Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design > General
Contemporary High Performance Computing: From Petascale toward Exascale focuses on the ecosystems surrounding the world's leading centers for high performance computing (HPC). It covers many of the important factors involved in each ecosystem: computer architectures, software, applications, facilities, and sponsors. The first part of the book examines significant trends in HPC systems, including computer architectures, applications, performance, and software. It discusses the growth from terascale to petascale computing and the influence of the TOP500 and Green500 lists. The second part of the book provides a comprehensive overview of 18 HPC ecosystems from around the world. Each chapter in this section describes programmatic motivation for HPC and their important applications; a flagship HPC system overview covering computer architecture, system software, programming systems, storage, visualization, and analytics support; and an overview of their data center/facility. The last part of the book addresses the role of clouds and grids in HPC, including chapters on the Magellan, FutureGrid, and LLGrid projects. With contributions from top researchers directly involved in designing, deploying, and using these supercomputing systems, this book captures a global picture of the state of the art in HPC.
Numerical simulation models are used in all engineering disciplines for modeling physical phenomena to learn how the phenomena work, and to identify problems and optimize behavior. Smart Proxy Models provide an opportunity to replicate numerical simulations with very high accuracy and can be run on a laptop within a few minutes, thereby simplifying the use of complex numerical simulations, which can otherwise take tens of hours. This book focuses on Smart Proxy Modeling and provides readers with all the essential details on how to develop Smart Proxy Models using Artificial Intelligence and Machine Learning, as well as how it may be used in real-world cases. Covers replication of highly accurate numerical simulations using Artificial Intelligence and Machine Learning Details application in reservoir simulation and modeling and computational fluid dynamics Includes real case studies based on commercially available simulators Smart Proxy Modeling is ideal for petroleum, chemical, environmental, and mechanical engineers, as well as statisticians and others working with applications of data-driven analytics.
With the increased concern for energy conservation in recent years, much attention has been focused on lighting energy consumption and methods for reducing it. Along with this concern for energy efficient lighting has come the realization that lighting has profound effects on worker productivity as well as important aesthetic qualities. This book presents an introduction to lighting design and energy efficiency which can be utilized while maintaining the quality of illumination. Topics include lighting energy management, selection of lamps, task lighting, lighting design, lighting control, reflectors, ballast selection, natural daylighting, wireless lighting control, and case studies.
This reference text discusses advances in wireless communication, design challenges, and future research directions to design reliable wireless communication. The text discusses emerging technologies including wireless sensor networks, Internet of Things (IoT), cloud computing, mm-Wave, Massive MIMO, cognitive radios (CR), visible light communication (VLC), wireless optical communication, signal processing, and channel modeling. The text covers artificial intelligence-based applications in wireless communication, machine learning techniques and challenges in wireless sensor networks, and deep learning for channel and bandwidth estimation during optical wireless communication. The text will be useful for senior undergraduate, graduate students, and professionals in the fields of electrical engineering, and electronics and communication engineering.
Telecommunications have underpinned social interaction and economic activity since the 19th century and have been increasingly reliant on optical fibers since their initial commercial deployment by BT in 1983. Today, mobile phone networks, data centers, and broadband services that facilitate our entertainment, commerce, and increasingly health provision are built on hidden optical fiber networks. However, recently it emerged that the fiber network is beginning to fill up, leading to the talk of a capacity crunch where the capacity still grows but struggles to keep up with the increasing demand. This book, featuring contributions by the suppliers of widely deployed simulation software and academic authors, illustrates the origins of the limited performance of an optical fiber from the engineering, physics, and information theoretic viewpoints. Solutions are then discussed by pioneers in each of the respective fields, with near-term solutions discussed by industrially based authors, and more speculative high-potential solutions discussed by leading academic groups.
This book looks at relationships between the organisation of physical objects in space and the organisation of ideas. Historical, philosophical, psychological and architectural knowledge are united to develop an understanding of the relationship between information and its representation. Despite its potential to break the mould, digital information has relied on metaphors from a pre-digital era. In particular, architectural ideas have pervaded discussions of digital information, from the urbanisation of cyberspace in science fiction, through to the adoption of spatial visualisations in the design of graphical user interfaces. This book tackles: * the historical importance of physical places to the organisation and expression of knowledge * the limitations of using the physical organisation of objects as the basis for systems of categorisation and taxonomy * the emergence of digital technologies and the 20th century new conceptual understandings of knowledge and its organisation * the concept of disconnecting storage of information objects from their presentation and retrieval * ideas surrounding semantic space' * the realities of the types of user interface which now dominate modern computing.
We are crossing a new frontier in the evolution of computing and entering the era of cognitive systems. The victory of IBM's Watson on the television quiz show Jeopardy! revealed how scientists and engineers at IBM and elsewhere are pushing the boundaries of science and technology to create machines that sense, learn, reason, and interact with people in new ways to provide insight and advice. In Smart Machines, John E. Kelly III, director of IBM Research, and Steve Hamm, a writer at IBM and a former business and technology journalist, introduce the fascinating world of "cognitive systems" to general audiences and provide a window into the future of computing. Cognitive systems promise to penetrate complexity and assist people and organizations in better decision making. They can help doctors evaluate and treat patients, augment the ways we see, anticipate major weather events, and contribute to smarter urban planning. Kelly and Hamm's comprehensive perspective describes this technology inside and out and explains how it will help us conquer the harnessing and understanding of "big data," one of the major computing challenges facing businesses and governments in the coming decades. Absorbing and impassioned, their book will inspire governments, academics, and the global tech industry to work together to power this exciting wave in innovation.
Software development isn't an "ivory tower" exercise.Street coders get the job done by prioritizing tasks, making quick decisions, and knowing which rules to break. Street Coder: Rules to break and how to break themis a programmer's survival guide, full of tips, tricks, and hacks that will make you a more efficient programmer. This book's rebel mindset challenges status quo thinking and exposes the important skills you need on the job. You'll learnthe crucial importance of algorithms and data structures, turn programming chores into programming pleasures, and shatter dogmatic principles keeping you from your full potential. Every new coder starts out with a lot of theory; the "streetsmarts" come with experience. To be successful, you need to know how toput theory into action, understand why "best practices" are the best, and know when to go rogue and break the unbreakable rules.
The architects of today s large and complex systems all too often struggle with the lack of a consistent set of principles and practices that adequately address the entire breadth of systems architecture. The Method Framework for Engineering System Architectures (MFESA) enables system architects and process engineers to create methods for effectively and efficiently engineering high-quality architecture for systems, subsystems, and software components. Meets the Needs of Specific Projects The book begins by documenting the common challenges that must be addressed by system architecture engineering. It explores the major principles answering these challenges and forming the basis of MFESA. Next, the authors introduce MFESA, including its primary goals, inputs, tasks, outputs, and assumptions. Then they describe the fundamental concepts and terminology on which the systems architecture engineering is founded. This is followed by a description of each of the ten system architecture engineering tasks including associated goals and objectives, preconditions, inputs, steps, postconditions, work products, guidelines, and pitfalls. Finally, the book documents the relationship between quality and architecture, explains the quality model underlying MFESA, and provides a summary of MFESA method framework, as well as a list of points to remember and future directions planned for MFESA. Explains Specific Rationales Organized as a handy desk reference, this book harnesses more than 100 years of the authors combined professional experience to provide extensive guidelines, best practices, and tips on avoiding possible pitfalls. It presents a direct rationale of why steps are taken, how things can go wrong, and guidance for how and when to tailor the model for a system s specific context. CRC Press is pleased to announce that The Method Framework for Engineering System Architectures has been added to "Intel Corporation s Recommended Reading List." Intel s Recommended Reading program provides technical professionals a simple and handy reference list of what to read to stay abreast of new technologies. Dozens of industry technologists, corporate fellows, and engineers have helped by suggesting books and reviewing the list. This is the most comprehensive reading list available for professional computer developers.
After nearly six years as the field's leading reference, the second edition of this award-winning handbook reemerges with completely updated content and a brand new format. The Computer Engineering Handbook, Second Edition is now offered as a set of two carefully focused books that together encompass all aspects of the field. In addition to complete updates throughout the book to reflect the latest issues in low-power design, embedded processors, and new standards, this edition includes a new section on computer memory and storage as well as several new chapters on such topics as semiconductor memory circuits, stream and wireless processors, and nonvolatile memory technologies and applications.
This book provides a comprehensive coverage of System-on-Chip (SoC) post-silicon validation and debug challenges and state-of-the-art solutions with contributions from SoC designers, academic researchers as well as SoC verification experts. The readers will get a clear understanding of the existing debug infrastructure and how they can be effectively utilized to verify and debug SoCs.
For any digital TV developer or manager, the maze of standards and
specifications related to MHP and OCAP is daunting-you have to
patch together pieces from several standards to gather all the
necessary knowledge you need to compete worldwide. The standards
themselves can be confusing, and contain many inconsistencies and
missing pieces. Interactive TV Standards provides a guide for
actually deploying these technologies for a broadcaster or product
and application developer.
This comprehensive account of the concept and practices of deduction is the first to bring together perspectives from philosophy, history, psychology and cognitive science, and mathematical practice. Catarina Dutilh Novaes draws on all of these perspectives to argue for an overarching conceptualization of deduction as a dialogical practice: deduction has dialogical roots, and these dialogical roots are still largely present both in theories and in practices of deduction. Dutilh Novaes' account also highlights the deeply human and in fact social nature of deduction, as embedded in actual human practices; as such, it presents a highly innovative account of deduction. The book will be of interest to a wide range of readers, from advanced students to senior scholars, and from philosophers to mathematicians and cognitive scientists.
1. An up-to-date reference on Red Hat 8 with comparisons to Red Hat's 7 and 6 when warranted. 2. A combination of how to use and administer Linux and operating systems concepts (making this text unique to Linux textbooks) written in an easy-to-read manner. 3. Improved chapters on computer networks, regular expressions and scripting. Revised and additional examples to support the concepts in these chapters. 4. Comparisons between Red Hat Linux and other Linux distributions when such comparisons will be useful. 5. A set of ancillary material including a complete lab manual, text bank, power point notes, glossary of terms, instructor's manual and supplemental readings. The supplemental readings will allow for a smaller book while still retaining all of the important content. 6. Improved chapter reviews, added end-of-section activities, additional tables, improved figures (where possible) and "did you know" boxes inserted to provide useful facts.
The book presents the research by the Action Space! Studio on the Evolutionary City. An ambitious project meant to create a new tool not only for urban planners, but also for people involved inside project management business and people outside that practice. A kind of simulator-educational tool. The journey of discovery began by understanding evolution starting with Darwin, his phenotypes, the realms of biology, sociology, and economics. Pumped by evolution's magic the studio quickly plunged into game theory. These two lines of research synthesized into a set of games modeled on diverse aspects of the city - from the tasks a building developer faces when dealing with land value to the more intangible aspects of a city (i.e. the driving forces of desires in social groups).
This introductory user's guide to systems analysis and systems design focuses on building sustainable information systems to meet tomorrow's needs. It shows how practitioners can apply multiple participatory perspectives in development, so as to avoid future problems. As a practical guide, it is presented to be readily comprehensible and is organized to enable users to concentrate on their goals efficiently, and with minimum theoretical elaboration. The chapters follow the sequence involved in planning an information system, explaining key words, the time involved in each step, ending with a tutorial or exercises.
Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"? Cyber security is a big, messy, multivariate, multidimensional arena. A reasonable "defense-in-depth" requires many technologies; smart, highly skilled people; and deep and broad analysis, all of which must come together into some sort of functioning whole, which is often termed a security architecture. Secrets of a Cyber Security Architect is about security architecture in practice. Expert security architects have dozens of tricks of their trade in their kips. In this book, author Brook S. E. Schoenfield shares his tips and tricks, as well as myriad tried and true bits of wisdom that his colleagues have shared with him. Creating and implementing a cyber security architecture can be hard, complex, and certainly frustrating work. This book is written to ease this pain and show how to express security requirements in ways that make the requirements more palatable and, thus, get them accomplished. It also explains how to surmount individual, team, and organizational resistance. The book covers: What security architecture is and the areas of expertise a security architect needs in practice The relationship between attack methods and the art of building cyber defenses Why to use attacks and how to derive a set of mitigations and defenses Approaches, tricks, and manipulations proven successful for practicing security architecture Starting, maturing, and running effective security architecture programs Secrets of the trade for the practicing security architecture Tricks to surmount typical problems Filled with practical insight, Secrets of a Cyber Security Architect is the desk reference every security architect needs to thwart the constant threats and dangers confronting every digitally connected organization.
This introductory user's guide to systems analysis and systems design focuses on building sustainable information systems to meet tomorrow's needs. It shows how practitioners can apply multiple participatory perspectives in development, so as to avoid future problems. As a practical guide, it is presented to be readily comprehensible and is organized to enable users to concentrate on their goals efficiently, and with minimum theoretical elaboration. The chapters follow the sequence involved in planning an information system, explaining key words, the time involved in each step, ending with a tutorial or exercises.
What exactly is a cloud-native platform? It's certainly a hot topic in IT, as enterprises today assess this option for developing and delivering software quickly and repeatedly. This O'Reilly report explains the capabilities of cloud-native platforms and examines the fundamental changes enterprises need to make in process, organization, and culture if they're to take real advantage of this approach. Author Duncan Winn focuses on the open source platform Cloud Foundry, one of the more prominent cloud-native providers. You'll learn how cloud-native applications are designed to be "infrastructure unaware" so they can thrive and move at will in the highly distributed and constantly evolving cloud environment.With this report, you'll explore: Technical driving forces that are rapidly changing the way organizations develop and deliver software today How key concepts underpinning the Cloud Foundry platform leverage each of the technical forces discussed How cloud-native platforms remove the requirement to perform undifferentiated heavy lifting, such as provisioning VMs, middleware, and databases Why cloud-native platforms enable fast feedback loops as you move from agile development to agile deployment Recommended changes and practical considerations for organizations that want to build cloud-native applications.
This book offers the latest advances and results in the fields of Machine Learning and Deep Learning for Wireless Communication and provides positive and critical discussions on the challenges and prospects. It provides a broad spectrum in understanding the improvements in Machine Learning and Deep Learning that are motivating by the specific constraints posed by wireless networking systems. The book offers an extensive overview on intelligent Wireless Communication systems and its underlying technologies, research challenges, solutions, and case studies. It provides information on intelligent wireless communication systems and its models, algorithms and applications. The book is written as a reference that offers the latest technologies and research results to various industry problems.
Covers IoT-cloud convergence with a focus on complex industrial IoT case studies Discusses the broad background of IoT-cloud convergence architectures and their fundamentals along with resource provisioning mechanisms Emphasizes the use of context in developing context aware IoT solutions Presents a novel C-model that explains the IoT application development phases Discusses a simplified convergence model that depicts the role of cloud in an IoT application
Addresses a wide selection of multimedia applications, programmable and custom architectures for the implementations of multimedia systems, and arithmetic architectures and design methodologies. The book covers recent applications of digital signal processing algorithms in multimedia, presents high-speed and low-priority binary and finite field arithmetic architectures, details VHDL-based implementation approaches, and more.
Addresses the major issues involved in computer design and architectures. Dealing primarily with theory, tools, and techniques as related to advanced computer systems, it provides tutorials and surveys and relates new important research results. Each chapter provides background information, describes and analyzes important work done in the field, and provides important direction to the reader on future work and further readings. The topics covered include hierarchical design schemes, parallel and distributed modeling and simulation, parallel simulation tools and techniques, theoretical models for formal and performance modeling, and performance evaluation techniques.
A comprehensive guide to understanding the standard and most recent advances in the design of reliable computer systems. It is organized into three sections, beginning with an in-depth review of existing reliability techniques and evaluation criteria for both hardware and software. also examined are the models for detecting faults and predicting failures, and the financial considerations which are inherent in the design, purchase, operation, and maintenance of a reliable system.
This book makes a significant contribution to the development of management sciences, in terms of strategic management and more strictly resource approach to the company through structural definition of knowledge. |
You may like...
Customizable and Adaptive Quantum…
Nadia Nedjah, Luiza de Macedo Mourelle
Hardcover
R1,386
Discovery Miles 13 860
Edge-AI in Healthcare - Trends and…
Sonali Vyas, Akanksha Upadhyaya, …
Hardcover
R2,535
Discovery Miles 25 350
Mathematical Logic through Python
Yannai A. Gonczarowski, Noam Nisan
Paperback
Understanding Computers - Today and…
Charles Parker, Deborah Morley
Paperback
The Adventurous and Practical Journey to…
FANAP Studies & Research Center
Hardcover
R2,971
Discovery Miles 29 710
Discoverability in Digital Repositories…
Liz Woolcott, Ali Shiri
Paperback
R953
Discovery Miles 9 530
|