![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems
Real-time and embedded systems are essential to our lives, from controlling car engines and regulating traffic lights to monitoring plane takeoffs and landings to providing up-to-the-minute stock quotes. Bringing together researchers from both academia and industry, the Handbook of Real-Time and Embedded Systems provides comprehensive coverage of the most advanced and timely topics in the field. The book focuses on several major areas of real-time and embedded systems. It examines real-time scheduling and resource management issues and explores the programming languages, paradigms, operating systems, and middleware for these systems. The handbook also presents challenges encountered in wireless sensor networks and offers ways to solve these problems. It addresses key matters associated with real-time data services and reviews the formalisms, methods, and tools used in real-time and embedded systems. In addition, the book considers how these systems are applied in various fields, including adaptive cruise control in the automobile industry. With its essential material and integration of theory and practice, the Handbook of Real-Time and Embedded Systems facilitates advancements in this area so that the services we rely on can continue to operate successfully.
This Book discusses machine learning for model order reduction, which can be used in modern VLSI design to predict the behavior of an electronic circuit, via mathematical models that predict behavior. The author describes techniques to reduce significantly the time required for simulations involving large-scale ordinary differential equations, which sometimes take several days or even weeks. This method is called model order reduction (MOR), which reduces the complexity of the original large system and generates a reduced-order model (ROM) to represent the original one. Readers will gain in-depth knowledge of machine learning and model order reduction concepts, the tradeoffs involved with using various algorithms, and how to apply the techniques presented to circuit simulations and numerical analysis. Introduces machine learning algorithms at the architecture level and the algorithm levels of abstraction; Describes new, hybrid solutions for model order reduction; Presents machine learning algorithms in depth, but simply; Uses real, industrial applications to verify algorithms.
In recent years, wireless networks have become more ubiquitous and integrated into everyday life. As such, it is increasingly imperative to research new methods to boost cost-effectiveness for spectrum and energy efficiency. Interference Mitigation and Energy Management in 5G Heterogeneous Cellular Networks is a pivotal reference source for the latest research on emerging network architectures and mitigation technology to enhance cellular network performance and dependency. Featuring extensive coverage across a range of relevant perspectives and topics, such as interference alignment, resource allocation, and high-speed mobile environments, this book is ideally designed for engineers, professionals, practitioners, upper-level students, and academics seeking current research on interference and energy management for 5G heterogeneous cellular networks. Topics Covered: Cognitive Radio Game Theory Green Technologies High-Speed Mobile Environments
Major advances in computing are occurring at an ever-increasing pace. This is especially so in the area of high performance computing (HPC), where today's supercomputer is tomorrow's workstation. High Performance Computing Systems and Applications is a record of HPCS'98, the 12th annual Symposium on High Performance Computing Systems and Applications. The quality of the conference was significantly enhanced by the high proportion of keynote and invited speakers. This book presents the latest research in HPC architecture, networking, applications and tools. Of special note are the sections on computational biology and physics. High Performance Computing Systems and Applications is suitable as a secondary text for a graduate-level course on computer architecture and networking, and as a reference for researchers and practitioners in industry.
This updated and reorganized Fifth edition of Software Testing: A Craftsman's Approach continues to be a valuable reference for software testers, developers, and engineers, by applying the strong mathematics content of previous editions to a coherent treatment of software testing. Responding to instructor and student survey input, the authors have streamlined chapters and examples. The Fifth Edition: Has a new chapter on feature interaction testing that explores the feature interaction problem and explains how to reduce tests Uses Java instead of pseudo-code for all examples including structured and object-oriented ones Presents model-based development and provides an explanation of how to conduct testing within model-based development environments Explains testing in waterfall, iterative, and agile software development projects Explores test-driven development, reexamines all-pairs testing, and explains the four contexts of software testing Thoroughly revised and updated, Software Testing: A Craftsman's Approach, Fifth Edition is sure to become a standard reference for those who need to stay up to date with evolving technologies in software testing.
This book presents various novel architectures for FPGA-optimized accurate and approximate operators, their detailed accuracy and performance analysis, various techniques to model the behavior of approximate operators, and thorough application-level analysis to evaluate the impact of approximations on the final output quality and performance metrics. As multiplication is one of the most commonly used and computationally expensive operations in various error-resilient applications such as digital signal and image processing and machine learning algorithms, this book particularly focuses on this operation. The book starts by elaborating on the various sources of error resilience and opportunities available for approximations on various layers of the computation stack. It then provides a detailed description of the state-of-the-art approximate computing-related works and highlights their limitations.
An up-to-date guide to creating your own fun and useful Raspberry Pi (TM) programs This fully updated guide shows how to create inventive programs and fun games on your powerful Raspberry Pi-with no programming experience required. Programming the Raspberry Pi (TM): Getting Started with Python, Third Edition addresses physical changes and new setup procedures as well as OS updates to the current version 4. You will discover how to configure hardware and software, write Python scripts, create user-friendly GUIs, and control external electronics. Step-by-step projects include a digital clock prototype and a fully functioning Raspberry Pi robot. Configure your Raspberry Pi and explore its features Start writing and debugging Python programs Use strings, lists, functions, and dictionaries Work with modules, classes, and methods Apply object-oriented development methods Create user-friendly games using Pygame Build intuitive user interfaces with guizero Interface with hardware using the gpiozero library Attach external electronics through the GPIO port Add powerful Web features to your projects
Prepare for Microsoft Exam AZ-801 and demonstrate your real-world mastery of configuring and managing Windows Server on-premises, hybrid, and Infrastructure as a Service (IaaS) platform workloads. Designed for professionals with Windows Server and Azure experience, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified: Windows Server Hybrid Administrator Associate level. Focus on the expertise measured by these objectives: Secure Windows Server on-premises and hybrid infrastructures Implement and manage Windows Server high availability Implement disaster recovery Migrate servers and workloads Monitor and troubleshoot Windows Server environments This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you have significant experience with Windows Server operating systems About the Exam Exam AZ-801 focuses on knowledge needed to secure Windows Server operating systems, networking, and storage; secure hybrid Active Directory infrastructures; use Azure Services to identify and remediate Windows Server security issues; implement and manage Windows Server failover clusters and Storage Spaces Direct; manage Windows Server backup and recovery; use Azure Site Recovery to implement disaster recovery; protect VMs with Hyper-V replicas; migrate on-premises storage and services; move workloads and AD DS infrastructure to Windows Server 2022 from previous versions; migrate IIS workloads to Azure; use Windows Server tools and Azure services to monitor Windows Server; troubleshoot on-premises networking, hybrid networking, virtual machines in Azure, and Active Directory. About Microsoft Certification Passing this exam and Exam AZ-800 Administering Windows Server Hybrid Core Infrastructure fulfills your requirements for the Microsoft Certified: Windows Server Hybrid Administrator Associate credential. This demonstrates your expertise in configuring and managing Windows Server on-premises, hybrid, and IaaS platform workloads; integrating Windows Server environments with Azure services; managing and maintaining Windows Server IaaS workloads in Azure, and moving workloads to Azure. This certification supports your goals as an IT, cloud, identity/access, or information protection administrator; a network, security, or support engineer, and a technology manager. See full details at: microsoft.com/learn
Electronic services networks--systems of terminals and computers linked by telecommunication apparatus and used to process transactions--have had an increasing influence on industrial structures and commercial practices over the past decade. Margaret Guerin-Calvert and Steven Wildman have assembled diverse essays representing the best of current thinking on these networks. The book provides the reader with varied theoretical perspectives on ESNs and their effects on business and finance and contains five case studies that apply these theoretical ideas to issues raised by the proliferation of these networks. Unlike other works, which have focused on ESNs as features of specific industries, this collection explores the networks themselves as economic phenomena. The contributions are grouped into two parts. The first presents general theoretical perspectives on the economics of various ESNs, their effects on the industries and markets that employ them, and the policy issues they raise. Among the topics discussed are structural relationships among ESNs, their effect on organizational structures, compatibility between shared networks, and competitive search facilitation. In Part II, the contributors offer a detailed look at the economic policy histories of ESNs in specific industries, including banking, real estate, airlines, and travel. There are discussions of automatic teller machines, computer reservation systems, multiple-listing services, and electronic data interchange. These studies demonstrate the incredible variety of applications of ESN technology and make this an indispensable resource for professionals in all types of businesses that use or could use ESNs, as well as for students in a wide range of law, business, and public policy courses.
Increase your iPad IQ with this genius-level guide to the Apple iPad If you want to squeeze every last bit of incredible from your Apple iPad we've got you covered with this newly revised iPad Portable Genius. Want to learn how to connect to a network? How to configure your tablet? How to surf the web more comfortably? All while keeping your identity and accounts private and secure? With the iPad Portable Genius as your guide, you'll unlock the full potential of your iPad in no time at all. You'll learn how to: Get the most out of sending and receiving your email Have fun with your images and take crystal-clear photos every time Shoot and edit video right on your iPad Manage your busy schedule with calendars Perfect for anyone looking to save time and reveal the true power and flexibility of their iPad, the iPad Portable Genius, Fourth Edition contains all the new, engaging, and extensively illustrated info you need to master your tablet.
This book describes model-based development of adaptive embedded systems, which enable improved functionality using the same resources. The techniques presented facilitate design from a higher level of abstraction, focusing on the problem domain rather than on the solution domain, thereby increasing development efficiency. Models are used to capture system specifications and to implement (manually or automatically) system functionality. The authors demonstrate the real impact of adaptivity on engineering of embedded systems by providing several industrial examples of the models used in the development of adaptive embedded systems.
This book provides readers with a comprehensive, state-of-the-art reference to the design automation aspects of quantum computers. Given roadmaps calling for quantum computers with 2000 qubits in a few years, readers will benefit from the practical implementation aspects covered in this book. The authors discuss real hardware to the extent possible. Provides an up-to-date, single-source reference to design automation aspects of quantum computers; Presentation is not just theoretical, but substantiated with real quantum hardware; Covers multi-faceted aspects of quantum computers, providing readers with valuable information, no matter the direction in which technology moves.
Over the last decade, there has been a growing interest in human behavior analysis, motivated by societal needs such as security, natural interfaces, affective computing, and assisted living. However, the accurate and non-invasive detection and recognition of human behavior remain major challenges and the focus of many research efforts. Traditionally, in order to identify human behavior, it is first necessary to continuously collect the readings of physical sensing devices (e.g., camera, GPS, and RFID), which can be worn on human bodies, attached to objects, or deployed in the environment. Afterwards, using recognition algorithms or classification models, the behavior types can be identified so as to facilitate advanced applications. Although such traditional approaches deliver satisfactory performance and are still widely used, most of them are intrusive and require specific sensing devices, raising issues such as privacy and deployment costs. In this book, we will present our latest findings on non-invasive sensing and understanding of human behavior. Specifically, this book differs from existing literature in the following senses. Firstly, we focus on approaches that are based on non-invasive sensing technologies, including both sensor-based and device-free variants. Secondly, while most existing studies examine individual behaviors, we will systematically elaborate on how to understand human behaviors of various granularities, including not only individual-level but also group-level and community-level behaviors. Lastly, we will discuss the most important scientific problems and open issues involved in human behavior analysis.
The recent boom in the mobile telecommunication market has captured the interest of electronic and communication companies worldwide. In order to cut costs, and to decrease volume and power consumption, research is ongoing which focuses on the integration of a complete RF transceiver on a single die. This book discusses for the first time an important building block in such a single-chip wireless transceiver, that is, the frequency synthesizer. CMOS Wireless Frequency Synthesizer Design starts off with a comprehensive overview of possible synthesizer architectures together with a discussion of the general PLL theory. It goes on to present an easy calculation method of predicting LC-tuned VCO phase noise. Practical designs are presented which illustrate in detail the implementation of monolithic LC-tuned VCOs, using either bonding-wire inductors or hollow planar inductors. It is demonstrated that such designs can achieve the required phase noise specifications using standard CMOS technology. CMOS Wireless Frequency Synthesizer Design also discusses the other PLL building blocks such as the high-speed frequency divider. The phase-switching multi-modulus prescaler architecture, which combines high input frequencies with a programmable division factor, is presented in chapter 6. A concluding chapter combines all the gathered knowledge and presents the first monolithic standard CMOS frequency synthesizer that achieves the DCS-1800 specifications. CMOS Wireless Frequency Synthesizer Design is essential reading for all researchers and practicing engineers working in the design of wireless communication systems requiring highly integrated RF transceivers and frequency synthesizers.
Floating Gate Devices: Operation and Compact Modeling focuses on
standard operations and compact modeling of memory devices based on
Floating Gate architecture. Floating Gate devices are the building
blocks of Flash, EPROM, EEPROM memories. Flash memories, which are
the most versatile nonvolatile memories, are widely used to store
code (BIOS, Communication protocol, Identification code, ) and data
(solid-state Hard Disks, Flash cards for digital cameras, ).
A wide range of modern computer applications require the performance and flexibility of parallel and distributed systems. Better software support is required if the technical advances in these systems are to be fully exploited by commerce and industry. This involves the provision of specialised techniques and tools as well as the integration of standard software engineering methods. This book will reflect current advances in this area, and will address issues of theory and practice with contributions from academia and industry. It is the aim of the book to provide a focus for information on this developing which will be of use to both researchers and practitioners.
This book focuses on the theory and application of interdependent networks. The contributors consider the influential networks including power and energy networks, transportation networks, and social networks. The first part of the book provides the next generation sustainability framework as well as a comprehensive introduction of smart cities with special emphasis on energy, communication, data analytics and transportation. The second part offers solutions to performance and security challenges of developing interdependent networks in terms of networked control systems, scalable computation platforms, and dynamic social networks. The third part examines the role of electric vehicles in the future of sustainable interdependent networks. The fourth and last part of this volume addresses the promises of control and management techniques for the future power grids.
This book provides readers with an insightful guide to the design, testing and optimization of 2.5D integrated circuits. The authors describe a set of design-for-test methods to address various challenges posed by the new generation of 2.5D ICs, including pre-bond testing of the silicon interposer, at-speed interconnect testing, built-in self-test architecture, extest scheduling, and a programmable method for low-power scan shift in SoC dies. This book covers many testing techniques that have already been used in mainstream semiconductor companies. Readers will benefit from an in-depth look at test-technology solutions that are needed to make 2.5D ICs a reality and commercially viable.
This volume reports new developments on work in the quantum flux parametron (QFP) project. It makes complete a series on Josephson supercomputers, which includes four earlier volumes, also published by World Scientific. QFP technology has great potential especially in the design of computer architecture. It is regarded as being able to go beyond the horizon of current technology, and is a leading direction for the advancement of computer technology in the next decade.
The first Stanford MIPS project started as a special graduate course in 1981. That project produced working silicon in 1983 and a prototype for running small programs in early 1984. After that, we declared it a success and decided to move on to the next project-MIPS-X. This book is the final and complete word on MIPS-X. The initial design of MIPS-X was formulated in 1984 beginning in the Spring. At that time, we were unsure that RISe technology was going to have the industrial impact that we felt it should. We also knew of a number of architectural and implementation flaws in the Stanford MIPS machine. We believed that a new processor could achieve a performance level of over 10 times a VAX 11/780, and that a microprocessor of this performance level would convince academic skeptics of the value of the RISe approach. We were concerned that the flaws in the original RISe design might overshadow the core ideas, or that attempts to industrialize the technology would repeat the mistakes of the first generation designs. MIPS-X was targeted to eliminate the flaws in the first generation de signs and to boost the performance level by over a factor of five."
This book presents a state-of-the-art technique for formal verification of continuous-time Simulink/Stateflow diagrams, featuring an expressive hybrid system modelling language, a powerful specification logic and deduction-based verification approach, and some impressive, realistic case studies. Readers will learn the HCSP/HHL-based deductive method and the use of corresponding tools for formal verification of Simulink/Stateflow diagrams. They will also gain some basic ideas about fundamental elements of formal methods such as formal syntax and semantics, and especially the common techniques applied in formal modelling and verification of hybrid systems. By investigating the successful case studies, readers will realize how to apply the pure theory and techniques to real applications, and hopefully will be inspired to start to use the proposed approach, or even develop their own formal methods in their future work.
This book shows IT managers how to identify, mitigate and manage risks in an IT outsourcing exercise. The book explores current trends and highlights key issues and changes that are taking place within outsourcing. Attention is given to identifying the drivers and related risks of outsourcing by examining recently published and existing concepts of IT outsourcing. Founded on academic theory and empirical and quantitative information, this book: * Incorporates the complete risk identification and mitigation life cycle * Highlights the concept of core competency * Looks at motivating factors and working relationships of the buyer and supplier * Provides background to understand the risks as a result of 'human factors' as defined by the agency theory * Reviews the areas of risk that influence the decision to outsource the IT function * Examines the forces that determine the equilibrium in the risk profiles for the buyer and supplier
PC Based Instrumentation and Control is a guide to implementing computer control, instrumentation and data acquisition using a standard PC and some of the more traditional computer languages. Numerous examples of configurations and working circuits, as well as representative software, make this a practical, hands-on guide to implementing PC-based testing and calibration systems and increasing efficiency without compromising quality or reliability. Guidance is given on modifying the circuits and software routines to meet the reader's specific needs. The third edition includes updated coverage of PC hardware and bus systems, a new chapter on virtual instruments and an introduction to programming and software development in a modern 32-bit environment. Additional examples have been included, with source code and executables available for download from the companion website www.key2control.com.
This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems. |
![]() ![]() You may like...
The Definitive Guide to Linux Network…
Nathan Yocom, John Turner, …
Paperback
PowerShell - IT Pro Solutions
William R. Stanek, William Stanek
Paperback
R1,070
Discovery Miles 10 700
Finite Elements and Fast Iterative…
Howard Elman, David Silvester, …
Hardcover
R4,587
Discovery Miles 45 870
Linux Malware Incident Response: A…
Cameron H. Malin, Eoghan Casey, …
Paperback
R459
Discovery Miles 4 590
|