![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems
A hands-on introduction to FPGA prototyping and SoC design This Second Edition of the popular book follows the same "learning-by-doing" approach to teach the fundamentals and practices of VHDL synthesis and FPGA prototyping. It uses a coherent series of examples to demonstrate the process to develop sophisticated digital circuits and IP (intellectual property) cores, integrate them into an SoC (system on a chip) framework, realize the system on an FPGA prototyping board, and verify the hardware and software operation. The examples start with simple gate-level circuits, progress gradually through the RT (register transfer) level modules, and lead to a functional embedded system with custom I/O peripherals and hardware accelerators. Although it is an introductory text, the examples are developed in a rigorous manner, and the derivations follow strict design guidelines and coding practices used for large, complex digital systems. The new edition is completely updated. It presents the hardware design in the SoC context and introduces the hardware-software co-design concept. Instead of treating examples as isolated entities, the book integrates them into a single coherent SoC platform that allows readers to explore both hardware and software "programmability" and develop complex and interesting embedded system projects. The revised edition: Adds four general-purpose IP cores, which are multi-channel PWM (pulse width modulation) controller, I2C controller, SPI controller, and XADC (Xilinx analog-to-digital converter) controller. Introduces a music synthesizer constructed with a DDFS (direct digital frequency synthesis) module and an ADSR (attack-decay-sustain-release) envelop generator. Expands the original video controller into a complete stream-based video subsystem that incorporates a video synchronization circuit, a test pattern generator, an OSD (on-screen display) controller, a sprite generator, and a frame buffer. Introduces basic concepts of software-hardware co-design with Xilinx MicroBlaze MCS soft-core processor. Provides an overview of bus interconnect and interface circuit. Introduces basic embedded system software development. Suggests additional modules and peripherals for interesting and challenging projects. The FPGA Prototyping by VHDL Examples, Second Edition makes a natural companion text for introductory and advanced digital design courses and embedded system course. It also serves as an ideal self-teaching guide for practicing engineers who wish to learn more about this emerging area of interest.
Architecture of Reliable Web Applications Software presents new concepts regarding the reliability, availability, manageability, performance, scalability, and secured-ability of applications, particularly the ones that run over the Web. ""Architecture of Reliable Web Applications Software"" examines the causes of failure in a Web-based information system development project, and indicates that to exploit the unprecedented opportunities offered by e-service applications, businesses and users alike need a highly available, reliable, and efficient telecommunication infrastructure. ""Architecture of Reliable Web Application Software"" proposes a scalable QoS-aware architecture for the management of QoS-aware Web services to provide QoS management support for both Web services' providers and consumers. It also introduces Hyper-services as a unified application model for semantic Web frameworks and proposes Conceptual Model Driven Software Development as a means of easy adoption to them.
Order affects the results you get: Different orders of presenting material can lead to qualitatively and quantitatively different learning outcomes. These differences occur in both natural and artificial learning systems. In Order to Learn shows how order effects are crucial in human learning, instructional design, machine learning, and both symbolic and connectionist cognitive models. Each chapter explains a different aspect of how the order in which material is presented can strongly influence what is learned by humans and theoretical models of learning in a variety of domains. In addition to data, models are provided that predict and describe order effects and analyze how and when they will occur. The introductory and concluding chapters compile suggestions for improving learning through better sequences of learning materials, including how to take advantage of order effects that encourage learning and how to avoid order effects that discourage learning. Each chapter also highlights questions that may inspire further research. Taken together, these chapters show how order effects in different areas can and do inform each other. In Order to Learn will be of interest to researchers and students in cognitive science, education, machine learning.
In a digital context, trust is a multifaceted concept, including trust in application usability, trust in information security, and trust in fellow users. Mobile technologies have compounded the impact of such considerations. Trust Management in Mobile Environments: Autonomic and Usable Models explores current advances in digital and mobile computing technologies from the user perspective, evaluating trust models and autonomic trust management. From the recent history of trust in digital environments to prospective future developments, this book serves as a potent reference source for professionals, graduate and post-graduate students, researchers, and practitioners in the field of trust management.
The rapid, global growth of technology necessitates a continued review of issues relating to privacy and security, as well as studies on the adoption of and access to new products, tools, and software. ICT Ethics and Security in the 21st Century: New Developments and Applications highlights ethical dilemmas and security challenges posed by the rise of more recent technologies along with ongoing challenges such as the digital divide, threats to privacy, and organizational security measures. This book comprises a valuable resource for ICT researchers, educators, students, and professionals along with both employers and employees of large organizations searching for resolutions to the everyday ethical and security dilemmas we must grapple with in our highly globalised and technologized world.
This book provides comprehensive coverage of the latest research into integrated circuits' ageing, explaining the causes of this phenomenon, describing its effects on electronic systems, and providing mitigation techniques to build ageing-resilient circuits.
Almost all the systems in our world, including technical, social, economic, and environmental systems, are becoming interconnected and increasingly complex, and as such they are vulnerable to various risks. Due to this trend, resilience creation is becoming more important to system managers and decision makers, this to ensure sustained performance. In order to be able to ensure an acceptable sustained performance under such interconnectedness and complexity, resilience creation with a system approach is a requirement. Mathematical modeling based approaches are the most common approach for system resilience creation. Mathematical Modelling of System Resilience covers resilience creation for various system aspects including a functional system of the supply chain, overall supply chain systems; various methodologies for modeling system resilience; satellite-based approach for addressing climate related risks, repair-based approach for sustainable performance of an engineering system, and modeling measures of the reliability for a vertical take-off and landing system. Each of the chapters contributes state of the art research for the relevant resilience related topic covered in the chapter. Technical topics covered in the book include: 1. Supply chain risk, vulnerability and disruptions 2. System resilience for containing failures and disruptions 3. Resiliency considering frequency and intensities of disasters 4. Resilience performance index 5. Resiliency of electric Traction system 6. Degree of resilience 7. Satellite observation and hydrological risk 8. Latitude of Resilience 9. On-line repair for resilience 10. Reliability design for Vertical Takeoff and landing Prototype
In today's modernized environment, a growing number of software companies are changing their traditional engineering approaches in response to the rapid development of computing technologies. As these businesses adopt modern software engineering practices, they face various challenges including the integration of current methodologies and contemporary design models and the refactoring of existing systems using advanced approaches. Applications and Approaches to Object-Oriented Software Design: Emerging Research and Opportunities is a pivotal reference source that provides vital research on the development of modern software practices that impact maintenance, design, and developer productivity. While highlighting topics such as augmented reality, distributed computing, and big data processing, this publication explores the current infrastructure of software systems as well as future advancements. This book is ideally designed for software engineers, IT specialists, data scientists, business professionals, developers, researchers, students, and academicians seeking current research on contemporary software engineering methods.
As cloud technology continues to advance and be utilized, many service providers have begun to employ multiple networks, or cloud federations; however, as the popularity of these federations increases, so does potential utilization challenges. Developing Interoperable and Federated Cloud Architecture provides valuable insight into current and emergent research occurring within the field of cloud infrastructures. Featuring barriers, recent developments, and practical applications on the interoperability issues of federated cloud architectures, this book is a focused reference for administrators, developers, and cloud users interested in energy awareness, scheduling, and federation policies and usage.
This book provides readers with an overview of the architectures, programming frameworks, and hardware accelerators for typical cloud computing applications in data centers. The authors present the most recent and promising solutions, using hardware accelerators to provide high throughput, reduced latency and higher energy efficiency compared to current servers based on commodity processors. Readers will benefit from state-of-the-art information regarding application requirements in contemporary data centers, computational complexity of typical tasks in cloud computing, and a programming framework for the efficient utilization of the hardware accelerators.
This book describes a variety of test generation algorithms for testing crosstalk delay faults in VLSI circuits. It introduces readers to the various crosstalk effects and describes both deterministic and simulation-based methods for testing crosstalk delay faults. The book begins with a focus on currently available crosstalk delay models, test generation algorithms for delay faults and crosstalk delay faults, before moving on to deterministic algorithms and simulation-based algorithms used to test crosstalk delay faults. Given its depth of coverage, the book will be of interest to design engineers and researchers in the field of VLSI Testing.
An introductory text to computer architecture, this comprehensive volume covers the concepts from logic gates to advanced computer architecture. It comes with a full spectrum of exercises and web-downloadable support materials, including assembler and simulator, which can be used in the context of different courses. The authors also make available a hardware description, which can be used in labs and assignments, for hands-on experimentation with an actual, simple processor.This unique compendium is a useful reference for undergraduates, graduates and professionals majoring in computer engineering, circuits and systems, software engineering, biomedical engineering and aerospace engineering.Related Link(s)
This book is designed to cover three objectives. One, to provide a comprehensive resource to individuals (including novice, IT/Non-HP-UX administrators, HP-UX administrators) who intend to take the Certified System Administrator for HP-UX certification exam and pass it. Two, to provide a quick and valuable on-the-job resource to HP-UX administrators, administrators of other UNIX operating system software, IT managers, programmers, and DBAs working in the HP-UX environment. Three, to provide an easy-to-understand guide to novice and IT/non-HP-UX administrators who intend to learn HP-UX from the beginning. This book contains 33 chapters. The book is organized in such a way that it helps its audience understand concepts, implementation procedures, some basic troubleshooting, command syntax, configuration files, and daemons involved. There are three key areas: UNIX fundamentals, HP-UX system administration, and HP-UX network administration. 1.UNIX Fundamentals covers the basics of UNIX. Most information is not specific to a particular UNIX flavor, but rather includes general UNIX concepts, file manipulation and security techniques, shell and awk programming, vi editor, basic commands, and other topics. Chapters 01 through 06 and chapter 21 cover this area. Unlike many other similar books, a chapter on shell scripting is presented after covering HP-UX System Administration chapters. This is done intentionally to provide readers with some practical examples based on the knowledge they have gained from UNIX Fundamentals and HP-UX System Administration chapters. 2.HP-UX System Administration covers the HP-UX-specific system administration concepts and topics including HP-UX installation methods; software and patch management; user and group account administration; disk and device file management; LVM and file system administration; swap space and printer management; system startup and shutdown procedures; kernel reconfiguration techniques; backup, restore, and system recovery functions; job automation and process control; system logging and performance monitoring; and so on. Chapters 07 through 20 cover this area. 3.HP-UX Network Administration covers HP-UX network administration concepts and topics such as OSI and TCP/IP models; network hardware overview; LAN card administration; IP subnetting and routing techniques; network troubleshooting tools; system startup services; naming services such as DNS, NIS, and LDAP; File sharing tools viz. NFS and AutoFS; Time synchronization using NTP; internet services administration; BootP/TFTP services; system security; and so on. Chapters 22 through 33 cover this area. The beginning of each chapter highlights objectives covered. The end of each chapter includes a summary as to what is learnt in the chapter. Throughout the book tables, figures, screen shots, and examples are given to explain concepts and tasks. The output generated as a result of running commands is highlighted in light grey background to differentiate it with surrounding text. The book includes several appendices one of which contains more than 550 practice exam questions. Tables of commands, important files, and service daemons are included in separate appendices.
Intelligent assistant systems information is becoming the raw material of modern society. Access to information spaces and the capability to use them effectively and efficiently has become a key economical success factor. ""Intelligent Assistant Systems: Concepts, Techniques and Technologies"" contributes to the development of particular kinds of software and intelligent assistant systems, highlighting preliminary answers to the question, ""what is assistance?"" ""Intelligent Assistant Systems: Concepts, Techniques and Technologies"" demonstrates that assistant systems will become reality, as the technology for implementing these systems is available and the problems that require assistance for their solutions are soon to be discovered. This book addresses intelligent assistant systems and issues, their scope, purpose, architecture, implementation, deployment, theoretical background, and use.
Java Card is one of the latest developments in the area of multi-application and platform-independent smart cards. As a working tool for professionals, this easy-to-understand resource provides clear, detailed guidance on smart cards, credit and debit cards, Java Card and Open Card Framework (OCF). It offers in-depth coverage of important standards, open specifications and critical security issues, including common threats and security mechanisms regarding the card and its connection interface. The book explains how to program a Java Card applet, an OCF card service and a terminal application. What's more, the book presents an informative case study on the credit-debit application, offering a detailed road map of the application development process.
Model-driven Development for Embedded Software: Application to Communications for Drone Swarm describes the principles of model-oriented design used in the aeronautical field, specifically for the UAV (Unmanned Aerial Vehicle). The book focuses on designing an embedded system for drones to carry out ad hoc communication within a drone fleet. In this context, an original methodology for rapid prototyping of embedded systems is presented. This approach saves time for the verification and formal validation phases, contributing to certification of the Unmanned Aerial System (UAS). The book also addresses the more traditional verification phases that must be performed to verify accuracy of the system. This evaluation is carried out in simulation and by real experimentation. The various tools necessary for the implementation of this methodology are described to allow the reader to be able to implement independently. Finally, to illustrate the contribution of this original methodology, an example of embedded system development is presented in which the different phases of the methodology are explained to conceive, validate and test a new secure routing protocol developed for communications within a fleet of drones.
In the age of increasing reliance on data and the importance of sensitive information, applications and technologies have arisen to appropriately deal with assuring the security of medical informatics and healthcare administration functions. In order for technology to progress, new systems are being installed globally to address this issue. Governance of Picture Archiving and Communications Systems: Data Security and Quality Management of Filmless Radiology examines information security management systems for the facilitation of picture archiving and communication systems (PACS). This valuable contribution to data security and quality management literature provides a comprehensive guide for all aspects of the implementation of PACS for the enhancement of modern practices in radiology. |
You may like...
Introduction to Evolutionary Algorithms
Xinjie Yu, Mitsuo Gen
Hardcover
R4,922
Discovery Miles 49 220
Data Science and Big Data: An…
Witold Pedrycz, Shyi-Ming Chen
Hardcover
R4,705
Discovery Miles 47 050
Enhancing Academic Research With…
Dhananjay Subhashchandra Deshpande, Narayan Bhosale, …
Hardcover
R4,999
Discovery Miles 49 990
Primer for Data Analytics and Graduate…
Douglas Wolfe, Grant Schneider
Hardcover
R2,441
Discovery Miles 24 410
|