![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing > Systems analysis & design
VLSI 2010 Annual Symposium will present extended versions of the best papers presented in ISVLSI 2010 conference. The areas covered by the papers will include among others: Emerging Trends in VLSI, Nanoelectronics, Molecular, Biological and Quantum Computing. MEMS, VLSI Circuits and Systems, Field-programmable and Reconfigurable Systems, System Level Design, System-on-a-Chip Design, Application-Specific Low Power, VLSI System Design, System Issues in Complexity, Low Power, Heat Dissipation, Power Awareness in VLSI Design, Test and Verification, Mixed-Signal Design and Analysis, Electrical/Packaging Co-Design, Physical Design, Intellectual property creating and sharing.
This book describes the use of free air cooling to improve the efficiency of, and cooling of, equipment for use in telecom infrastructures. Discussed at length is the cooling of communication installation rooms such as data centers or base stations, and this is intended as a valuable tool for the people designing and manufacturing key parts of communication networks. This book provides an introduction to current cooling methods used for energy reduction, and also compares present cooling methods in use in the field. The qualification methods and standard reliability assessments are reviewed, and their inability to assess the risks of free air cooling is discussed. The method of identifying the risks associated with free air cooling on equipment performance and reliability is introduced. A novel method of assessment for free air cooling is also proposed that utilizes prognostics and health management (PHM). This book also: Describes how the implementation of free air cooling can save energy for cooling within the telecommunications infrastructure. Analyzes the potential risks and failures of mechanisms possible in the implementation of free air cooling, which benefits manufacturers and equipment designers. Presents prognostics-based assessments to identify and mitigate the risks of telecommunications equipment under free air cooling conditions, which can provide the early warning of equipment failures at operation stage without disturbing the data centers' service. Optimum Cooling for Data Centers is an ideal book for researchers and engineers interested in designing and manufacturing equipment for use in telecom infrastructures.
"Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE" explains how to apply the complex MARTE standard in practical situations. This approachable reference provides a handy user guide, illustrating with numerous examples how you can use MARTE to design and develop real-time and embedded systems and software. Expert co-authors Bran Selic and Sebastien Gerard lead the team
that drafted and maintain the standard and give you the tools you
need apply MARTE to overcome the limitations of cyber-physical
systems. The functional sophistication required of modern
cyber-physical systems has reached a point where traditional
code-centric development methods are proving less and less capable
of delivering a reliable product in a timely manner. In "Modeling
and Analysis of Real-Time and Embedded Systems with UML and MARTE,"
you will learn how to take advantage of modern model-based
engineering methods and corresponding industry standards to
overcome these limitations. These methods take full advantage of
computer-supported automation allowing timely detection of design
flaws to reduce engineering risk, leading thereby to better overall
product quality and greater productivity.
This book offers up novel research which uses analytical approaches to explore nonlinear features exhibited by various dynamic processes. Relevant to disciplines across engineering and physics, the asymptotic method combined with the multiple scale method is shown to be an efficient and intuitive way to approach mechanics. Beginning with new material on the development of cutting-edge asymptotic methods and multiple scale methods, the book introduces this method in time domain and provides examples of vibrations of systems. Clearly written throughout, it uses innovative graphics to exemplify complex concepts such as nonlinear stationary and nonstationary processes, various resonances and jump pull-in phenomena. It also demonstrates the simplification of problems through using mathematical modelling, by employing the use of limiting phase trajectories to quantify nonlinear phenomena. Particularly relevant to structural mechanics, in rods, cables, beams, plates and shells, as well as mechanical objects commonly found in everyday devices such as mobile phones and cameras, the book shows how each system is modelled, and how it behaves under various conditions. It will be of interest to engineers and professionals in mechanical engineering and structural engineering, alongside those interested in vibrations and dynamics. It will also be useful to those studying engineering maths and physics.
This book provides a comprehensive presentation of the most advanced research results and technological developments enabling understanding, qualifying and mitigating the soft errors effect in advanced electronics, including the fundamental physical mechanisms of radiation induced soft errors, the various steps that lead to a system failure, the modelling and simulation of soft error at various levels (including physical, electrical, netlist, event driven, RTL, and system level modelling and simulation), hardware fault injection, accelerated radiation testing and natural environment testing, soft error oriented test structures, process-level, device-level, cell-level, circuit-level, architectural-level, software level and system level soft error mitigation techniques. The book contains a comprehensive presentation of most recent advances on understanding, qualifying and mitigating the soft error effect in advanced electronic systems, presented by academia and industry experts in reliability, fault tolerance, EDA, processor, SoC and system design, and in particular, experts from industries that have faced the soft error impact in terms of product reliability and related business issues and were in the forefront of the countermeasures taken by these companies at multiple levels in order to mitigate the soft error effects at a cost acceptable for commercial products. In a fast moving field, where the impact on ground level electronics is very recent and its severity is steadily increasing at each new process node, impacting one after another various industry sectors (as an example, the Automotive Electronics Council comes to publish qualification requirements on soft errors), research and technology developments and industrial practices have evolve very fast, outdating the most recent books edited at 2004.
Exploring the interrelations between generalized metric spaces, lattice-ordered groups, and order statistics, the book contains a new algebraic approach to Signal Processing Theory. It describes mathematical concepts and results important in the development, analysis, and optimization of signal processing algorithms intended for various applications. The book offers a solution of large-scale Signal Processing Theory problems of increasing both signal processing efficiency under prior uncertainty conditions and signal processing rate that is provided by multiplication-free signal processing algorithms based on lattice-ordered group operations. From simple basic relationships to computer simulation, the text covers a wide range of new mathematical techniques essential for understanding the proposed signal processing algorithms developed for solving the following problems: signal parameter and spectral estimation, signal filtering, detection, classification, and resolution; array signal processing; demultiplexing and demodulation in multi-channel communication systems and multi-station networks; wavelet analysis of 1D/ 2D signals. Along with discussing mathematical aspects, each chapter presents examples illustrating operation of signal processing algorithms developed for various applications. The book helps readers understand relations between known classic and obtained results as well as recent research trends in Signal Processing Theory and its applications, providing all necessary mathematical background concerning lattice-ordered groups to prepare readers for independent work in the marked directions including more advanced research and development.
The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners on a daily basis. In the X-Ways Forensics Practitioner's Guide, the authors provide you with complete coverage of this powerful tool, walking you through configuration and X-Ways fundamentals, and then moving through case flow, creating and importing hash databases, digging into OS artifacts, and conducting searches. With X-Ways Forensics Practitioner's Guide, you will be able to
use X-Ways Forensics to its fullest potential without any
additional training. The book takes you from installation to the
most advanced features of the software. Once you are familiar with
the basic components of X-Ways, the authors demonstrate
never-before-documented features using real life examples and
information on how to present investigation results. The book
culminates with chapters on reporting, triage and preview methods,
as well as electronic discovery and cool X-Ways apps.
This graduate-level textbook elucidates low-risk and fail-safe systems in mathematical detail. It addresses, in particular, problems where mission-critical performance is paramount, such as in aircraft, missiles, nuclear reactors and weapons, submarines, and many other types of systems where "failure" can result in overwhelming loss of life and property. The book is divided into four parts: Fundamentals, Electronics, Software, and Dangerous Goods. The first part on Fundamentals addresses general concepts of system safety engineering that are applicable to any type of system. The second part, Electronics, addresses the detection and correction of electronic hazards. In particular, the Bent Pin Problem, Sneak Circuit Problem, and related electrical problems are discussed with mathematical precision. The third part on Software addresses predicting software failure rates as well as detecting and correcting deep software logical flaws (called defects). The fourth part on Dangerous Goods presents solutions to three typical industrial chemical problems faced by the system safety engineer during the design, storage, and disposal phases of a dangerous goods' life cycle.
This book discusses IoT in healthcare and how it enables interoperability, machine-to-machine communication, information exchange, and data movement. It also covers how healthcare service delivery automates patient care with the help of mobility solutions, new technologies, and next-gen healthcare facilities with challenges faced and suggested solutions prescribed. Reinvention of Health Applications with IoT: Challenges and Solutions presents the latest applications of IoT in healthcare along with challenges and solutions. It looks at a comparison of advanced technologies such as Deep Learning, Machine Learning, and AI and explores the ways they can be applied to sensed data to improve prediction and decision-making in smart health services. It focuses on society 5.0 technologies and illustrates how they can improve society and the transformation of IoT in healthcare facilities to support patient independence. Case studies are included for applications such as smart eyewear, smart jackets, and smart beds. The book will also go into detail on wearable technologies and how they can communicate patient information to doctors in medical emergencies. The target audiences for this edited volume is researchers, practitioners, students, as well as key stakeholders involved in and working on healthcare engineering solutions.
Addresses the complete functional framework workflow in IoT technology Explores basic and high level concepts Provides data based intelligent and automated systems through Industrial IoT and its implications to the real world Discusses the major applications Presents an interdisciplinary platform
Martin Fowler's guide to reworking bad code into well-structured code Refactoring improves the design of existing code and enhances software maintainability, as well as making existing code easier to understand. Original Agile Manifesto signer and software development thought leader, Martin Fowler, provides a catalog of refactorings that explains why you should refactor; how to recognize code that needs refactoring; and how to actually do it successfully, no matter what language you use. Refactoring principles: understand the process and general principles of refactoring Code smells: recognize "bad smells" in code that signal opportunities to refactor Application improvement: quickly apply useful refactorings to make a program easier to comprehend and change Building tests: writing good tests increases a programmer's effectiveness Moving features: an important part of refactoring is moving elements between contexts Data structures: a collection of refactorings to organize data, an important role in programs Conditional Logic: use refactorings to make conditional sections easier to understand APIs: modules and their functions are the building blocks of our software, and APIs are the joints that we use to plug them together Inheritance: it is both very useful and easy to misuse, and it's often hard to see the misuse until it's in the rear-view mirror---refactorings can fix the misuse Examples are written in JavaScript, but you shouldn't find it difficult to adapt the refactorings to whatever language you are currently using as they look mostly the same in different languages. "Whenever you read [Refactoring], it's time to read it again. And if you haven't read it yet, please do before writing another line of code." -David Heinemeier Hansson, Creator of Ruby on Rails, Founder & CTO at Basecamp "Any fool can write code that a computer can understand. Good programmers write code that humans can understand." -M. Fowler (1999)
Explores the role of Artificial Intelligence and Smart Computing in health informatics and healthcare with an emphasis on clinical data management and analysis for precise prediction and prompt action Presents cutting edge tracking, monitoring, real time assistance, and security for IoT in healthcare Discusses broadly on wearable sensors and IoT devices and their role in smart living assistance and energy conservation Describes a system mode and architecture for a clear picture of IoT in healthcare Explains the challenges and opportunities with IoT based healthcare industries and includes a study of threats, impacts, and the need of information security
Integration of IoT (Internet of Things) with big data and cloud computing has brought forward numerous advantages and challenges such as data analytics, integration, and storage. This book highlights these challenges and provides an integrating framework for these technologies, illustrating the role of blockchain in all possible facets of IoT security. Furthermore, it investigates the security and privacy issues associated with various IoT systems along with exploring various machine learning-based IoT security solutions. This book brings together state-of-the-art innovations, research activities (both in academia and in industry), and the corresponding standardization impacts of 5G as well. Aimed at graduate students, researchers in computer science and engineering, communication networking, IoT, machine learning and pattern recognition, this book Showcases the basics of both IoT and various security paradigms supporting IoT, including Blockchain Explores various machine learning-based IoT security solutions and highlights the importance of IoT for industries and smart cities Presents various competitive technologies of Blockchain, especially concerned with IoT security Provides insights into the taxonomy of challenges, issues, and research directions in IoT-based applications Includes examples and illustrations to effectively demonstrate the principles, algorithm, applications, and practices of security in the IoT environment
The theory and applications of Iteration Methods is a very fast-developing field of numerical analysis and computer methods. The second edition is completely updated and continues to present the state-of-the-art contemporary theory of iteration methods with practical applications, exercises, case studies, and examples of where and how they can be used. The Theory and Applications of Iteration Methods, Second Edition includes newly developed iteration methods taking advantage of the most recent technology (computers, robots, machines). It extends the applicability of well-established methods by increasing the convergence domain and offers sharper error tolerance. New proofs and ideas for handling convergence are introduced along with a new variety of story problems picked from diverse disciplines. This new edition is for researchers, practitioners, and students in engineering, economics, and computational sciences.
1 uniquely integrates essentials from vehicle dynamics and control theory for controller design with NI LabVIEW at the level of practical applications 2 Provides new features in the modelling of drivetrain configuration, regenerative braking, rollover dynamics for model-based control 3 Shares advanced controller designs that have yet to be published 4 Provides mathematical models of vehicle behavior of vehicles that move dynamically in the presence of disturbances to the motion 5 Demonstrates what a control design engineer can do to practically achieve the desired vehicle behavior based on mathematical models
Convergence of Blockchain, AI, and IoT: Concepts and Challenges discusses the convergence of three powerful technologies that play into the digital revolution and blur the lines between biological, digital, and physical objects. This book covers novel algorithms, solutions for addressing issues in applications, security, authentication, and privacy. The book provides an overview of the clinical scientific research enabling smart diagnosis equipment through AI. It presents the role these technologies play in augmented reality and blockchain, covers digital currency managed with bitcoin, and discusses deep learning and how it can enhance human thoughts and behaviors. Targeted audiences range from those interested in the technical revolution of blockchain, big data and the Internet of Things, to research scholars and the professional market.
Provides an overview and background of cost-effectiveness analysis and how it's used Discusses cost-effective in relation to systems engineering Links cost-effectiveness with military issues and problems Explores the usage of cost-effectiveness as it relates to systems architecting and the re-engineering of office systems Compares cost-effective analysis to everyday life when dealing with purchasing small home devices such as phones, and large devices such as automobiles.
Global competition and other factors are forcing manufacturers to produce highly safe engineering systems and products. This book meets the needs for product designers, systems engineers, and safety engineers that work together and need a single resource which considers all three areas when designing new products and systems that they can refer to. Applied Safety for Engineers: Systems and Products serves as a comprehensive resource offering a wide range of safety topics when involved with product design, engineering system analysis, and engineering maintenance. Examples along with their solutions are placed at the end of each chapter to test reader comprehension. The book facilitates the importance for product designers, safety, and systems engineering professionals to work closely during the product design phase so they can understand each other's discipline. Written in a manner that readers do not need any previous knowledge on the subject, the book offers many sources for further reading at the end of each chapter. This book will be useful to product designers, system engineers, safety specialists, graduate and senior undergraduate students, researchers and manufacturers, industrial engineers, safety engineers, and engineers-at-large.
Systems-Level Modelling of Microbial Communities: Theory and Practice introduces various aspects of modelling microbial communities and presents a detailed overview of the computational methods which have been developed in this area. This book is aimed at researchers in the field of computational/systems biology as well as biologists/experimentalists studying microbial communities, who are keen on embracing the concepts of computational modelling. The primary focus of this book is on methods for modelling interactions between micro-organisms in a community, with special emphasis on constraint-based and network-based modelling techniques. A brief overview of population- and agent-based modelling is also presented. Lastly, it covers the experimental methods to understand microbial communities, and provides an outlook on how the field may evolve in the coming years.
Focusses on model based systems engineering and describes the architecture of the systems design models Uses real-world examples to corroborate different and disparate systems engineering activities Describes and applies the Vee systems engineering design methodology, with cohesive examples and application of designing systems Discusses culture change and the skills people need to design and integrate systems Shows detailed and cohesive examples of the systems engineering tools throughout the systems engineering lifecycle
This book discusses risk management as it applies to problem-solving for simple, complex and wicked problems faced by policy creators and implementors, project managers and systems engineers in the context of policies, large engineering projects (LEPs), projects and systems. When applying systems thinking to risk management, it can be seen that risk management applies to almost every action taken in daily life. This book: Introduces the systems approach of integrating risk management into policy creation and implementation, project management and systems engineering, such as the risk framework and the Firm Fixed Price (FFP) contract with penalties and bonuses. Introduces a number of out-of-the box concepts building on the application of the systems thinking tools in the system thinker's toolbox. Points out that integrating risk management into policy and project management and systems engineering is just good management and engineering practice. Discusses the flow of risk in a policy from creation through implementation via LEPs and simpler projects, identifying where risks arise and where they should be dealt with. Presents the risks in the relationship between policy creation, implementation, project management and systems engineering. Discusses risks throughout the policy implementation process and shows how the nature of risks changes from political to financial to technological as implementation proceeds. Discusses managing complexity and specifies the minimum number of elements in a system for it to be defined as, and managed as, complex. Points out that in most instances the traditionally ignored major implementation risk is that of poor performance by personnel. Shows how to proactively incorporate prevention into planning in order to prevent risks, as well as how to mitigate them when they occur.
The Web of Things (WoT) is a concept that describes approaches, programming tools and software architectural systems, which interface networks of real-world objects with the World Wide Web. The book is organized into 11 chapters, each focusing on a unique wireless technological aspect of the Web of Things, and it aims to comprehensively cover each of its various applications, including: A strong emphasis on WoT problems and solutions, identifying the main open issues, innovations and latest technologies behind WoT A blend of theoretical and simulation-based problems for better understanding of the concepts behind WoT Various exemplifying applications in which the use of WoT is very attractive and an inspiration for future applications The book will be useful to researchers, software developers and undergraduate and postgraduate students, as well as practitioners.
Nature-Inspired Optimization Algorithms, a comprehensive work on the most popular optimization algorithms based on nature, starts with an overview of optimization going from the classical to the latest swarm intelligence algorithm. Nature has a rich abundance of flora and fauna that inspired the development of optimization techniques, providing us with simple solutions to complex problems in an effective and adaptive manner. The study of the intelligent survival strategies of animals, birds, and insects in a hostile and ever-changing environment has led to the development of techniques emulating their behavior. This book is a lucid description of fifteen important existing optimization algorithms based on swarm intelligence and superior in performance. It is a valuable resource for engineers, researchers, faculty, and students who are devising optimum solutions to any type of problem ranging from computer science to economics and covering diverse areas that require maximizing output and minimizing resources. This is the crux of all optimization algorithms. Features: Detailed description of the algorithms along with pseudocode and flowchart Easy translation to program code that is also readily available in Mathworks website for some of the algorithms Simple examples demonstrating the optimization strategies are provided to enhance understanding Standard applications and benchmark datasets for testing and validating the algorithms are included This book is a reference for undergraduate and post-graduate students. It will be useful to faculty members teaching optimization. It is also a comprehensive guide for researchers who are looking for optimizing resources in attaining the best solution to a problem. The nature-inspired optimization algorithms are unconventional, and this makes them more efficient than their traditional counterparts. |
You may like...
Conversations With A Gentle Soul
Ahmed Kathrada, Sahm Venter
Paperback
(3)
Prisoner 913 - The Release Of Nelson…
Riaan de Villiers, Jan-Ad Stemmet
Paperback
R542
Discovery Miles 5 420
|