![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design > General
This book introduces readers to all the necessary components and knowledge to start being a vital part of the IoT revolution. The author discusses how to create smart-IoT solutions to help solve a variety of real problems. Coverage includes the most important aspects of IoT architecture, the various applications of IoT, and the enabling technologies for IoT. This book presents key IoT concepts and abstractions, while showcasing real case studies. The discussion also includes an analysis of IoT strengths, weaknesses, opportunities and threats. Readers will benefit from the in-depth introduction to internet of things concepts, along with discussion of IoT algorithms and architectures tradeoffs. Case studies include smart homes, smart agriculture, and smart automotive.
Enabling Technologies for Next Generation Wireless Communications provides up-to-date information on emerging trends in wireless systems, their enabling technologies and their evolving application paradigms. This book includes the latest trends and developments toward next generation wireless communications. It highlights the requirements of next generation wireless systems, limitations of existing technologies in delivering those requirements and the need to develop radical new technologies. It focuses on bringing together information on various technological developments that are enablers vital to fulfilling the requirements of future wireless communication systems and their applications. Topics discussed include spectrum issues, network planning, signal processing, transmitter, receiver, antenna technologies, channel coding, security and application of machine learning and deep learning for wireless communication systems. The book also provides information on enabling business models for future wireless systems. This book is useful as a resource for researchers and practitioners worldwide, including industry practitioners, technologists, policy decision-makers, academicians, and graduate students.
Artificial Intelligence Techniques in IoT Sensor Networks is a technical book which can be read by researchers, academicians, students and professionals interested in artificial intelligence (AI), sensor networks and Internet of Things (IoT). This book is intended to develop a shared understanding of applications of AI techniques in the present and near term. The book maps the technical impacts of AI technologies, applications and their implications on the design of solutions for sensor networks. This text introduces researchers and aspiring academicians to the latest developments and trends in AI applications for sensor networks in a clear and well-organized manner. It is mainly useful for research scholars in sensor networks and AI techniques. In addition, professionals and practitioners working on the design of real-time applications for sensor networks may benefit directly from this book. Moreover, graduate and master's students of any departments related to AI, IoT and sensor networks can find this book fascinating for developing expert systems or real-time applications. This book is written in a simple and easy language, discussing the fundamentals, which relieves the requirement of having early backgrounds in the field. From this expectation and experience, many libraries will be interested in owning copies of this work.
Sustainable Entrepreneurship is nowadays considered as a discipline at the cross-roads of many others. This book describes recent cases, techniques and tools proposed for leaders, entrepreneurs, and practitioners who are involved and responsible for making strategic decisions in their companies and aiming at sustainable development. This book highlights the use of new business models/methods that can be employed by organizations and researchers to save millions of dollars, to enhance the economic growth, as well as to resolve environmental and social issues, via sustainable networks, renewal energy distribution, and social/green entrepreneurship. It will provide a comprehensive discussion of practical techniques, like Machine Learning, Robotics, Photovoltaic solar energy, in the field of renewable energy, and other digital tools, such as digital marketing, crowdsourcing platforms, and digital currency. Meanwhile, it will enlighten the way for entrepreneurs and decision makers by helping them to learn how to grow their business. The focus will be on how to benefit from these techniques to develop sustainable and renewable energy-based projects, as well as digitalized new ventures. The book walks the reader through the latest emerging trends in digitalization that can support practitioners, managers, entrepreneurs, and researchers to help them appreciate the application of sustainable solutions in various functional domains.
The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration. The book, DDoS Attacks - Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show the implications associated with them. Features: Covers topics that describe taxonomies of the DDoS attacks in detail, recent trends and classification of defensive mechanisms on the basis of deployment location, the types of defensive action, and the solutions offering economic incentives. Introduces chapters discussing the various types of DDoS attack associated with different layers of security, an attacker's motivations, and the importance of incentives and liabilities in any defensive solution. Illustrates the role of fair resource-allocation schemes, separate payment mechanisms for attackers and legitimate users, negotiation models on cost and types of resources, and risk assessments and transfer mechanisms. DDoS Attacks - Classification, Attacks, Challenges, and Countermeasures is designed for the readers who have an interest in the cybersecurity domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals who are focusing on developing defensive schemes and applications for detecting or mitigating the DDoS attacks, and faculty members across different universities.
IoT is empowered by various technologies used to detect, gather, store, act, process, transmit, oversee, and examine information. The combination of emergent technologies for information processing and distributed security, such as Cloud computing, Artificial intelligence, and Blockchain, brings new challenges in addressing distributed security methods that form the foundation of improved and eventually entirely new products and services. As systems interact with each other, it is essential to have an agreed interoperability standard, which is safe and valid. This book aims at providing an introduction by illustrating state-of-the-art security challenges and threats in IoT and the latest developments in IoT with Cloud, AI, and Blockchain security challenges. Various application case studies from domains such as science, engineering, and healthcare are introduced, along with their architecture and how they leverage various technologies Cloud, AI, and Blockchain. This book provides a comprehensive guide to researchers and students to design IoT integrated AI, Cloud, and Blockchain projects and to have an overview of the next generation challenges that may arise in the coming years.
The book addresses the need to investigate new approaches to lower energy requirement in multiple application areas and serves as a guide into emerging circuit technologies. It explores revolutionary device concepts, sensors, and associated circuits and architectures that will greatly extend the practical engineering limits of energy-efficient computation. The book responds to the need to develop disruptive new system architectures and semiconductor processes aimed at achieving the highest level of computational energy efficiency for general purpose computing systems. Discusses unique technologies and material only available in specialized journal and conferences. Covers emerging materials and device structures, such as ultra-low power technologies, nanoelectronics, and microsystem manufacturing. Explores semiconductor processing and manufacturing, device design, and performance. Contains practical applications in the engineering field, as well as graduate studies. Written by international experts from both academia and industry.
Distributed Artificial Intelligence (DAI) came to existence as an approach for solving complex learning, planning, and decision-making problems. When we talk about decision making, there may be some meta-heuristic methods where the problem solving may resemble like operation research. But exactly, it is not related completely to management research. The text examines representing and using organizational knowledge in DAI systems, dynamics of computational ecosystems, and communication-free interactions among rational agents. This publication takes a look at conflict-resolution strategies for nonhierarchical distributed agents, constraint-directed negotiation of resource allocations, and plans for multiple agents. Topics included plan verification, generation, and execution, negotiation operators, representation, network management problem, and conflict-resolution paradigms. The manuscript elaborates on negotiating task decomposition and allocation using partial global planning and mechanisms for assessing nonlocal impact of local decisions in distributed planning. The book will attract researchers and practitioners who are working in management and computer science, and industry persons in need of a beginner to advanced understanding of the basic and advanced concepts.
Exclusively covers interoperability of IoT systems in parallel with their use towards the development of smart systems Discusses the requirements of interoperability in smart IoT systems and their solutions Reviews IoT applications in different smart and intelligent systems Explores dealing with interoperability of heterogeneous participating devices Provides different case studies and open problems related to interoperability in IoT system
This book focuses on RFID (Radio Frequency Identification), IoT (Internet of Things), and WSN (Wireless Sensor Network). It includes contributions that discuss the security and privacy issues as well as the opportunities and applications that are tightly linked to sensitive infrastructures and strategic services. This book addresses the complete functional framework and workflow in IoT-enabled RFID systems and explores basic and high-level concepts. It is based on the latest technologies and covers the major challenges, issues, and advances in the field. It presents data acquisition and case studies related to data-intensive technologies in RFID-based IoT and includes WSN-based systems and their security. It can serve as a manual for those in the industry while also helping beginners to understand both the basic and advanced aspects of IoT-based RFID-related issues. This book can be a premier interdisciplinary platform for researchers, practitioners, and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered, and find solutions that have been adopted in the fields of IoT and analytics.
This up-to-date reference discusses important concepts of vehicular communication in intelligent transportation systems. Augmented Intelligence Toward Smart Vehicular Applications begins by discussing key objectives of intelligent transport systems and vehicular ad-hoc networks (VANETs). It then goes on to discuss challenges, applications and future trends in VANETs. The text focuses on the organization of artificial intelligence (AI) and aspects of deep learning algorithms, particularly multimodal transport. This book will serve as an ideal reference for graduate students and academic researchers in the field of electrical engineering, electronics and communication engineering and transportation engineering. Features In-depth coverage of Internet of Things (IoT) in vehicular applications Discussion on nn-vehicle sensor networks Implementation of mobile IP and migration of IPv6 Focus on the need of AI in smart vehicular applications Discussions on advanced concepts in the field of intelligent transport systems
D2D-based proximity service is a very hot topic with great commercial potential from an application standpoint. Unlike existing books which focus on D2D communications technologies, this book fills a gap by summarizing and analyzing the latest applications and research results in academic, industrial fields, and standardization. The authors present the architecture, fundamental issues, and applications in a D2D networking environment from both application and interdisciplinary points of view.
This book presents a collection of automated methods that are useful for different aspects of fault analysis in cryptography. The first part focuses on automated analysis of symmetric cipher design specifications, software implementations, and hardware circuits. The second part provides automated deployment of countermeasures. The third part provides automated evaluation of countermeasures against fault attacks. Finally, the fourth part focuses on automating fault attack experiments. The presented methods enable software developers, circuit designers, and cryptographers to test and harden their products.
This textbook teaches students techniques for the design of advanced digital systems using System-on-Chip (SoC) Field Programmable Gate Arrays (FPGAs). The author demonstrates design of custom hardware components for the FPGA fabric using VHDL, with implementation of custom hardware-software interfaces. Readers gain hands-on experience by writing programs and Linux device drivers in C to interact with custom hardware. This textbook enables laboratory experience in the design of custom digital systems using SoC FPGAs, emphasizing computational tasks such as digital signal processing, audio, or video processing.
This book discusses Change Management Impact Analysis and how this method is used to analysis the risks and benefits of a change management initiative when it pertains to obtaining critical insight into how the change management program budget should be allotted. The process also offers useful indicators for what areas within the system should be monitored during the change management process. This book presents theoretical analysis of practical implications and surveys, along with analysis. It covers the functions aimed at identifying various stakeholders associated with the software such as requirement component, design component, and class component. The book talks about the interrelationship between the change and the effects on the rest of the system and dives deeper to include the critical role that the analysis places on the existing multiple functions such as estimating the development costs, the project overhead costs, cost for the modification of the system, and system strength or detecting errors in the system during the process. Case studies are also included to help researchers and practitioners to absorb the material presented. This book is useful to graduate students, researchers, academicians, institutions, and professionals that interested in exploring the areas of Impact Analysis.
Parallel Computing for Data Science: With Examples in R, C++ and CUDA is one of the first parallel computing books to concentrate exclusively on parallel data structures, algorithms, software tools, and applications in data science. It includes examples not only from the classic "n observations, p variables" matrix format but also from time series, network graph models, and numerous other structures common in data science. The examples illustrate the range of issues encountered in parallel programming. With the main focus on computation, the book shows how to compute on three types of platforms: multicore systems, clusters, and graphics processing units (GPUs). It also discusses software packages that span more than one type of hardware and can be used from more than one type of programming language. Readers will find that the foundation established in this book will generalize well to other languages, such as Python and Julia.
This book focuses on a specialized branch of the vast domain of software engineering: component-based software engineering (CBSE). Component-Based Software Engineering: Methods and Metrics enhances the basic understanding of components by defining categories, characteristics, repository, interaction, complexity, and composition. It divides the research domain of CBSE into three major sub-domains: (1) reusability issues, (2) interaction and integration issues, and (3) testing and reliability issues. This book covers the state-of-the-art literature survey of at least 20 years in the domain of reusability, interaction and integration complexities, and testing and reliability issues of component-based software engineering. The aim of this book is not only to review and analyze the previous works conducted by eminent researchers, academicians, and organizations in the context of CBSE, but also suggests innovative, efficient, and better solutions. A rigorous and critical survey of traditional and advanced paradigms of software engineering is provided in the book. Features: In-interactions and Out-Interactions both are covered to assess the complexity. In the context of CBSE both white-box and black-box testing methods and their metrics are described. This work covers reliability estimation using reusability which is an innovative method. Case studies and real-life software examples are used to explore the problems and their solutions. Students, research scholars, software developers, and software designers or individuals interested in software engineering, especially in component-based software engineering, can refer to this book to understand the concepts from scratch. These measures and metrics can be used to estimate the software before the actual coding commences.
While aviation fatalities have thankfully fallen dramatically in recent years, the phenomena of complexity and cognitive bias have been shown to be factors in many accidents. An understanding of these phenomena promises to bring the fatality rate even lower, and a deeper understanding of commercial aircraft in the context of systems engineering will contribute to that trend. Systems Approach to the Design of Commercial Aircraft describes commercial aircraft from an advanced systems point of view, addressing complexity, cybersecurity, and systems architecting. In addition, it provides an explanation of systems engineering, describes how systems engineering forms a framework for commercial aircraft, covers how systems engineering and systems architecting relate to commercial aircraft, addresses complexity, and shows how humans fit into systems engineering and the importance for commercial aircraft. It goes onto present how cybersecurity plays an important role in the mix and how human interface fits in. The readership includes designers of aircraft, manufacturers, researchers, systems engineers, and students. Scott Jackson is a fellow of the International Council on Systems Engineering (INCOSE) and the author of Systems Engineering for Commercial Aircraft (1997 and 2015) in English and Chinese. Ricardo Moraes dos Santos is a senior systems engineer at EMBRAER S/A and an INCOSE Brazil chapter director. He works with Architecting process (Corporate) and is head of Cybersecurity and Safety (STPA Applications) at EMBRAER S/A.
Transforming Management Using Artificial Intelligence Techniques redefines management practices using artificial intelligence (AI) by providing a new approach. It offers a detailed, well-illustrated treatment of each topic with examples and case studies, and brings the exciting field to life by presenting a substantial and robust introduction to AI in a clear and concise manner. It provides a deeper understanding of how the relevant aspects of AI impact each other's efficacy for better output. It's a reliable and accessible one-step resource that introduces AI; presents a full examination of applications; provides an understanding of the foundations; examines education powered by AI, entertainment, home and service robots, healthcare re-imagined, predictive policing, space exploration; and so much more, all within the realm of AI. This book will feature: Uncovering new and innovative features of AI and how it can help in raising economic efficiency at both micro- and macro levels Both the literature and practical aspects of AI and its uses This book summarizing key concepts at the end of each chapter to assist reader comprehension Case studies of tried and tested approaches to resolutions of typical problems Ideal for both teaching and general-knowledge purposes. This book will also simply provide the topic of AI for the readers, aspiring researchers and practitioners involved in management and computer science, so they can obtain a high-level of understanding of AI and managerial applications.
Trust and Records in an Open Digital Environment explores issues that arise when digital records are entrusted to the cloud and will help professionals to make informed choices in the context of a rapidly changing digital economy. Showing that records need to ensure public trust, especially in the era of alternative truths, this volume argues that reliable resources, which are openly accessible from governmental institutions, e-services, archival institutions, digital repositories, and cloud-based digital archives, are the key to an open digital environment. The book also demonstrates that current established practices need to be reviewed and amended to include the networked nature of the cloud-based records, to investigate the role of new players, like cloud service providers (CSP), and assess the potential for implementing new, disruptive technologies like blockchain. Stancic and the contributors address these challenges by taking three themes - state, citizens, and documentary form - and discussing their interaction in the context of open government, open access, recordkeeping, and digital preservation. Exploring what is needed to enable the establishment of an open digital environment, Trust and Records in an Open Digital Environment should be essential reading for data, information, document, and records management professionals. It will also be a key text for archivists, librarians, professors, and students working in the information sciences and other related fields.
The PIC16F1847-Based PLC project supports up to 4 analog inputs and 1 analog output, 1 High Speed Counter, 2 PWM (pulse width modulation) outputs, 1 Drum Sequencer Instruction with up to 16 steps, the implementation of Sequential Function Charts (SFCs) with up to 24 steps. This volume presents advanced concepts of the PIC16F1847-Based PLC project and consists of topics like program control, high speed counter and PWM macros. It further explains memory related drum sequencer instruction, sequential functional charts, and analog input and output modules. Aimed at researchers and graduate students in electrical engineering, power electronics, robotics and automation, sensors, this book: Presents program control macros to enable or disable a block of PLC program or to move execution of a program from one place to another. Proposes a High-Speed Counter and four PWM Macros for high speed counting and PWM operations. Develops memory related macros to enable the user to do memory read/write operations. Provides a Drum Sequencer instruction with up to 16 steps and 16 outputs on each step. Discusses the implementation of Sequential Function Chart (SFC) elements with up to 24 steps.
Knowledge Architectures reviews traditional approaches to managing information and explains why they need to adapt to support 21st-century information management and discovery. Exploring the rapidly changing environment in which information is being managed and accessed, the book considers how to use knowledge architectures, the basic structures and designs that underlie all of the parts of an effective information system, to best advantage. Drawing on 40 years of work with a variety of organizations, Bedford explains that failure to understand the structure behind any given system can be the difference between an effective solution and a significant and costly failure. Demonstrating that the information user environment has shifted significantly in the past 20 years, the book explains that end users now expect designs and behaviors that are much closer to the way they think, work, and act. Acknowledging how important it is that those responsible for developing an information or knowledge management system understand knowledge structures, the book goes beyond a traditional library science perspective and uses case studies to help translate the abstract and theoretical to the practical and concrete. Explaining the structures in a simple and intuitive way and providing examples that clearly illustrate the challenges faced by a range of different organizations, Knowledge Architectures is essential reading for those studying and working in library and information science, data science, systems development, database design, and search system architecture and engineering.
Businesses today are faced with a highly competitive market and fast-changing technologies. In order to meet demanding customers' needs, they rely on high quality software. A new field of study, soft computing techniques, is needed to estimate the efforts invested in component-based software. Component-Based Systems: Estimating Efforts Using Soft Computing Techniques is an important resource that uses computer-based models for estimating efforts of software. It provides an overview of component-based software engineering, while addressing uncertainty involved in effort estimation and expert opinions. This book will also instruct the reader how to develop mathematical models. This book is an excellent source of information for students and researchers to learn soft computing models, their applications in software management, and will help software developers, managers, and those in the industry to apply soft computing techniques to estimate efforts.
"I highly recommend Mr. Hobbs' book." - Stephen Thomas, PE, Founder and Editor of FunctionalSafetyEngineer.com Safety-critical devices, whether medical, automotive, or industrial, are increasingly dependent on the correct operation of sophisticated software. Many standards have appeared in the last decade on how such systems should be designed and built. Developers, who previously only had to know how to program devices for their industry, must now understand remarkably esoteric development practices and be prepared to justify their work to external auditors. Embedded Software Development for Safety-Critical Systems discusses the development of safety-critical systems under the following standards: IEC 61508; ISO 26262; EN 50128; and IEC 62304. It details the advantages and disadvantages of many architectural and design practices recommended in the standards, ranging from replication and diversification, through anomaly detection to the so-called "safety bag" systems. Reviewing the use of open-source components in safety-critical systems, this book has evolved from a course text used by QNX Software Systems for a training module on building embedded software for safety-critical devices, including medical devices, railway systems, industrial systems, and driver assistance devices in cars. Although the book describes open-source tools for the most part, it also provides enough information for you to seek out commercial vendors if that's the route you decide to pursue. All of the techniques described in this book may be further explored through hundreds of learned articles. In order to provide you with a way in, the author supplies references he has found helpful as a working software developer. Most of these references are available to download for free.
This book gives an overview of best effort data and real-time multipath routing protocols in WMSN. It provides results of recent research in design issues affecting the development of strategic multipath routing protocols that support multimedia data traffic in WMSN from an IoT perspective, plus detailed analysis on the appropriate traffic models. |
You may like...
The System Designer's Guide to VHDL-AMS…
Peter J Ashenden, Gregory D. Peterson, …
Paperback
R2,281
Discovery Miles 22 810
Clean Architecture - A Craftsman's Guide…
Robert Martin
Paperback
(1)
Creativity in Computing and DataFlow…
Suyel Namasudra, Veljko Milutinovic
Hardcover
R4,204
Discovery Miles 42 040
Advances in Delay-Tolerant Networks…
Joel J. P. C. Rodrigues
Paperback
R4,669
Discovery Miles 46 690
|