![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > General
This critical and forward-looking book features: An assessment of the impact of Internet of Things (IoT) on the telecom industry's revenue streams IoT-based business models in the telecom industry A PESTLE (political, economic, socio-cultural, technological, legal, and environmental) analysis of the industry in relation to IoT Key technological drivers. It also features a case study of Bell Canada Enterprises (BCE) Inc., which highlights IoT-based business models in the industry. The study reveals that telecom operators have started implementing IoT projects, however, true revenue streams are yet to materialize. Ten IoT-based business models have been identified at BCE Inc. The book points out that operators do leverage existing infrastructure in terms of broadband fiber and mobile connectivity in part and resort to partnerships and acquisitions to acquire much-needed knowledge, technology, and smart devices. Concerning the effect of IoT on the telecoms' revenue streams, it was revealed that new entrants, who are not necessarily in the telecom industry, have impacted the old players' revenue streams. OTT services like YouTube, WhatsApp, IPTV, Netflix, are the biggest culprits. Seven key technological drivers for IoT have been identified and include widespread wireless connectivity, the availability and affordability of microcontrollers, sensors and actuators, the decreasing cost of bandwidth, the recent implementation of IPv6, and the ongoing development of 5G network, as well as the use of cloud computing and analytics. Finally, the PESTLE analysis of the industry shows that the lack of a comprehensive political and regulatory framework still slows down IoT deployment. Interoperability, security, and privacy concerns are other constraints. Conversely, general economic conditions in most developed and developing economies are favorable to the advancement of IoT technology. Governments are willing to subsidize R&D and have partnered with the private sector to speed up the roll-out process.
the first book on Unity for embedded systems design and robotics a comprehensive step-by-step guide packed with illustrations each chapter contains a real project
Addresses the complete functional framework workflow in IoT technology Explores basic and high level concepts Provides data based intelligent and automated systems through Industrial IoT and its implications to the real world Discusses the major applications Presents an interdisciplinary platform
Explores the role of Artificial Intelligence and Smart Computing in health informatics and healthcare with an emphasis on clinical data management and analysis for precise prediction and prompt action Presents cutting edge tracking, monitoring, real time assistance, and security for IoT in healthcare Discusses broadly on wearable sensors and IoT devices and their role in smart living assistance and energy conservation Describes a system mode and architecture for a clear picture of IoT in healthcare Explains the challenges and opportunities with IoT based healthcare industries and includes a study of threats, impacts, and the need of information security
It is now possible to gain competitive advantages based on consolidated R/3 system implementations. One of the most important optimisation aspects is a more consistent process integration in order to bring about fast, secure and cost effective business processes. This approach inevitably leads to Workflow Management and for SAP users to SAP® WebFlow®. This book introduces the topic of Workflow Management, gives an overview of the technical possibilities of SAP® WebFlow® and allows the reader to assess SAP workflow project risks and costs/benefits based on real life examples. Check lists and technical hints not only aid the reader in evaluating potential projects but also in the management of real life workflow project engineering.
This book explores the most significant computational methods and the history of their development. It begins with the earliest mathematical / numerical achievements made by the Babylonians and the Greeks, followed by the period beginning in the 16th century. For several centuries the main scientific challenge concerned the mechanics of planetary dynamics, and the book describes the basic numerical methods of that time. In turn, at the end of the Second World War scientific computing took a giant step forward with the advent of electronic computers, which greatly accelerated the development of numerical methods. As a result, scientific computing became established as a third scientific method in addition to the two traditional branches: theory and experimentation. The book traces numerical methods' journey back to their origins and to the people who invented them, while also briefly examining the development of electronic computers over the years. Featuring 163 references and more than 100 figures, many of them portraits or photos of key historical figures, the book provides a unique historical perspective on the general field of scientific computing - making it a valuable resource for all students and professionals interested in the history of numerical analysis and computing, and for a broader readership alike.
Does IT spending really boost bank performance? It is widely accepted that technological developments have had a major impact on reshaping both front- and back-office operations, but there still remains some doubt as to whether the massive spending on IT by banks has improved performance or productivity in this sector. Elena Beccalli provides a useful insight into the effects of IT investments on European bank performance, drawing on new empirical evidence that academics, bankers, and IT consultants alike will find to be a fascinating contribution to this ongoing strategic debate.
SystemVerilog is a rich set of extensions to the IEEE 1364-2001 Verilog Hardware Description Language (Verilog HDL). These extensions address two major aspects of HDL-based design. First, modeling very large designs with concise, accurate, and intuitive code. Second, writing high-level test programs to efficiently and effectively verify these large designs. The first edition of this book addressed the first aspect of the SystemVerilog extensions to Verilog. Important modeling features were presented, such as two-state data types, enumerated types, user-degined types, structures, unions, and interfaces. Emphasis was placed on the proper usage of these enhancements for simulation and synthesis.
The ultimate resource for making embedded systems reliable, safe, and secure Embedded Systems Security provides: A broad understanding of security principles, concerns, and technologies Proven techniques for the efficient development of safe and secure embedded software A study of the system architectures, operating systems and hypervisors, networking, storage, and cryptographic issues that must be considered when designing secure embedded systems Nuggets of practical advice and numerous case studies throughout Written by leading authorities in the field with 65 years of embedded security experience: one of the original developers of the world s only Common Criteria EAL 6+ security certified software product and a lead designer of NSA certified cryptographic systems. This book is indispensable for embedded systems and security professionals, new and experienced. An important contribution to the understanding of the security of embedded systems. The Kleidermachers are experts in their field. As the Internet of things becomes reality, this book helps business and technology management as well as engineers understand the importance of "security from scratch." This book, with its examples and key points, can help bring more secure, robust systems to the market. Dr. Joerg Borchert, Vice President, Chip Card & Security, Infineon Technologies North America Corp.; President and Chairman, Trusted Computing Group Embedded Systems Security provides real-world examples of risk and exploitation; most importantly the book offers clear insight into methods used to counter vulnerabilities to build true, native security into technology. Adriel Desautels, President and CTO, Netragard, LLC. Security of embedded systems is more important than ever. The growth in networking is just one reason. However, many embedded systems developers have insufficient knowledge of how to achieve security in their systems. David Kleidermacher, a world-renowned expert in this field, shares in this book his knowledge and long experience with other engineers. A very important book at the right time. Prof. Dr.-Ing. Matthias Sturm, Leipzig University of Applied
Sciences; Chairman, Embedded World Conference steering board
This book contains extended and revised versions of the best papers presented at the 29th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2021, held in Singapore, in October 2021*. The 12 full papers included in this volume were carefully reviewed and selected from the 44 papers (out of 75 submissions) presented at the conference. The papers discuss the latest academic and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) design, considering the challenges of nano-scale, state-of-the-art and emerging manufacturing technologies. In particular they address cutting-edge research fields like low-power design of RF, analog and mixed-signal circuits, EDA tools for the synthesis and verification of heterogenous SoCs, accelerators for cryptography and deep learning and on-chip Interconnection system, reliability and testing, and integration of 3D-ICs. *The conference was held virtually.
As the computer industry retools to leverage massively parallel graphics processing units (GPUs), this book is designed to meet the needs of working software developers who need to understand GPU programming with CUDA and increase efficiency in their projects. "CUDA Application Design and Development" starts with an introduction to parallel computing concepts for readers with no previous parallel experience, and focuses on issues of immediate importance to working software developers: achieving high performance, maintaining competitiveness, analyzing CUDA benefits versus costs, and determining application lifespan. The book then details the thought behind CUDA and teaches how to create, analyze, and debug CUDA applications. Throughout, the focus is on software engineering issues: how to use CUDA in the context of existing application code, with existing compilers, languages, software tools, and industry-standard API libraries. Using an approach refined in a series of well-received articles
at Dr Dobb's Journal, author Rob Farber takes the reader
step-by-step from fundamentals to implementation, moving from
language theory to practical coding.
This book will introduce professional engineers and students alike to system development using Platform FPGAs. The focus is on embedded systems but it also serves as a general guide to building custom computing systems. The text describes the fundamental technology in terms of hardware, software, and a set of principles to guide the development of Platform FPGA systems. The goal is to show how to systematically and creatively apply these principles to the construction of application-specific embedded system architectures. There is a strong focus on using free and open source software to increase productivity. The organization of each chapter in the book includes two parts.
The white pages describe concepts, principles, and general
knowledge. The gray pages include a technical rendition of the main
issues of the chapter and show the concepts applied in practice.
This includes step-by-step details for a specific development board
and tool chain so that the reader can carry out the same steps on
their own. Rather than try to demonstrate the concepts on a broad
set of tools and boards, the text uses a single set of tools
(Xilinx Platform Studio, Linux, and GNU) throughout and uses a
single developer board (Xilinx ML-510) for the examples.
An epic account of the decades-long battle to control what has emerged as the world's most critical resource—microchip technology—with the United States and China increasingly in conflict. You may be surprised to learn that microchips are the new oil—the scarce resource on which the modern world depends. Today, military, economic, and geopolitical power are built on a foundation of computer chips. Virtually everything—from missiles to microwaves, smartphones to the stock market—runs on chips. Until recently, America designed and built the fastest chips and maintained its lead as the #1 superpower. Now, America's edge is slipping, undermined by competitors in Taiwan, Korea, Europe, and, above all, China. Today, as Chip War reveals, China, which spends more money each year importing chips than it spends importing oil, is pouring billions into a chip-building initiative to catch up to the US. At stake is America's military superiority and economic prosperity. Economic historian Chris Miller explains how the semiconductor came to play a critical role in modern life and how the U.S. become dominant in chip design and manufacturing and applied this technology to military systems. America's victory in the Cold War and its global military dominance stems from its ability to harness computing power more effectively than any other power. But here, too, China is catching up, with its chip-building ambitions and military modernization going hand in hand. America has let key components of the chip-building process slip out of its grasp, contributing not only to a worldwide chip shortage but also a new Cold War with a superpower adversary that is desperate to bridge the gap. Illuminating, timely, and fascinating, Chip War shows that, to make sense of the current state of politics, economics, and technology, we must first understand the vital role played by chips.
Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly depends on the efficient implementation of modular exponentiation and modular multiplication. Since 1984, when Montgomery first introduced a method to evaluate modular multiplications, many algorithmic modifications have been done for improving the efficiency of modular multiplication, but very less work has been done on the modular exponentiation to improve the efficiency. This research monograph addresses the question- how can the performance of modular exponentiation, which is the crucial operation of many public-key cryptographic techniques, be improved? The book focuses on Energy Efficient Modular Exponentiations for Cryptographic hardware. Spread across five chapters, this well-researched text focuses in detail on the Bit Forwarding Techniques and the corresponding hardware realizations. Readers will also discover advanced performance improvement techniques based on high radix multiplication and Cryptographic hardware based on multi-core architectures.
This book covers a domain that is significantly impacted by the growth of soft computing. Internet of Things (IoT)-related applications are gaining much attention with more and more devices which are getting connected, and they become the potential components of some smart applications. Thus, a global enthusiasm has sparked over various domains such as health, agriculture, energy, security, and retail. So, in this book, the main objective is to capture this multifaceted nature of IoT and machine learning in one single place. According to the contribution of each chapter, the book also provides a future direction for IoT and machine learning research. The objectives of this book are to identify different issues, suggest feasible solutions to those identified issues, and enable researchers and practitioners from both academia and industry to interact with each other regarding emerging technologies related to IoT and machine learning. In this book, we look for novel chapters that recommend new methodologies, recent advancement, system architectures, and other solutions to prevail over the limitations of IoT and machine learning.
Covers the significant embedded computing technologies--highlighting their applications in wireless communication and computing power An embedded system is a computer system designed for specific control functions within a larger system--often with real-time computing constraints. It is embedded as part of a complete device often including hardware and mechanical parts. Presented in three parts, "Embedded Systems: Hardware, Design, and Implementation" provides readers with an immersive introduction to this rapidly growing segment of the computer industry. Acknowledging the fact that embedded systems control many of today's most common devices such as smart phones, PC tablets, as well as hardware embedded in cars, TVs, and even refrigerators and heating systems, the book starts with a basic introduction to embedded computing systems. It hones in on system-on-a-chip (SoC), multiprocessor system-on-chip (MPSoC), and network-on-chip (NoC). It then covers on-chip integration of software and custom hardware accelerators, as well as fabric flexibility, custom architectures, and the multiple I/O standards that facilitate PCB integration. Next, it focuses on the technologies associated with embedded computing systems, going over the basics of field-programmable gate array (FPGA), digital signal processing (DSP) and application-specific integrated circuit (ASIC) technology, architectural support for on-chip integration of custom accelerators with processors, and O/S support for these systems. Finally, it offers full details on architecture, testability, and computer-aided design (CAD) support for embedded systems, soft processors, heterogeneous resources, and on-chip storage before concluding with coverage of software support--in particular, O/S Linux. "Embedded Systems: Hardware, Design, and Implementation" is an ideal book for design engineers looking to optimize and reduce the size and cost of embedded system products and increase their reliability and performance.
The book outlines the concept of the Automated City, in the context of smart city research and development. While there have been many other perspectives on the smart city such as the participatory city and the data-centric city, this book focuses on automation for the smart city based on current and emerging technologies such as the Internet of Things, Artificial Intelligence and Robotics. The book attempts to provide a balanced view, outlining the promises and potential of the Automated City as well as the perils and challenges of widespread automation in the city. The book discusses, at some depth, automated vehicles, urban robots and urban drones as emerging technologies that will automate many aspects of city life and operation, drawing on current work and research literature. The book also considers broader perspectives of the future city, in the context of automation in the smart city, including aspirational visions of cities, transportation, new business models, and socio-technological challenges, from urban edge computing, ethics of the Automated City and smart devices, to large scale cooperating autonomous systems in the city.
This book describes an approach and supporting infrastructure to
facilitate debugging the silicon implementation of a System-on-Chip
(SOC), allowing its associated product to be introduced into the
market more quickly.Readers learn step-by-step the key requirements
for debugging a modern, silicon SOC implementation, nine factors
that complicate this debugging task, and a new debug approach that
addresses these requirements and complicating factors.The authors
novel communication-centric, scan-based, abstraction-based,
run/stop-based (CSAR) debug approach is discussed in detail,
showing how it helps to meet debug requirements and address the
nine, previously identified factors that complicate debugging
silicon implementations of SOCs. The authors also derive the debug
infrastructure requirements to support debugging of a silicon
implementation of an SOC with their CSAR debug approach. This debug
infrastructure consists of a generic on-chip debug architecture, a
configurable automated design-for-debug flow to be used during the
design of an SOC, and customizable off-chip debugger software.
Coverage includes an evaluation of the efficiency and effectiveness
of the CSAR approach and its supporting infrastructure, using six
industrial SOCs and an illustrative, example SOC model.The authors
also quantify the hardware cost and design effort to support their
approach.
Nowadays, the prevalence of computing systems in our lives is so ubiquitous that we live in a cyber-physical world dominated by computer systems, from pacemakers to cars and airplanes. These systems demand for more computational performance to process large amounts of data from multiple data sources with guaranteed processing times. Actuating outside of the required timing bounds may cause the failure of the system, being vital for systems like planes, cars, business monitoring, e-trading, etc. High-Performance and Time-Predictable Embedded Computing presents recent advances in software architecture and tools to support such complex systems, enabling the design of embedded computing devices which are able to deliver high-performance whilst guaranteeing the application required timing bounds. Technical topics discussed in the book include: - Parallel embedded platforms - Programming models - Mapping and scheduling of parallel computations - Timing and schedulability analysis - Runtimes and operating systems The work reflected in this book was done in the scope of the European project P SOCRATES, funded under the FP7 framework program of the European Commission. High-performance and time-predictable embedded computing is ideal for personnel in computer/communication/embedded industries as well as academic staff and master/research students in computer science, embedded systems, cyber-physical systems and internet-of-things.
. . . a surprisingly useful and largely readable effort. It presents in textbook style an introduction to the creation, use, and evaluation of online full text databases. SLA SSD Bulletin This is the first complete treatment of full text databases. Comprehensive and up-to-date, the book incorporates an overview of the current status of full text databases with explanations of past research pertinent to full text and information regarding the future of full text. The major online systems that offer full text are described, with five systems highlighted: DIALOG, Mead Data Central's LEXIS and NEXIS, Westlaw, STN International, and BRS. The book features an extensive bibliography that includes articles specifically about full text databases as well as citations to research studies that use methodology particularly appropriate to full text research. The first two chapters of the book describe in detail the major online systems that currently offer full text. Chapter 3 provides an overview of the search and display features on the major online systems that are particularly suited to full text searching. Chapters 4, 5, 6, and 7 focus on full text searching. Chapter 4 introduces and provides an overview of the types of full text research that have been done. The next three chapters describe in detail the methodology and findings of some full text research projects undertaken by the authors. Chapters 8 and 9 bring together the practical aspects of the research described in the preceding chapters and offer useful advice for searchers, database producers and online developers. The information is of immediate use for searching today's full text database, but also offers ideas for improvement in the near future. The final chapter focuses on the future of full text research. This book is appropriate for online searchers, database producers, database vendors and designers. It can also be used as a supplemental text in courses in advanced online searching and information storage and retrieval.
Windows 10 hAlt Ihren PC am Laufen: Es verwaltet Ihre Dateien und bietet eine Plattform fA1/4r alle wichtigen Programme und Anwendungen. Kurz gesagt, es ist die Schaltstelle Ihres Computers. Mit diesem Buch lernen Sie Windows 10 richtig kennen, aktuell zum 2004 Update aus 2020. Mit den leicht nachvollziehbaren Schritt-fA1/4r-Schritt-Anleitungen und vielen wertvollen Tipps richten Sie Ihren Computer so ein, wie es fA1/4r Sie am besten passt. Andy Rathbone informiert Sie umfassend. Und auch wenn mal etwas nicht so lAuft wie erhofft, finden Sie in diesem Buch eine schnelle und verstAndliche LAsung. Es werden keine Vorkenntnisse vorausgesetzt.
The European research project DESERVE (DEvelopment platform for Safe and Efficient dRiVE, 2012-2015) had the aim of designing and developing a platform tool to cope with the continuously increasing complexity and the simultaneous need to reduce cost for future embedded Advanced Driver Assistance Systems (ADAS). For this purpose, the DESERVE platform profits from cross-domain software reuse, standardization of automotive software component interfaces, and easy but safety-compliant integration of heterogeneous modules. This enables the development of a new generation of ADAS applications, which challengingly combine different functions, sensors, actuators, hardware platforms, and Human Machine Interfaces (HMI). This book presents the different results of the DESERVE project concerning the ADAS development platform, test case functions, and validation and evaluation of different approaches. The reader is invited to substantiate the content of this book with the deliverables published during the DESERVE project. Technical topics discussed in this book include: Modern ADAS development platforms; Design space exploration; Driving modelling; Video-based and Radar-based ADAS functions; HMI for ADAS; Vehicle-hardware-in-the-loop validation systems
During the development of an engineered product, developers often need to create an embedded system-a prototype-that demonstrates the operation/function of the device and proves its viability. Offering practical tools for the development and prototyping phases, Embedded Systems Circuits and Programming provides a tutorial on microcontroller programming and the basics of embedded design. The book focuses on several development tools and resources: Standard and off-the-shelf components, such as input/output devices, integrated circuits, motors, and programmable microcontrollers The implementation of circuit prototypes via breadboards, the in-house fabrication of test-time printed circuit boards (PCBs), and the finalization by the manufactured board Electronic design programs and software utilities for creating PCBs Sample circuits that can be used as part of the targeted embedded system The selection and programming of microcontrollers in the circuit For those working in electrical, electronic, computer, and software engineering, this hands-on guide helps you successfully develop systems and boards that contain digital and analog components and controls. The text includes easy-to-follow sample circuits and their corresponding programs, enabling you to use them in your own work. For critical circuits, the authors provide tested PCB files.
Modern electronic systems consist of a fairly heterogeneous set of components. Today, a single system can be constituted by a hardware platform, frequently composed of a mix of analog and digital components, and by several software application layers. The hardware can include several heterogeneous microprocessors (e.g. GPP, DSP, GPU, etc.), dedicated ICs (ASICs and/or FPGAs), memories, a set of local connections between the system components, and some interfaces between the system and the environment (sensors, actuators, etc.). Therefore, on the one hand, multi-processor embedded systems are capable of meeting the demand of processing power and flexibility of complex applications. On the other hand, such systems are very complex to design and optimize, so that the design methodology plays a major role in determining the success of the products. For these reasons, to cope with the increasing system complexity, the approaches typically used today are oriented towards co-design methodologies working at the higher levels of abstraction. Unfortunately, such methodologies are typically customized for the specific application, suffer of a lack of generality and still need a considerable effort when real-size project are envisioned. Therefore, there is still the need for a general methodology able to support the designer during the high-level steps of a co-design flow, enabling an effective design space exploration before tackling the low-level steps and thus committing to the final technology. This should prevent costly redesign loops.In such a context, the work described in this book, composed of two parts, aims at providing models, methodologies and tools to support each step of the co-design flow of embedded systems implemented by exploiting heterogeneous multi-processor architectures mapped on distributed systems, as well as fully integrated onto a single chip. The first part focuses on issues like the analysis of system specification languages, and the analysis of existing system-level HW/SW co-simulation methodologies to support heterogeneous multi-processor architectures. The second part focuses mainly on Design Space Exploration, and it presents both some theoretical advancements with respect to the first part, and the development of a prototypal framework that provides practical exploitation of the proposed concepts. |
You may like...
Human Factors in Organizational Design…
G. E Bradley, H.W. Hendrick
Hardcover
R5,634
Discovery Miles 56 340
Strategic Environmental Performance…
Frances Alston, Brian K. Perkins
Paperback
R1,525
Discovery Miles 15 250
|