![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems
This two-part book puts the spotlight on how a TCP/IP stack works using Micri m's uC/TCP-IP as a reference. Part I includes an overview of the basics of the Internet Protocol and walks through various aspects of C/TCP-IP implementation and usage. Part II provides examples for the reader, using the Renesas YRDKRX62N Evaluation Board. The board features the Renesas RX62N, a high-performance 32-bit Flash MCU with FPU and DSP capability, and rich connectivity including Ethernet. Together with the Renesas e2Studio, the evaluation board provides everything necessary to get you up and running quickly, as well as a fun and educational experience, resulting in a high-level of proficiency in a short time. This book is written for serious embedded systems programmers, consultants, hobbyists, and students interested in understanding the inner workings of a TCP/IP stack. uC/TCP-IP is not just a great learning platform, but also a full commercial-grade software package, ready to be part of a wide range of products. The topics covered in this book include: Ethernet technology and device drivers IP connectivity Client and Server architecture Socket programming UDP performance TCP performance System network performance
i. This book will contain AI, ML, DL, big data and security never before considered ii. Innovative artificial intelligence techniques and algorithms iii. Only emerging from recent research and development, e.g. AI for big data from security perspective, which are not covered in any existing texts iv. Artificial Intelligence for big data and security Applications with advanced features v. Key new finding of machine learning and deep learning for Security Applications
Provides comprehensive research ideas about Edge-AI technology that can assist doctors in making better data-driven decisions and will provide insights to researchers about healthcare industry, trends and future perspective. Examines how healthcare systems of the future will operate, by augmenting clinical resources and ensuring optimal patient outcomes. Provides insight about how Edge-AI is revolutionizing decision making, early warnings for conditions, and visual inspection in healthcare. Highlight trends, challenges, opportunities and future areas where Healthcare informatics deal with accessing vast data sets of potentially life-saving information.
Verification of real-time requirements in systems-on-chip becomes more complex as more applications are integrated. Predictable and composable systems can manage the increasing complexity using formal verification and simulation. This book explains the concepts of predictability and composability and shows how to apply them to the design and analysis of a memory controller, which is a key component in any real-time system.
Gives broad perspective on 5G communications with a focus on smart cities Discusses artificial intelligence in future wireless communication and its applications Provides a systemic and comprehensive coverage of 6G technologies, challenges and use cases Explores role of future wireless in safety, health, and transport in smart cities Includes case studies of future wireless communications
This book presents the basics of both NAND flash storage and machine learning, detailing the storage problems the latter can help to solve. At a first sight, machine learning and non-volatile memories seem very far away from each other. Machine learning implies mathematics, algorithms and a lot of computation; non-volatile memories are solid-state devices used to store information, having the amazing capability of retaining the information even without power supply. This book will help the reader understand how these two worlds can work together, bringing a lot of value to each other. In particular, the book covers two main fields of application: analog neural networks (NNs) and solid-state drives (SSDs). After reviewing the basics of machine learning in Chapter 1, Chapter 2 shows how neural networks can mimic the human brain; to accomplish this result, neural networks have to perform a specific computation called vector-by-matrix (VbM) multiplication, which is particularly power hungry. In the digital domain, VbM is implemented by means of logic gates which dictate both the area occupation and the power consumption; the combination of the two poses serious challenges to the hardware scalability, thus limiting the size of the neural network itself, especially in terms of the number of processable inputs and outputs. Non-volatile memories (phase change memories in Chapter 3, resistive memories in Chapter 4, and 3D flash memories in Chapter 5 and Chapter 6) enable the analog implementation of the VbM (also called "neuromorphic architecture"), which can easily beat the equivalent digital implementation in terms of both speed and energy consumption. SSDs and flash memories are strictly coupled together; as 3D flash scales, there is a significant amount of work that has to be done in order to optimize the overall performances of SSDs. Machine learning has emerged as a viable solution in many stages of this process. After introducing the main flash reliability issues, Chapter 7 shows both supervised and un-supervised machine learning techniques that can be applied to NAND. In addition, Chapter 7 deals with algorithms and techniques for a pro-active reliability management of SSDs. Last but not least, the last section of Chapter 7 discusses the next challenge for machine learning in the context of the so-called computational storage. No doubt that machine learning and non-volatile memories can help each other, but we are just at the beginning of the journey; this book helps researchers understand the basics of each field by providing real application examples, hopefully, providing a good starting point for the next level of development.
#1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020 and 2021 2020 Cybersecurity CANON Hall of Fame Winner Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2 Guide to the CISSP CBK, COBIT 5 for Information Security, and ISACA CSX Cybersecurity Fundamental Certification, is back with this new book incorporating practical experience in leading, building, and sustaining an information security/cybersecurity program. CISO COMPASS includes personal, pragmatic perspectives and lessons learned of over 75 award-winning CISOs, security leaders, professional association leaders, and cybersecurity standard setters who have fought the tough battle. Todd has also, for the first time, adapted the McKinsey 7S framework (strategy, structure, systems, shared values, staff, skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization, capable of industry/ peer award-winning recognition, enhance cybersecurity maturity, gain confidence by senior management, and avoid pitfalls. The book is a comprehensive, soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy, emerging trends and technologies, cybersecurity organization structure and reporting models, leveraging current incidents, security control frameworks, risk management, laws and regulations, data protection and privacy, meaningful policies and procedures, multi-generational workforce team dynamics, soft skills, and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity.
This book provides insights on how to approach and utilize data science tools, technologies and methodologies related to artificial intelligence (AI) in industrial contexts. It explains the essence of distributed computing and AI-technologies, and their inter-connections. Description of various technology and methodology approaches, and their purpose and benefits when developing AI-solution in industrial contexts is included. In addition, it summarizes experiences from AI technology deployment projects from several industrial sectors. Features: Presents compendium of methodologies and technologies in Industrial AI and digitalization. Illustrates sensor to actuation approach showing complete cycle, that defines and differences AI and digitalization concept. Covers a broad range of academic and industrial issues within the field of asset management. Discusses impact of Industry 4.0 in other sectors. Includes a dedicated chapter on real-time case studies. This book is aimed at researchers and professionals in industrial and software engineering, network security, AI and ML, engineering managers, operational and maintenance specialists, asset managers, digital and AI manufacturing specialists.
Whether the source is more industry-based or academic research, there certainly appears to be a growing interest in the field of cryptocurrency. The New York Times had a cover story on March 24, 2022, titled "Time to Enter the Crypto Zone?," and they talked about institutional investors pouring billions into digital tokens, salaries being taken in Bitcoins, and even Bitcoin ATMs in grocery stores. Certainly, there have been ups and downs in crypto, but it has a kind of alluring presence that tempts one to include crypto as part of one’s portfolio. Those who are "prime crypto-curious" investors are usually familiar with the tech/pop culture and feel they want to diversify a bit in this fast-moving market. Even universities are beginning to offer more courses and create "Centers on Cryptocurrency." Some universities are even requiring their students who take a crypto course to pay the course tuition via cryptocurrency. In response to the growing interest and fascination about the crypto industry and cryptocurrency in general, Cryptocurrency Concepts, Technology, and Applications brings together many leading worldwide contributors to discuss a broad range of issues associated with cryptocurrency. The book covers a wide array of crypto-related topics, including: Blockchain NFTs Data analytics and AI Crypto crime Crypto industry and regulation Crypto and public choice Consumer confidence Bitcoin and other cryptocurrencies. Presenting various viewpoints on where the crypto industry is heading, this timely book points out both the advantages and limitations of this emerging field. It is an easy-to-read, yet comprehensive, overview of cryptocurrency in the U.S. and international markets.
This book is timely and discusses the effects from the pandemic. Written for longevity, and may be useful to compare this pandemic and the response to future events. The book is written for academia: social sciences, public health, information science, emergency management, and policy fields, and is easier informational reading for the layperson.
This book provides an introduction to decision making in a distributed computational framework. Classical detection theory assumes a centralized configuration. All observations are processed by a central processor to produce the decision. In the decentralized detection system, distributed detectors generate decisions based on locally available observations; these decisions are then conveyed to the fusion center that makes the global decision. Using numerous examples throughout the book, the author discusses such distributed detection processes under several different formulations and in a wide variety of network topologies.
This book uses automotive embedded systems as an example to introduce functional safety assurance and safety-aware cost optimization. The book explores functional safety assurance from the perspectives of verification, enhancement, and validation. The functional safety assurance methods implement a safe and efficient assurance system that integrates safety verification, enhancement, and validation. The assurance methods offered in this book could provide a reasonable and scientific theoretical basis for the subsequent formulation of automotive functional safety standards. The safety-aware cost optimization methods divide cost types according to the essential differences of various costs in system design and establish reasonable models based on different costs. The cost optimization methods provided in this book could give appropriate cost optimization solutions for the cost-sensitive automotive industry, thereby achieving effective cost management and control. Functional safety assurance methods and safety-aware cost optimization support each other and jointly build the architecture of functional safety design methodologies for automotive embedded systems. The work aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this area or those interested in hardware cost optimization and development cost optimization design methods based on ensuring functional safety in general.
1. Covers latest concepts in intelligent analytics for industry 4.0. 2. Presents the applications of intelligent analytics for various industry 4.0 domains. 3. Covers latest research topics in the field. 4. Written in a comprehensive and simple manner. 5. The text is accompanied by tables and illustrative figures for better understanding of the topic.
Gain a thorough understanding of today's sometimes daunting, ever-changing world of technology as you learn how to apply the latest technology to your academic, professional and personal life with TECHNOLOGY FOR SUCCESS: COMPUTER CONCEPTS. Written by a team of best-selling technology authors and based on extensive research and feedback from students like you, this edition breaks each topic into brief, inviting lessons that address the "what, why and how" behind digital advancements to ensure deep understanding and application to today's real world. Optional online MindTap and SAM (Skills Assessment Manager) learning tools offer hands-on and step-by-step training, videos that cover the more difficult concepts and simulations that challenge you to solve problems in the actual world. You leave this course able to read the latest technology news and understand its impact on your daily life, the economy and society.
The developments in mesh generation are usually driven by the needs of new applications and/or novel algorithms. The last decade has seen a renewed interest in mesh generation and adaptation by the computational engineering community, due to the challenges introduced by complex industrial problems.Another common challenge is the need to handle complex geometries. Nowadays, it is becoming obvious that geometry should be persistent throughout the whole simulation process. Several methodologies that can carry the geometric information throughout the simulation stage are available, but due to the novelty of these methods, the generation of suitable meshes for these techniques is still the main obstacle for the industrial uptake of this technology.This book will cover different aspects of mesh generation and adaptation, with particular emphasis on cutting-edge mesh generation techniques for advanced discretisation methods and complex geometries.
This book gives a broad look at both fundamental networking technology and new areas that support it and use it. It is a concise introduction to the most prominent, recent technological topics in computer networking. Topics include network technology such as wired and wireless networks, enabling technologies such as data centers, software defined networking, cloud and grid computing and applications such as networks on chips, space networking and network security. The accessible writing style and non-mathematical treatment makes this a useful book for the student, network and communications engineer, computer scientist and IT professional.
Building on the successful first and second volumes, this book is the third volume of the Springer book on the Robot Operating System (ROS): The Complete Reference. The Robot Operating System is evolving from year to year with a wealth of new contributed packages and enhanced capabilities. Further, the ROS is being integrated into various robots and systems and is becoming an embedded technology in emerging robotics platforms. The objective of this third volume is to provide readers with additional and comprehensive coverage of the ROS and an overview of the latest achievements, trends and packages developed with and for it. Combining tutorials, case studies, and research papers, the book consists of sixteen chapters and is divided into five parts. Part 1 presents multi-robot systems with the ROS. In Part 2, four chapters deal with the development of unmanned aerial systems and their applications. In turn, Part 3 highlights recent work related to navigation, motion planning and control. Part 4 discusses recently contributed ROS packages for security, ROS2, GPU usage, and real-time processing. Lastly, Part 5 deals with new interfaces allowing users to interact with robots. Taken together, the three volumes of this book offer a valuable reference guide for ROS users, researchers, learners and developers alike. Its breadth of coverage makes it a unique resource.
1. The book will discuss most relevant real-life applications and case studies of Network Technologies. 2. The book will provide deeper knowledge regarding emerging research trends and future research directions in Network Technologies. 3. The book will provide theoretical, algorithmic, simulation, and implementation-based research developments in Network Technologies. 4. The book will follow theoretical approach to describe fundamentals of Network Technologies for the beginners as well as practical approach to depict simulation and implementation of real-life applications for intermediate and advanced readers.
This book describes novel methods for network-on-chip (NoC) design, using source-synchronous high-speed resonant clocks. The authors discuss NoCs from the bottom up, providing circuit level details, before providing architectural simulations. As a result, readers will get a complete picture of how a NoC can be designed and optimized.Using the methods described in this book, readers are enabled to design NoCs that are 5X better than existing approaches in terms of latency and throughput and can also sustain a significantly greater amount of traffic."
During a meeting in Toronto last winter, Mike Jenkins, Bob Bernecky and I were discussing how the two existing theories on arrays influenced or were in fluenced by programming languages and systems. More's Army Theory was the basis for NIAL and APL2 and Mullin's A Mathematics of A rmys(MOA), is being used as an algebra of arrays in functional and A-calculus based pro gramming languages. MOA was influenced by Iverson's initial and extended algebra, the foundations for APL and J respectively. We discussed that there is a lot of interest in the Computer Science and Engineering communities concerning formal methods for languages that could support massively parallel operations in scientific computing, a back to-roots interest for both Mike and myself. Languages for this domain can no longer be informally developed since it is necessary to map languages easily to many multiprocessor architectures. Software systems intended for parallel computation require a formal basis so that modifications can be done with relative ease while ensuring integrity in design. List based lan guages are profiting from theoretical foundations such as the Bird-Meertens formalism. Their theory has been successfully used to describe list based parallel algorithms across many classes of architectures."
BASIC Microcomputing and Biostatistics is designed as the first practical "how to" guide to both computer programming in BASIC and the statis tical data processing techniques needed to analyze experimental, clinical, and other numerical data. It provides a small vocabulary of essential com puter statements and shows how they are used to solve problems in the bio logical, physical, and medical sciences. No mathematical background be yond algebra and an inkling of the principles of calculus is assumed. All more advanced mathematical techniques are developed from "scratch" before they are used. The computing language is BASIC, a high-level lan guage that is easy to learn and widely available using time-sharing com puter systems and personal microcomputers. The strategy of the book is to present computer programming at the outset and to use it throughout. BASIC is developed in a way reminiscent of graded readers used in human languages; the first programs are so sim ple that they can be read almost without an introduction to the language. Each program thereafter contains new vocabulary and one or more con cepts, explained in the text, not used in the previous ones. By gradual stages, the reader can progress from programs that do nothing more than count from one to ten to sophisticated programs for nonlinear curve fitting, matrix algebra, and multiple regression. There are 33 working programs and, except for the introductory ones, each performs a useful function in everyday data processing problems encountered by the experimentalist in many diverse fields." |
![]() ![]() You may like...
Evolutionary Computing and Mobile…
V. Suma, Noureddine Bouhmala, …
Hardcover
R5,823
Discovery Miles 58 230
Learning without Boundaries - Technology…
Robert J. Seidel, Paul R. Chatelier
Hardcover
R4,530
Discovery Miles 45 300
Brain-Machine Interface - Closed-loop…
Xilin Liu, Jan Van der Spiegel
Hardcover
R4,959
Discovery Miles 49 590
Nonlinear Assignment Problems…
Panos M. Pardalos, L.S. Pitsoulis
Hardcover
R4,390
Discovery Miles 43 900
Distributed Systems for System…
Paulo Verissimo, Luis Rodrigues
Hardcover
R3,696
Discovery Miles 36 960
Advances in Production Management…
Alexandre Dolgui, Alain Bernard, …
Hardcover
R5,262
Discovery Miles 52 620
|