![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > General
The author of the "Programmer's Toolbox" column shows how to use powerful math functions to achieve optimal real-time performance in programming. Along the way, readers will gain new understanding of math fundamentals, learn how to write more robust software for real-time systems, and discover how to implement math algorithms efficiently and accurately. The toolkit is bundled with a CD-ROM containing an arsenal of math algorithms to make the learning process easy and fun.
Concurrent systems are generally understood in terms of behavioral
notions. Models for Concurrency analyzes the subject in terms of
events and their temporal relationship rather than on global
states. It presents a comprehensive analysis of model theory
applied to concurrent protocols, and seeks to provide a theory of
concurrency that is both intuitively appealing and rigorously based
on mathematical foundations.
Do big math on small machines Write fast and accurate library functions Master analytical and numerical calculus Perform numerical integration to any order Implement z-transform formulas Need to learn the ins and outs of the fundamental math functions in
Build your own Internet of Things (IoT) projects for prototyping and proof-of-concept purposes.Updated for the Raspberry Pi 4 and other recent boards, this book contains the tools needed to build a prototype of your design, sense the environment, communicate with the Internet (over the Internet and Machine to Machine communications) and display the results. Raspberry Pi IoT Projects, 2nd Edition provides several IoT projects and designs shown from the start to the finish including an IoT Heartbeat Monitor, an IoT Swarm, IoT Solar Powered Weather Station, an IoT iBeacon Application and a RFID (Radio Frequency Identification) IoT Inventory Tracking System. The software is presented as reusable libraries, primarily in Python and C with full source code available, making this version a valuable learning resource for classrooms and learning labs. What You'll Learn Create IOT projects with the Raspberry Pi Talk to sensors with the Raspberry Pi Use iBeacons with the IOT Raspberry Pi Communicate your IOT data to the Internet Build security into your IOT device Who This Book Is ForPrimary audience are those with some technical background, but not necessarily engineers. It will also appeal to technical people wanting to learn about the Raspberry Pi in a project-oriented method.
PC Based Instrumentation and Control is a guide to implementing computer control, instrumentation and data acquisition using a standard PC and some of the more traditional computer languages. Numerous examples of configurations and working circuits, as well as representative software, make this a practical, hands-on guide to implementing PC-based testing and calibration systems and increasing efficiency without compromising quality or reliability. Guidance is given on modifying the circuits and software routines to meet the reader's specific needs. The third edition includes updated coverage of PC hardware and bus systems, a new chapter on virtual instruments and an introduction to programming and software development in a modern 32-bit environment. Additional examples have been included, with source code and executables available for download from the companion website www.key2control.com.
Parallel Computing for Data Science: With Examples in R, C++ and CUDA is one of the first parallel computing books to concentrate exclusively on parallel data structures, algorithms, software tools, and applications in data science. It includes examples not only from the classic "n observations, p variables" matrix format but also from time series, network graph models, and numerous other structures common in data science. The examples illustrate the range of issues encountered in parallel programming. With the main focus on computation, the book shows how to compute on three types of platforms: multicore systems, clusters, and graphics processing units (GPUs). It also discusses software packages that span more than one type of hardware and can be used from more than one type of programming language. Readers will find that the foundation established in this book will generalize well to other languages, such as Python and Julia.
A complete guide to testing, analyzing, verifying, and monitoring real-time systems More and more of our modern-day systems and devices–from toasters and climate-control systems to airplanes and space shuttles–contain embedded systems to control their functions and ensure that their responses are both timely and correct. With safety a requisite factor, performance validation is a critical aspect of real-time systems. Answering the needs of professionals and students alike, Real-Time Systems: Scheduling, Analysis, and Verification provides a substantial, up-to-date overview of the verification and validation process. It describes several approaches to the problem, and examines the advantages and disadvantages of each approach. Designed to be both an introductory text and a handy reference for the practitioner, the book discusses:
With ample illustrations and examples of a variety of industrial and toy applications, Real-Time Systems: Scheduling, Analysis, and Verification serves as a key resource for every professional who works with real-time systems.
The ERP implementation cycle is characterized by complexity,
uncertainty and a long time-scale. It is about people and issues
that affect the business - it is a multi-disciplinary effort. This
book will provide you with the practical information you will need
in relation to the many issues and events within the implementation
cycle. After reading this book you will be fully equipped and
alerted to what is involved in an ERP implementation.
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time. The field is extending to hardware-based security primitives and protocols such as block ciphers and stream ciphers entangled with the hardware, thus improving IC security. While at the application level there is a growing interest in hardware security for RFID systems and the necessary accompanying system architectures. This book brings together contributions from researchers and practitioners in academia and industry, an interdisciplinary group with backgrounds in physics, mathematics, cryptography, coding theory and processor theory. It will serve as important background material for students and practitioners, and will stimulate much further research and development.
Historians have different views on the core identity of analogue computing. Some portray the technology solely as a precursor to digital computing, whereas others stress that analogue applications existed well after 1940. Even within contemporary sources, there is a spectrum of understanding around what constitutes analogue computing. To understand the relationship between analogue and digital computing, and what this means for users today, the history must consider how the technology is used. Technology for Modelling investigates the technologies, the concepts, and the applications of analogue computing. The text asserts that analogue computing must be thought of as not just a computing technology, but also as a modelling technology, demonstrating how the history of analogue computing can be understood in terms of the parallel themes of calculation and modelling. The book also includes a number of detailed case studies of the technology's use and application. Topics and features: discusses the meaning of analogue computing and its significance in history, and describes the main differences between analogue and digital computing; provides a chronology of analogue computing, based upon the two major strands of calculation and modeling; examines the wider relationship between computing and modelling, and discusses how the theme of modelling fits within the history of analogue computing; describes how the history of analogue computing evolved through a number of stages of use; presents illustrative case studies on analogue modelling in academic research, oil reservoir modelling, aeronautical design, and meteorology. General readers and researchers in the field of history of computing - as well as history of science more generally - will find this book a fascinating insight into the historical use and evolution of technology. The volume provides a long-needed historical framework and context for these core computing technologies. Dr. Charles Care is a senior software engineer at BT and an Associate Fellow at the Department of Computer Science of the University of Warwick, UK.
The demands of increasingly complex embedded systems and associated performance computations have resulted in the development of heterogeneous computing architectures that often integrate several types of processors, analog and digital electronic components, and mechanical and optical components?all on a single chip. As a result, now the most prominent challenge for the design automation community is to efficiently plan for such heterogeneity and to fully exploit its capabilities. A compilation of work from internationally renowned authors,
Model-Based Design for Embedded Systems elaborates on related
practices and addresses the main facets of heterogeneous
Model-Based Design for embedded systems, including the current
state of the art, important challenges, and the latest trends.
Focusing on computational models as the core design artifact, this
book presents the cutting-edge results that have helped establish
Model-Based Design and continue to expand its parameters.
Reconfigurable Embedded Control Systems: Applications for Flexibility and Agility addresses the development of reconfigurable embedded control systems and describes various problems in this important research area, which include static and dynamic (manual or automatic) reconfigurations, multi-agent architectures, modeling and verification, component-based approaches, architecture description languages, distributed reconfigurable architectures, real-time and low power scheduling, execution models, and the implementation of such systems. The chapters contained within this reference work propose interesting and useful solutions that can be applied in future industry.
Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly depends on the efficient implementation of modular exponentiation and modular multiplication. Since 1984, when Montgomery first introduced a method to evaluate modular multiplications, many algorithmic modifications have been done for improving the efficiency of modular multiplication, but very less work has been done on the modular exponentiation to improve the efficiency. This research monograph addresses the question- how can the performance of modular exponentiation, which is the crucial operation of many public-key cryptographic techniques, be improved? The book focuses on Energy Efficient Modular Exponentiations for Cryptographic hardware. Spread across five chapters, this well-researched text focuses in detail on the Bit Forwarding Techniques and the corresponding hardware realizations. Readers will also discover advanced performance improvement techniques based on high radix multiplication and Cryptographic hardware based on multi-core architectures.
Large-area high-resolution displays are essential for scientific visualization, entertainment, and defense applications. A popular way to realize such displays is to tile multiple projectors together to create one large display. As opposed to a 19 diagonal monitor with a resolution of 60 pixels per inch, tiled multi-projector displays are often 10 x 8 and have a resolution of 100-300 pixels per inch. The research in this area spans several traditional areas in computer science, including computer vision, computer graphics, image processing, human-computer interaction, and visualization tools. This book shows how to make such displays inexpensive, flexible, and commonplace by making them both perceptually and functionally seamless. In addition, the use of multi-projector techniques in large-scale visualization, virtual reality, computer graphics, and vision applications is discussed.
Covers the significant embedded computing technologies--highlighting their applications in wireless communication and computing power An embedded system is a computer system designed for specific control functions within a larger system--often with real-time computing constraints. It is embedded as part of a complete device often including hardware and mechanical parts. Presented in three parts, "Embedded Systems: Hardware, Design, and Implementation" provides readers with an immersive introduction to this rapidly growing segment of the computer industry. Acknowledging the fact that embedded systems control many of today's most common devices such as smart phones, PC tablets, as well as hardware embedded in cars, TVs, and even refrigerators and heating systems, the book starts with a basic introduction to embedded computing systems. It hones in on system-on-a-chip (SoC), multiprocessor system-on-chip (MPSoC), and network-on-chip (NoC). It then covers on-chip integration of software and custom hardware accelerators, as well as fabric flexibility, custom architectures, and the multiple I/O standards that facilitate PCB integration. Next, it focuses on the technologies associated with embedded computing systems, going over the basics of field-programmable gate array (FPGA), digital signal processing (DSP) and application-specific integrated circuit (ASIC) technology, architectural support for on-chip integration of custom accelerators with processors, and O/S support for these systems. Finally, it offers full details on architecture, testability, and computer-aided design (CAD) support for embedded systems, soft processors, heterogeneous resources, and on-chip storage before concluding with coverage of software support--in particular, O/S Linux. "Embedded Systems: Hardware, Design, and Implementation" is an ideal book for design engineers looking to optimize and reduce the size and cost of embedded system products and increase their reliability and performance.
The arrival and popularity of multi-core processors has sparked a renewed interest in the development of parallel programs. Similarly, the availability of low-cost microprocessors and sensors has generated a great interest in embedded real-time programs. This book provides students and programmers whose backgrounds are in traditional sequential programming with the opportunity to expand their capabilities into parallel, embedded, real-time and distributed computing. It also addresses the theoretical foundation of real-time scheduling analysis, focusing on theory that is useful for actual applications. Written by award-winning educators at a level suitable for undergraduates and beginning graduate students, this book is the first truly entry-level textbook in the subject. Complete examples allow readers to understand the context in which a new concept is used, and enable them to build and run the examples, make changes, and observe the results.
Computational intelligence is rapidly becoming an essential part of reliability engineering. This book offers a wide spectrum of viewpoints on the merger of technologies. Leading scientists share their insights and progress on reliability engineering techniques, suitable mathematical methods, and practical applications. Thought-provoking ideas are embedded in a solid scientific basis that contribute to the development the emerging field. This book is for anyone working on the most fundamental paradigm-shift in resilience engineering in decades. Scientists benefit from this book by gaining insight in the latest in the merger of reliability engineering and computational intelligence. Businesses and (IT) suppliers can find inspiration for the future, and reliability engineers can use the book to move closer to the cutting edge of technology.
Find the right bootloader solution or combination of firmware required to boot a platform considering its security, product features, and optimized boot solutions. This book covers system boot firmware, focusing on real-world firmware migration from closed source to open source adaptation. The book provides an architectural overview of popular boot firmware. This includes both closed sourced and/or open source in nature, such as Unified Extensible Firmware Interface (UEFI), coreboot, and Slim Bootloader and their applicable market segments based on product development and deployment requirements. Traditional system firmware is often complex and closed sourced whereas modern firmware is still a kind of hybrid between closed and open source. But what might a future firmware model look like? The most simplistic boot firmware solution uses open source firmware development. This book helps you decide how to choose the right boot firmware for your products and develop your own boot firmware using open source. Coverage includes: Why open source firmware is used over closed source The pros and cons of closed and open source firmware A hybrid work model: for faster bring-up activity using closed source, binary integrated with open source firmware What You Will Learn Understand the architecture of standard and popular boot firmware Pick the correct bootloader for your required target hardware Design a hybrid workflow model for the latest chipset platform Understand popular payload architectures and offerings for embedded systems Select the right payload for your bootloader solution to boot to the operating system Optimize the system firmware boot time based on your target hardware requirement Know the product development cycle using open source firmware development Who This Book Is For Embedded firmware and software engineers migrating the product development from closed source firmware to open source firmware for product adaptation needs as well as engineers working for open source firmware development. A secondary audience includes engineers working on various bootloaders such as open source firmware, UEFI, and Slim Bootloader development, as well as undergraduate and graduate students working on developing firmware skill sets.
Unique selling point: * This book teaches readers how to build IoT products through practical projects, ranging from beginners to advanced level, so that they can build knowledge through hands-on tasks rather than theoretical knowledge. Core audience: * IoT enthusiasts, students and tutors Place in the market: * This is a new approach and distinctly different from all of the books which focus only on theory.
This book offers ideas to help improve digital technologies and increase their efficiency during implementation and application for researchers and practitioners. The outstanding position of the book among others is that it dwells with cyber-physical systems' progress and proposes ideas and finding around digital tools and technologies and their application. A distinguished contribution is in presenting results on Digital Twins development and application, enhancing approaches of communication and information transferring between cyber-physical systems connected within the Internet of things platforms, computer linguistic as a part of cyber-physical systems, intelligent cybersecurity and computer vision systems. The target audience of this book also includes practitioners and experts, as well as state authorities and representatives of manufacturing and industry who are interested in creating and implementing of cyber-physical systems in framework of digitalization projects.
Rugged Embedded Systems: Computing in Harsh Environments describes how to design reliable embedded systems for harsh environments, including architectural approaches, cross-stack hardware/software techniques, and emerging challenges and opportunities. A "harsh environment" presents inherent characteristics, such as extreme temperature and radiation levels, very low power and energy budgets, strict fault tolerance and security constraints, etc. that challenge the computer system in its design and operation. To guarantee proper execution (correct, safe, and low-power) in such scenarios, this contributed work discusses multiple layers that involve firmware, operating systems, and applications, as well as power management units and communication interfaces. This book also incorporates use cases in the domains of unmanned vehicles (advanced cars and micro aerial robots) and space exploration as examples of computing designs for harsh environments.
Implement real-time data processing applications on the Raspberry Pi. This book uniquely helps you work with data science concepts as part of real-time applications using the Raspberry Pi as a localized cloud. You'll start with a brief introduction to data science followed by a dedicated look at the fundamental concepts of Python programming. Here you'll install the software needed for Python programming on the Pi, and then review the various data types and modules available. The next steps are to set up your Pis for gathering real-time data and incorporate the basic operations of data science related to real-time applications. You'll then combine all these new skills to work with machine learning concepts that will enable your Raspberry Pi to learn from the data it gathers. Case studies round out the book to give you an idea of the range of domains where these concepts can be applied. By the end of Data Science with the Raspberry Pi, you'll understand that many applications are now dependent upon cloud computing. As Raspberry Pis are cheap, it is easy to use a number of them closer to the sensors gathering the data and restrict the analytics closer to the edge. You'll find that not only is the Pi an easy entry point to data science, it also provides an elegant solution to cloud computing limitations through localized deployment. What You Will Learn Interface the Raspberry Pi with sensors Set up the Raspberry Pi as a localized cloud Tackle data science concepts with Python on the Pi Who This Book Is For Data scientists who are looking to implement real-time applications using the Raspberry Pi as an edge device and localized cloud. Readers should have a basic knowledge in mathematics, computers, and statistics. A working knowledge of Python and the Raspberry Pi is an added advantage.
This book features a collection of high-quality, peer-reviewed papers presented at the Fourth International Conference on Intelligent Computing and Communication (ICICC 2020) organized by the Department of Computer Science and Engineering and the Department of Computer Science and Technology, Dayananda Sagar University, Bengaluru, India, on 18-20 September 2020. The book is organized in two volumes and discusses advanced and multi-disciplinary research regarding the design of smart computing and informatics. It focuses on innovation paradigms in system knowledge, intelligence and sustainability that can be applied to provide practical solutions to a number of problems in society, the environment and industry. Further, the book also addresses the deployment of emerging computational and knowledge transfer approaches, optimizing solutions in various disciplines of science, technology and health care.
Foundations of Quantum Programming discusses how new programming methodologies and technologies developed for current computers can be extended to exploit the unique power of quantum computers, which promise dramatic advantages in processing speed over currently available computer systems. Governments and industries around the globe are now investing vast amounts of money with the expectation of building practical quantum computers. Drawing upon years of experience and research in quantum computing research and using numerous examples and illustrations, Mingsheng Ying has created a very useful reference on quantum programming languages and important tools and techniques required for quantum programming, making the book a valuable resource for academics, researchers, and developers.
|
![]() ![]() You may like...
Geological Controls for Gas Hydrates and…
Sanjeev Rajput, N K Thakur
Paperback
Machine Learning for Planetary Science
Joern Helbert, Mario D'Amore, …
Paperback
R3,590
Discovery Miles 35 900
Structural Geometry of Mobile Belts of…
Tapas Kumar Biswal, Sumit Kumar Ray, …
Hardcover
R4,242
Discovery Miles 42 420
Seismic While Drilling - Fundamentals of…
F.B. Poletto, F. Miranda
Paperback
R4,737
Discovery Miles 47 370
|