|
Books > Computing & IT > Computer hardware & operating systems
This book presents best selected papers presented at the 4th
International Conference on Smart Computing and Informatics (SCI
2020), held at the Department of Computer Science and Engineering,
Vasavi College of Engineering (Autonomous), Hyderabad, Telangana,
India. It presents advanced and multi-disciplinary research towards
the design of smart computing and informatics. The theme is on a
broader front which focuses on various innovation paradigms in
system knowledge, intelligence and sustainability that may be
applied to provide realistic solutions to varied problems in
society, environment and industries. The scope is also extended
towards the deployment of emerging computational and knowledge
transfer approaches, optimizing solutions in various disciplines of
science, technology and health care.
As the volume of global Internet traffic increases, the Internet is
beginning to suffer from a broad spectrum of performance-degrading
infrastructural limitations that threaten to jeopardize the
continued growth of new, innovative services. In answer to this
challenge, computer scientists seek to maintain the original design
principles of the Internet while allowing for a more dynamic
approach to the manner in which networks are designed and operated.
The Handbook of Research on Redesigning the Future of Internet
Architectures covers some of the hottest topics currently being
debated by the Internet community at large, including Internet
governance, privacy issues, service delivery automation, advanced
networking schemes, and new approaches to Internet
traffic-forwarding and path-computation mechanics. Targeting
students, network-engineers, and technical strategists, this book
seeks to provide a broad and comprehensive look at the next wave of
revolutionary ideas poised to reshape the very foundation of the
Internet as we know it.
This book presents Dual Mode Logic (DML), a new design paradigm for
digital integrated circuits. DML logic gates can operate in two
modes, each optimized for a different metric. Its on-the-fly
switching between these operational modes at the gate, block and
system levels provide maximal E-D optimization flexibility. Each
highly detailed chapter has multiple illustrations showing how the
DML paradigm seamlessly implements digital circuits that dissipate
less energy while simultaneously improving performance and reducing
area without a significant compromise in reliability. All the
facets of the DML methodology are covered, starting from basic
concepts, through single gate optimization, general module
optimization, design trade-offs and new ways DML can be integrated
into standard design flows using standard EDA tools. DML logic is
compatible with numerous applications but is particularly
advantageous for ultra-low power, reliable high performance
systems, and advanced scaled technologies Written in language
accessible to students and design engineers, each topic is oriented
toward immediate application by all those interested in an
alternative to CMOS logic. Describes a novel, promising alternative
to conventional CMOS logic, known as Dual Mode Logic (DML), with
which a single gate can be operated selectively in two modes, each
optimized for a different metric (e.g., energy consumption,
performance, size); Demonstrates several techniques at the
architectural level, which can result in high energy savings and
improved system performance; Focuses on the tradeoffs between
power, area and speed including optimizations at the transistor and
gate level, including alternatives to DML basic cells; Illustrates
DML efficiency for a variety of VLSI applications.
Portable Biosensors and Point-of-Care Systems describes the
principles, design and applications of a new generation of
analytical and diagnostic biomedical devices, characterized by
their very small size, ease of use, multi-analytical capabilities
and speed to provide handheld and mobile point-of-care (POC)
diagnostics. The book is divided in four Parts. Part I is an
in-depth analysis of the various technologies upon which portable
diagnostic devices and biosensors are built. In Part II, advances
in the design and optimization of special components of biosensor
systems and handheld devices are presented. In Part III, a wide
scope of applications of portable biosensors and handheld POC
devices is described, ranging from the support of primary
healthcare to food and environmental safety screening. Diverse
topics are covered, including counterterrorism, travel medicine and
drug development. Finally, Part IV of the book is dedicated to the
presentation of commercially available products including a review
of the products of point-of-care in-vitro-diagnostics companies, a
review of technologies which have achieved a high Technology
Readiness Level, and a special market case study of POC infusion
systems combined with intelligent patient monitoring. This book is
essential reading for researchers and experts in the healthcare
diagnostic and analytical sector, and for electronics and material
engineers working on portable sensors.
Enterprise Architecture (EA) is the organizing logic for a firm's
core business processes and IT capabilities captured in a set of
policies and technical choices. ""Handbook of Enterprise Systems
Architecture in Practice"" provides a comprehensive and unified
reference overview of practical aspects of enterprise architecture.
This premier reference source includes a complete analysis of EA
theory, concepts, strategies, implementation challenges, and case
studies. The impact of effective enterprise architecture on IT
governance, IT portfolio management, IT risks, and IT outsourcing
are described in this authoritative reference tool. Researchers and
IT professionals will gain insights into how firms can maximize the
business value of IT and increase competitiveness.
Society's growing dependence on information technology for survival
has elevated the importance of controlling and evaluating
information systems. A sound plan for auditing information systems
and the technology that supports them is a necessity for
organizations to improve the IS benefits and allow the organization
to manage the risks associated with technology. Auditing
Information Systems gives a global vision of auditing and control,
exposing the major techniques and methods. It provides guidelines
for auditing the crucial areas of IT--databases, security,
maintenance, quality, and communications.
This book discusses the advantages and challenges of Body-Biasing
for integrated circuits and systems, together with the deployment
of the design infrastructure needed to generate this Body-Bias
voltage. These new design solutions enable state of the art energy
efficiency and system flexibility for the latest applications, such
as Internet of Things and 5G communications.
This book is the sixth volume of the successful book series on
Robot Operating System: The Complete Reference. The objective of
the book is to provide the reader with comprehensive coverage of
the Robot Operating Systems (ROS) and the latest trends and
contributed systems. ROS is currently considered as the primary
development framework for robotics applications. There are seven
chapters organized into three parts. Part I presents two chapters
on the emerging ROS 2.0 framework; in particular, ROS 2.0 is become
increasingly mature to be integrated into the industry. The first
chapter from Amazon AWS deals with the challenges that ROS 2
developers will face as they transition their system to be
commercial-grade. The second chapter deals with reactive
programming for both ROS1 and ROS. In Part II, two chapters deal
with advanced robotics, namely on the usage of robots in farms, and
the second deals with platooning systems. Part III provides three
chapters on ROS navigation. The first chapter deals with the use of
deep learning for ROS navigation. The second chapter presents a
detailed tuning guide on ROS navigation and the last chapter
discusses SLAM for ROS applications. I believe that this book is a
valuable companion for ROS users and developers to learn more ROS
capabilities and features.
This book describes how we can design and make efficient processors
for high-performance computing, AI, and data science. Although
there are many textbooks on the design of processors we do not have
a widely accepted definition of the efficiency of a general-purpose
computer architecture. Without a definition of the efficiency, it
is difficult to make scientific approach to the processor design.
In this book, a clear definition of efficiency is given and thus a
scientific approach for processor design is made possible. In
chapter 2, the history of the development of high-performance
processor is overviewed, to discuss what quantity we can use to
measure the efficiency of these processors. The proposed quantity
is the ratio between the minimum possible energy consumption and
the actual energy consumption for a given application using a given
semiconductor technology. In chapter 3, whether or not this
quantity can be used in practice is discussed, for many real-world
applications. In chapter 4, general-purpose processors in the past
and present are discussed from this viewpoint. In chapter 5, how we
can actually design processors with near-optimal efficiencies is
described, and in chapter 6 how we can program such processors.
This book gives a new way to look at the field of the design of
high-performance processors.
With the proliferation of GPS devices in daily life, trajectory
data that records where and when people move is now readily
available on a large scale. As one of the most typical
representatives, it has now become widely recognized that taxi
trajectory data provides rich opportunities to enable promising
smart urban services. Yet, a considerable gap still exists between
the raw data available, and the extraction of actionable
intelligence. This gap poses fundamental challenges on how we can
achieve such intelligence. These challenges include inaccuracy
issues, large data volumes to process, and sparse GPS data, to name
but a few. Moreover, the movements of taxis and the leaving
trajectory data are the result of a complex interplay between
several parties, including drivers, passengers, travellers, urban
planners, etc. In this book, we present our latest findings on
mining taxi GPS trajectory data to enable a number of smart urban
services, and to bring us one step closer to the vision of smart
mobility. Firstly, we focus on some fundamental issues in
trajectory data mining and analytics, including data map-matching,
data compression, and data protection. Secondly, driven by the real
needs and the most common concerns of each party involved, we
formulate each problem mathematically and propose novel data mining
or machine learning methods to solve it. Extensive evaluations with
real-world datasets are also provided, to demonstrate the
effectiveness and efficiency of using trajectory data. Unlike other
books, which deal with people and goods transportation separately,
this book also extends smart urban services to goods transportation
by introducing the idea of crowdshipping, i.e., recruiting taxis to
make package deliveries on the basis of real-time information.
Since people and goods are two essential components of smart
cities, we feel this extension is bot logical and essential.
Lastly, we discuss the most important scientific problems and open
issues in mining GPS trajectory data.
The Second Edition of the Best Damn Windows Server Book Period is
completely revised and updated to Windows Server 2008.
This book will show you how to increase the reliability and
flexibility of your server infrastructure with built-in Web and
virtualization technologies; have more control over your servers
and web sites using new tools like IIS7, Windows Server Manager,
and Windows PowerShell; and secure your network with Network Access
Protection and the Read-Only Domain Controller.
New to this Edition:
* Web server management with Internet Information Services
7.0
* Virtualize multiple operating systems on a single server
* Hardening Security, including Network Access Protection,
Federated Rights Management, and Read-Only Domain Controller
As technology expands and evolves, one-dimensional, graphical user
interface (GUI) design becomes increasingly limiting and
simplistic. Designers must meet the challenge of developing new and
creative interfaces that adapt to meet human needs and
technological trends. HCI Beyond the GUI provides designers with
this know how by exploring new ways to reach users that involve all
of the human senses. Dr. Kortum gathers contributions from leading
human factors designers to present a single reference for
professionals, researchers, and students.
Explores the human factors involved in the design and
implementation of the nontraditional interfaces, detailing design
strategies, testing methodologies, and implementation techniques
Provides an invaluable resource for practitioners who design
interfaces for children, gamers and users with accessibility needs
Offers extensive case studies, examples and design guidelines
Contrary to popular belief, there has never been any shortage of
Macintosh-related security issues. OS9 had issues that warranted
attention. However, due to both ignorance and a lack of research,
many of these issues never saw the light of day. No solid
techniques were published for executing arbitrary code on OS9, and
there are no notable legacy Macintosh exploits. Due to the combined
lack of obvious vulnerabilities and accompanying exploits,
Macintosh appeared to be a solid platform. Threats to Macintosh's
OS X operating system are increasing in sophistication and number.
Whether it is the exploitation of an increasing number of holes,
use of rootkits for post-compromise concealment or disturbed denial
of service, knowing why the system is vulnerable and understanding
how to defend it is critical to computer security.
* Macintosh OS X Boot Process and Forensic Software All the power,
all the tools, and all the geekery of Linux is present in Mac OS X.
Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX
platform....Now, you can master the boot process, and Macintosh
forensic software.
* Look Back Before the Flood and Forward Through the 21st Century
Threatscape Back in the day, a misunderstanding of Macintosh
security was more or less industry-wide. Neither the administrators
nor the attackers knew much about the platform. Learn from Kevin
Finisterre how and why that has all changed
* Malicious Macs: Malware and the Mac As OS X moves further from
desktops, laptops, and servers into the world of consumer
technology (iPhones, iPods, and so on), what are the implications
for the further spread of malware and other security breaches? Find
out from David Harley.
* Malware Detection and the Mac Understand why the continuing
insistence of vociferous Mac zealots that it "can't happen here" is
likely to aid OS X exploitationg
* Mac OS X for Pen Testers With its BSD roots, super-slick
graphical interface, and near-bulletproof reliability, Apple's Mac
OS X provides a great platform for pen testing.
* WarDriving and Wireless Penetration Testing with OS X Configure
and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use
the information obtained during a WarDrive, to successfully
penetrate a customer's wireless network.
* Leopard and Tiger Evasion Follow Larry Hernandez through
exploitation techniques, tricks, and features of both OS X Tiger
and Leopard, using real-world scenarios for explaining and
demonstrating the concepts behind them.
* Encryption Technologies and OS X Apple has come a long way from
the bleak days of OS9. THere is now a wide array of encryption
choices within Mac OS X. Let Gareth Poreus show you what they are.
* Cuts through the hype with a serious discussion of the
security
vulnerabilities of the Mac OS X operating system
* Reveals techniques by which OS X can be "owned"
* Details procedures to defeat these techniques
* Offers a sober look at emerging threats and trends
Microsoft Forefront is a comprehensive suite of security products
that will provide companies with multiple layers of defense against
threats. Computer and Network Security is a paramount issue for
companies in the global marketplace. Businesses can no longer
afford for their systems to go down because of viruses, malware,
bugs, trojans, or other attacks. Running a Microsoft Forefront
Suite within your environment brings many different benefits.
Forefront allows you to achieve comprehensive, integrated, and
simplified infrastructure security. This comprehensive suite of
tools provides end-to-end security stretching from Web servers back
to the desktop. This book will provide system administrators
familiar with Syngress' existing Microsoft networking and security
titles with a complete reference to Microsoft's flagship security
products.
* First book to address securing an entire Microsoft network from
Web servers all the way back to the desktop.
* Companion Web site provides best practices checklists for
securing Microsoft operating systems, applications, servers, and
databases.
* Companion Web site provides special chapter on designing and
implementing a disaster recover plan for a Microsoft network.
This book provides a single-source reference to routing algorithms
for Networks-on-Chip (NoCs), as well as in-depth discussions of
advanced solutions applied to current and next generation, many
core NoC-based Systems-on-Chip (SoCs). After a basic introduction
to the NoC design paradigm and architectures, routing algorithms
for NoC architectures are presented and discussed at all
abstraction levels, from the algorithmic level to actual
implementation. Coverage emphasizes the role played by the routing
algorithm and is organized around key problems affecting current
and next generation, many-core SoCs. A selection of routing
algorithms is included, specifically designed to address key issues
faced by designers in the ultra-deep sub-micron (UDSM) era,
including performance improvement, power, energy, and thermal
issues, fault tolerance and reliability.
This book describes a wide variety of System-on-Chip (SoC) security
threats and vulnerabilities, as well as their sources, in each
stage of a design life cycle. The authors discuss a wide variety of
state-of-the-art security verification and validation approaches
such as formal methods and side-channel analysis, as well as
simulation-based security and trust validation approaches. This
book provides a comprehensive reference for system on chip
designers and verification and validation engineers interested in
verifying security and trust of heterogeneous SoCs.
Digital signal processing is now a growing area of study invading
all walks of organizational life, from consumer products to
database management. ""Web-Based Supply Chain Management and
Digital Signal Processing: Methods for Effective Information
Administration and Transmission"" presents trends and techniques
for successful intelligent decision-making and transfer of products
through digital signal processing. A defining collection of field
advancements, this publication provides the latest and most
complete research in supply chain management with examples and case
studies useful for those involved with various levels of
management.
|
|