![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > General
The fundamental principles of electronic device and circuit design are discussed in a clear and detailed manner along with explanatory diagrams. Various IoT-based smart applications in different fields along with challenges and issues along with prospects of IoT for future applications have also been discussed. The chapters delve into myriad aspects of circuit design, including MOSFET structures depending on their low power applications for IoT-enabled systems, advanced sensor design and fabrication using MEMS, indirect bootstrap techniques, efficient CMOS comparators, various encryption-decryption algorithms, IoT video forensics applications, microstrip patch antennas in embedded IoT applications, real-time object detection using sound, IOT and nanotechnologies based wireless sensors, and much more. It also introduces logic BIST using BS-CFSR for electronic devices that can be part of many applications in many industries, such as defense, automotive, banking, computer, healthcare, networking, and telecommunication.
Energy Autonomy of Batteryless and Wireless Embedded Systems covers the numerous new applications of embedded systems that are envisioned in the context of aeronautics, such as sensor deployment for flight tests or for structural health monitoring. However, the increasing burden of on-board cabling requires wireless solutions. Moreover, concerns such as safety or system lifetime preclude the use of electrochemical energy storage. Ambient energy capture, storage and management are therefore key topics. This book presents these concepts and illustrates them through actual implementations in airliners. With five years of experience within this specialist field, the authors present results from actual flight tests via a partnership with Airbus. Basic concepts are summarized, together with practical implementations in airliners, enriching the book through the very specific aspects related to embedded systems deployed in aircraft. This book will appeal to both students and practising engineers in the field.
Rugged Embedded Systems: Computing in Harsh Environments describes how to design reliable embedded systems for harsh environments, including architectural approaches, cross-stack hardware/software techniques, and emerging challenges and opportunities. A "harsh environment" presents inherent characteristics, such as extreme temperature and radiation levels, very low power and energy budgets, strict fault tolerance and security constraints, etc. that challenge the computer system in its design and operation. To guarantee proper execution (correct, safe, and low-power) in such scenarios, this contributed work discusses multiple layers that involve firmware, operating systems, and applications, as well as power management units and communication interfaces. This book also incorporates use cases in the domains of unmanned vehicles (advanced cars and micro aerial robots) and space exploration as examples of computing designs for harsh environments.
the first book on Unity for embedded systems design and robotics a comprehensive step-by-step guide packed with illustrations each chapter contains a real project
the first book on Unity for embedded systems design and robotics a comprehensive step-by-step guide packed with illustrations each chapter contains a real project
This book presents a model of electromagnetic (EM) information leakage based on electromagnetic and information theory. It discusses anti-leakage, anti-interception and anti-reconstruction technologies from the perspectives of both computer science and electrical engineering. In the next five years, the threat posed by EM information leakage will only become greater, and the demand for protection will correspondingly increase. The book systematically introduces readers to the theory of EM information leakage and the latest technologies and measures designed to counter it, and puts forward an EM information leakage model that has established the foundation for new research in this area, paving the way for new technologies to counter EM information leakage. As such, it offers a valuable reference guide for all researchers and engineers involved in EM information leakage and countermeasures.
Foundations of Quantum Programming discusses how new programming methodologies and technologies developed for current computers can be extended to exploit the unique power of quantum computers, which promise dramatic advantages in processing speed over currently available computer systems. Governments and industries around the globe are now investing vast amounts of money with the expectation of building practical quantum computers. Drawing upon years of experience and research in quantum computing research and using numerous examples and illustrations, Mingsheng Ying has created a very useful reference on quantum programming languages and important tools and techniques required for quantum programming, making the book a valuable resource for academics, researchers, and developers.
This new book provides an insightful look at the varied and exciting uses and applications of Wi-Fi and the Internet of Things in agriculture. With internet-enabled communications becoming more widely available, farms and agricultural establishments can take advantage of these new technologies for a wide range of farm operations, such as crop management, farm vehicle tracking, livestock monitoring, storage monitoring, and more. The collected data from these devices can be stored in the cloud system or server and accessed by the farmers via the internet or mobile phones. This book shows the many benefits to farmers from applying IoT, including better utilizing information for monitoring crops, optimizing water use, planning effective fertilization strategies, and saving time and reducing the operation expenses. Topics include using IoT for vertical farming, IoT-based smart irrigation system, landslide susceptibility assessment, automated aeroponics systems, crop survival analysis, and more. The volume also considers the challenges of IoT in agriculture, such as the requirements of applications of wireless sensor networks, the threat of attacks and the detection of vulnerabilities in wireless sensor networks, and more. Internet of Things for Agriculture 4.0: Impact and Challenges provides a better understanding of the time- and resourcing-saving benefits of wireless sensors and remote monitoring devices in agriculture. The volume will be useful for those involved in agricultural operations as well as scientists and researchers, and faculty and students in agriculture and computer and information science engineering.
Control system design is a challenging task for practicing engineers. It requires knowledge of different engineering fields, a good understanding of technical specifications and good communication skills. The current book introduces the reader into practical control system design, bridging the gap between theory and practice. The control design techniques presented in the book are all model based., considering the needs and possibilities of practicing engineers. Classical control design techniques are reviewed and methods are presented how to verify the robustness of the design. It is how the designed control algorithm can be implemented in real-time and tested, fulfilling different safety requirements. Good design practices and the systematic software development process are emphasized in the book according to the generic standard IEC61508. The book is mainly addressed to practicing control and embedded software engineers - working in research and development - as well as graduate students who are faced with the challenge to design control systems and implement them in real-time."
This book integrates new ideas and topics from real time systems, embedded systems, and software engineering to give a complete picture of the whole process of developing software for real-time embedded applications. You will not only gain a thorough understanding of concepts related to microprocessors, interrupts, and system boot process, appreciating the importance of real-time modeling and scheduling, but you will also learn software engineering practices such as model documentation, model analysis, design patterns, and standard conformance. This book is split into four parts to help you learn the key concept of embedded systems; Part one introduces the development process, and includes two chapters on microprocessors and interrupts---fundamental topics for software engineers; Part two is dedicated to modeling techniques for real-time systems; Part three looks at the design of software architectures and Part four covers software implementations, with a focus on POSIX-compliant operating systems. With this book you will learn: The pros and cons of different architectures for embedded systems POSIX real-time extensions, and how to develop POSIX-compliant real time applications How to use real-time UML to document system designs with timing constraints The challenges and concepts related to cross-development Multitasking design and inter-task communication techniques (shared memory objects, message queues, pipes, signals) How to use kernel objects (e.g. Semaphores, Mutex, Condition variables) to address resource sharing issues in RTOS applications The philosophy underpinning the notion of "resource manager" and how to implement a virtual file system using a resource manager The key principles of real-time scheduling and several key algorithms
Explores the role of Artificial Intelligence and Smart Computing in health informatics and healthcare with an emphasis on clinical data management and analysis for precise prediction and prompt action Presents cutting edge tracking, monitoring, real time assistance, and security for IoT in healthcare Discusses broadly on wearable sensors and IoT devices and their role in smart living assistance and energy conservation Describes a system mode and architecture for a clear picture of IoT in healthcare Explains the challenges and opportunities with IoT based healthcare industries and includes a study of threats, impacts, and the need of information security
Addresses the complete functional framework workflow in IoT technology Explores basic and high level concepts Provides data based intelligent and automated systems through Industrial IoT and its implications to the real world Discusses the major applications Presents an interdisciplinary platform
This book explores the most significant computational methods and the history of their development. It begins with the earliest mathematical / numerical achievements made by the Babylonians and the Greeks, followed by the period beginning in the 16th century. For several centuries the main scientific challenge concerned the mechanics of planetary dynamics, and the book describes the basic numerical methods of that time. In turn, at the end of the Second World War scientific computing took a giant step forward with the advent of electronic computers, which greatly accelerated the development of numerical methods. As a result, scientific computing became established as a third scientific method in addition to the two traditional branches: theory and experimentation. The book traces numerical methods' journey back to their origins and to the people who invented them, while also briefly examining the development of electronic computers over the years. Featuring 163 references and more than 100 figures, many of them portraits or photos of key historical figures, the book provides a unique historical perspective on the general field of scientific computing - making it a valuable resource for all students and professionals interested in the history of numerical analysis and computing, and for a broader readership alike.
It is now possible to gain competitive advantages based on consolidated R/3 system implementations. One of the most important optimisation aspects is a more consistent process integration in order to bring about fast, secure and cost effective business processes. This approach inevitably leads to Workflow Management and for SAP users to SAP® WebFlow®. This book introduces the topic of Workflow Management, gives an overview of the technical possibilities of SAP® WebFlow® and allows the reader to assess SAP workflow project risks and costs/benefits based on real life examples. Check lists and technical hints not only aid the reader in evaluating potential projects but also in the management of real life workflow project engineering.
Does IT spending really boost bank performance? It is widely accepted that technological developments have had a major impact on reshaping both front- and back-office operations, but there still remains some doubt as to whether the massive spending on IT by banks has improved performance or productivity in this sector. Elena Beccalli provides a useful insight into the effects of IT investments on European bank performance, drawing on new empirical evidence that academics, bankers, and IT consultants alike will find to be a fascinating contribution to this ongoing strategic debate.
SystemVerilog is a rich set of extensions to the IEEE 1364-2001 Verilog Hardware Description Language (Verilog HDL). These extensions address two major aspects of HDL-based design. First, modeling very large designs with concise, accurate, and intuitive code. Second, writing high-level test programs to efficiently and effectively verify these large designs. The first edition of this book addressed the first aspect of the SystemVerilog extensions to Verilog. Important modeling features were presented, such as two-state data types, enumerated types, user-degined types, structures, unions, and interfaces. Emphasis was placed on the proper usage of these enhancements for simulation and synthesis.
The ultimate resource for making embedded systems reliable, safe, and secure Embedded Systems Security provides: A broad understanding of security principles, concerns, and technologies Proven techniques for the efficient development of safe and secure embedded software A study of the system architectures, operating systems and hypervisors, networking, storage, and cryptographic issues that must be considered when designing secure embedded systems Nuggets of practical advice and numerous case studies throughout Written by leading authorities in the field with 65 years of embedded security experience: one of the original developers of the world s only Common Criteria EAL 6+ security certified software product and a lead designer of NSA certified cryptographic systems. This book is indispensable for embedded systems and security professionals, new and experienced. An important contribution to the understanding of the security of embedded systems. The Kleidermachers are experts in their field. As the Internet of things becomes reality, this book helps business and technology management as well as engineers understand the importance of "security from scratch." This book, with its examples and key points, can help bring more secure, robust systems to the market. Dr. Joerg Borchert, Vice President, Chip Card & Security, Infineon Technologies North America Corp.; President and Chairman, Trusted Computing Group Embedded Systems Security provides real-world examples of risk and exploitation; most importantly the book offers clear insight into methods used to counter vulnerabilities to build true, native security into technology. Adriel Desautels, President and CTO, Netragard, LLC. Security of embedded systems is more important than ever. The growth in networking is just one reason. However, many embedded systems developers have insufficient knowledge of how to achieve security in their systems. David Kleidermacher, a world-renowned expert in this field, shares in this book his knowledge and long experience with other engineers. A very important book at the right time. Prof. Dr.-Ing. Matthias Sturm, Leipzig University of Applied
Sciences; Chairman, Embedded World Conference steering board
This book contains extended and revised versions of the best papers presented at the 29th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2021, held in Singapore, in October 2021*. The 12 full papers included in this volume were carefully reviewed and selected from the 44 papers (out of 75 submissions) presented at the conference. The papers discuss the latest academic and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) design, considering the challenges of nano-scale, state-of-the-art and emerging manufacturing technologies. In particular they address cutting-edge research fields like low-power design of RF, analog and mixed-signal circuits, EDA tools for the synthesis and verification of heterogenous SoCs, accelerators for cryptography and deep learning and on-chip Interconnection system, reliability and testing, and integration of 3D-ICs. *The conference was held virtually.
As the computer industry retools to leverage massively parallel graphics processing units (GPUs), this book is designed to meet the needs of working software developers who need to understand GPU programming with CUDA and increase efficiency in their projects. "CUDA Application Design and Development" starts with an introduction to parallel computing concepts for readers with no previous parallel experience, and focuses on issues of immediate importance to working software developers: achieving high performance, maintaining competitiveness, analyzing CUDA benefits versus costs, and determining application lifespan. The book then details the thought behind CUDA and teaches how to create, analyze, and debug CUDA applications. Throughout, the focus is on software engineering issues: how to use CUDA in the context of existing application code, with existing compilers, languages, software tools, and industry-standard API libraries. Using an approach refined in a series of well-received articles
at Dr Dobb's Journal, author Rob Farber takes the reader
step-by-step from fundamentals to implementation, moving from
language theory to practical coding.
This book will introduce professional engineers and students alike to system development using Platform FPGAs. The focus is on embedded systems but it also serves as a general guide to building custom computing systems. The text describes the fundamental technology in terms of hardware, software, and a set of principles to guide the development of Platform FPGA systems. The goal is to show how to systematically and creatively apply these principles to the construction of application-specific embedded system architectures. There is a strong focus on using free and open source software to increase productivity. The organization of each chapter in the book includes two parts.
The white pages describe concepts, principles, and general
knowledge. The gray pages include a technical rendition of the main
issues of the chapter and show the concepts applied in practice.
This includes step-by-step details for a specific development board
and tool chain so that the reader can carry out the same steps on
their own. Rather than try to demonstrate the concepts on a broad
set of tools and boards, the text uses a single set of tools
(Xilinx Platform Studio, Linux, and GNU) throughout and uses a
single developer board (Xilinx ML-510) for the examples.
Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly depends on the efficient implementation of modular exponentiation and modular multiplication. Since 1984, when Montgomery first introduced a method to evaluate modular multiplications, many algorithmic modifications have been done for improving the efficiency of modular multiplication, but very less work has been done on the modular exponentiation to improve the efficiency. This research monograph addresses the question- how can the performance of modular exponentiation, which is the crucial operation of many public-key cryptographic techniques, be improved? The book focuses on Energy Efficient Modular Exponentiations for Cryptographic hardware. Spread across five chapters, this well-researched text focuses in detail on the Bit Forwarding Techniques and the corresponding hardware realizations. Readers will also discover advanced performance improvement techniques based on high radix multiplication and Cryptographic hardware based on multi-core architectures.
This book covers a domain that is significantly impacted by the growth of soft computing. Internet of Things (IoT)-related applications are gaining much attention with more and more devices which are getting connected, and they become the potential components of some smart applications. Thus, a global enthusiasm has sparked over various domains such as health, agriculture, energy, security, and retail. So, in this book, the main objective is to capture this multifaceted nature of IoT and machine learning in one single place. According to the contribution of each chapter, the book also provides a future direction for IoT and machine learning research. The objectives of this book are to identify different issues, suggest feasible solutions to those identified issues, and enable researchers and practitioners from both academia and industry to interact with each other regarding emerging technologies related to IoT and machine learning. In this book, we look for novel chapters that recommend new methodologies, recent advancement, system architectures, and other solutions to prevail over the limitations of IoT and machine learning.
Written by a Federal Aviation Administration (FAA) consultant designated engineering representative (DER) and an electronics hardware design engineer who together taught the DO-254 class at the Radio Technical Commission for Aeronautics, Inc. (RTCA) in Washington, District of Columbia, USA, Airborne Electronic Hardware Design Assurance: A Practitioner's Guide to RTCA/DO-254 is a testimony to the lessons learned and wisdom gained from many years of first-hand experience in the design, verification, and approval of airborne electronic hardware. This practical guide to the use of RTCA/DO-254 in the development of airborne electronic hardware for safety critical airborne applications: Describes how to optimize engineering processes and practices to harmonize with DO-254 Addresses the single most problematic aspect of engineering and compliance to DO-254-poorly written requirements Includes a tutorial on how to write requirements that will minimize the cost and effort of electronic design and verification Discusses the common pitfalls encountered by practitioners of DO-254, along with how those pitfalls occur and what can be done about them Settles the ongoing debate and misconceptions about the true definition of a derived requirement Promotes embracing DO-254 as the best means to achieve compliance to it, as well as the best path to high-quality electronic hardware Airborne Electronic Hardware Design Assurance: A Practitioner's Guide to RTCA/DO-254 offers real-world insight into RTCA/DO-254 and how its objectives can be satisfied. It provides engineers with valuable information that can be applied to any project to make compliance to DO-254 as easy and problem-free as possible.
The book outlines the concept of the Automated City, in the context of smart city research and development. While there have been many other perspectives on the smart city such as the participatory city and the data-centric city, this book focuses on automation for the smart city based on current and emerging technologies such as the Internet of Things, Artificial Intelligence and Robotics. The book attempts to provide a balanced view, outlining the promises and potential of the Automated City as well as the perils and challenges of widespread automation in the city. The book discusses, at some depth, automated vehicles, urban robots and urban drones as emerging technologies that will automate many aspects of city life and operation, drawing on current work and research literature. The book also considers broader perspectives of the future city, in the context of automation in the smart city, including aspirational visions of cities, transportation, new business models, and socio-technological challenges, from urban edge computing, ethics of the Automated City and smart devices, to large scale cooperating autonomous systems in the city. |
You may like...
An Introduction to Fuzzy Linear…
Jagdeep Kaur, Amit Kumar
Hardcover
Supply Chain Games: Operations…
Konstantin Kogan, Charles S. Tapiero
Hardcover
R2,743
Discovery Miles 27 430
A Theology of Love - The Dynamic of…
Mildred Bangs Wynkoop
Paperback
Teaching the Postsecondary Music Student…
Kimberly A. McCord
Hardcover
R3,455
Discovery Miles 34 550
Beyond Co-Teaching Basics - A…
Wendy W. Murawski, Wendy W. Lochner
Paperback
Special Education Design and Development…
Ajay Singh, Mark Viner, …
Hardcover
R5,129
Discovery Miles 51 290
|