![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems
Unique selling point: * Brings together insights on various fields, and how IoT and AI combined can help bring about sustainable living Core audience: * Researchers and academics - worldwide applicability Place in the market: * Gives a more comprehensive overview of the potential applications of IoT and AI for sustainability than other books on the market
Intelligent Vehicular Network and Communications: Fundamentals, Architectures and Solutions begins with discussions on how the transportation system has transformed into today's Intelligent Transportation System (ITS). It explores the design goals, challenges, and frameworks for modeling an ITS network, discussing vehicular network model technologies, mobility management architectures, and routing mechanisms and protocols. It looks at the Internet of Vehicles, the vehicular cloud, and vehicular network security and privacy issues. The book investigates cooperative vehicular systems, a promising solution for addressing current and future traffic safety needs, also exploring cooperative cognitive intelligence, with special attention to spectral efficiency, spectral scarcity, and high mobility. In addition, users will find a thorough examination of experimental work in such areas as Controller Area Network protocol and working function of On Board Unit, as well as working principles of roadside unit and other infrastructural nodes. Finally, the book examines big data in vehicular networks, exploring various business models, application scenarios, and real-time analytics, concluding with a look at autonomous vehicles.
This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications. The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival. Provides deep insight into the security threats undermining existing integrated circuit authentication techniques; Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems; Offers a comprehensive summary of existing authentication protocols and their limitations; Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption; Includes detailed case studies on the emerging applications of IC authentication schemes.
This book brings together a selection of the best papers from the twenty-first edition of the Forum on specification and Design Languages Conference (FDL), which took place on September 10-12, 2018, in Munich, Germany. FDL is a well-established international forum devoted to dissemination of research results, practical experiences and new ideas in the application of specification, design and verification languages to the design, modeling and verification of integrated circuits, complex hardware/software embedded systems, and mixed-technology systems. Covers Assertion Based Design, Verification & Debug; Includes language-based modeling and design techniques for embedded systems; Covers design, modeling and verification of mixed physical domain and mixed signal systems that include significant analog parts in electrical and non-electrical domains; Includes formal and semi-formal system level design methods for complex embedded systems based on the Unified Modelling Language (UML) and Model Driven Engineering (MDE).
The more rapid rate of increase in the speed of microprocessor technology than in memory speeds has created a serious 'memory gap' for computer designers and manufacturers. "High Performance Memory Systems" addresses this issue and examines all aspects of improving the memory system performance of general-purpose programs. Current research highlights from both industry and academia focus on: coherence, synchronization, and allocation; power-awareness, reliability, and reconfigurability; software-based memory tuning; architecture design issues; and workload considerations. Topics and features: *both harware and software approaches to scalability and speed disparities are considered *introductory chapter provides broad examination of high performance memory systems *includes coverage of topics from several important international conferences Edited by leading international authorities in the field, this new work provides a survey from researchers and practitioners on advances in technology, architecture, and algorithms that address scalability needs in multiprocessors and the expanding gap between CPU/network and memory speeds. It is ideally suited to researchers and R & D professionals with interests or practice in computer engineering, computer architecture, and processor architecture.
Dependable Network Computing provides insights into various problems facing millions of global users resulting from the internet revolution'. It covers real-time problems involving software, servers, and large-scale storage systems with adaptive fault-tolerant routing and dynamic reconfiguration techniques. Also included is material on routing protocols, QoS, and dead- and live-lock free related issues. All chapters are written by leading specialists in their respective fields. Dependable Network Computing provides useful information for scientists, researchers, and application developers building networks based on commercially off-the-shelf components.
This book reviews and presents a number of approaches to Fuzzy-based system safety and reliability assessment. For each proposed approach, it provides case studies demonstrating their applicability, which will enable readers to implement them into their own risk analysis process. The book begins by giving a review of using linguistic terms in system safety and reliability analysis methods and their extension by fuzzy sets. It then progresses in a logical fashion, dedicating a chapter to each approach, including the 2-tuple fuzzy-based linguistic term set approach, fuzzy bow-tie analysis, optimizing the allocation of risk control measures using fuzzy MCDM approach, fuzzy sets theory and human reliability, and emergency decision making fuzzy-expert aided disaster management system. This book will be of interest to professionals and researchers working in the field of system safety and reliability, as well as postgraduate and undergraduate students studying applications of fuzzy systems.
This book is designed for those who manage software development
projects. It explores software and risk management both from a
technology and a business perspective. Issues regarding costs,
schedules, technical performance, and strategies for software
development are discussed.
This book presents MOSFET-based current mode logic (CML) topologies, which increase the speed, and lower the transistor count, supply voltage and power consumption. The improved topologies modify the conventional PDN, load, and the current source sections of the basic CML gates. Electronic system implementation involves embedding digital and analog circuits on a single die shifting towards mixed-mode circuit design. The high-resolution, low-power and low-voltage analog circuits are combined with high-frequency complex digital circuits, and the conventional static CMOS logic generates large current spikes during the switching (also referred to as digital switching noise), which degrade the resolution of the sensitive analog circuits via supply line and substrate coupling. This problem is exacerbated further with scaling down of CMOS technology due to higher integration levels and operating frequencies. In the literature, several methods are described to reduce the propagation of the digital switching noise. However, in high-resolution applications, these methods are not sufficient. The conventional CMOS static logic is no longer an effective solution, and therefore an alternative with reduced current spikes or that draws a constant supply current must be selected. The current mode logic (CML) topology, with its unique property of requiring constant supply current, is a promising alternative to the conventional CMOS static logic.
The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation techniques; (3) the portability over different platforms and architectures. First, the authors propose an approximate fingerprinting technique for android packaging that captures the underlying static structure of the android applications in the context of bulk and offline detection at the app-market level. This book proposes a malware clustering framework to perform malware clustering by building and partitioning the similarity network of malicious applications on top of this fingerprinting technique. Second, the authors propose an approximate fingerprinting technique that leverages dynamic analysis and natural language processing techniques to generate Android malware behavior reports. Based on this fingerprinting technique, the authors propose a portable malware detection framework employing machine learning classification. Third, the authors design an automatic framework to produce intelligence about the underlying malicious cyber-infrastructures of Android malware. The authors then leverage graph analysis techniques to generate relevant intelligence to identify the threat effects of malicious Internet activity associated with android malware. The authors elaborate on an effective android malware detection system, in the online detection context at the mobile device level. It is suitable for deployment on mobile devices, using machine learning classification on method call sequences. Also, it is resilient to common code obfuscation techniques and adaptive to operating systems and malware change overtime, using natural language processing and deep learning techniques. Researchers working in mobile and network security, machine learning and pattern recognition will find this book useful as a reference. Advanced-level students studying computer science within these topic areas will purchase this book as well.
This two-part book puts the spotlight on how a TCP/IP stack works using Micri m's uC/TCP-IP as a reference. Part I includes an overview of the basics of the Internet Protocol and walks through various aspects of C/TCP-IP implementation and usage. Part II provides examples for the reader, using the Renesas YRDKRX62N Evaluation Board. The board features the Renesas RX62N, a high-performance 32-bit Flash MCU with FPU and DSP capability, and rich connectivity including Ethernet. Together with the Renesas e2Studio, the evaluation board provides everything necessary to get you up and running quickly, as well as a fun and educational experience, resulting in a high-level of proficiency in a short time. This book is written for serious embedded systems programmers, consultants, hobbyists, and students interested in understanding the inner workings of a TCP/IP stack. uC/TCP-IP is not just a great learning platform, but also a full commercial-grade software package, ready to be part of a wide range of products. The topics covered in this book include: Ethernet technology and device drivers IP connectivity Client and Server architecture Socket programming UDP performance TCP performance System network performance
Verification of real-time requirements in systems-on-chip becomes more complex as more applications are integrated. Predictable and composable systems can manage the increasing complexity using formal verification and simulation. This book explains the concepts of predictability and composability and shows how to apply them to the design and analysis of a memory controller, which is a key component in any real-time system.
Recent industry surveys expect the cloud computing services market to be in excess of $20 billion and cloud computing jobs to be in excess of 10 million worldwide in 2014 alone. In addition, since a majority of existing information technology (IT) jobs is focused on maintaining legacy in-house systems, the demand for these kinds of jobs is likely to drop rapidly if cloud computing continues to take hold of the industry. However, there are very few educational options available in the area of cloud computing beyond vendor-specific training by cloud providers themselves. Cloud computing courses have not found their way (yet) into mainstream college curricula. This book is written as a textbook on cloud computing for educational programs at colleges. It can also be used by cloud service providers who may be interested in offering a broader perspective of cloud computing to accompany their own customer and employee training programs. The typical reader is expected to have completed a couple of courses in programming using traditional high-level languages at the college-level, and is either a senior or a beginning graduate student in one of the science, technology, engineering or mathematics (STEM) fields. We have tried to write a comprehensive book that transfers knowledge through an immersive "hands-on approach," where the reader is provided the necessary guidance and knowledge to develop working code for real-world cloud applications. Additional support is available at the book's website: www.cloudcomputingbook.info Organization The book is organized into three main parts. Part I covers technologies that form the foundations of cloud computing. These include topics such as virtualization, load balancing, scalability & elasticity, deployment, and replication. Part II introduces the reader to the design & programming aspects of cloud computing. Case studies on design and implementation of several cloud applications in the areas such as image processing, live streaming and social networks analytics are provided. Part III introduces the reader to specialized aspects of cloud computing including cloud application benchmarking, cloud security, multimedia applications and big data analytics. Case studies in areas such as IT, healthcare, transportation, networking and education are provided.
This book contains extended and revised versions of the best papers presented at the 27th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2019, held in Cusco, Peru, in October 2019. The 15 full papers included in this volume were carefully reviewed and selected from the 28 papers (out of 82 submissions) presented at the conference. The papers discuss the latest academic and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) design, considering the challenges of nano-scale, state-of-the-art and emerging manufacturing technologies. In particular they address cutting-edge research fields like heterogeneous, neuromorphic and brain-inspired, biologically-inspired, approximate computing systems.
This book provides an introduction to decision making in a distributed computational framework. Classical detection theory assumes a centralized configuration. All observations are processed by a central processor to produce the decision. In the decentralized detection system, distributed detectors generate decisions based on locally available observations; these decisions are then conveyed to the fusion center that makes the global decision. Using numerous examples throughout the book, the author discusses such distributed detection processes under several different formulations and in a wide variety of network topologies.
This book discusses business architecture as a basis for aligning efforts with outcomes. It views BA as complementary to enterprise architecture, where the focus of technological initiatives and inventories is to understand and improve business organization, business direction, and business decision-making. This book provides a practical, long-term view on BA. Based on the authors' consulting experience and industrial research, the material in this book is a valuable addition to the thought processes around BA and EA. The lead author has direct and practical experience with large clients in applying APQC capability framework for undertaking multiple enterprise-wide capability assessments.
This book addresses dynamic modelling methodology and analyses of tree-type robotic systems. Such analyses are required to visualize the motion of a system without really building it. The book contains novel treatment of the tree-type systems using concept of kinematic modules and the corresponding Decoupled Natural Orthogonal Complements (DeNOC), unified representation of the multiple-degrees-of freedom-joints, efficient recursive dynamics algorithms, and detailed dynamic analyses of several legged robots. The book will help graduate students, researchers and practicing engineers in applying their knowledge of dynamics for analysis of complex robotic systems. The knowledge contained in the book will help one in virtual testing of robot operation, trajectory planning and control.
This book describes digital design techniques with exercises. The concepts and exercises discussed are useful to design digital logic from a set of given specifications. Looking at current trends of miniaturization, the contents provide practical information on the issues in digital design and various design optimization and performance improvement techniques at logic level. The book explains how to design using digital logic elements and how to improve design performance. The book also covers data and control path design strategies, architecture design strategies, multiple clock domain design and exercises , low-power design strategies and solutions at the architecture and logic-design level. The book covers 60 exercises with solutions and will be useful to engineers during the architecture and logic design phase. The contents of this book prove useful to hardware engineers, logic design engineers, students, professionals and hobbyists looking to learn and use the digital design techniques during various phases of design.
- Curating Social Data - Summarizing Social Data - Analyzing Social Data - Social Data Analytics Applications: Trust, Recommender Systems, Cognitive Analytics
With this book, managers and decision makers are given the tools to make more informed decisions about big data purchasing initiatives. Big Data Analytics: A Practical Guide for Managers not only supplies descriptions of common tools, but also surveys the various products and vendors that supply the big data market. Comparing and contrasting the different types of analysis commonly conducted with big data, this accessible reference presents clear-cut explanations of the general workings of big data tools. Instead of spending time on HOW to install specific packages, it focuses on the reasons WHY readers would install a given package. The book provides authoritative guidance on a range of tools, including open source and proprietary systems. It details the strengths and weaknesses of incorporating big data analysis into decision-making and explains how to leverage the strengths while mitigating the weaknesses. Describes the benefits of distributed computing in simple terms Includes substantial vendor/tool material, especially for open source decisions Covers prominent software packages, including Hadoop and Oracle Endeca Examines GIS and machine learning applications Considers privacy and surveillance issues The book further explores basic statistical concepts that, when misapplied, can be the source of errors. Time and again, big data is treated as an oracle that discovers results nobody would have imagined. While big data can serve this valuable function, all too often these results are incorrect, yet are still reported unquestioningly. The probability of having erroneous results increases as a larger number of variables are compared unless preventative measures are taken. The approach taken by the authors is to explain these concepts so managers can ask better questions of their analysts and vendors as to the appropriateness of the methods used to arrive at a conclusion. Because the world of science and medicine has been grappling with similar issues in the publication of studies, the authors draw on their efforts and apply them to big data.
The emergence of highly promising and potent technologies has enabled the transition of ordinary objects into smart artifacts-providing wider connectivity of digitized entities that can facilitate the building of connected cities. This book provides readers with a solid foundation on the latest technologies and tools required to develop and enhance smart cities around the world. The book begins by examining the rise of the cloud as the fundamental technology for establishing and sustaining smart cities and enterprises. Explaining the principal technologies and platform solutions for implementing intelligent cities, the book details the role of various technologies, standards, protocols, and tools in establishing flexible homes and the buildings of the future. Examines IT platforms and tools from various product vendors Considers service-oriented architecture and event-driven architecture for smart city applications Explains how to leverage big data analytics for smart city enhancement and improved decision making Includes case studies of intelligent cities, smart homes, buildings, transports, healthcare systems, and airports The authors explore the convergence of cloud computing and enterprise architecture and present valuable information on next-generation cloud computing. They also cover the various architectural types, including enterprise-scale integration, security, management, and governance. The book concludes by explaining the various security requirements of intelligent cities as well as the threats and vulnerabilities of the various components that form the basis of the intelligent city framework, including cloud, big data, Internet of Things, and mobile technologies.
This book is focused on addressing the designs of FinFET-based analog ICs for 5G and E-band communication networks. In addition, it also incorporates some of the contemporary developments over different fields. It highlights the latest advances, problems and challenges and presents the latest research results in the field of mm-wave integrated circuits designing based on scientific literature and its practical realization. The traditional approaches are excluded in this book. The authors cover various design guidelines to be taken care for while designing these circuits and detrimental scaling effects on the same. Moreover, Gallium Nitrides (GaN) are also reported to show huge potentials for the power amplifier designing required in 5G communication network. Subsequently, to enhance the readability of this book, the authors also include real-time problems in RFIC designing, case studies from experimental results, and clearly demarking design guidelines for the 5G communication ICs designing. This book incorporates the most recent FinFET architecture for the analog IC designing and the scaling effects along with the GaN technology as well.
The book covers a wide range of wireless communication and network technologies, and will help readers understand the role of wireless technologies in applications touching on various spheres of human life, e.g. healthcare, agriculture, building smart cities, forecasting and the manufacturing industry. The book begins by discussing advances in wireless communication, including emerging trends and research directions for network technologies. It also highlights the importance of and need to actively develop these technologies. In turn, the book addresses different algorithms and methodologies which could be beneficial in implementing 5G Mobile Communication, Vehicular Ad-hoc Networks (VANET), Reliable Cooperative Networks, Delay Tolerant Networks (DTN) and many more contexts related to advanced communications. It then addresses the prominence of wireless communication in connection with the Internet of Things (IoT), Mobile Opportunistic Networks and Cognitive Radio Networks (CRN). Lastly, it presents the new horizons in architecture and building protocols for Li-Fi (Light-Fidelity) and Wearable Sensor Technology.
Providing an in-depth introduction to fundamental classical and non-classical logics, this textbook offers a comprehensive survey of logics for computer scientists. Logics for Computer Science contains intuitive introductory chapters explaining the need for logical investigations, motivations for different types of logics and some of their history. They are followed by strict formal approach chapters. All chapters contain many detailed examples explaining each of the introduced notions and definitions, well chosen sets of exercises with carefully written solutions, and sets of homework. While many logic books are available, they were written by logicians for logicians, not for computer scientists. They usually choose one particular way of presenting the material and use a specialized language. Logics for Computer Science discusses Gentzen as well as Hilbert formalizations, first order theories, the Hilbert Program, Godel's first and second incompleteness theorems and their proofs. It also introduces and discusses some many valued logics, modal logics and introduces algebraic models for classical, intuitionistic, and modal S4 and S5 logics. The theory of computation is based on concepts defined by logicians and mathematicians. Logic plays a fundamental role in computer science, and this book explains the basic theorems, as well as different techniques of proving them in classical and some non-classical logics. Important applications derived from concepts of logic for computer technology include Artificial Intelligence and Software Engineering. In addition to Computer Science, this book may also find an audience in mathematics and philosophy courses, and some of the chapters are also useful for a course in Artificial Intelligence. |
You may like...
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright
Paperback
R1,491
Discovery Miles 14 910
Inclusive Radio Communications for 5G…
Claude Oestges, Francois Quitin
Paperback
R2,896
Discovery Miles 28 960
Wireless Communication Networks…
Hailong Huang, Andrey V. Savkin, …
Paperback
R2,763
Discovery Miles 27 630
|