serves as a quick review, and end-of-chapter questions that simulate those on the actual exam. Designed to help candidates pass the CISA exam easily, it also serves as an ideal on-the-job reference. Richard E. Cascarino, MBA, CIA, CISM, CFE, CRMA, is well known in international auditing. Richard is a principal of Richard Cascarino & Associates. He has over 31 years' experience in audit training and consulting. He is a regular speaker at national and international conferences and has presented courses throughout Africa, Europe, the Middle East and the USA. Richard is a Past President of the Institute of Internal Auditors in South Africa, was the founding Regional Director of the Southern African Region of the IIA-Inc. and is a member of ISACA, and the Association of Certified Fraud Examiners, where he is a member of the Board of Regents for Higher Education. Richard was Chairman of the Audit Committee of Gauteng cluster 2 (Premier's office, Shared Services and Health) in Johannesburg and is currently the Chairman of the Audit and Risk Committee of the Department of Public Enterprises in South Africa. Richard is also a visiting Lecturer at the University of the Witwatersrand, author of the book Internal Auditing: An Integrated Approach, now in its third edition. This book is extensively used as a university textbook worldwide. In addition, he is the author of the Auditor's Guide to IT Auditing, Second Edition and the book Corporate Fraud and Internal Control: A Framework for Prevention. He is also a contributor to all four editions of QFINANCE, the Ultimate Resource.
This book describes research performed in the context of trust/distrust propagation and aggregation, and their use in recommender systems. This is a hot research topic with important implications for various application areas. The main innovative contributions of the work are: -new bilattice-based model for trust and distrust, allowing for ignorance and inconsistency -proposals for various propagation and aggregation operators, including the analysis of mathematical properties -Evaluation of these operators on real data, including a discussion on the data sets and their characteristics. -A novel approach for identifying controversial items in a recommender system -An analysis on the utility of including distrust in recommender systems -Various approaches for trust based recommendations (a.o. base on collaborative filtering), an in depth experimental analysis, and proposal for a hybrid approach -Analysis of various user types in recommender systems to optimize bootstrapping of cold start users.
Enterprise resource planning (ERP) refers to large commercial software packages that promise a seamless integration of information flow through an organization. Traditionally, separate units were created within an organization to carry out various tasks, and these functional areas would create their own information systems thereby giving rise to systems that were not integrated. ERP strives to provide a solution to these problems. Enterprise Resoure Planning Solutions and Management examines the issues that need to be further studied and better understood to ensure successful implementation and deployment of ERP systems.
The book presents papers from the 6th International Conference on Big Data and Cloud Computing Challenges (ICBCC 2019), held at the University of Missouri, Kansas City, USA, on September 9 and 10, 2019 and organized in collaboration with VIT Chennai. The book includes high-quality, original research on various aspects of big data and cloud computing, offering perspectives from the industrial and research communities on how to address the current challenges in the field. As such it is a valuable reference resource for researchers and practitioners in academia and industry.
The main goal of Internet of Things (IoT) is to make secure, reliable, and fully automated smart environments. However, there are many technological challenges in deploying IoT. This includes connectivity and networking, timeliness, power and energy consumption dependability, security and privacy, compatibility and longevity, and network/protocol standards. Internet of Things and Secure Smart Environments: Successes and Pitfalls provides a comprehensive overview of recent research and open problems in the area of IoT research. Features: Presents cutting edge topics and research in IoT Includes contributions from leading worldwide researchers Focuses on IoT architectures for smart environments Explores security, privacy, and trust Covers data handling and management (accumulation, abstraction, storage, processing, encryption, fast retrieval, security, and privacy) in IoT for smart environments This book covers state-of-the-art problems, presents solutions, and opens research directions for researchers and scholars in both industry and academia.
This book describes the technology of charge-trapping non-volatile memories and their uses. The authors explain the device physics of each device architecture and provide a concrete description of the materials involved and the fundamental properties of the technology. Modern material properties, used as charge-trapping layers, for new applications are introduced. Provides a comprehensive overview of the technology for charge-trapping non-volatile memories; Details new architectures and current modeling concepts for non-volatile memory devices; Focuses on conduction through multi-layer gate dielectrics stacks.
This textbook for a one-semester course in Electrical Circuit Theory is written to be concise, understandable, and applicable. Matlab is used throughout, for coding the programs and simulation of the circuits. Every new concept is illustrated with numerous examples and figures, in order to facilitate learning. The simple and clear style of presentation, along with comprehensive coverage, enables students to gain a solid foundation in the subject, along with the ability to apply techniques to real circuit analysis. Written to be accessible to students of varying backgrounds, this textbook presents the analysis of realistic, working circuits Presents concepts in a clear, concise and comprehensive manner, such as the difficult problem of setting up the equilibrium equations of circuits using a systematic approach in a few distinct steps Includes worked examples of functioning circuits, throughout every chapter, with an emphasis on real applications Includes numerous exercises at the end of each chapter Provides program scripts and circuit simulations, using the popular and widely used Matlab software, as supplementary material online
"Modeling Enterprise Architecture with TOGAF" explains everything you need to know to effectively model enterprise architecture with The Open Group Architecture Framework (TOGAF), the leading EA standard. This solution-focused reference presents key techniques and illustrative examples to help you model enterprise architecture. This book describes the TOGAF standard and its structure, from the architecture transformation method to governance, and presents enterprise architecture modeling practices with plenty of examples of TOGAF deliverables in the context of a case study. Although widespread and growing quickly, enterprise architecture
is delicate to manage across all its dimensions. Focusing on the
architecture transformation method, TOGAF provides a wide
framework, which covers the repository, governance, and a set of
recognized best practices. The examples featured in this book were
realized using the open source Modelio tool, which includes
extensions for TOGAF.
This volume is published as the proceedings of the third Russian-German - vanced Research Workshop on Computational Science and High Performance Computing in Novosibirsk, Russia, in July 2007. The contributions of these proceedings were provided and edited by the - thors, chosen after a careful selection and reviewing. The workshop was organized by the High Performance Computing Center Stuttgart(Stuttgart,Germany)andtheInstituteofComputationalTechnologies SBRAS(Novosibirsk,Russia)intheframeworkofactivitiesoftheGerman-Russian CenterforComputationalTechnologiesandHighPerformanceComputing. Thee event is held biannually and has already become a good tradition for German and Russian scientists. The ?rst Workshop took place in September 2003 in Novosibirskand the second Workshopwas hosted by Stuttgart in March 2005. Both workshops gave the possibility of sharing and discussing the latest results and developing further scienti?c contacts in the ?eld of computational science and high performance computing. The topics of the current workshop include software and hardware for high performancecomputation,numericalmodellingingeophysicsandcomputational ?uid dynamics, mathematical modelling of tsunami waves, simulation of fuel cellsandmodern? breopticsdevices,numericalmodellingincryptographypr- lems andaeroacoustics,interval analysis,toolsfor Gridapplications,researchon service-oriented architecture (SOA) and telemedicine technologies. Theparticipationofrepresentativesofmajorresearchorganizationsengagedin the solution of the most complex problems of mathematical modelling, devel- ment of new algorithms,programsandkey elementsof informationtechnologies, elaboration and implementation of software and hardware for high performance computing systems,provideda highlevelof competenceofthe workshop. Among the German participants were the heads and leading specialists of the HighPerformanceComputingCenterStuttgart(HLRS)(UniversityofStuttgart), NECHighPerformanceComputingEuropeGmbH,SectionofAppliedMathem- ics(UniversityofFreiburgi.Br.),InstituteofAerodynamics(RWTHAachen),- gionalComputingCenterErlangen(RRZE(UniversityofErlangen-Nuremberg), Center for High Performance Computing (ZHR) (Dresden University of Technology).
This book cover wireless communication, security issues, advanced wireless sensor networks, routing protocols of WSNs with cross-layer solutions, emerging trends in the advanced WSNs, power management, distributed sensing and data gathering techniques for WSNs, WSNs Security, applications, research of advanced WSNs with simulation results, and simulation tools for WSNs. Features: Covers technologies supporting advanced wireless communication system, sensor networks and the conceptual development of the subject. Discusses advanced data gathering and sharing/ distributed sensing techniques with its business applicability. Includes numerous worked-out mathematical equations/formulas, and essential principles including figures, illustrations, algorithms, and flow charts are included in the book. Provides pervasive background knowledge including both wireless communications and wireless sensor networks Covers wireless networks as well as sensor network models in detailed. This is aimed at graduate students, researchers and academicians working in the field of computer science, wireless communication technology, and advanced wireless sensor networks.
This book takes a holistic view on mobile and distributed computing systems. It presents innovative solutions at all system layers. These range from hardware over vertical and horizontal infrastructure services and novel middleware techniques to various types of application software. Some chapters address core properties of ubiquitous applications including mobility, self-healing and self-organization of both technical and social-technical systems.
Manufacturing computers in series was quite a feat in the 1950s. As mathematical as it gets, the machines discussed here were called X1 and X8. The industrial achievement combined with the background in a mathematical research center made the company Electrologica a legend in Dutch computing. The tales in this book are told by those who have a right to tell. Highly engaged professionals take readers back to their pioneering work with the machines and in retrospect unveil some of the values, which went without saying in the 1960s. To disagree, Paul Klint relates the contrasting views on software in Dutch research traditions. ALGOL culture: Frans Kruseman Aretz takes the reader along to the detailed decisions on constructing compilers and shows the values of an ALGOL culture transpiring. Signposts: Dirk Dekker for the first time 'owns' his algorithm for mutual exclusion. In particle physics: Rene van Dantzig's use case was an Electrologica X8 computer controlling two other computers in three-dimensional detection of colliding particles. Early steps in AI: Lambert Meertens' tale of the X8 machine composing a violin quartet comes with his original presentation, as well as the code in ALGOL 60. The reflections of first hand experiences combine well with the second thoughts of historical research into archival sources. Historians Huub de Beer and Gerard Alberts offer a view into the boardrooms of the local enterprise Electrologica, and of the electronics multinational Philips. Where pioneers and historians meet in an inspiring dialogue, the reader gains a view on the often implicit decisions constituting the field. Fortuitously, a copy of the X8 was retrieved from Kiel, Germany, and put on display at Rijksmuseum Boerhaave, Leiden. Sparked by the very material presence of an X8, the present book takes stock of the state of historiography of Electrologica. Gerard Alberts is an associate professor in History of Digital Cultures, retired from the University of Amsterdam. Jan Friso Groote is a full professor of Formal Methods at the Eindhoven University of Technology.
Wireless sensor networks have a range of applications, including military uses and in environmental monitoring. When an area of interest is inaccessible by conventional means, such a network can be deployed in ways resulting in a random distribution of the sensors. Randomly Deployed Wireless Sensor Networks offers a probabilistic method to model and analyze these networks. The book considers the network design, coverage, target detection, localization and tracking of sensors in randomly deployed wireless networks, and proposes a stochastic model. It quantifies the relationship between parameters of the network and its performance, and puts forward a communication protocol. The title provides analyses and formulas, giving engineering insight into randomly deployed wireless sensor networks. Five chapters consider the analysis of coverage performance; working modes and scheduling mechanisms; the relationship between sensor behavior and network performance properties; probabilistic forwarding routing protocols; localization methods for multiple targets and target number estimation; and experiments on target localization and tracking with a Mica sensor system.
The primary purpose of this book is to present the state-of-the-art of mobile cloud computing and applications with an emphasis on energy-efficiency. The future research directions are also highlighted in this book to enrich the global market-place of mobile cloud computing services facilitating the scientific, industrial, business, and consumer applications. We expect that the book will serve as a reference to a large number of readers including researchers, system architects, practitioners, and graduate-level students. This book focuses on an emerging area that has considerable research interest, momentum, and interest of commercial developers. The target reader of this book are professional developers, under-graduate and post-graduate students, and researchers. As mobile cloud computing, as well as green computing, will have a major impact on the quality of science and society over the next few years, its knowledge will enrich our readers to be at the forefront of the field. This book reports the latest research advances in the area of green mobile cloud computing. The book covers the architecture, services, methods, applications, and future research directions of green mobile cloud computing.
Why learn functional programming? Isn't that some complicated ivory-tower technique used only in obscure languages like Haskell? In fact, functional programming is actually very simple. It's also very powerful, as Haskell demonstrates by throwing away all the conventional programming tools and using only functional programming features. But it doesn't have to be done that way. Functional programming is a power tool that you can use in addition to all your usual tools, to whatever extent your current mainstream language supports it. Most languages have at least basic support. In this book we use Python and Java and, as a bonus, Scala. If you prefer another language, there will be minor differences in syntax, but the concepts are the same. Give functional programming a try. You may be surprised how much a single power tool can help you in your day-to-day programming.
Recent industry surveys expect the cloud computing services market to be in excess of $20 billion and cloud computing jobs to be in excess of 10 million worldwide in 2014 alone. In addition, since a majority of existing information technology (IT) jobs is focused on maintaining legacy in-house systems, the demand for these kinds of jobs is likely to drop rapidly if cloud computing continues to take hold of the industry. However, there are very few educational options available in the area of cloud computing beyond vendor-specific training by cloud providers themselves. Cloud computing courses have not found their way (yet) into mainstream college curricula. This book is written as a textbook on cloud computing for educational programs at colleges. It can also be used by cloud service providers who may be interested in offering a broader perspective of cloud computing to accompany their own customer and employee training programs. The typical reader is expected to have completed a couple of courses in programming using traditional high-level languages at the college-level, and is either a senior or a beginning graduate student in one of the science, technology, engineering or mathematics (STEM) fields. We have tried to write a comprehensive book that transfers knowledge through an immersive "hands-on approach," where the reader is provided the necessary guidance and knowledge to develop working code for real-world cloud applications. Additional support is available at the book's website: www.cloudcomputingbook.info Organization The book is organized into three main parts. Part I covers technologies that form the foundations of cloud computing. These include topics such as virtualization, load balancing, scalability & elasticity, deployment, and replication. Part II introduces the reader to the design & programming aspects of cloud computing. Case studies on design and implementation of several cloud applications in the areas such as image processing, live streaming and social networks analytics are provided. Part III introduces the reader to specialized aspects of cloud computing including cloud application benchmarking, cloud security, multimedia applications and big data analytics. Case studies in areas such as IT, healthcare, transportation, networking and education are provided.
"The Definitive Guide to SUSE Linux Enterprise Server" is a comprehensive guide to Novell's SUSE Linux Enterprise Server (SLES), one of the most powerful Linux-based server solutions available today. Sander van Vugt, noted author, consultant, and trainer, guides you through the most important aspects of SLES, beginning with an in-depth overview of installation and configuration tasks. In the opening chapters, you will learn how to configure network capabilities, efficiently manage software updates, and manage the file system. Later chapters are devoted to configuration and deployment of key network services including the MySQL database, CUPS, Samba, PostFix, FTP, DNS, proxy servers, and more. Along the way, van Vugt illustrates important administration concepts such as instituting strict file system security and server automation. Since increasing demands are placed on these services, you'll learn how to cluster servers together to lessen downtime and increase performance.
The more rapid rate of increase in the speed of microprocessor technology than in memory speeds has created a serious 'memory gap' for computer designers and manufacturers. "High Performance Memory Systems" addresses this issue and examines all aspects of improving the memory system performance of general-purpose programs. Current research highlights from both industry and academia focus on: coherence, synchronization, and allocation; power-awareness, reliability, and reconfigurability; software-based memory tuning; architecture design issues; and workload considerations. Topics and features: *both harware and software approaches to scalability and speed disparities are considered *introductory chapter provides broad examination of high performance memory systems *includes coverage of topics from several important international conferences Edited by leading international authorities in the field, this new work provides a survey from researchers and practitioners on advances in technology, architecture, and algorithms that address scalability needs in multiprocessors and the expanding gap between CPU/network and memory speeds. It is ideally suited to researchers and R & D professionals with interests or practice in computer engineering, computer architecture, and processor architecture. |
![]() ![]() You may like...
PowerShell, IT Pro Solutions…
William R. Stanek, William Stanek
Hardcover
R1,550
Discovery Miles 15 500
|