![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > General
"Fundamentals of Wearable Computers and Augmented Reality" presents
a broad coverage of the technologies and interface design issues
associated with wearable computers and augmented reality displays
both rapidly developing fields in computer science, engineering,
and human interface design. This book presents concepts related to
the use and underlying technologies of augmented reality and
wearable computer systems. There are many application areas for
this technology, such as medicine, manufacturing, training, and
recreation. Wearable computers will allow a much closer association
of information with the user than is possible with traditional
desktop computers.
Like the anti-lock brakes system of a car, real-time systems are time-vital technologies put in place to react under a certain set of circumstances, often vital to security of data, information, or other resources. Innovations in Embedded and Real-Time Systems Engineering for Communication has collected the latest research within the field of real-time systems engineering, and will serve as a vital reference compendium for practitioners and academics. From a wide variety of fields and countries, the authors of this collection are the respective experts in their areas of concentration, giving the latest case studies, methodologies, frameworks, architectures, best practices, and research as it relates to real-time systems engineering for communication.
The latest on getting the most from laptops and tablets Not that long ago, laptops were seen as luxuries. Now they're practically an essential for many people, and--as faster computing power and super-sharp displays make many of them the equal of a desktop--the new wave of lightweight laptops is increasingly replacing the home PC with its bulky tower and multiple cords. Plus, you can use your laptop when chilling on the couch or venturing out for a quick coffee! In this fully updated edition of Laptops For Dummies, bestselling tech writer Dan Gookin takes a friendly walk through everything you need to know, from the basics (if you're new to laptops) all the way up to the latest hardware and tech updates--including the recent release of Windows 10. Along the way you'll learn how to synchronize your laptop with other machines, coordinate email pickup across devices, and beef up your security. You'll also learn how to Choose the right laptop Check out tablet options Troubleshoot problems Maintain and upgrade Whether you're choosing a new laptop or want to maximize what you're getting from the one you have, Laptops For Dummies has you covered, wherever you want to work--or play!
When the SCION project started in 2009, the goal was to create an architecture offering high availability and security for basic point-to-point communication. In the five years since the publication of SCION: A Secure Internet Architecture, this next-generation Internet architecture has evolved in terms of both design and deployment. On the one hand, there has been development of exciting new concepts and systems, including a new global time-synchronization system, an inter-domain approach for bandwidth reservations called COLIBRI, and Green Networking, which allows combating global climate change on three fronts. On the other hand, SCION is now also in production use by the Swiss financial ecosystem, and enables participants such as the Swiss National Bank, the Swiss provider of clearing services (SIX), and all Swiss financial institutes to communicate securely and reliably with each other via the Secure Swiss Finance Network. This unique guidebook provides an updated description of SCION's main components, covering new research topics and the most recent deployments. In particular, it presents in-depth discussion of formal verification efforts. Importantly, it offers a comprehensive, thorough description of the current SCION system: Describes the principles that guided SCION's design as a secure and robust Internet architecture Provides a comprehensive description of the next evolution in the way data finds its way through the Internet Explains how SCION can contribute to reducing carbon emissions, by introducing SCION Green Networking Demonstrates how SCION not only functions in academic settings but also works in production deployments Discusses additional use cases for driving SCION's adoption Presents the approaches for formal verification of protocols and code Illustrated with many colorful figures, pictures, and diagrams, allowing easy access to the concepts and use cases Assembled by a team with extensive experience in the fields of computer networks and security, this text/reference is suitable for researchers, practitioners, and graduate students interested in network security. Also, readers with limited background in computer networking but with a desire to know more about SCION will benefit from an overview of relevant chapters in the beginning of the book.
This book describes a comprehensive combination of methodologies that strongly enhance the modern Virtual Prototype (VP)-based verification flow for heterogeneous systems-on-chip (SOCs). In particular, the book combines verification and analysis aspects across various stages of the VP-based verification flow, providing a new perspective on verification by leveraging advanced techniques, like metamorphic testing, data flow testing, and information flow testing. In addition, the book puts a strong emphasis on advanced coverage-driven methodologies to verify the functional behavior of the SOC as well as ensure its security. Provides an extensive introduction to the modern VP-based verification flow for heterogeneous SOCs; Introduces a novel metamorphic testing technique for heterogeneous SOCs which does not require reference models; Includes automated advanced data flow coverage-driven methodologies tailored for SystemC/AMS-based VPs; Describes enhanced functional coverage-driven methodologies to verify various functional behaviors of RF amplifiers.
Computer Hardware teaches the basic functioning of a computer with a concentration on the machine level elements. It clearly explains the role of each of the parts involved in the computer make up and describes how the whole system ticks, without overwhelming the reader in minute detail. Aimed at introductory courses for computing undergraduates, Computer Hardware covers basic principles behind the design of modern computer systems.
Pervasive healthcare is the conceptual system of providing healthcare to anyone, at anytime, and anywhere by removing restraints of time and location while increasing both the coverage and the quality of healthcare. Pervasive Healthcare Monitoring is at the forefront of this research, and presents the ways in which mobile and wireless technologies can be used to implement the vision of pervasive healthcare. This vision includes prevention, healthcare maintenance and checkups; short-term monitoring (home healthcare monitoring), long-term monitoring (nursing home), and personalized healthcare monitoring; and incidence detection and management, emergency intervention, and transportation and treatment. The pervasive healthcare applications include pervasive health monitoring, intelligent emergency management system, pervasive healthcare data access, and ubiquitous mobile telemedicine. Pervasive Healthcare Monitoring fills the need for a research-oriented book on the wide array of emerging healthcare applications and services, including the treatment of several new wireless technologies and the ways in which they will implement the vision of pervasive healthcare. This book is written primarily for university faculty and graduate students in the field of healthcare technologies, and industry professionals involved in healthcare IT research, design, and development.
Digital Systems Design and Prototyping: Using Field Programmable Logic and Hardware Description Languages, Second Edition covers the subject of digital systems design using two important technologies: Field Programmable Logic Devices (FPLDs) and Hardware Description Languages (HDLs). These two technologies are combined to aid in the design, prototyping, and implementation of a whole range of digital systems from very simple ones replacing traditional glue logic to very complex ones customized as the applications require. Three HDLs are presented: VHDL and Verilog, the widely used standard languages, and the proprietary Altera HDL (AHDL). The chapters on these languages serve as tutorials and comparisons are made that show the strengths and weaknesses of each language. A large number of examples are used in the description of each language providing insight for the design and implementation of FPLDs. The CD-ROM included with the book contains the Altera MAX+PLUS II development environment which is ready to compile and simulate all examples. With the addition of the Altera UP-1 prototyping board, all examples can be tested and verified in a real FPLD. Digital Systems Design and Prototyping: Using Field Programmable Logic and Hardware Description Languages, Second Edition is designed as an advanced level textbook as well as a reference for the professional engineer.
Discusses open principles, methods, and research problems Presents a vision for how IIoT could change the world in the distant future Covers how industry automation is projected to be the largest and fastest growing segment of the IIoT market Explores the collaboratively development of high performance telecommunications, military, industrial, and general purpose embedded computing applications Offers a systematic overview of the state-of-the-art research efforts and potential research directions for dealing with IIoT challenges.
This textbook aims to help the reader develop an in-depth understanding of logical reasoning and gain knowledge of the theory of computation. The book combines theoretical teaching and practical exercises; the latter is realised in Isabelle/HOL, a modern theorem prover, and PAT, an industry-scale model checker. I also give entry-level tutorials on the two software to help the reader get started. By the end of the book, the reader should be proficient in both software. Content-wise, this book focuses on the syntax, semantics and proof theory of various logics; automata theory, formal languages, computability and complexity. The final chapter closes the gap with a discussion on the insight that links logic with computation. This book is written for a high-level undergraduate course or a Master's course. The hybrid skill set of practical theorem proving and model checking should be helpful for the future of readers should they pursue a research career or engineering in formal methods.
In programming, Gotcha is a well known term. A gotcha is a language feature, which, if misused, causes unexpected - and, in hardware design, potentially disastrous - behavior. The purpose of this book is to enable engineers to write better Verilog/SystemVerilog design and verification code, and to deliver digital designs to market more quickly. This book shows over 100 common coding mistakes that can be made with the Verilog and SystemVerilog languages. Each example explains in detail the symptoms of the error, the languages rules that cover the error, and the correct coding style to avoid the error. The book helps digital design and verification engineers to recognize these common coding mistakes, and know how to avoid them. Many of these errors are very subtle, and can potentially cost hours or days of lost engineering time trying to find and debug the errors. This book is unique because while there are many books that teach the language, and a few that try to teach coding style, no other book addresses how to recognize and avoid coding errors with these languages.
Addresses innovations in technology relating to the energy efficiency of a wide variety of contemporary computer systems and networks With concerns about global energy consumption at an all-time high, improving computer networks energy efficiency is becoming an increasingly important topic. Large-Scale Distributed Systems and Energy Efficiency: A Holistic View addresses innovations in technology relating to the energy efficiency of a wide variety of contemporary computer systems and networks. After an introductory overview of the energy demands of current Information and Communications Technology (ICT), individual chapters offer in-depth analyses of such topics as cloud computing, green networking (both wired and wireless), mobile computing, power modeling, the rise of green data centers and high-performance computing, resource allocation, and energy efficiency in peer-to-peer (P2P) computing networks. Discusses measurement and modeling of the energy consumption method Includes methods for energy consumption reduction in diverse computing environments Features a variety of case studies and examples of energy reduction and assessment Timely and important, Large-Scale Distributed Systems and Energy Efficiency is an invaluable resource for ways of increasing the energy efficiency of computing systems and networks while simultaneously reducing the carbon footprint.
This book constitutes the refereed post-conference proceedings of the Fourth IFIP International Cross-Domain Conference on Internet of Things, IFIPIoT 2021, held virtually in November 2021. The 15 full papers presented were carefully reviewed and selected from 33 submissions. Also included is a summary of two panel sessions held at the conference. The papers are organized in the following topical sections: challenges in IoT Applications and Research, Modernizing Agricultural Practice Using IoT, Cyber-physical IoT systems in Wildfire Context, IoT for Smart Health, Security, Methods.
Quality Electronic Design (QED)'s landscape spans a vast region where territories of many participating disciplines and technologies overlap. This book explores the latest trends in several key topics related to quality electronic design, with emphasis on Hardware Security, Cybersecurity, Machine Learning, and application of Artificial Intelligence (AI). The book includes topics in nonvolatile memories (NVM), Internet of Things (IoT), FPGA, and Neural Networks.
The material presented in this book originates from the first Eurographics Workshop on Graphics Hardware, held in Lisbon, Portugal, in August 1986. Leading experts in the field present the state of their ongoing graphics hardware projects and give their individual views of future developments. The final versions of the contributions are written in the light of in-depth discussions at the workshop. The book starts a series of EurographicSeminars volumes on the state-of-the-art of graphics hardware. This volume presents a unique collection of material which covers the following topics: workstation architectures, traffic simulators, hardware support for geometric modeling, ray-tracing. It therefore will be of interest to all computer graphics professionals wishing to gain a deeper knowledge of graphics hardware.
This book deals with analysis techniques for TCP, UDP, Web, and SOAP data transmission performance on the IoT cloud side, CSMA-type, and multi-hop data transmission performance on the IoT edge side, as well as gateway receives buffer and transmit packet assembly data transmission performance. As mathematical tools for the analysis of communication performance, universal analysis methods such as stochastic processes, queues, Markov processes, and communication traffic simulators are applied to actual examples, and their usage is described in detail. This book aims to provide lifelong skills for analyzing communication performance that will serve as the basis for the future evolution of the IoT.
The book is aimed to foster knowledge based on Blockchain technology highlighting on the framework basics, operating principles and different incarnations. The fundamental problems encountered in existing blockchain architectures and means for removing those would be covered. It would also touch upon blockchain based IoT systems and applications. The book covers applications and use cases of blockchain technology for industrial IoT systems. In addition, methods for inducing computational intelligence into existing blockchain frameworks thereby thwarting most of the limitations are also discussed. The readers would benefit from the rich technical content in this rapidly emerging field thereby enabling a skilled workforce for the future.
This book covers the state-of-the-art research in design of modern electronic systems used in safety-critical applications such as medical devices, aircraft flight control, and automotive systems. The authors discuss lifetime reliability of digital systems, as well as an overview of the latest research in the field of reliability-aware design of integrated circuits. They address modeling approaches and techniques for evaluation and improvement of lifetime reliability for nano-scale CMOS digital circuits, as well as design algorithms that are the cornerstone of Computer Aided Design (CAD) of reliable VLSI circuits. In addition to developing lifetime reliability analysis and techniques for clocked storage elements (such as flip-flops), the authors also describe analysis and improvement strategies targeting commercial digital circuits.
The go-to guide to getting started with micro:bit and exploring all of the mini-computer's amazing capabilities The micro:bit is a pocket-sized electronic development platform built with education in mind. It was developed by the BBC in partnership with Microsoft and other major tech companies to provide kids with a fun, easy, inexpensive way to develop their digital skills. With it, kids (and grownups) can learn basic programming and coding while having fun making virtual pets, developing games, and a whole lot more. Written by internationally bestselling tech author Gareth Halfacree and endorsed by the Micro:bit Foundation, the micro:bit User Guide contains what you need to know to get up and running fast with the micro:bit. Learn everything from taking your first steps with the software to writing your own programs. You'll also learn how to expand its capabilities with add-ons through easy-to-follow, step-by-step instructions. * Configure your micro:bit and develop your digital skills * Write code in Microsoft PXT, Python, JavaScript, and more * Discover the motion detector and compass * Connect the micro:bit to a computer, Raspberry Pi, or your smartphone * Build your own circuits and create hardware The micro:bit User Guide is your go-to source for learning all the secrets of the micro:bit. Whether you're just beginning or have some experience, this book allows you to dive right in and experience everything the micro:bit has to offer.
This book reviews and presents a number of approaches to Fuzzy-based system safety and reliability assessment. For each proposed approach, it provides case studies demonstrating their applicability, which will enable readers to implement them into their own risk analysis process. The book begins by giving a review of using linguistic terms in system safety and reliability analysis methods and their extension by fuzzy sets. It then progresses in a logical fashion, dedicating a chapter to each approach, including the 2-tuple fuzzy-based linguistic term set approach, fuzzy bow-tie analysis, optimizing the allocation of risk control measures using fuzzy MCDM approach, fuzzy sets theory and human reliability, and emergency decision making fuzzy-expert aided disaster management system. This book will be of interest to professionals and researchers working in the field of system safety and reliability, as well as postgraduate and undergraduate students studying applications of fuzzy systems.
This book presents various concepts and applications related to risk-conscious operations management. It also provides an overview of the risk-based engineering - fundamental to the concept of risk-conscious operations management. It presents the reliability concept to support Dependency Modelling, which includes hardware systems structures and components for reliability improvement and risk reduction. The book further develops and builds attributes and model for risk-conscious culture - critical to characterize operational approach to risk and presents human factor modelling, where it works on developing an approach for human error precursor analysis. This book will be useful for students, researchers, academicians and professionals working on identifying risk and reliability issues in complex safety and mission critical systems. It will also be beneficial for industry risk-and-reliability experts and operational safety staff working in the complex engineering systems.
Enterprise resource planning (ERP) refers to large commercial software packages that promise a seamless integration of information flow through an organization. Traditionally, separate units were created within an organization to carry out various tasks, and these functional areas would create their own information systems thereby giving rise to systems that were not integrated. ERP strives to provide a solution to these problems. Enterprise Resoure Planning Solutions and Management examines the issues that need to be further studied and better understood to ensure successful implementation and deployment of ERP systems.
Manufacturing computers in series was quite a feat in the 1950s. As mathematical as it gets, the machines discussed here were called X1 and X8. The industrial achievement combined with the background in a mathematical research center made the company Electrologica a legend in Dutch computing. The tales in this book are told by those who have a right to tell. Highly engaged professionals take readers back to their pioneering work with the machines and in retrospect unveil some of the values, which went without saying in the 1960s. To disagree, Paul Klint relates the contrasting views on software in Dutch research traditions. ALGOL culture: Frans Kruseman Aretz takes the reader along to the detailed decisions on constructing compilers and shows the values of an ALGOL culture transpiring. Signposts: Dirk Dekker for the first time 'owns' his algorithm for mutual exclusion. In particle physics: Rene van Dantzig's use case was an Electrologica X8 computer controlling two other computers in three-dimensional detection of colliding particles. Early steps in AI: Lambert Meertens' tale of the X8 machine composing a violin quartet comes with his original presentation, as well as the code in ALGOL 60. The reflections of first hand experiences combine well with the second thoughts of historical research into archival sources. Historians Huub de Beer and Gerard Alberts offer a view into the boardrooms of the local enterprise Electrologica, and of the electronics multinational Philips. Where pioneers and historians meet in an inspiring dialogue, the reader gains a view on the often implicit decisions constituting the field. Fortuitously, a copy of the X8 was retrieved from Kiel, Germany, and put on display at Rijksmuseum Boerhaave, Leiden. Sparked by the very material presence of an X8, the present book takes stock of the state of historiography of Electrologica. Gerard Alberts is an associate professor in History of Digital Cultures, retired from the University of Amsterdam. Jan Friso Groote is a full professor of Formal Methods at the Eindhoven University of Technology.
. . . a surprisingly useful and largely readable effort. It presents in textbook style an introduction to the creation, use, and evaluation of online full text databases. SLA SSD Bulletin This is the first complete treatment of full text databases. Comprehensive and up-to-date, the book incorporates an overview of the current status of full text databases with explanations of past research pertinent to full text and information regarding the future of full text. The major online systems that offer full text are described, with five systems highlighted: DIALOG, Mead Data Central's LEXIS and NEXIS, Westlaw, STN International, and BRS. The book features an extensive bibliography that includes articles specifically about full text databases as well as citations to research studies that use methodology particularly appropriate to full text research. The first two chapters of the book describe in detail the major online systems that currently offer full text. Chapter 3 provides an overview of the search and display features on the major online systems that are particularly suited to full text searching. Chapters 4, 5, 6, and 7 focus on full text searching. Chapter 4 introduces and provides an overview of the types of full text research that have been done. The next three chapters describe in detail the methodology and findings of some full text research projects undertaken by the authors. Chapters 8 and 9 bring together the practical aspects of the research described in the preceding chapters and offer useful advice for searchers, database producers and online developers. The information is of immediate use for searching today's full text database, but also offers ideas for improvement in the near future. The final chapter focuses on the future of full text research. This book is appropriate for online searchers, database producers, database vendors and designers. It can also be used as a supplemental text in courses in advanced online searching and information storage and retrieval.
The developments in mesh generation are usually driven by the needs of new applications and/or novel algorithms. The last decade has seen a renewed interest in mesh generation and adaptation by the computational engineering community, due to the challenges introduced by complex industrial problems.Another common challenge is the need to handle complex geometries. Nowadays, it is becoming obvious that geometry should be persistent throughout the whole simulation process. Several methodologies that can carry the geometric information throughout the simulation stage are available, but due to the novelty of these methods, the generation of suitable meshes for these techniques is still the main obstacle for the industrial uptake of this technology.This book will cover different aspects of mesh generation and adaptation, with particular emphasis on cutting-edge mesh generation techniques for advanced discretisation methods and complex geometries. |
![]() ![]() You may like...
Logic Synthesis for Low Power VLSI…
Sasan Iman, Massoud Pedram
Hardcover
R4,493
Discovery Miles 44 930
Energy-Efficient Modular Exponential…
Satyanarayana Vollala, N. Ramasubramanian, …
Hardcover
R4,929
Discovery Miles 49 290
The Engineering of Reliable Embedded…
Michael J. Pont
Hardcover
Formal and Adaptive Methods for…
Anatoliy Doroshenko, Olena Yatsenko
Hardcover
R5,784
Discovery Miles 57 840
Energy-Efficient Fault-Tolerant Systems
Jimson Mathew, Rishad A. Shafik, …
Hardcover
R5,095
Discovery Miles 50 950
|