![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems
This book proposes a synergistic framework to help IP vendors to protect hardware IP privacy and integrity from design, optimization, and evaluation perspectives. The proposed framework consists of five interacting components that directly target at the primary IP violations. All the five algorithms are developed based on rigorous mathematical modeling for primary IP violations and focus on different stages of IC design, which can be combined to provide a formal security guarantee.
Network on Chip (NoC) addresses the communication requirement of different nodes on System on Chip. The bio-inspired algorithms improve the bandwidth utilization, maximize the throughput and reduce the end-to-end latency and inter-flit arrival time. This book exclusively presents in-depth information regarding bio-inspired algorithms solving real world problems focussing on fault-tolerant algorithms inspired by the biological brain and implemented on NoC. It further documents the bio-inspired algorithms in general and more specifically, in the design of NoC. It gives an exhaustive review and analysis of the NoC architectures developed during the last decade according to various parameters. Key Features: Covers bio-inspired solutions pertaining to Network-on-Chip (NoC) design solving real world examples Includes bio-inspired NoC fault-tolerant algorithms with detail coding examples Lists fault-tolerant algorithms with detailed examples Reviews basic concepts of NoC Discusses NoC architectures developed-to-date
Hazard and operability studies (HAZOP) is perhaps the most powerful technique for the identification and analysis of hazards. But in many industries it is unknown, and where it is employed it often does not fulfil its potential because of incorrect use. This book describes HAZOP and explains its efficient and effective use. It is a structured text which first teaches HAZOP, step by step, and then provides additional information and guidance on particular problems and applications. It therefore provides a course for those who want to learn the technique and a reference source for practitioners. Not only have the authors employed, researched and taught the method, but they have also written a standard on its use. They are therefore the ideal advisers, not only for introducing newcomers to HAZOP, but also for guiding practitioners through its more advanced aspects. Key features of this book include:&UL; &LI; Detailed discussion and practical examples of the application of HAZOP to software-based systems;&LI; An explanation of the overall context of HAZOP in safety analysis;&LI; A method of applying HAZOP to the human components of systems.&/UL; System Safety - HAZOP and Software HAZOP is based on experience. It is an crucial teaching and reference text on a safety technique which is used in a wide range of industries, including military, process, rail and other transport, electricity generation, and medical. It explains HAZOP and its application to software-based systems for managers, engineers and safety personnel in all industries.
This book offers readers an easy introduction into quantum computing as well as into the design for corresponding devices. The authors cover several design tasks which are important for quantum computing and introduce corresponding solutions. A special feature of the book is that those tasks and solutions are explicitly discussed from a design automation perspective, i.e., utilizing clever algorithms and data structures which have been developed by the design automation community for conventional logic (i.e., for electronic devices and systems) and are now applied for this new technology. By this, relevant design tasks can be conducted in a much more efficient fashion than before - leading to improvements of several orders of magnitude (with respect to runtime and other design objectives). Describes the current state of the art for designing quantum circuits, for simulating them, and for mapping them to real hardware; Provides a first comprehensive introduction into design automation for quantum computing that tackles practically relevant tasks; Targets the quantum computing community as well as the design automation community, showing both perspectives to quantum computing, and what impressive improvements are possible when combining the knowledge of both communities.
If you're already a comfortable programmer, familiar with your single board computer and microcontroller, and are ready to refine your projects, then let's get started! This book covers advanced methods and techniques for creating, implementing, monitoring and controlling your experiments and projects with your Raspberry Pi and Arduino. Projects will use Python and the Tkinter GUI and will also cover software development for adding real time data display to the Raspberry Pi. You'll review concepts of frequency occurring in nature and the techniques used to measure the frequency of electrically varying signal voltages. You'll also study procedures for safe design, implementation and operation of experimental measurement systems operating at high heats and high temperatures. Throughout the book you'll look at sources and types of errors, and best practices for minimizing and reducing them. Often times there are simple environmental issues hindering what would seem to be simple projects: high temperatures, controlling the power for elevated temperature with the proportional integral and derivative (PID) algorithm, and the limitations imposed by eight bit code, the influence of noise and errors in measured data, and many more. Advanced Arduino Techniques in Science provides the best tools to move past those restrictions. What You'll Learn Implement an experimental control system and graphical data display for the Raspberry Pi and Arduino Manage experimental control with PID algorithm implementation, tuning and limitations imposed by eight bit digital signals Build an analytical front end Examine data smoothing capability of the Kalman filter Explore available methods for measuring both high and low frequency values in electronic signals Who This Book Is For Educators, researchers, students, makers, citizen scientists, or hobbyists can all extend their measuring capability or improve upon the quality of their collected data. The book is directed to those with intermediate skills in programming and those who are comfortable with Python programming and Arduino C.
Home Computers showcases the quirky and characterful beginnings of a commercial product that would come to unite the globe: the personal computer. As so much technology is forgotten once it is superseded, this is a celebration of machines, industrial design and techno-utopianism of an era in the not-so-distant past. Conceived as a visual sourcebook of the most popular, most powerful and most idiosyncratic computers to grace our workspaces, this timely publication offers a reflection on how far we've come and a nostalgic look at a time when digital worlds could be contained in a box and turned off, rather than ever-present in our lives. Home Computers opens with a scene-setting retrospective by computer and gaming writer Alex Wiltshire. The book's heart is a series of specially commissioned photographs that capture details of switches and early user-interface design, letterforms and logos, and the quirks that set one computer off from another. Images are complemented by a potted history of each device, the inventors or personalities behind it, and its innovations and influences.
Everyone is developing iPhone applications, and it's clear why. The iPhone is the coolest mobile device available, and the App Store makes it simple to get an application out into the unstoppable iPhone app market. With hundreds of thousands of app developers entering the game, it's crucial to learn from those who have actually succeeded. This book shows you how some of the most innovative and creative iPhone application developers have developed cool, best-selling apps. Not only does every successful application have a story, but behind every great app is excellent code. In this book, you'll see the code and learn how to use it to make your own cool applications. You'll learn everything from how Joost works to the Unity game engine, from the mathematics of visual processing to the latest Flash and iPhone projects. This book shares the secrets of the coolest iPhone apps being built today by the best iPhone developers-invaluable knowledge for anyone who wants to create the app that everyone is talking about.What you'll learn* Game development with Unity and iPhone OpenGL* Unit testing and iPhone-specific testing tools * How to approach and solve complex app development roadblocks* The best code fully explained and presented with screenshotsWho this book is for iPhone application developers of all experience levels and development platforms
Over the last decade, there has been a growing interest in human behavior analysis, motivated by societal needs such as security, natural interfaces, affective computing, and assisted living. However, the accurate and non-invasive detection and recognition of human behavior remain major challenges and the focus of many research efforts. Traditionally, in order to identify human behavior, it is first necessary to continuously collect the readings of physical sensing devices (e.g., camera, GPS, and RFID), which can be worn on human bodies, attached to objects, or deployed in the environment. Afterwards, using recognition algorithms or classification models, the behavior types can be identified so as to facilitate advanced applications. Although such traditional approaches deliver satisfactory performance and are still widely used, most of them are intrusive and require specific sensing devices, raising issues such as privacy and deployment costs. In this book, we will present our latest findings on non-invasive sensing and understanding of human behavior. Specifically, this book differs from existing literature in the following senses. Firstly, we focus on approaches that are based on non-invasive sensing technologies, including both sensor-based and device-free variants. Secondly, while most existing studies examine individual behaviors, we will systematically elaborate on how to understand human behaviors of various granularities, including not only individual-level but also group-level and community-level behaviors. Lastly, we will discuss the most important scientific problems and open issues involved in human behavior analysis.
This book features a collection of high-quality, peer-reviewed research papers presented at the 7th International Conference on Innovations in Computer Science & Engineering (ICICSE 2019), held at Guru Nanak Institutions, Hyderabad, India, on 16-17 August 2019. Written by researchers from academia and industry, the book discusses a wide variety of industrial, engineering, and scientific applications of the emerging techniques in the field of computer science.
Short and comprehensive text on how to master android studio Perfect for beginners or experts who need a refresher
This book provides a new perspective on modeling cyber-physical systems (CPS), using a data-driven approach. The authors cover the use of state-of-the-art machine learning and artificial intelligence algorithms for modeling various aspect of the CPS. This book provides insight on how a data-driven modeling approach can be utilized to take advantage of the relation between the cyber and the physical domain of the CPS to aid the first-principle approach in capturing the stochastic phenomena affecting the CPS. The authors provide practical use cases of the data-driven modeling approach for securing the CPS, presenting novel attack models, building and maintaining the digital twin of the physical system. The book also presents novel, data-driven algorithms to handle non- Euclidean data. In summary, this book presents a novel perspective for modeling the CPS.
Strategic intelligence (SI) has mostly been used in military settings, but its worth goes well beyond that limited role. It has become invaluable for improving any organization's strategic decision making process. The author of Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management recognizes synergies among component pieces of strategic intelligence, and demonstrates how executives can best use this internal and external information toward making better decisions. Divided into two major parts, the book first discusses the convergence of knowledge management (KM), business intelligence (BI), and competitive intelligence (CI) into what the author defines as strategic intelligence. The second part of the volume describes case studies written by recognized experts in the fields of KM, BI, and CI. The case studies include strategic scenarios at Motorola, AARP, Northrop Grumman, and other market leaders. About the Editor Jay Liebowitz, D.Sc., is a full professor in the Graduate Division of Business and Management and program director for the Graduate Certificate in Competitive Intelligence at Johns Hopkins University. The first knowledge management officer at NASA Goddard Space Flight Center, he also served as the Robert W. Deutsch Distinguished Professor of Information Systems at the University of Maryland-Baltimore County, professor of Management Science at George Washington University, and Chaired Professor of Artificial Intelligence (AI) at the U.S. Army War College. A founder and chairperson of The World Congress on Expert Systems, he is a Fulbright Scholar, IEEE-USA Federal Communications Commission Executive Fellow, and Computer Educator of the Year (International Association for Computer Information Systems).
This book describes the recent innovation of deep in-memory architectures for realizing AI systems that operate at the edge of energy-latency-accuracy trade-offs. From first principles to lab prototypes, this book provides a comprehensive view of this emerging topic for both the practicing engineer in industry and the researcher in academia. The book is a journey into the exciting world of AI systems in hardware.
This book defines and explores the problem of placing the instances of dynamic data types on the components of the heterogeneous memory organization of an embedded system, with the final goal of reducing energy consumption and improving performance. It is one of the first to cover the problem of placement for dynamic data objects on embedded systems with heterogeneous memory architectures, presenting a complete methodology that can be easily adapted to real cases and work flows. The authors discuss how to improve system performance and energy consumption simultaneously. Discusses the problem of placement for dynamic data objects on embedded systems with heterogeneous memory architectures; Presents a complete methodology that can be adapted easily to real cases and work flows; Offers hints on how to improve system performance and energy consumption simultaneously.
Many modern computer systems, including homogeneous and heterogeneous architectures, support shared memory in hardware. In a shared memory system, each of the processor cores may read and write to a single shared address space. For a shared memory machine, the memory consistency model defines the architecturally visible behavior of its memory system. Consistency definitions provide rules about loads and stores (or memory reads and writes) and how they act upon memory. As part of supporting a memory consistency model, many machines also provide cache coherence protocols that ensure that multiple cached copies of data are kept up-to-date. The goal of this primer is to provide readers with a basic understanding of consistency and coherence. This understanding includes both the issues that must be solved as well as a variety of solutions. We present both high-level concepts as well as specific, concrete examples from real-world systems. This second edition reflects a decade of advancements since the first edition and includes, among other more modest changes, two new chapters: one on consistency and coherence for non-CPU accelerators (with a focus on GPUs) and one that points to formal work and tools on consistency and coherence.
This book introduces models and methodologies that can be employed towards making the Industry 4.0 vision a reality within the process industries, and at the same time investigates the impact of uncertainties in such highly integrated settings. Advances in computing power along with the widespread availability of data have led process industries to consider a new paradigm for automated and more efficient operations. The book presents a theoretically proven optimal solution to multi-parametric linear and mixed-integer linear programs and efficient solutions to problems such as process scheduling and design under global uncertainty. It also proposes a systematic framework for the uncertainty-aware integration of planning, scheduling and control, based on the judicious coupling of reactive and proactive methods. Using these developments, the book demonstrates how the integration of different decision-making layers and their simultaneous optimisation can enhance industrial process operations and their economic resilience in the face of uncertainty.
As more companies move toward microservices and other distributed technologies, the complexity of these systems increases. You can't remove the complexity, but through Chaos Engineering you can discover vulnerabilities and prevent outages before they impact your customers. This practical guide shows engineers how to navigate complex systems while optimizing to meet business goals. Two of the field's prominent figures, Casey Rosenthal and Nora Jones, pioneered the discipline while working together at Netflix. In this book, they expound on the what, how, and why of Chaos Engineering while facilitating a conversation from practitioners across industries. Many chapters are written by contributing authors to widen the perspective across verticals within (and beyond) the software industry. Learn how Chaos Engineering enables your organization to navigate complexity Explore a methodology to avoid failures within your application, network, and infrastructure Move from theory to practice through real-world stories from industry experts at Google, Microsoft, Slack, and LinkedIn, among others Establish a framework for thinking about complexity within software systems Design a Chaos Engineering program around game days and move toward highly targeted, automated experiments Learn how to design continuous collaborative chaos experiments
This holistic book is an invaluable reference for addressing various practical challenges in architecting and engineering Intelligent IoT and eHealth solutions for industry practitioners, academic and researchers, as well as for engineers involved in product development. The first part provides a comprehensive guide to fundamentals, applications, challenges, technical and economic benefits, and promises of the Internet of Things using examples of real-world applications. It also addresses all important aspects of designing and engineering cutting-edge IoT solutions using a cross-layer approach from device to fog, and cloud covering standards, protocols, design principles, reference architectures, as well as all the underlying technologies, pillars, and components such as embedded systems, network, cloud computing, data storage, data processing, big data analytics, machine learning, distributed ledger technologies, and security. In addition, it discusses the effects of Intelligent IoT, which are reflected in new business models and digital transformation. The second part provides an insightful guide to the design and deployment of IoT solutions for smart healthcare as one of the most important applications of IoT. Therefore, the second part targets smart healthcare-wearable sensors, body area sensors, advanced pervasive healthcare systems, and big data analytics that are aimed at providing connected health interventions to individuals for healthier lifestyles.
This book discusses various aspects of cloud computing, in which trust and fault-tolerance models are included in a multilayered, cloud architecture. The authors present a variety of trust and fault models used in the cloud, comparing them based on their functionality and the layer in the cloud to which they respond. Various methods are discussed that can improve the performance of cloud architectures, in terms of trust and fault-tolerance, while providing better performance and quality of service to user. The discussion also includes new algorithms that overcome drawbacks of existing methods, using a performance matrix for each functionality. This book provide readers with an overview of cloud computing and how trust and faults in cloud datacenters affects the performance and quality of service assured to the users. Discusses fundamental issues related to trust and fault-tolerance in Cloud Computing; Describes trust and fault management techniques in multi layered cloud architecture to improve security, reliability and performance of the system; Includes methods to enhance power efficiency and network efficiency, using trust and fault based resource allocation.
This book describes the most frequently used high-speed serial buses in embedded systems, especially those used by FPGAs. These buses employ SerDes, JESD204, SRIO, PCIE, Aurora and SATA protocols for chip-to-chip and board-to-board communication, and CPCIE, VPX, FC and Infiniband protocols for inter-chassis communication. For each type, the book provides the bus history and version info, while also assessing its advantages and limitations. Furthermore, it offers a detailed guide to implementing these buses in FPGA design, from the physical layer and link synchronization to the frame format and application command. Given its scope, the book offers a valuable resource for researchers, R&D engineers and graduate students in computer science or electronics who wish to learn the protocol principles, structures and applications of high-speed serial buses.
This book bridges the gaps between logic, mathematics and computer science by delving into the theory of well-quasi orders, also known as wqos. This highly active branch of combinatorics is deeply rooted in and between many fields of mathematics and logic, including proof theory, commutative algebra, braid groups, graph theory, analytic combinatorics, theory of relations, reverse mathematics and subrecursive hierarchies. As a unifying concept for slick finiteness or termination proofs, wqos have been rediscovered in diverse contexts, and proven to be extremely useful in computer science. The book introduces readers to the many facets of, and recent developments in, wqos through chapters contributed by scholars from various fields. As such, it offers a valuable asset for logicians, mathematicians and computer scientists, as well as scholars and students.
This book offers the reader a comprehensive view of the design space of wearable computers, cutting across multiple application domains and interaction modalities. Besides providing several examples of wearable technologies, Wearable Interaction illustrates how to create and to assess interactive wearables considering human factors in design decisions related to input entry and output responses. The book also discusses the impacts of form factors and contexts of use in the design of wearable interaction. Miniaturized components, flexible materials, and sewable electronics toolkits exemplify advances in technology that facilitated the design and development of wearable technologies. Despite such advances, creating wearable interfaces that are efficient is still challenging. The new affordances of on-body interfaces require the consideration of new interaction paradigms, so that the design decisions for the user interaction take into account key limitations in the interaction surfaces of wearables concerning input entry, processing power for output responses, and in the time and attention that wearers dedicate to complete their interaction. Under such constraints, creating interfaces with high usability levels is complex. Also, because wearables are worn continuously and in close contact with the human body, on-body interfaces must be carefully designed to neither disturb nor overwhelm wearers. The context of use and the potential of wearable technologies must be both well understood to provide users with relevant information and services using appropriate approaches and without overloading them with notifications. Wearable Interaction explains thoroughly how interactive wearables have been created taking into account the needs of end users as well as the vast potential that wearable technologies offer. Readers from academia, industry or government will learn how wearables can be designed and developed to facilitate human activities and tasks across different sectors.
It's the little things that turn a good digital product into a great one. With this full color practical book, you'll learn how to design effective microinteractions: the small details that exist inside and around features. How can users change a setting? How do they turn on mute, or know they have a new email message? Through vivid, real-world examples from today's devices and applications, author Dan Saffer walks you through a microinteraction's essential parts, then shows you how to use them in a mobile app, a web widget, and an appliance. You'll quickly discover how microinteractions can change a product from one that's tolerated into one that's treasured. Explore a microinteraction's structure: triggers, rules, feedback, modes, and loops Learn the types of triggers that initiate a microinteraction Create simple rules that define how your microinteraction can be used Help users understand the rules with feedback, using graphics, sounds, and vibrations Use modes to let users set preferences or modify a microinteraction Extend a microinteraction's life with loops, such as "Get data every 30 seconds"
This book brings together a selection of the best papers from the twenty-first edition of the Forum on specification and Design Languages Conference (FDL), which took place on September 10-12, 2018, in Munich, Germany. FDL is a well-established international forum devoted to dissemination of research results, practical experiences and new ideas in the application of specification, design and verification languages to the design, modeling and verification of integrated circuits, complex hardware/software embedded systems, and mixed-technology systems. Covers Assertion Based Design, Verification & Debug; Includes language-based modeling and design techniques for embedded systems; Covers design, modeling and verification of mixed physical domain and mixed signal systems that include significant analog parts in electrical and non-electrical domains; Includes formal and semi-formal system level design methods for complex embedded systems based on the Unified Modelling Language (UML) and Model Driven Engineering (MDE).
This textbook is designed for graduate-level courses, and for self-study, in analog and sampled-data, including switched-capacitor, circuit theory and design for ongoing, or active electrical engineers, needing to become proficient in analog circuit design on a system, rather than on a device, level. After decades of experience in industry and teaching this material in academic settings, the author has extracted many of the most important and useful features of analog circuit theory and design and presented them in a manner that is easy to digest and utilize. The methodology and analysis techniques presented can be applied to areas well beyond those specifically addressed in this book. This book is meant to enable readers to gain a 'general knowledge' of one aspect of analog engineering (e.g., that of network theory, filter design, system theory and sampled-data signal processing). The presentation is self-contained and should be accessible to anyone with a first degree in electrical engineering. |
![]() ![]() You may like...
Enterprise Level Security 1 & 2
Kevin Foltz, William R. Simpson
Paperback
R1,421
Discovery Miles 14 210
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,056
Discovery Miles 10 560
|