![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > General
Rugged Embedded Systems: Computing in Harsh Environments describes how to design reliable embedded systems for harsh environments, including architectural approaches, cross-stack hardware/software techniques, and emerging challenges and opportunities. A "harsh environment" presents inherent characteristics, such as extreme temperature and radiation levels, very low power and energy budgets, strict fault tolerance and security constraints, etc. that challenge the computer system in its design and operation. To guarantee proper execution (correct, safe, and low-power) in such scenarios, this contributed work discusses multiple layers that involve firmware, operating systems, and applications, as well as power management units and communication interfaces. This book also incorporates use cases in the domains of unmanned vehicles (advanced cars and micro aerial robots) and space exploration as examples of computing designs for harsh environments.
This book presents a model of electromagnetic (EM) information leakage based on electromagnetic and information theory. It discusses anti-leakage, anti-interception and anti-reconstruction technologies from the perspectives of both computer science and electrical engineering. In the next five years, the threat posed by EM information leakage will only become greater, and the demand for protection will correspondingly increase. The book systematically introduces readers to the theory of EM information leakage and the latest technologies and measures designed to counter it, and puts forward an EM information leakage model that has established the foundation for new research in this area, paving the way for new technologies to counter EM information leakage. As such, it offers a valuable reference guide for all researchers and engineers involved in EM information leakage and countermeasures.
Foundations of Quantum Programming discusses how new programming methodologies and technologies developed for current computers can be extended to exploit the unique power of quantum computers, which promise dramatic advantages in processing speed over currently available computer systems. Governments and industries around the globe are now investing vast amounts of money with the expectation of building practical quantum computers. Drawing upon years of experience and research in quantum computing research and using numerous examples and illustrations, Mingsheng Ying has created a very useful reference on quantum programming languages and important tools and techniques required for quantum programming, making the book a valuable resource for academics, researchers, and developers.
This new book provides an insightful look at the varied and exciting uses and applications of Wi-Fi and the Internet of Things in agriculture. With internet-enabled communications becoming more widely available, farms and agricultural establishments can take advantage of these new technologies for a wide range of farm operations, such as crop management, farm vehicle tracking, livestock monitoring, storage monitoring, and more. The collected data from these devices can be stored in the cloud system or server and accessed by the farmers via the internet or mobile phones. This book shows the many benefits to farmers from applying IoT, including better utilizing information for monitoring crops, optimizing water use, planning effective fertilization strategies, and saving time and reducing the operation expenses. Topics include using IoT for vertical farming, IoT-based smart irrigation system, landslide susceptibility assessment, automated aeroponics systems, crop survival analysis, and more. The volume also considers the challenges of IoT in agriculture, such as the requirements of applications of wireless sensor networks, the threat of attacks and the detection of vulnerabilities in wireless sensor networks, and more. Internet of Things for Agriculture 4.0: Impact and Challenges provides a better understanding of the time- and resourcing-saving benefits of wireless sensors and remote monitoring devices in agriculture. The volume will be useful for those involved in agricultural operations as well as scientists and researchers, and faculty and students in agriculture and computer and information science engineering.
Control system design is a challenging task for practicing engineers. It requires knowledge of different engineering fields, a good understanding of technical specifications and good communication skills. The current book introduces the reader into practical control system design, bridging the gap between theory and practice. The control design techniques presented in the book are all model based., considering the needs and possibilities of practicing engineers. Classical control design techniques are reviewed and methods are presented how to verify the robustness of the design. It is how the designed control algorithm can be implemented in real-time and tested, fulfilling different safety requirements. Good design practices and the systematic software development process are emphasized in the book according to the generic standard IEC61508. The book is mainly addressed to practicing control and embedded software engineers - working in research and development - as well as graduate students who are faced with the challenge to design control systems and implement them in real-time."
Unique selling point: * This book teaches readers how to build IoT products through practical projects, ranging from beginners to advanced level, so that they can build knowledge through hands-on tasks rather than theoretical knowledge. Core audience: * IoT enthusiasts, students and tutors Place in the market: * This is a new approach and distinctly different from all of the books which focus only on theory.
This book integrates new ideas and topics from real time systems, embedded systems, and software engineering to give a complete picture of the whole process of developing software for real-time embedded applications. You will not only gain a thorough understanding of concepts related to microprocessors, interrupts, and system boot process, appreciating the importance of real-time modeling and scheduling, but you will also learn software engineering practices such as model documentation, model analysis, design patterns, and standard conformance. This book is split into four parts to help you learn the key concept of embedded systems; Part one introduces the development process, and includes two chapters on microprocessors and interrupts---fundamental topics for software engineers; Part two is dedicated to modeling techniques for real-time systems; Part three looks at the design of software architectures and Part four covers software implementations, with a focus on POSIX-compliant operating systems. With this book you will learn: The pros and cons of different architectures for embedded systems POSIX real-time extensions, and how to develop POSIX-compliant real time applications How to use real-time UML to document system designs with timing constraints The challenges and concepts related to cross-development Multitasking design and inter-task communication techniques (shared memory objects, message queues, pipes, signals) How to use kernel objects (e.g. Semaphores, Mutex, Condition variables) to address resource sharing issues in RTOS applications The philosophy underpinning the notion of "resource manager" and how to implement a virtual file system using a resource manager The key principles of real-time scheduling and several key algorithms
Heterogeneous Computing with OpenCL 2.0 teaches OpenCL and parallel programming for complex systems that may include a variety of device architectures: multi-core CPUs, GPUs, and fully-integrated Accelerated Processing Units (APUs). This fully-revised edition includes the latest enhancements in OpenCL 2.0 including: * Shared virtual memory to increase programming flexibility and reduce data transfers that consume resources * Dynamic parallelism which reduces processor load and avoids bottlenecks * Improved imaging support and integration with OpenGL Designed to work on multiple platforms, OpenCL will help you more effectively program for a heterogeneous future. Written by leaders in the parallel computing and OpenCL communities, this book explores memory spaces, optimization techniques, extensions, debugging and profiling. Multiple case studies and examples illustrate high-performance algorithms, distributing work across heterogeneous systems, embedded domain-specific languages, and will give you hands-on OpenCL experience to address a range of fundamental parallel algorithms.
the first book on Unity for embedded systems design and robotics a comprehensive step-by-step guide packed with illustrations each chapter contains a real project
the first book on Unity for embedded systems design and robotics a comprehensive step-by-step guide packed with illustrations each chapter contains a real project
This critical and forward-looking book features: An assessment of the impact of Internet of Things (IoT) on the telecom industry's revenue streams IoT-based business models in the telecom industry A PESTLE (political, economic, socio-cultural, technological, legal, and environmental) analysis of the industry in relation to IoT Key technological drivers. It also features a case study of Bell Canada Enterprises (BCE) Inc., which highlights IoT-based business models in the industry. The study reveals that telecom operators have started implementing IoT projects, however, true revenue streams are yet to materialize. Ten IoT-based business models have been identified at BCE Inc. The book points out that operators do leverage existing infrastructure in terms of broadband fiber and mobile connectivity in part and resort to partnerships and acquisitions to acquire much-needed knowledge, technology, and smart devices. Concerning the effect of IoT on the telecoms' revenue streams, it was revealed that new entrants, who are not necessarily in the telecom industry, have impacted the old players' revenue streams. OTT services like YouTube, WhatsApp, IPTV, Netflix, are the biggest culprits. Seven key technological drivers for IoT have been identified and include widespread wireless connectivity, the availability and affordability of microcontrollers, sensors and actuators, the decreasing cost of bandwidth, the recent implementation of IPv6, and the ongoing development of 5G network, as well as the use of cloud computing and analytics. Finally, the PESTLE analysis of the industry shows that the lack of a comprehensive political and regulatory framework still slows down IoT deployment. Interoperability, security, and privacy concerns are other constraints. Conversely, general economic conditions in most developed and developing economies are favorable to the advancement of IoT technology. Governments are willing to subsidize R&D and have partnered with the private sector to speed up the roll-out process.
Mit diesem Buch kAnnen Sie sich ganz leicht in Windows 10 einarbeiten. Wenn Sie die wesentlichen Grundlagen verstehen wollen, ohne sich durch verwirrendes Computerkauderwelsch graben zu mA1/4ssen, suchen Sie nicht weiter! Dieses Buch nutzt einen Schritt-fA1/4r-Schritt-Ansatz, der speziell fA1/4r Windows-10-AnfAnger entwickelt wurde. Leicht verstAndliche Texte in groA er Schrift und eine FA1/4lle hilfreicher Abbildungen machen auch aus Ihnen einen Windows-10-Profi.
This book explores the most significant computational methods and the history of their development. It begins with the earliest mathematical / numerical achievements made by the Babylonians and the Greeks, followed by the period beginning in the 16th century. For several centuries the main scientific challenge concerned the mechanics of planetary dynamics, and the book describes the basic numerical methods of that time. In turn, at the end of the Second World War scientific computing took a giant step forward with the advent of electronic computers, which greatly accelerated the development of numerical methods. As a result, scientific computing became established as a third scientific method in addition to the two traditional branches: theory and experimentation. The book traces numerical methods' journey back to their origins and to the people who invented them, while also briefly examining the development of electronic computers over the years. Featuring 163 references and more than 100 figures, many of them portraits or photos of key historical figures, the book provides a unique historical perspective on the general field of scientific computing - making it a valuable resource for all students and professionals interested in the history of numerical analysis and computing, and for a broader readership alike.
Explores the role of Artificial Intelligence and Smart Computing in health informatics and healthcare with an emphasis on clinical data management and analysis for precise prediction and prompt action Presents cutting edge tracking, monitoring, real time assistance, and security for IoT in healthcare Discusses broadly on wearable sensors and IoT devices and their role in smart living assistance and energy conservation Describes a system mode and architecture for a clear picture of IoT in healthcare Explains the challenges and opportunities with IoT based healthcare industries and includes a study of threats, impacts, and the need of information security
It is now possible to gain competitive advantages based on consolidated R/3 system implementations. One of the most important optimisation aspects is a more consistent process integration in order to bring about fast, secure and cost effective business processes. This approach inevitably leads to Workflow Management and for SAP users to SAP® WebFlow®. This book introduces the topic of Workflow Management, gives an overview of the technical possibilities of SAP® WebFlow® and allows the reader to assess SAP workflow project risks and costs/benefits based on real life examples. Check lists and technical hints not only aid the reader in evaluating potential projects but also in the management of real life workflow project engineering.
What telecommunications professionals need to know about nonlinear
optical communication systems
Does IT spending really boost bank performance? It is widely accepted that technological developments have had a major impact on reshaping both front- and back-office operations, but there still remains some doubt as to whether the massive spending on IT by banks has improved performance or productivity in this sector. Elena Beccalli provides a useful insight into the effects of IT investments on European bank performance, drawing on new empirical evidence that academics, bankers, and IT consultants alike will find to be a fascinating contribution to this ongoing strategic debate.
SystemVerilog is a rich set of extensions to the IEEE 1364-2001 Verilog Hardware Description Language (Verilog HDL). These extensions address two major aspects of HDL-based design. First, modeling very large designs with concise, accurate, and intuitive code. Second, writing high-level test programs to efficiently and effectively verify these large designs. The first edition of this book addressed the first aspect of the SystemVerilog extensions to Verilog. Important modeling features were presented, such as two-state data types, enumerated types, user-degined types, structures, unions, and interfaces. Emphasis was placed on the proper usage of these enhancements for simulation and synthesis.
The ultimate resource for making embedded systems reliable, safe, and secure Embedded Systems Security provides: A broad understanding of security principles, concerns, and technologies Proven techniques for the efficient development of safe and secure embedded software A study of the system architectures, operating systems and hypervisors, networking, storage, and cryptographic issues that must be considered when designing secure embedded systems Nuggets of practical advice and numerous case studies throughout Written by leading authorities in the field with 65 years of embedded security experience: one of the original developers of the world s only Common Criteria EAL 6+ security certified software product and a lead designer of NSA certified cryptographic systems. This book is indispensable for embedded systems and security professionals, new and experienced. An important contribution to the understanding of the security of embedded systems. The Kleidermachers are experts in their field. As the Internet of things becomes reality, this book helps business and technology management as well as engineers understand the importance of "security from scratch." This book, with its examples and key points, can help bring more secure, robust systems to the market. Dr. Joerg Borchert, Vice President, Chip Card & Security, Infineon Technologies North America Corp.; President and Chairman, Trusted Computing Group Embedded Systems Security provides real-world examples of risk and exploitation; most importantly the book offers clear insight into methods used to counter vulnerabilities to build true, native security into technology. Adriel Desautels, President and CTO, Netragard, LLC. Security of embedded systems is more important than ever. The growth in networking is just one reason. However, many embedded systems developers have insufficient knowledge of how to achieve security in their systems. David Kleidermacher, a world-renowned expert in this field, shares in this book his knowledge and long experience with other engineers. A very important book at the right time. Prof. Dr.-Ing. Matthias Sturm, Leipzig University of Applied
Sciences; Chairman, Embedded World Conference steering board
This book contains extended and revised versions of the best papers presented at the 29th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2021, held in Singapore, in October 2021*. The 12 full papers included in this volume were carefully reviewed and selected from the 44 papers (out of 75 submissions) presented at the conference. The papers discuss the latest academic and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) design, considering the challenges of nano-scale, state-of-the-art and emerging manufacturing technologies. In particular they address cutting-edge research fields like low-power design of RF, analog and mixed-signal circuits, EDA tools for the synthesis and verification of heterogenous SoCs, accelerators for cryptography and deep learning and on-chip Interconnection system, reliability and testing, and integration of 3D-ICs. *The conference was held virtually.
As the computer industry retools to leverage massively parallel graphics processing units (GPUs), this book is designed to meet the needs of working software developers who need to understand GPU programming with CUDA and increase efficiency in their projects. "CUDA Application Design and Development" starts with an introduction to parallel computing concepts for readers with no previous parallel experience, and focuses on issues of immediate importance to working software developers: achieving high performance, maintaining competitiveness, analyzing CUDA benefits versus costs, and determining application lifespan. The book then details the thought behind CUDA and teaches how to create, analyze, and debug CUDA applications. Throughout, the focus is on software engineering issues: how to use CUDA in the context of existing application code, with existing compilers, languages, software tools, and industry-standard API libraries. Using an approach refined in a series of well-received articles
at Dr Dobb's Journal, author Rob Farber takes the reader
step-by-step from fundamentals to implementation, moving from
language theory to practical coding.
Increase your iPad IQ with this genius-level guide to the Apple iPad If you want to squeeze every last bit of incredible from your Apple iPad we've got you covered with this newly revised iPad Portable Genius. Want to learn how to connect to a network? How to configure your tablet? How to surf the web more comfortably? All while keeping your identity and accounts private and secure? With the iPad Portable Genius as your guide, you'll unlock the full potential of your iPad in no time at all. You'll learn how to: Get the most out of sending and receiving your email Have fun with your images and take crystal-clear photos every time Shoot and edit video right on your iPad Manage your busy schedule with calendars Perfect for anyone looking to save time and reveal the true power and flexibility of their iPad, the iPad Portable Genius, Fourth Edition contains all the new, engaging, and extensively illustrated info you need to master your tablet.
This book will introduce professional engineers and students alike to system development using Platform FPGAs. The focus is on embedded systems but it also serves as a general guide to building custom computing systems. The text describes the fundamental technology in terms of hardware, software, and a set of principles to guide the development of Platform FPGA systems. The goal is to show how to systematically and creatively apply these principles to the construction of application-specific embedded system architectures. There is a strong focus on using free and open source software to increase productivity. The organization of each chapter in the book includes two parts.
The white pages describe concepts, principles, and general
knowledge. The gray pages include a technical rendition of the main
issues of the chapter and show the concepts applied in practice.
This includes step-by-step details for a specific development board
and tool chain so that the reader can carry out the same steps on
their own. Rather than try to demonstrate the concepts on a broad
set of tools and boards, the text uses a single set of tools
(Xilinx Platform Studio, Linux, and GNU) throughout and uses a
single developer board (Xilinx ML-510) for the examples.
Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly depends on the efficient implementation of modular exponentiation and modular multiplication. Since 1984, when Montgomery first introduced a method to evaluate modular multiplications, many algorithmic modifications have been done for improving the efficiency of modular multiplication, but very less work has been done on the modular exponentiation to improve the efficiency. This research monograph addresses the question- how can the performance of modular exponentiation, which is the crucial operation of many public-key cryptographic techniques, be improved? The book focuses on Energy Efficient Modular Exponentiations for Cryptographic hardware. Spread across five chapters, this well-researched text focuses in detail on the Bit Forwarding Techniques and the corresponding hardware realizations. Readers will also discover advanced performance improvement techniques based on high radix multiplication and Cryptographic hardware based on multi-core architectures. |
You may like...
Enterprise Architecture, Integration and…
Peter Bernus, Guy Doumeingts, …
Hardcover
R1,410
Discovery Miles 14 100
Towards Analytical Techniques for…
L. Octavio Lerma, Vladik Kreinovich
Hardcover
R3,094
Discovery Miles 30 940
And For All These Reasons... I'm In…
Gil Oved, Lebo Gunguluza, …
Hardcover
(1)
The Haunting Season - The instant Sunday…
Bridget Collins, Natasha Pulley, …
Paperback
R269
Discovery Miles 2 690
|