0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (24)
  • R500+ (2,620)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design > General

Viruses, Hardware and Software Trojans - Attacks and Countermeasures (Hardcover, 1st ed. 2020): Anatoly Belous, Vitali Saladukha Viruses, Hardware and Software Trojans - Attacks and Countermeasures (Hardcover, 1st ed. 2020)
Anatoly Belous, Vitali Saladukha
R4,188 Discovery Miles 41 880 Ships in 18 - 22 working days

This book provides readers with a valuable reference on cyber weapons and, in particular, viruses, software and hardware Trojans. The authors discuss in detail the most dangerous computer viruses, software Trojans and spyware, models of computer Trojans affecting computers, methods of implementation and mechanisms of their interaction with an attacker - a hacker, an intruder or an intelligence agent. Coverage includes Trojans in electronic equipment such as telecommunication systems, computers, mobile communication systems, cars and even consumer electronics. The evolutionary path of development of hardware Trojans from "cabinets", "crates" and "boxes" to the microcircuits (IC) is also discussed. Readers will benefit from the detailed review of the major known types of hardware Trojans in chips, principles of their design, mechanisms of their functioning, methods of their introduction, means of camouflaging and detecting, as well as methods of protection and counteraction.

Parallel Supercomputing in MIMD Architectures (Hardcover): R.Michael Hord Parallel Supercomputing in MIMD Architectures (Hardcover)
R.Michael Hord
R7,910 Discovery Miles 79 100 Ships in 10 - 15 working days

Parallel Supercomputing in MIMD Architectures is devoted to supercomputing on a wide variety of Multiple-Instruction-Multiple-Data (MIMD)-class parallel machines. This book describes architectural concepts, commercial and research hardware implementations, major programming concepts, algorithmic methods, representative applications, and benefits and drawbacks. Commercial machines described include Connection Machine 5, NCUBE, Butterfly, Meiko, Intel iPSC, iPSC/2 and iWarp, DSP3, Multimax, Sequent, and Teradata. Research machines covered include the J-Machine, PAX, Concert, and ASP. Operating systems, languages, translating sequential programs to parallel, and semiautomatic parallelizing are aspects of MIMD software addressed in Parallel Supercomputing in MIMD Architectures. MIMD issues such as scalability, partitioning, processor utilization, and heterogenous networks are discussed as well.This book is packed with important information and richly illustrated with diagrams and tables, Parallel Supercomputing in MIMD Architectures is an essential reference for computer professionals, program managers, applications system designers, scientists, engineers, and students in the computer sciences.

Handbook of Communications Systems Management - 1999 Edition (Hardcover): Gilbert Held Handbook of Communications Systems Management - 1999 Edition (Hardcover)
Gilbert Held
R9,974 Discovery Miles 99 740 Ships in 10 - 15 working days

As a manager of the 90s, you know that IT departments like your own must continue to meet increasingly sophisticated end-user needs despite highly limited resources. Learn when it s best to farm out work to consultants, when to reserve internal resources for other tasks, and how best to use your in-house staff. Coverage unlike any other in the marketplace. Written by 41 experts all practitioners in the networking and IS management fields this guidebook provides unique depth and scope. In this Third Edition, you ll find all new material that clearly outlines today s hottest issues. Prepares you to quickly respond to management requirements. Are you aware of the latest on strategic planning, systems planning, and points-of-failure planning? Have you linked your IT architecture and business plans? Have you updated senior management as to how IT can help achieve corporate goals? Do you have a corporate technology plan? Turn to the Handbook for all this and more. Now you can get up to speed on the latest in client/server, on how to give your end users faster and greater access to corporate data at a lower cost, and on how to quantify the amount of network support that this improvement will require? The Handbook was written with you in mind. The perfect resource for today s successful communications systems manager. This comprehensive, highly authoritative reference is designed to help you select, maintain, and manage your communications systems. It provides all the tools you need to evaluate, formulate, and implement effective communications network strategies to keep pace with today s rapidly changing technology. You get illustrations, tables, and diagrams to clearly outline and guide you the entire way. Be aware of the latest technologies and their impact on you. Keep costs down by aiding your thinking through all the systems and network elements from concept through implementation and day-to-day operation.

The Network Manager's Handbook - 1999 (Hardcover): John Lusa The Network Manager's Handbook - 1999 (Hardcover)
John Lusa
R7,933 Discovery Miles 79 330 Ships in 10 - 15 working days

This essential handbook for the data communications/network manager and planner covers a variety of data communication and IS topics. The Network Manager's Handbook addresses technical issues associated with local and wide area networking, purchasing communications services, supporting the network's users, understanding the telecommunications regulatory environment, personnel issues, and more.

Handbook of Server Management and Administration - 1999 (Hardcover): Kristin B. Marks Handbook of Server Management and Administration - 1999 (Hardcover)
Kristin B. Marks
R7,926 Discovery Miles 79 260 Ships in 10 - 15 working days

Servers are the heart of the network. The Handbook of Server Management and Administration keeps you up-to-date with the very latest server technology and gives you the tools you need to choose, configure and maintain a server that will serve users, data streams and corporate goals with equal efficiency. The practical tips and case studies you'll find in the Handbook include detailed explanations of: the case for mainframe servers in the enterprise server installation considerations server security policies server data bus standards migrating to NetWare 4.1 and Novell Directory Services Windows NT Workstation vs. Server 4.0 UNIX as an application server fax servers Internet e-mail servers the art of placing images and multimedia on the corporate network and more! The contributing authors to the Handbook of Server Management and Administration are industry experts. Some work at corporations that have designed innovative solutions. Some wear battle scars from the field. Many are experienced writers and public speakers. All of them know what they're talking about. These leading authorities give you a wealth of practical advice, tips and strategies on how to: evaluate anti-virus solutions within distributed environments set up fault tolerance protection and RAID technology for networks choose the best network data and storage management techniques

Trust & Fault in Multi Layered Cloud Computing Architecture (Hardcover, 1st ed. 2020): Punit Gupta, Pradeep Kumar Gupta Trust & Fault in Multi Layered Cloud Computing Architecture (Hardcover, 1st ed. 2020)
Punit Gupta, Pradeep Kumar Gupta
R2,665 Discovery Miles 26 650 Ships in 18 - 22 working days

This book discusses various aspects of cloud computing, in which trust and fault-tolerance models are included in a multilayered, cloud architecture. The authors present a variety of trust and fault models used in the cloud, comparing them based on their functionality and the layer in the cloud to which they respond. Various methods are discussed that can improve the performance of cloud architectures, in terms of trust and fault-tolerance, while providing better performance and quality of service to user. The discussion also includes new algorithms that overcome drawbacks of existing methods, using a performance matrix for each functionality. This book provide readers with an overview of cloud computing and how trust and faults in cloud datacenters affects the performance and quality of service assured to the users. Discusses fundamental issues related to trust and fault-tolerance in Cloud Computing; Describes trust and fault management techniques in multi layered cloud architecture to improve security, reliability and performance of the system; Includes methods to enhance power efficiency and network efficiency, using trust and fault based resource allocation.

Simulation of Local Area Networks (Hardcover): Matthew N.O Sadiku Simulation of Local Area Networks (Hardcover)
Matthew N.O Sadiku
R5,765 Discovery Miles 57 650 Ships in 10 - 15 working days

A fast-growing area in the communications industry is the internetworking of an ever-increasing proliferation of computers, particularly via local area networks (LANs). The LAN is a resource-sharing data communications network being used by many offices to interchange information such as electronic mail, word processing, and files among computers and other devices. This unique book shows the user how to establish the performance characteristics of a LAN before putting it to use in a particular type of situation. Simulation of Local Area Networks consists of eight chapters, each with its own extensive list of references. The first chapter provides a brief review of local area networks, and the second chapter gives the analytical models of popular LANs-token-passing bus and ring networks, CSMA/CD LANs, and star networks. Chapter 3 covers general principles of simulation, and Chapter 4 discusses fundamental concepts in probability and statistics relating to simulation modeling. Materials in Chapters 3 and 4 are specifically applied in developing simulation models on token-passing LANs, CSMA/CD LANs, and star LANs in Chapters 5 through 7. The computer code in Chapters 5, 6, and 7 is divided into segments, and a detailed explanation of each segment is provided. The last chapter reviews special-purpose languages such as GPSS, SIMSCRIPT, GASP, SIMULA, SLAM, and RESQ. Helpful criteria for language selection are included. The entire code is put together in the appendixes. This book has two major advantages over existing texts. First, it uses C, a well-developed general-purpose language that is familiar to most analysts. Second, the text specifically applies the simulation principles to local area networks. No other book available shows the systems analyst how to evaluate the performance of existing or proposed systems under different kinds of conditions.

Principles and Structures of FPGAs (Hardcover, 1st ed. 2018): Hideharu Amano Principles and Structures of FPGAs (Hardcover, 1st ed. 2018)
Hideharu Amano
R4,957 Discovery Miles 49 570 Ships in 10 - 15 working days

This comprehensive textbook on the field programmable gate array (FPGA) covers its history, fundamental knowledge, architectures, device technologies, computer-aided design technologies, design tools, examples of application, and future trends. Programmable logic devices represented by FPGAs have been rapidly developed in recent years and have become key electronic devices used in most IT products. This book provides both complete introductions suitable for students and beginners, and high-level techniques useful for engineers and researchers in this field. Differently developed from usual integrated circuits, the FPGA has unique structures, design methodologies, and application techniques. Allowing programming by users, the device can dramatically reduce the rising cost of development in advanced semiconductor chips. The FPGA is now driving the most advanced semiconductor processes and is an all-in-one platform combining memory, CPUs, and various peripheral interfaces. This book introduces the FPGA from various aspects for readers of different levels. Novice learners can acquire a fundamental knowledge of the FPGA, including its history, from Chapter 1; the first half of Chapter 2; and Chapter 4. Professionals who are already familiar with the device will gain a deeper understanding of the structures and design methodologies from Chapters 3 and 5. Chapters 6-8 also provide advanced techniques and cutting-edge applications and trends useful for professionals. Although the first parts are mainly suitable for students, the advanced sections of the book will be valuable for professionals in acquiring an in-depth understanding of the FPGA to maximize the performance of the device.

Advanced Simulation and Test Methodologies for VLSI Design (Hardcover, 1989 ed.): G. Russell, I.L. Sayers Advanced Simulation and Test Methodologies for VLSI Design (Hardcover, 1989 ed.)
G. Russell, I.L. Sayers
R4,221 Discovery Miles 42 210 Ships in 18 - 22 working days
The Dialogical Roots of Deduction - Historical, Cognitive, and Philosophical Perspectives on Reasoning (Paperback): Catarina... The Dialogical Roots of Deduction - Historical, Cognitive, and Philosophical Perspectives on Reasoning (Paperback)
Catarina Dutilh Novaes
R811 Discovery Miles 8 110 Ships in 10 - 15 working days

This comprehensive account of the concept and practices of deduction is the first to bring together perspectives from philosophy, history, psychology and cognitive science, and mathematical practice. Catarina Dutilh Novaes draws on all of these perspectives to argue for an overarching conceptualization of deduction as a dialogical practice: deduction has dialogical roots, and these dialogical roots are still largely present both in theories and in practices of deduction. Dutilh Novaes' account also highlights the deeply human and in fact social nature of deduction, as embedded in actual human practices; as such, it presents a highly innovative account of deduction. The book will be of interest to a wide range of readers, from advanced students to senior scholars, and from philosophers to mathematicians and cognitive scientists.

Fundamentals of Modern Electric Circuit Analysis and Filter Synthesis - A Transfer Function Approach (Hardcover, 2nd ed. 2023):... Fundamentals of Modern Electric Circuit Analysis and Filter Synthesis - A Transfer Function Approach (Hardcover, 2nd ed. 2023)
Afshin Izadian
R2,502 Discovery Miles 25 020 Ships in 18 - 22 working days

This textbook explains the fundamentals of electric circuits and uses the transfer function as a tool to analyze circuits, systems, and filters. The author avoids the Fourier transform, since this topic is often not taught in circuits courses. General transfer functions for low pass, high pass, band pass and band reject filters are demonstrated, with first order and higher order filters explained in plain language. The author's presentation is designed to be accessible to a broad audience, with the concepts of circuit analysis explained in basic language, reinforced by numerous, solved examples.

Smart Sensors Networks - Communication Technologies and Intelligent Applications (Paperback): Fatos Xhafa, Fang-Yie Leu,... Smart Sensors Networks - Communication Technologies and Intelligent Applications (Paperback)
Fatos Xhafa, Fang-Yie Leu, Li-Ling Hung
R2,842 R2,647 Discovery Miles 26 470 Save R195 (7%) Ships in 10 - 15 working days

Smart Sensors Networks: Communication Technologies and Intelligent Applications explores the latest sensor and sensor networks techniques and applications, showing how networked wireless sensors are used to monitor and gather intelligence from our surrounding environment. It provides a systematic look at the unique characteristics of wireless sensor networks through their usage in a broad range of areas, including healthcare for the elderly, energy consumption, industrial automation, intelligent transportation systems, smart homes and cities, and more. The book shows how sensor-networks work and how they are applied to monitor our surrounding environment. It explores the most important aspects of modern sensors technologies, providing insights on the newest technologies and the systems needed to operate them. Readers will find the book to be an entry point for understanding the fundamental differences between the various sensor technologies and their use in for different scenarios. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS

Network and Data Security for Non-Engineers (Hardcover): Frank M. Groom, Kevin Groom, Stephan S. Jones Network and Data Security for Non-Engineers (Hardcover)
Frank M. Groom, Kevin Groom, Stephan S. Jones
R5,351 Discovery Miles 53 510 Ships in 10 - 15 working days

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.

The End of Error - Unum Computing (Hardcover): John L. Gustafson The End of Error - Unum Computing (Hardcover)
John L. Gustafson
R5,795 Discovery Miles 57 950 Ships in 10 - 15 working days

The Future of Numerical Computing Written by one of the foremost experts in high-performance computing and the inventor of Gustafson's Law, The End of Error: Unum Computing explains a new approach to computer arithmetic: the universal number (unum). The unum encompasses all IEEE floating-point formats as well as fixed-point and exact integer arithmetic. This new number type obtains more accurate answers than floating-point arithmetic yet uses fewer bits in many cases, saving memory, bandwidth, energy, and power. A Complete Revamp of Computer Arithmetic from the Ground Up Richly illustrated in color, this groundbreaking book represents a fundamental change in how to perform calculations automatically. It illustrates how this novel approach can solve problems that have vexed engineers and scientists for decades, including problems that have been historically limited to serial processing. Suitable for Anyone Using Computers for Calculations The book is accessible to anyone who uses computers for technical calculations, with much of the book only requiring high school math. The author makes the mathematics interesting through numerous analogies. He clearly defines jargon and uses color-coded boxes for mathematical formulas, computer code, important descriptions, and exercises.

Building an Information Security Awareness Program (Hardcover): Mark B. Desman Building an Information Security Awareness Program (Hardcover)
Mark B. Desman
R5,068 Discovery Miles 50 680 Ships in 10 - 15 working days

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.

Securing and Controlling Cisco Routers (Hardcover): Peter T. Davis Securing and Controlling Cisco Routers (Hardcover)
Peter T. Davis
R5,130 Discovery Miles 51 300 Ships in 10 - 15 working days

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.

Network and Application Security - Fundamentals and Practices (Hardcover): Debashis Ganguly Network and Application Security - Fundamentals and Practices (Hardcover)
Debashis Ganguly
R5,758 Discovery Miles 57 580 Ships in 10 - 15 working days

To deal with security issues effectively, knowledge of theories alone is not sufficient. Practical experience is essential. Helpful for beginners and industry practitioners, this book develops a concrete outlook, providing readers with basic concepts and an awareness of industry standards and best practices. Chapters address cryptography and network security, system-level security, and applications for network security. The book also examines application level attacks, practical software security, and securing application-specific networks. Ganguly Debashis speaks about Network and Application Security

Ethical Hacking and Penetration Testing Guide (Hardcover): Rafay Baloch Ethical Hacking and Penetration Testing Guide (Hardcover)
Rafay Baloch
R5,353 Discovery Miles 53 530 Ships in 10 - 15 working days

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don't know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.

Communication Architectures for Systems-on-Chip (Paperback): Jose L. Ayala Communication Architectures for Systems-on-Chip (Paperback)
Jose L. Ayala
R2,287 Discovery Miles 22 870 Ships in 10 - 15 working days

A presentation of state-of-the-art approaches from an industrial applications perspective, Communication Architectures for Systems-on-Chip shows professionals, researchers, and students how to attack the problem of data communication in the manufacture of SoC architectures. With its lucid illustration of current trends and research improving the performance, quality, and reliability of transactions, this is an essential reference for anyone dealing with communication mechanisms for embedded systems, systems-on-chip, and multiprocessor architectures-or trying to overcome existing limitations. Exploring architectures currently implemented in manufactured SoCs-and those being proposed-this book analyzes a wide range of applications, including: Well-established communication buses Less common networks-on-chip Modern technologies that include the use of carbon nanotubes (CNTs) Optical links used to speed up data transfer and boost both security and quality of service (QoS) The book's contributors pay special attention to newer problems, including how to protect transactions of critical on-chip information (personal data, security keys, etc.) from an external attack. They examine mechanisms, revise communication protocols involved, and analyze overall impact on system performance.

Op Amps: Design, Application, and Troubleshooting (Paperback, 2nd edition): David Terrell Op Amps: Design, Application, and Troubleshooting (Paperback, 2nd edition)
David Terrell
R3,127 Discovery Miles 31 270 Ships in 18 - 22 working days

OP Amps deliberately straddles that imaginary line between the technician and engineering worlds. Topics are carefully addressed on three levels: operational overview, numerical analysis, and design procedures. Troubleshooting techniques are presented that rely on the application of fundamental electronics principles. Systematic methods are shown that can be used to diagnose defects in many kinds of circuits that employ operational amplifiers.
One of the book's greatest strengths is the easy-to-read conversational
writing style. The author speaks directly to the student in a manner that encourages learning. This book explains the technical details of operational amplifier circuits in clear and understandable language without sacrificing technical depth.
Easy-to-read conversational style communicates procedures an technical details in simple language.
Three levels of technical material: operational overview, manericall analysis, and design procedures.
Mathematics limited to algebraic manipulation.

Designing Green Networks and Network Operations - Saving Run-the-Engine Costs (Paperback): Daniel Minoli Designing Green Networks and Network Operations - Saving Run-the-Engine Costs (Paperback)
Daniel Minoli
R2,287 Discovery Miles 22 870 Ships in 10 - 15 working days

In recent years, socio-political trends toward environmental responsibility and the pressing need to reduce Run-the-Engine (RTE) costs have resulted in the concept of Green IT. Although a significant amount of energy is used to operate routing, switching, and transmission equipment, comparatively less attention has been paid to Green Networking. A clear and concise introduction to green networks and green network operations, Designing Green Networks and Network Operations: Saving Run-the-Engine Costs guides you through the techniques available to achieve efficiency goals for corporate and carrier networks, including deploying more efficient hardware, blade form-factor routers and switches, and pursuing consolidation, virtualization, and network and cloud computing. The book: Delineates techniques to minimize network power, cooling, floor space, and online storage while optimizing service performance, capacity, and availability Discusses virtualization, network computing, and Web services as approaches for green data centers and networks Emphasizes best practices and compliance with international standards for green operations Extends the green data center techniques to the networking environment Incorporates green principles in the intranet, extranet, and the entire IT infrastructures Reviews networking, power management, HVAC and CRAC basics Presents methodical steps toward a seamless migration to Green IT and Green Networking

Location-Based Services Handbook - Applications, Technologies, and Security (Paperback): Syed Ahson, Mohammad Ilyas Location-Based Services Handbook - Applications, Technologies, and Security (Paperback)
Syed Ahson, Mohammad Ilyas
R2,270 Discovery Miles 22 700 Ships in 10 - 15 working days

Location-Based Services Handbook: Applications, Technologies, and Security is a comprehensive reference containing all aspects of essential technical information on location-based services (LBS) technology. With broad coverage ranging from basic concepts to research-grade material, it presents a much-needed overview of technologies for positioning and localizing, including range- and proximity-based localization methods, and environment-based location estimation methods. Featuring valuable contributions from field experts around the world, this book addresses existing and future directions of LBS technology, exploring how it can be used to optimize resource allocation and improve cooperation in wireless networks. It is a self-contained, comprehensive resource that presents: A detailed description of the wireless location positioning technology used in LBS Coverage of the privacy and protection procedure for cellular networks-and its shortcomings An assessment of threats presented when location information is divulged to unauthorized parties Important IP Multimedia Subsystem and IMS-based presence service proposals The demand for navigation services is predicted to rise by a combined annual growth rate of more than 104 percent between 2008 and 2012, and many of these applications require efficient and highly scalable system architecture and system services to support dissemination of location-dependent resources and information to a large and growing number of mobile users. This book offers tools to aid in determining the optimal distance measurement system for a given situation by assessing factors including complexity, accuracy, and environment. It provides an extensive survey of existing literature and proposes a novel, widely applicable, and highly scalable architecture solution. Organized into three major sections-applications, technologies, and security-this material fully covers various location-based applications and the impact they will have on the future.

Energy Efficient Hardware-Software Co-Synthesis Using Reconfigurable Hardware (Paperback): Jingzhao Ou, Viktor K. Prasanna Energy Efficient Hardware-Software Co-Synthesis Using Reconfigurable Hardware (Paperback)
Jingzhao Ou, Viktor K. Prasanna
R2,343 Discovery Miles 23 430 Ships in 10 - 15 working days

Rapid energy estimation for energy efficient applications using field-programmable gate arrays (FPGAs) remains a challenging research topic. Energy dissipation and efficiency have prevented the widespread use of FPGA devices in embedded systems, where energy efficiency is a key performance metric. Helping overcome these challenges, Energy Efficient Hardware-Software Co-Synthesis Using Reconfigurable Hardware offers solutions for the development of energy efficient applications using FPGAs. The book integrates various high-level abstractions for describing hardware and software platforms into a single, consistent application development framework, enabling users to construct, simulate, and debug systems. Based on these high-level concepts, it proposes an energy performance modeling technique to capture the energy dissipation behavior of both the reconfigurable hardware platform and the target applications running on it. The authors also present a dynamic programming-based algorithm to optimize the energy performance of an application running on a reconfigurable hardware platform. They then discuss an instruction-level energy estimation technique and a domain-specific modeling technique to provide rapid and fairly accurate energy estimation for hardware-software co-designs using reconfigurable hardware. The text concludes with example designs and illustrative examples that show how the proposed co-synthesis techniques lead to a significant amount of energy reduction. This book explores the advantages of using reconfigurable hardware for application development and looks ahead to future research directions in the field. It outlines the range of aspects and steps that lead to an energy efficient hardware-software application synthesis using FPGAs.

Synchronization and Control of Multiagent Systems (Paperback): Dong Sun Synchronization and Control of Multiagent Systems (Paperback)
Dong Sun
R2,400 Discovery Miles 24 000 Ships in 10 - 15 working days

Multiple intelligent agent systems are commonly used in research requiring complex behavior. Synchronization control provides an advantage in solving the problem of multi-agent coordination. This book focuses on the use of synchronization control to coordinate the group behavior of multiple agents. The author includes numerous real-world application examples from robotics, automation, and advanced manufacturing. Giving a detailed look at cross-coupling based synchronization control, the text covers such topics as adaptive synchronization control, synchronous tracking control of parallel manipulators, and minimization of contouring errors of CNC machine tools with synchronization controls.

Energy-Aware Memory Management for Embedded Multimedia Systems - A Computer-Aided Design Approach (Paperback): Florin Balasa,... Energy-Aware Memory Management for Embedded Multimedia Systems - A Computer-Aided Design Approach (Paperback)
Florin Balasa, Dhiraj K. Pradhan
R2,303 Discovery Miles 23 030 Ships in 10 - 15 working days

Energy-Aware Memory Management for Embedded Multimedia Systems: A Computer-Aided Design Approach presents recent computer-aided design (CAD) ideas that address memory management tasks, particularly the optimization of energy consumption in the memory subsystem. It explains how to efficiently implement CAD solutions, including theoretical methods and novel algorithms. The book covers various energy-aware design techniques, including data-dependence analysis techniques, memory size estimation methods, extensions of mapping approaches, and memory banking approaches. It shows how these techniques are used to evaluate the data storage of an application, reduce dynamic and static energy consumption, design energy-efficient address generation units, and much more. Providing an algebraic framework for memory management tasks, this book illustrates how to optimize energy consumption in memory subsystems using CAD solutions. The algorithmic style of the text should help electronic design automation (EDA) researchers and tool developers create prototype software tools for system-level exploration, with the goal to ultimately obtain an optimized architectural solution of the memory subsystem.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Arizona's Amphibians & Reptiles - A…
John C. Murphy Hardcover R1,685 Discovery Miles 16 850
Love Letters to Water - An Anthology
Claudiu Murgan Hardcover R865 R744 Discovery Miles 7 440
Ponds and small lakes - Microorganisms…
Brian Moss Paperback R803 Discovery Miles 8 030
A Theology of Criticism - Balthasar…
Michael P. Murphy Hardcover R2,804 Discovery Miles 28 040
Call To Adventure - Expanded Compendium…
Jerry Joe Seltzer Hardcover R656 Discovery Miles 6 560
Lake Kolleru - Environmental Status…
Y. Anjaneyulu Hardcover R1,505 R1,303 Discovery Miles 13 030
Silver Springs - The Liquid Heart of…
Robert L. Knight, Marian Rizzo Hardcover R998 Discovery Miles 9 980
Miraculous Images and Votive Offerings…
Frank Graziano Hardcover R3,574 Discovery Miles 35 740
The Misadventures of a Cross-America…
Hank Landau Hardcover R644 Discovery Miles 6 440
Along the Calumet River
Cynthia L Ogorek Hardcover R719 R638 Discovery Miles 6 380

 

Partners