0
Your cart

Your cart is empty

Price
  • R50 - R100 (1)
  • R100 - R250 (205)
  • R250 - R500 (831)
  • R500+ (8,488)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems

Enabling Technologies for Effective Planning and Management in Sustainable Smart Cities (Hardcover, 1st ed. 2023): Mohd Abdul... Enabling Technologies for Effective Planning and Management in Sustainable Smart Cities (Hardcover, 1st ed. 2023)
Mohd Abdul Ahad, Gabriella Casalino, Bharat Bhushan
R4,926 Discovery Miles 49 260 Ships in 12 - 19 working days

With the rapid penetration of technology in varied application domains, the existing cities are getting connected more seamlessly. Cities becomes smart by inducing ICT in the classical city infrastructure for its management. According to McKenzie Report, about 68% of the world population will migrate towards urban settlements in near future. This migration is largely because of the improved Quality of Life (QoL) and livelihood in urban settlements. In the light of urbanization, climate change, democratic flaws, and rising urban welfare expenditures, smart cities have emerged as an important approach for society's future development. Smart cities have achieved enhanced QoL by giving smart information to people regarding healthcare, transportation, smart parking, smart traffic structure, smart home, smart agronomy, community security etc. Typically, in smart cities data is sensed by the sensor devices and provided to end users for further use. The sensitive data is transferred with the help of internet creating higher chances for the adversaries to breach the data. Considering the privacy and security as the area of prime focus, this book covers the most prominent security vulnerabilities associated with varied application areas like healthcare, manufacturing, transportation, education and agriculture etc. Furthermore, the massive amount of data being generated through ubiquitous sensors placed across the smart cities needs to be handled in an effective, efficient, secured and privacy preserved manner. Since a typical smart city ecosystem is data driven, it is imperative to manage this data in an optimal manner. Enabling technologies like Internet of Things (IoT), Natural Language Processing (NLP), Blockchain Technology, Deep Learning, Machine Learning, Computer vision, Big Data Analytics, Next Generation Networks and Software Defined Networks (SDN) provide exemplary benefits if they are integrated in the classical city ecosystem in an effective manner. The application of Artificial Intelligence (AI) is expanding across many domains in the smart city, such as infrastructure, transportation, environmental protection, power and energy, privacy and security, governance, data management, healthcare, and more. AI has the potential to improve human health, prosperity, and happiness by reducing our reliance on manual labor and accelerating our progress in the sciences and technologies. NLP is an extensive domain of AI and is used in collaboration with machine learning and deep learning algorithms for clinical informatics and data processing. In modern smart cities, blockchain provides a complete framework that controls the city operations and ensures that they are managed as effectively as possible. Besides having an impact on our daily lives, it also facilitates many areas of city management.

Handbook of Research of Internet of Things and Cyber-Physical Systems - An Integrative Approach to an Interconnected Future... Handbook of Research of Internet of Things and Cyber-Physical Systems - An Integrative Approach to an Interconnected Future (Hardcover)
Amit Kumar Tyagi, Niladhuri Sreenath
R5,985 Discovery Miles 59 850 Ships in 12 - 19 working days

This new volume discusses how integrating IoT devices and cyber-physical systems can help society by providing multiple efficient and affordable services to users. It covers the various applications of IoT-based cyber-physical systems, such as satellite imaging in relation to climate change, industrial control systems, e-healthcare applications, security uses, automotive and traffic monitoring and control, urban smart city planning, and more. The authors also outline the methods, tools, and algorithms for IoT-based cyber-physical systems and explore the integration of machine learning, blockchain, and Internet of Things-based cloud applications. With the continuous emerging new technologies and trends in IoT technology and CPS, this volume will be a helpful resource for scientists, researchers, industry professionals, faculty and students, and others who wish to keep abreast of new developments and new challenges for sustainable development in Industry 4.0.

Vehicular Ad Hoc Networks - Futuristic Technologies for Interactive Modelling, Dimensioning, and Optimization (Hardcover):... Vehicular Ad Hoc Networks - Futuristic Technologies for Interactive Modelling, Dimensioning, and Optimization (Hardcover)
Muhammad Arif, Guojun Wang, Mazin Abed Mohammed, Md Tabrez Nafis
R3,439 Discovery Miles 34 390 Ships in 12 - 19 working days

With the evolution of technology and sudden growth in the number of smart vehicles, traditional Vehicular Ad hoc NETworks (VANETs) face several technical challenges in deployment and management due to less flexibility, scalability, poor connectivity, and inadequate intelligence. VANETs have raised increasing attention from both academic research and industrial aspects resulting from their important role in driving assistant system. Vehicular Ad Hoc Networks focuses on recent advanced technologies and applications that address network protocol design, low latency networking, context-aware interaction, energy efficiency, resource management, security, human-robot interaction, assistive technology and robots, application development, and integration of multiple systems that support Vehicular Networks and smart interactions. Simulation is a key tool for the design and evaluation of Intelligent Transport Systems (ITS) that take advantage of communication-capable vehicles in order to provide valuable safety, traffic management, and infotainment services. It is widely recognized that simulation results are only significant when realistic models are considered within the simulation tool chain. However, quite often research works on the subject are based on simplistic models unable to capture the unique characteristics of vehicular communication networks. The support that different simulation tools offer for such models is discussed, as well as the steps that must be undertaken to fine-tune the model parameters in order to gather realistic results. Moreover, the book provides handy hints and references to help determine the most appropriate tools and models. This book will promote best simulation practices in order to obtain accurate results.

Let's Get IoT-fied! - 30 IoT Projects for All Levels (Hardcover): Shriram K. Vasudevan, Anudeep Juluru, TS Murugesh Let's Get IoT-fied! - 30 IoT Projects for All Levels (Hardcover)
Shriram K. Vasudevan, Anudeep Juluru, TS Murugesh
R3,475 Discovery Miles 34 750 Ships in 12 - 19 working days

Unique selling point: * This book teaches readers how to build IoT products through practical projects, ranging from beginners to advanced level, so that they can build knowledge through hands-on tasks rather than theoretical knowledge. Core audience: * IoT enthusiasts, students and tutors Place in the market: * This is a new approach and distinctly different from all of the books which focus only on theory.

Energy Optimization Protocol Design for Sensor Networks in IoT Domains (Hardcover): Sanjeev J. Wagh, Manisha Sunil Bhende,... Energy Optimization Protocol Design for Sensor Networks in IoT Domains (Hardcover)
Sanjeev J. Wagh, Manisha Sunil Bhende, Anuradha D. Thakare
R3,569 Discovery Miles 35 690 Ships in 12 - 19 working days

This book provides an essential overview of IoT, energy-efficient topology control protocols, motivation, and challenges for topology control for Wireless Sensor Networks, and the scope of the research in the domain of IoT. Further, it discusses the different design issues of topology control and energy models for IoT applications, different types of simulators with their advantages and disadvantages. It also discusses extensive simulation results and comparative analysis for various algorithms. The key point of this book is to present a solution to minimize energy and extend the lifetime of IoT networks using optimization methods to improve the performance. Features: Describes various facets necessary for energy optimization in IoT domain. Covers all aspects to achieve energy optimization using latest technologies and algorithms, in wireless sensor networks. Presents various IoT and Topology Control Methods and protocols, various network models, and model simulation using MATLAB (R). Reviews methods and results of optimization with Simulation Hardware architecture leading to prolonged life of IoT networks. First time introduces bio-inspired algorithms in the IoT domain for performance optimization This book aims at Graduate Students, Researchers in Information Technology, Computer Science and Engineering, Electronics and Communication Engineering.

Designing Switch/Routers - Fundamental Concepts and Design Methods (Paperback): James Aweya Designing Switch/Routers - Fundamental Concepts and Design Methods (Paperback)
James Aweya
R2,582 Discovery Miles 25 820 Ships in 12 - 19 working days

Provides an introductory level discussion that covers the functions and architectures of the switch/router Focuses on the fundamental concepts that underline the design of switch/routers in general Explains how a routing protocol uses a routing metric to select the best path to a network destination when multiple paths exist Discusses in greater detail the various design methods, and the well-known architectures associated with switch/routers Provides example architectures that illustrate how real-world switch/routers are designed

Designing Switch/Routers - Fundamental Concepts and Design Methods (Hardcover): James Aweya Designing Switch/Routers - Fundamental Concepts and Design Methods (Hardcover)
James Aweya
R6,264 Discovery Miles 62 640 Ships in 12 - 19 working days

Provides an introductory level discussion that covers the functions and architectures of the switch/router Focuses on the fundamental concepts that underline the design of switch/routers in general Explains how a routing protocol uses a routing metric to select the best path to a network destination when multiple paths exist Discusses in greater detail the various design methods, and the well-known architectures associated with switch/routers Provides example architectures that illustrate how real-world switch/routers are designed

Designing Switch/Routers - Architectures and Applications (Hardcover): James Aweya Designing Switch/Routers - Architectures and Applications (Hardcover)
James Aweya
R6,264 Discovery Miles 62 640 Ships in 12 - 19 working days

Discusses the design goals and key features switch/router manufacturers consider when designing their products Explains the design and architectural considerations, as well as the typical processes and steps used to build practical switch/routers Describes the components of a switch/router that are used in configuring, managing, and monitoring it Discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design Describes typical networking applications of switch/routers, particularly, in enterprise and Internet service provider (ISP) networks

Foundations of Hardware IP Protection (Hardcover, 1st ed. 2017): Lilian Bossuet, Lionel Torres Foundations of Hardware IP Protection (Hardcover, 1st ed. 2017)
Lilian Bossuet, Lionel Torres
R3,646 Discovery Miles 36 460 Ships in 10 - 15 working days

This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection.

Advances in Applications of Computational Intelligence and the Internet of Things - Cryptography and Network Security in IoT... Advances in Applications of Computational Intelligence and the Internet of Things - Cryptography and Network Security in IoT (Hardcover)
Rajdeep Chowdhury, S. K. Niranjan
R4,051 Discovery Miles 40 510 Ships in 12 - 19 working days

This new volume illustrates the diverse applications of IoT. The volume addresses the crucial issue of data safekeeping along with the development of a new cryptographic and security technology as well as a range of other advances in IoT. The volume looks at the application of IoT in medical technology and healthcare, including the design of IoT-based mobile healthcare units and a blockchain technique based smart health record system. Other topics include a blended IoT-enabled learning approach through a study employing clustering techniques, an IoT-enabled garbage disposal system with an advanced message notification system through an android application, IoT-based self-healing concrete that uses bacteria and environmental waste, an IoT-enabled trash-the-ash application that regulates flow, and more. The fresh and innovative advances that demonstrate computational intelligence and IoT in practice that are discussed in this volume will be informative for academicians, scholars, scientists, industry professionals, policymakers, government and non-government organizations, and others.

Cyber Security Essentials (Hardcover): James Graham, Ryan Olson, Rick Howard Cyber Security Essentials (Hardcover)
James Graham, Ryan Olson, Rick Howard
R5,000 Discovery Miles 50 000 Ships in 9 - 17 working days

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish this, the team of security professionals from VeriSign's iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It's about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.

Centrality Metrics for Complex Network Analysis - Emerging Research and Opportunities (Hardcover): Natarajan Meghanathan Centrality Metrics for Complex Network Analysis - Emerging Research and Opportunities (Hardcover)
Natarajan Meghanathan
R4,709 Discovery Miles 47 090 Ships in 10 - 15 working days

As network science and technology continues to gain popularity, it becomes imperative to develop procedures to examine emergent network domains, as well as classical networks, to help ensure their overall optimization. Centrality Metrics for Complex Network Analysis: Emerging Research and Opportunities is a pivotal reference source for the latest research findings on centrality metrics and their broader applications for different categories of networks including wireless sensor networks, curriculum networks, social networks etc. Featuring extensive coverage on relevant areas, such as complex network graphs, node centrality metrics, and mobile sensor networks, this publication is an ideal resource for students, faculty, industry practitioners, and business professionals interested in theoretical concepts and current developments in network domains.

Design Automation Techniques for Approximation Circuits - Verification, Synthesis and Test (Hardcover, 1st ed. 2019): Arun... Design Automation Techniques for Approximation Circuits - Verification, Synthesis and Test (Hardcover, 1st ed. 2019)
Arun Chandrasekharan, Daniel Grosse, Rolf Drechsler
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book describes reliable and efficient design automation techniques for the design and implementation of an approximate computing system. The authors address the important facets of approximate computing hardware design - from formal verification and error guarantees to synthesis and test of approximation systems. They provide algorithms and methodologies based on classical formal verification, synthesis and test techniques for an approximate computing IC design flow. This is one of the first books in Approximate Computing that addresses the design automation aspects, aiming for not only sketching the possibility, but providing a comprehensive overview of different tasks and especially how they can be implemented.

Urban Analytics with Social Media Data - Foundations, Applications and Platforms (Hardcover): Tan Yigitcanlar, Nayomi Kankanamge Urban Analytics with Social Media Data - Foundations, Applications and Platforms (Hardcover)
Tan Yigitcanlar, Nayomi Kankanamge
R3,143 Discovery Miles 31 430 Ships in 12 - 19 working days

The use of data science and urban analytics has become a defining feature of smart cities. This timely book is a clear guide to the use of social media data for urban analytics. The book presents the foundations of urban analytics with social media data, along with real-world applications and insights on the platforms we use today. It looks at social media analytics platforms, cyberphysical data analytics platforms, crowd detection platforms, City-as-a-Platform, and city-as-a-sensor for platform urbanism. The book provides examples to illustrate how we apply and analyse social media data to determine disaster severity, assist authorities with pandemic policy, and capture public perception of smart cities. This will be a useful reference for those involved with and researching social, data, and urban analytics and informatics.

Hybrid Encryption Algorithms over Wireless Communication Channels (Paperback): Mai Helmy Shaheen Hybrid Encryption Algorithms over Wireless Communication Channels (Paperback)
Mai Helmy Shaheen
R1,437 Discovery Miles 14 370 Ships in 12 - 19 working days

This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, "Hybrid Encryption Algorithms over Wireless Communication Channels", examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik's cube is used afterwards in order to maximize the number of permutations. Transmission of images and videos is vital in today's communications systems. Hence, an effective encryption and modulation schemes are a must. The author adopts Orthogonal Frequency Division Multiplexing (OFDM), as the multicarrier transmission choice for wideband communications. For completeness, the author addresses the sensitivity of the encrypted data to the wireless channel impairments, and the effect of channel equalization on the received images and videos quality. Complete simulation experiments with MATLAB (R) codes are included. The book will help the reader obtain the required understanding for selecting the suitable encryption method that best fulfills the application requirements.

How to Find a Needle in a Haystack - From the Insider Threat to Solo Perpetrators (Hardcover): Yair Neuman How to Find a Needle in a Haystack - From the Insider Threat to Solo Perpetrators (Hardcover)
Yair Neuman
R1,601 Discovery Miles 16 010 Ships in 12 - 19 working days

By the end of this book, the reader will understand: the difficulties of finding a needle in a haystack; creative solutions to address the problem; unique ways of engineering features and solving the problem of the lack of data (e.g. synthetic data). Additionally, the reader will be able to: avoid mistakes resulting from a lack of understanding; search for appropriate methods of feature engineering; locate the relevant technological solutions within the general context of decision-making.

GPU Parallel Program Development Using CUDA (Paperback): Tolga Soyata GPU Parallel Program Development Using CUDA (Paperback)
Tolga Soyata
R1,590 Discovery Miles 15 900 Ships in 12 - 19 working days

GPU Parallel Program Development using CUDA teaches GPU programming by showing the differences among different families of GPUs. This approach prepares the reader for the next generation and future generations of GPUs. The book emphasizes concepts that will remain relevant for a long time, rather than concepts that are platform-specific. At the same time, the book also provides platform-dependent explanations that are as valuable as generalized GPU concepts. The book consists of three separate parts; it starts by explaining parallelism using CPU multi-threading in Part I. A few simple programs are used to demonstrate the concept of dividing a large task into multiple parallel sub-tasks and mapping them to CPU threads. Multiple ways of parallelizing the same task are analyzed and their pros/cons are studied in terms of both core and memory operation. Part II of the book introduces GPU massive parallelism. The same programs are parallelized on multiple Nvidia GPU platforms and the same performance analysis is repeated. Because the core and memory structures of CPUs and GPUs are different, the results differ in interesting ways. The end goal is to make programmers aware of all the good ideas, as well as the bad ideas, so readers can apply the good ideas and avoid the bad ideas in their own programs. Part III of the book provides pointer for readers who want to expand their horizons. It provides a brief introduction to popular CUDA libraries (such as cuBLAS, cuFFT, NPP, and Thrust),the OpenCL programming language, an overview of GPU programming using other programming languages and API libraries (such as Python, OpenCV, OpenGL, and Apple's Swift and Metal,) and the deep learning library cuDNN.

Zero Trust Journey Across the Digital Estate (Hardcover): Abbas Kudrati, Binil A. Pillai Zero Trust Journey Across the Digital Estate (Hardcover)
Abbas Kudrati, Binil A. Pillai
R3,279 Discovery Miles 32 790 Ships in 12 - 19 working days

* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.

Management of Organizational Culture as a Stabilizer of Changes - Organizational Culture Management Dilemmas (Paperback):... Management of Organizational Culture as a Stabilizer of Changes - Organizational Culture Management Dilemmas (Paperback)
Ibrahiem M.M.El Emary, Anna Brzozowska, Dagmara Bubel
R1,512 Discovery Miles 15 120 Ships in 12 - 19 working days

Unique selling point:* Focuses on the relationship between organizational culture and change effectiveness with a focus on communication systemsCore audience:* Intended for IT and business management professionals Place in the market:* Will go alongside the main author's other books to give a full picture of IT systems being utilised within business management

Botnets - Architectures, Countermeasures, and Challenges (Paperback): Georgios Kambourakis, Marios Anagnostopoulos, Weizhi... Botnets - Architectures, Countermeasures, and Challenges (Paperback)
Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou
R1,549 Discovery Miles 15 490 Ships in 12 - 19 working days

This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.

Vulnerability Management (Paperback, 2nd edition): Park Foreman Vulnerability Management (Paperback, 2nd edition)
Park Foreman
R1,539 Discovery Miles 15 390 Ships in 12 - 19 working days

Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks-including a new chapter on cloud vulnerabilities and risk management-from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.

Designing Switch/Routers - Architectures and Applications (Paperback): James Aweya Designing Switch/Routers - Architectures and Applications (Paperback)
James Aweya
R2,573 Discovery Miles 25 730 Ships in 12 - 19 working days

Discusses the design goals and key features switch/router manufacturers consider when designing their products Explains the design and architectural considerations, as well as the typical processes and steps used to build practical switch/routers Describes the components of a switch/router that are used in configuring, managing, and monitoring it Discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design Describes typical networking applications of switch/routers, particularly, in enterprise and Internet service provider (ISP) networks

Core Data in Swift (Paperback): Marcus Zarra Core Data in Swift (Paperback)
Marcus Zarra
R1,067 R805 Discovery Miles 8 050 Save R262 (25%) Ships in 12 - 19 working days

Core Data is intricate, powerful, and necessary. Discover the powerful capabilities integrated into Core Data, and how to use Core Data in your iOS and OS X projects. All examples are current for OS X El Capitan, iOS 9, and the latest release of Core Data. All the code is written in Swift, including numerous examples of how best to integrate Core Data with Apple's newest programming language. Core Data expert Marcus Zarra walks you through a fully developed application based around the Core Data APIs. You'll build on this application throughout the book, learning key Core Data elements such as NSPredicate, NSFetchRequest, thread management, and memory management. Start with the basics of Core Data and learn how to use it to develop your application. Then delve deep into the API details. Explore how to get Core Data integrated into your application properly, and work with this flexible API to create convenience methods to improve your application's maintainability. Reduce your migration difficulties, integrate your Core Data app with iCloud and Watch Kit, and use Core Data in a queue-based environment.By the end of the book, you'll have built a full-featured application, gained a complete understanding of Core Data, and learned how to integrate your application into the iPhone/iPad platform. This book is based on Core Data in Objective-C, Third Edition. It focuses on Swift and adds an additional chapter on how to integrate Core Data with an efficient network implementation, with best practices on how to load and pre-load data into your Swift application

Internet of Things and Data Mining for Modern Engineering and Healthcare Applications (Hardcover): Ankan Bhattacharya,... Internet of Things and Data Mining for Modern Engineering and Healthcare Applications (Hardcover)
Ankan Bhattacharya, Bappadittya Roy, Samarendra Nath Sur, Saurav Mallik, Subhasis Dasgupta
R3,736 Discovery Miles 37 360 Ships in 12 - 19 working days

This book focusses on the Internet of Things (IoT) and Data Mining for Modern Engineering and Healthcare Applications and the recent technological advancements in Microwave Engineering, Communication and applicability of newly developed Solid State Technologies in Bio-medical Engineering and Health-Care. The Reader will be able to know the recent advancements in Microwave Engineering including novel techniques in Microwave Antenna Design and various aspects of Microwave Propagation. This book aims to showcase, the various aspects of Communication, Networking, Data Mining, Computational Biology, Bioinformatics, Bio-Statistics and Machine Learning. In this book, recent trends in Solid State Technologies, VLSI and applicability of modern Electronic Devices in Bio-informatics and Health-Care is focused. Furthermore, this book showcases the modern optimization techniques in Power System Engineering, Machine Design and Power Systems. This Book highlights the Internet of Things (IoT) and Data Mining for Modern Engineering and Healthcare Applications and the recent technological advancements in Microwave Engineering, Communication and applicability of newly developed Solid State Technologies in Bio-medical Engineering and Health-Care for day-to-day applications. Societal benefits of Microwave Technologies for smooth and hustle-free life are also areas of major focus. Microwave Engineering includes recent advancements and novel techniques in Microwave Antenna Design and various aspects of Microwave Propagation. Day-to-Day applicability of modern communication and networking technologies are a matter of prime concern. This book aims to showcase, the various aspects of Communication, Networking, Data Mining, Computational Biology, Bioinformatics, Bio-Statistics and Machine Learning. Role of Solid Sate Engineering in development of modern electronic gadgets are discussed. In this book, recent trends in Solid State Technologies, VLSI and applicability of modern Electronic Devices in Bio-informatics and Biosensing Devices for Smart Health care are also discussed. Features: This book features Internet of Things (IoT) and Data Mining for Modern Engineering and Healthcare Applications and the recent technological advancements in Microwave Engineering, Communication and applicability of newly developed Solid State Technologies in Bio-medical Engineering and Smart Health-Care Technologies Showcases the novel techniques in Internet of Things (IoT) integrated Microwave Antenna Design and various aspects of Microwave Communication Highlights the role of Internet of Things (IoT) various aspects of Communication, Networking, Data Mining, Computational Biology, Bioinformatics, Bio-Statistics and Machine Learning Reviews the role of Internet of Things (IoT) in Solid State Technologies, VLSI and applicability of modern Electronic Devices in Bio-informatics and Health-Care In this book, role of Internet of Things (IoT) in Power System Engineering, Optics, RF and Microwave Energy Harvesting and Smart Biosensing Technologies are also highlighted

Timing Performance of Nanometer Digital Circuits Under Process Variations (Hardcover, 1st ed. 2018): Victor Champac, Jose... Timing Performance of Nanometer Digital Circuits Under Process Variations (Hardcover, 1st ed. 2018)
Victor Champac, Jose Garcia Gervacio
R3,370 Discovery Miles 33 700 Ships in 10 - 15 working days

This book discusses the digital design of integrated circuits under process variations, with a focus on design-time solutions. The authors describe a step-by-step methodology, going from logic gates to logic paths to the circuit level. Topics are presented in comprehensively, without overwhelming use of analytical formulations. Emphasis is placed on providing digital designers with understanding of the sources of process variations, their impact on circuit performance and tools for improving their designs to comply with product specifications. Various circuit-level "design hints" are highlighted, so that readers can use then to improve their designs. A special treatment is devoted to unique design issues and the impact of process variations on the performance of FinFET based circuits. This book enables readers to make optimal decisions at design time, toward more efficient circuits, with better yield and higher reliability.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Lai-Massey Cipher Designs - History…
Jorge Nakahara Jr. Hardcover R4,510 Discovery Miles 45 100
Logic of Computation
Helmut Schwichtenberg Hardcover R2,609 Discovery Miles 26 090
Microsoft Defender for Cloud
Yuri Diogenes, Tom Janetscheck Paperback R820 Discovery Miles 8 200
A First Course in Network Theory
Ernesto Estrada, Philip A Knight Hardcover R3,570 Discovery Miles 35 700
Interdisciplinary Applications of…
Ned Kock Hardcover R4,814 Discovery Miles 48 140
Linux Kernel in a Nutshell
Greg Kroah-Hartman Paperback R952 R645 Discovery Miles 6 450
Bayesian Inference on Complicated Data
Niansheng Tang Hardcover R3,310 Discovery Miles 33 100
Introduction to Linux - Installation and…
N B Venkateswarlu Hardcover R3,525 R2,949 Discovery Miles 29 490
Westminster Sermons
Charles Kingsley Paperback R601 Discovery Miles 6 010
Microsoft Azure Security Infrastructure
Yuri Diogenes, Tom Shinder, … Paperback R645 Discovery Miles 6 450

 

Partners