![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design > General
The fourth in the "Inside" series, this volume includes four theses
completed under the editor's direction at the Institute for the
Learning Sciences at Northwestern University. This series bridges
the gap between Schank's books introducing (for a popular audience)
the theories behind his work in artificial intelligence (AI) and
the many articles and books written by Schank and other AI
researchers for their colleagues and students. The series will be
of interest to graduate students in AI and professionals in other
academic fields who seek the retraining necessary to join the AI
effort or to understand it at the professional level.
The fourth in the "Inside" series, this volume includes four theses
completed under the editor's direction at the Institute for the
Learning Sciences at Northwestern University. This series bridges
the gap between Schank's books introducing (for a popular audience)
the theories behind his work in artificial intelligence (AI) and
the many articles and books written by Schank and other AI
researchers for their colleagues and students. The series will be
of interest to graduate students in AI and professionals in other
academic fields who seek the retraining necessary to join the AI
effort or to understand it at the professional level.
Classical and Fuzzy Concepts in Mathematical Logic and Applications provides a broad, thorough coverage of the fundamentals of two-valued logic, multivalued logic, and fuzzy logic. Exploring the parallels between classical and fuzzy mathematical logic, the book examines the use of logic in computer science, addresses questions in automatic deduction, and describes efficient computer implementation of proof techniques. Specific issues discussed include: oPropositional and predicate logic oLogic networks oLogic programming oProof of correctness oSemantics oSyntax oCompletenesss oNon-contradiction oTheorems of Herbrand and Kalman The authors consider that the teaching of logic for computer science is biased by the absence of motivations, comments, relevant and convincing examples, graphic aids, and the use of color to distinguish language and metalanguage. Classical and Fuzzy Concepts in Mathematical Logic and Applications discusses how the presence of these facts trigger a stirring, decisive insight into the understanding process. This view shapes this work, reflecting the authors' subjective balance between the scientific and pedagogic components of the textbook. Usually, problems in logic lack relevance, creating a gap between classroom learning and applications to real-life problems. The book includes a variety of application-oriented problems at the end of almost every section, including programming problems in PROLOG III. With the possibility of carrying out proofs with PROLOG III and other software packages, readers will gain a first-hand experience and thus a deeper understanding of the idea of formal proof.
Provides a readily accessible introduction to the analysis and design of digital circuits at a logic instead of electronics level. Second Edition features a new and improved arrangement of chapters, a balance of theoretical and practical implementation aspects and in-text examples in each chapter, 21 experiments using standard TTL type of ICs, updated end-of-chapter problems with answers to selected problems (answers provided in a Solutions Manual for Instructors only), and more.
This textbook serves as an introduction to fault-tolerance, intended for upper-division undergraduate students, graduate-level students and practicing engineers in need of an overview of the field. Readers will develop skills in modeling and evaluating fault-tolerant architectures in terms of reliability, availability and safety. They will gain a thorough understanding of fault tolerant computers, including both the theory of how to design and evaluate them and the practical knowledge of achieving fault-tolerance in electronic, communication and software systems. Coverage includes fault-tolerance techniques through hardware, software, information and time redundancy. The content is designed to be highly accessible, including numerous examples and exercises. Solutions and powerpoint slides are available for instructors.
This book gives a solution to the problem of constructing lightwave paths in free spaces by proposing the concept of a Self-Organized Lightwave Network (SOLNET). This concept enables us to form self-aligned coupling optical waveguides automatically. SOLNETs are fabricated by self-focusing of lightwaves in photosensitive media, in which the refractive index increases upon light beam exposure, to realize the following functions: 1) Optical solder: Self-aligned optical couplings between misaligned devices with different core sizes 2) Three-dimensional optical wiring 3) Targeting lightwaves onto specific objects SOLNETs are expected to reduce the efforts to implement lightwaves into electronic systems and allow us to create new architectures, thus reducing costs and energy dissipation and improving overall system performance. SOLNETs are also expected to be applied to a wide range of fields where lightwaves are utilized, for example, solar energy conversion systems and biomedical technologies, especially photo-assisted cancer therapies. Readers will systematically learn concepts and features of SOLNETs, SOLNET performance predicted by computer simulations, experimental demonstrations for the proof of concepts, and expected applications. They will also be prepared for future challenges of the applications. This book is intended to be read by scientists, engineers, and graduate students who study advanced optoelectronic systems such as optical interconnects within computers and optical networking systems, and those who produce new ideas or strategies on lightwave-related subjects.
Neural Network Analysis, Architectures and Applications discusses the main areas of neural networks, with each authoritative chapter covering the latest information from different perspectives. Divided into three parts, the book first lays the groundwork for understanding and simplifying networks. It then describes novel architectures and algorithms, including pulse-stream techniques, cellular neural networks, and multiversion neural computing. The book concludes by examining various neural network applications, such as neuron-fuzzy control systems and image compression. This final part of the book also provides a case study involving oil spill detection. This book is invaluable for students and practitioners who have a basic understanding of neural computing yet want to broaden and deepen their knowledge of the field.
Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory exercises for each key concept. The book is ideal as a textbook for upper-level undergraduate students studying computer engineering, computer science, electrical engineering, and biomedical engineering, but is also a handy reference for graduate students, researchers and industry professionals. For academic courses, the book contains a robust suite of teaching ancillaries. Users will be able to access schematic, layout and design files for a printed circuit board for hardware hacking (i.e. the HaHa board) that can be used by instructors to fabricate boards, a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials.
We are crossing a new frontier in the evolution of computing and entering the era of cognitive systems. The victory of IBM's Watson on the television quiz show Jeopardy! revealed how scientists and engineers at IBM and elsewhere are pushing the boundaries of science and technology to create machines that sense, learn, reason, and interact with people in new ways to provide insight and advice. In Smart Machines, John E. Kelly III, director of IBM Research, and Steve Hamm, a writer at IBM and a former business and technology journalist, introduce the fascinating world of "cognitive systems" to general audiences and provide a window into the future of computing. Cognitive systems promise to penetrate complexity and assist people and organizations in better decision making. They can help doctors evaluate and treat patients, augment the ways we see, anticipate major weather events, and contribute to smarter urban planning. Kelly and Hamm's comprehensive perspective describes this technology inside and out and explains how it will help us conquer the harnessing and understanding of "big data," one of the major computing challenges facing businesses and governments in the coming decades. Absorbing and impassioned, their book will inspire governments, academics, and the global tech industry to work together to power this exciting wave in innovation.
Based on a symposium honoring the extensive work of Allen Newell --
one of the founders of artificial intelligence, cognitive science,
human-computer interaction, and the systematic study of
computational architectures -- this volume demonstrates how
unifying themes may be found in the diversity that characterizes
current research on computers and cognition. The subject matter
includes:
BTEC National for IT Practitioners: Systems Units has been written specifically to cover the systems pathway of the BTEC National specifications. This book caters for one of the most popular pathways in the BTEC National specifications, bringing together all the key specialist units for students who have chosen the systems route, including the core units specific to this pathway that aren't covered in the core unit book. When used alongside its companions for the core units and business pathways, this series delivers the most accessible and usable student textbooks available for the BTEC National. Units covered: Unit 11 - Data Analysis and Design Unit 22 - Network Management Unit 13 - Human Computer Interaction Unit 28 - IT Technical Support Unit 16 - Maintaining Computer Systems Unit 29 - IT Systems Troubleshooting and Repair Written by an experienced tutor, each unit is illustrated with assessment activities, end-of-chapter questions, case studies and practical exercises. The result is a clear, straightforward textbook that encourages independent study and acts as a reference to various topics within the qualification.
Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network. It starts with a review of the major components of the TCP/IP protocol suite, as well as IP and MAC addressing, to provide a clear understanding of the various networking tools and how they are used in a LAN and a TCP/IP networking environment. Although the book focuses on built-in Windows networking tools, it also investigates a number of third-party products that can enhance the performance of your computer. It identifies tools to help you to understand the traffic flow and operational status of your network , illustrates the use of numerous tools, and shows you several methods to protect your computers from malicious software. It also examines one of the best programs for examining the flow of data on a network Wireshark and explains how to use this program to scan for open ports and discover vulnerability issues. In addition to helping you gain insight into existing problems, the text highlights built-in Windows networking tools that can help to determine if you can expect future bandwidth bottlenecks or other problems to occur under different growth scenarios. Placing the proven methods of an industry veteran at your fingertips, the book includes a chapter devoted to software programs that can enhance the security of your network. It explains how to negate the operation of unwanted advertisement trackers as well as how to minimize and alleviate the various types of hacking from keyboard loggers to network viruses. In the event your computational device is lost or stolen a cryptographic program is described that results in data becoming meaningless to the person or persons attempting to read your
Written by high performance computing (HPC) experts, Introduction to High Performance Computing for Scientists and Engineers provides a solid introduction to current mainstream computer architecture, dominant parallel programming models, and useful optimization strategies for scientific HPC. From working in a scientific computing center, the authors gained a unique perspective on the requirements and attitudes of users as well as manufacturers of parallel computers. The text first introduces the architecture of modern cache-based microprocessors and discusses their inherent performance limitations, before describing general optimization strategies for serial code on cache-based architectures. It next covers shared- and distributed-memory parallel computer architectures and the most relevant network topologies. After discussing parallel computing on a theoretical level, the authors show how to avoid or ameliorate typical performance problems connected with OpenMP. They then present cache-coherent non-uniform memory access (ccNUMA) optimization techniques, examine distributed-memory parallel programming with message passing interface (MPI), and explain how to write efficient MPI code. The final chapter focuses on hybrid programming with MPI and OpenMP. Users of high performance computers often have no idea what factors limit time to solution and whether it makes sense to think about optimization at all. This book facilitates an intuitive understanding of performance limitations without relying on heavy computer science knowledge. It also prepares readers for studying more advanced literature. Read about the authors' recent honor: Informatics Europe Curriculum Best Practices Award for Parallelism and Concurrency.
A fast-growing area in the communications industry is the internetworking of an ever-increasing proliferation of computers, particularly via local area networks (LANs). The LAN is a resource-sharing data communications network being used by many offices to interchange information such as electronic mail, word processing, and files among computers and other devices. This unique book shows the user how to establish the performance characteristics of a LAN before putting it to use in a particular type of situation. Simulation of Local Area Networks consists of eight chapters, each with its own extensive list of references. The first chapter provides a brief review of local area networks, and the second chapter gives the analytical models of popular LANs-token-passing bus and ring networks, CSMA/CD LANs, and star networks. Chapter 3 covers general principles of simulation, and Chapter 4 discusses fundamental concepts in probability and statistics relating to simulation modeling. Materials in Chapters 3 and 4 are specifically applied in developing simulation models on token-passing LANs, CSMA/CD LANs, and star LANs in Chapters 5 through 7. The computer code in Chapters 5, 6, and 7 is divided into segments, and a detailed explanation of each segment is provided. The last chapter reviews special-purpose languages such as GPSS, SIMSCRIPT, GASP, SIMULA, SLAM, and RESQ. Helpful criteria for language selection are included. The entire code is put together in the appendixes. This book has two major advantages over existing texts. First, it uses C, a well-developed general-purpose language that is familiar to most analysts. Second, the text specifically applies the simulation principles to local area networks. No other book available shows the systems analyst how to evaluate the performance of existing or proposed systems under different kinds of conditions.
Microprocessors and Microcomputer-Based System Design, Second Edition, builds on the concepts of the first edition. It discusses the basics of microprocessors, various 32-bit microprocessors, the 8085 microprocessor, the fundamentals of peripheral interfacing, and Intel and Motorola microprocessors. This edition includes new topics such as floating-point arithmetic, Program Array Logic, and flash memories. It covers the popular Intel 80486/80960 and Motorola 68040 as well as the Pentium and PowerPC microprocessors. The final chapter presents system design concepts, applying the design principles covered in previous chapters to sample problems.
Composed of three sections, this book presents the most popular
training algorithm for neural networks: backpropagation. The first
section presents the theory and principles behind backpropagation
as seen from different perspectives such as statistics, machine
learning, and dynamical systems. The second presents a number of
network architectures that may be designed to match the general
concepts of Parallel Distributed Processing with backpropagation
learning. Finally, the third section shows how these principles can
be applied to a number of different fields related to the cognitive
sciences, including control, speech recognition, robotics, image
processing, and cognitive psychology. The volume is designed to
provide both a solid theoretical foundation and a set of examples
that show the versatility of the concepts. Useful to experts in the
field, it should also be most helpful to students seeking to
understand the basic principles of connectionist learning and to
engineers wanting to add neural networks in general -- and
backpropagation in particular -- to their set of problem-solving
methods.
Composed of three sections, this book presents the most popular
training algorithm for neural networks: backpropagation. The first
section presents the theory and principles behind backpropagation
as seen from different perspectives such as statistics, machine
learning, and dynamical systems. The second presents a number of
network architectures that may be designed to match the general
concepts of Parallel Distributed Processing with backpropagation
learning. Finally, the third section shows how these principles can
be applied to a number of different fields related to the cognitive
sciences, including control, speech recognition, robotics, image
processing, and cognitive psychology. The volume is designed to
provide both a solid theoretical foundation and a set of examples
that show the versatility of the concepts. Useful to experts in the
field, it should also be most helpful to students seeking to
understand the basic principles of connectionist learning and to
engineers wanting to add neural networks in general -- and
backpropagation in particular -- to their set of problem-solving
methods.
Piezoelectric Materials and Devices: Applications in Engineering and Medical Sciences provides a complete overview of piezoelectric materials, covering all aspects of the materials starting from fundamental concepts. The treatment includes physics of piezoelectric materials, their characteristics and applications. The author uses simple language to explain the theory of piezoelectricity and introduce readers to the properties and design of different types of piezoelectric materials, such as those used in engineering and medical device applications. This book: Introduces various types of dielectrics and their classification based on their characteristics Addresses the mathematical formulation of piezoelectric effects and the definition of various piezoelectric constants Describes the structure and properties of practical piezoelectric materials such as quartz, lead zirconate titanate, barium titanate, zinc oxide, and polyvinylidene fluoride Covers the entire gamut of piezoelectric devices used in engineering and medical applications Discusses briefly the use of piezoelectric materials for energy harvesting and structural health monitoring Explores new developments in biomedical applications of piezoelectric devices such as drug delivery, blood flow and blood pressure monitoring, robotic operating tools, etc. Elaborates on design and virtual prototyping of piezoelectric devices through the use of FE software tools ANSYS and PAFEC Giving design engineers, scientists, and technologists the information and guidance they will need to adopt piezoelectric materials in the development of smart devices, this book will also motivate engineering and science students to initiate new research for developing innovative devices. Its contents will be invaluable to both students and professionals seeking a greater understanding of fundamentals and applications in the evolving field of piezoelectrics.
"The Encyclopedia of Microcomputers serves as the ideal companion reference to the popular Encyclopedia of Computer Science and Technology. Now in its 10th year of publication, this timely reference work details the broad spectrum of microcomputer technology, including microcomputer history; explains and illustrates the use of microcomputers throughout academe, business, government, and society in general; and assesses the future impact of this rapidly changing technology."
Created to help scientists and engineers write computer code, this practical book addresses the important tools and techniques that are necessary for scientific computing, but which are not yet commonplace in science and engineering curricula. This book contains chapters summarizing the most important topics that computational researchers need to know about. It leverages the viewpoints of passionate experts involved with scientific computing courses around the globe and aims to be a starting point for new computational scientists and a reference for the experienced. Each contributed chapter focuses on a specific tool or skill, providing the content needed to provide a working knowledge of the topic in about one day. While many individual books on specific computing topics exist, none is explicitly focused on getting technical professionals and students up and running immediately across a variety of computational areas.
This unique reference presents in-depth coverage of the latest methods and applications of digital image processing describing various computer architectures ideal for satisfying specific image processing demands.
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Among the many things you'll learn: How to get into a Windows operating system without having the username or password Vulnerabilities associated with passwords and how to keep them out of the hands of hackers How hackers use the techniques of computer forensic examiners to wreak havoc on individuals and companies Hiding one's IP address to avoid detection Manipulating data to and from a web page or application for nefarious reasons How to find virtually anything on the internet How hackers research the targets they plan to attack How network defenders collect traffic across the wire to indentify intrusions Using Metasploit to attack weaknesses in systems that are unpatched or have poorly implemented security measures The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks. It also covers techniques utilized by hackers to attack modern operating systems, such as Windows 7, Windows Vista, and Mac OS X. The author explores a number of techniques that hackers can use to exploit physical access, network access, and wireless vectors. Using screenshots to clarify procedures, this practical manual uses step-by-step examples and relevant analogies to facilitate u
"The Encyclopedia of Microcomputers serves as the ideal companion reference to the popular Encyclopedia of Computer Science and Technology. Now in its 10th year of publication, this timely reference work details the broad spectrum of microcomputer technology, including microcomputer history; explains and illustrates the use of microcomputers throughout academe, business, government, and society in general; and assesses the future impact of this rapidly changing technology."
As the dividing line between traditional computing science and telecommunications quickly becomes blurred or disappears in today's rapidly changing environment, there is an increasing need for computer professionals to possess knowledge of telecommunications principles. Telecommunications and Networking presents a comprehensive overview of the interaction and relationship between telecommunications and data processing. The book's early chapters cover basic telecommunications vocabulary, common nomenclature, telecommunications fundamentals, as well as the important relationships among coding, error detection and correction, and noise. Later chapters discuss such topics as switching, timing, topological structures, routing algorithms, and teleprocessing. Other topics covered in detail include specific concerns inherent to computer communications, such as protocols, error detection and correction, network monitoring and security, and system validation. System designers and programmers can no longer be effective simply by understanding the tradeoffs between hardware and software. Telecommunications and Networking provides both computing professionals and students the fundamental computer communications concepts necessary to function in today's computer industry.
The book presents the current standards of digital multiplexing, called synchronous digital hierarchy, including analog multiplexing technologies. It is aimed at telecommunication professionals who want to develop an understanding of digital multiplexing and synchronous digital hierarchy, in particular, and the functioning of practical telecommunication systems, in general. The text includes all relevant fundamentals and provides a handy reference for problem solving or defining operations and maintenance strategies. The author covers digital conversion and TDM principles, line coding and digital modulation, signal impairments, and synchronization, as well as emerging systems. |
You may like...
Advances in Delay-Tolerant Networks…
Joel J. P. C. Rodrigues
Paperback
R4,669
Discovery Miles 46 690
The System Designer's Guide to VHDL-AMS…
Peter J Ashenden, Gregory D. Peterson, …
Paperback
R2,281
Discovery Miles 22 810
Handbook of Research on Redesigning the…
Mohamed Boucadair, Christian Jacquenet
Hardcover
R8,649
Discovery Miles 86 490
Clean Architecture - A Craftsman's Guide…
Robert Martin
Paperback
(1)
|