Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 12 of 12 matches in All Departments
This book provides comprehensive coverage of various Cryptography topics, while highlighting the most recent trends such as quantum, blockchain, lightweight, Chaotic and DNA cryptography. Moreover, this book covers cryptography primitives and its usage and applications and focuses on the fundamental principles of modern cryptography such as Stream Ciphers, block ciphers, public key algorithms and digital signatures. Readers will gain a solid foundation in cryptography and security. This book presents the fundamental mathematical concepts of cryptography. Moreover, this book presents hiding data techniques such as steganography and watermarking. The author also provides a comparative study of the different cryptographic methods, which can be used to solve security problems.
This book describes the life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection. Various trade-offs in the design process are discussed, including those associated with many of the most common memory cores, controller IPs and system-on-chip (SoC) buses. Readers will also benefit from the author's practical coverage of new verification methodologies. such as bug localization, UVM, and scan-chain. A SoC case study is presented to compare traditional verification with the new verification methodologies. Discusses the entire life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection; Introduce a deep introduction for Verilog for both implementation and verification point of view. Demonstrates how to use IP in applications such as memory controllers and SoC buses. Describes a new verification methodology called bug localization; Presents a novel scan-chain methodology for RTL debugging; Enables readers to employ UVM methodology in straightforward, practical terms.
This Book discusses machine learning for model order reduction, which can be used in modern VLSI design to predict the behavior of an electronic circuit, via mathematical models that predict behavior. The author describes techniques to reduce significantly the time required for simulations involving large-scale ordinary differential equations, which sometimes take several days or even weeks. This method is called model order reduction (MOR), which reduces the complexity of the original large system and generates a reduced-order model (ROM) to represent the original one. Readers will gain in-depth knowledge of machine learning and model order reduction concepts, the tradeoffs involved with using various algorithms, and how to apply the techniques presented to circuit simulations and numerical analysis. Introduces machine learning algorithms at the architecture level and the algorithm levels of abstraction; Describes new, hybrid solutions for model order reduction; Presents machine learning algorithms in depth, but simply; Uses real, industrial applications to verify algorithms.
This book provides an introduction to Bluetooth technology, with a specific focus on developing a hardware architecture for its modem. The major concepts and techniques involved in Bluetooth technology are discussed, with special emphasis on hardware mapping. The book starts simply to allow the reader to master quickly the basic concepts, before addressing the advanced features. This book differs from existing content in that it presents Bluetooth Transceiver architecture suitable for implementation in an FPGA for IoT Devices. It will examine several digital algorithms for modulation and demodulation of Bluetooth signals, locking on the carrier phase, and synchronizing the symbol. Many of these previously analog designs have been translated to the digital domain.
This book introduces readers to all the necessary components and knowledge to start being a vital part of the IoT revolution. The author discusses how to create smart-IoT solutions to help solve a variety of real problems. Coverage includes the most important aspects of IoT architecture, the various applications of IoT, and the enabling technologies for IoT. This book presents key IoT concepts and abstractions, while showcasing real case studies. The discussion also includes an analysis of IoT strengths, weaknesses, opportunities and threats. Readers will benefit from the in-depth introduction to internet of things concepts, along with discussion of IoT algorithms and architectures tradeoffs. Case studies include smart homes, smart agriculture, and smart automotive.
This book discusses and compares several new trends that can be used to overcome Moore's law limitations, including Neuromorphic, Approximate, Parallel, In Memory, and Quantum Computing. The author shows how these paradigms are used to enhance computing capability as developers face the practical and physical limitations of scaling, while the demand for computing power keeps increasing. The discussion includes a state-of-the-art overview and the essential details of each of these paradigms.
This Book discusses machine learning for model order reduction, which can be used in modern VLSI design to predict the behavior of an electronic circuit, via mathematical models that predict behavior. The author describes techniques to reduce significantly the time required for simulations involving large-scale ordinary differential equations, which sometimes take several days or even weeks. This method is called model order reduction (MOR), which reduces the complexity of the original large system and generates a reduced-order model (ROM) to represent the original one. Readers will gain in-depth knowledge of machine learning and model order reduction concepts, the tradeoffs involved with using various algorithms, and how to apply the techniques presented to circuit simulations and numerical analysis. Introduces machine learning algorithms at the architecture level and the algorithm levels of abstraction; Describes new, hybrid solutions for model order reduction; Presents machine learning algorithms in depth, but simply; Uses real, industrial applications to verify algorithms.
This book describes the life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection. Various trade-offs in the design process are discussed, including those associated with many of the most common memory cores, controller IPs and system-on-chip (SoC) buses. Readers will also benefit from the author's practical coverage of new verification methodologies. such as bug localization, UVM, and scan-chain. A SoC case study is presented to compare traditional verification with the new verification methodologies. Discusses the entire life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection; Introduce a deep introduction for Verilog for both implementation and verification point of view. Demonstrates how to use IP in applications such as memory controllers and SoC buses. Describes a new verification methodology called bug localization; Presents a novel scan-chain methodology for RTL debugging; Enables readers to employ UVM methodology in straightforward, practical terms.
This book provides an introduction to Bluetooth technology, with a specific focus on developing a hardware architecture for its modem. The major concepts and techniques involved in Bluetooth technology are discussed, with special emphasis on hardware mapping. The book starts simply to allow the reader to master quickly the basic concepts, before addressing the advanced features. This book differs from existing content in that it presents Bluetooth Transceiver architecture suitable for implementation in an FPGA for IoT Devices. It will examine several digital algorithms for modulation and demodulation of Bluetooth signals, locking on the carrier phase, and synchronizing the symbol. Many of these previously analog designs have been translated to the digital domain.
This book provides comprehensive coverage of various Cryptography topics, while highlighting the most recent trends such as quantum, blockchain, lightweight, Chaotic and DNA cryptography. Moreover, this book covers cryptography primitives and its usage and applications and focuses on the fundamental principles of modern cryptography such as Stream Ciphers, block ciphers, public key algorithms and digital signatures. Readers will gain a solid foundation in cryptography and security. This book presents the fundamental mathematical concepts of cryptography. Moreover, this book presents hiding data techniques such as steganography and watermarking. The author also provides a comparative study of the different cryptographic methods, which can be used to solve security problems.
This book introduces readers to all the necessary components and knowledge to start being a vital part of the IoT revolution. The author discusses how to create smart-IoT solutions to help solve a variety of real problems. Coverage includes the most important aspects of IoT architecture, the various applications of IoT, and the enabling technologies for IoT. This book presents key IoT concepts and abstractions, while showcasing real case studies. The discussion also includes an analysis of IoT strengths, weaknesses, opportunities and threats. Readers will benefit from the in-depth introduction to internet of things concepts, along with discussion of IoT algorithms and architectures tradeoffs. Case studies include smart homes, smart agriculture, and smart automotive.
This book discusses and compares several new trends that can be used to overcome Moore's law limitations, including Neuromorphic, Approximate, Parallel, In Memory, and Quantum Computing. The author shows how these paradigms are used to enhance computing capability as developers face the practical and physical limitations of scaling, while the demand for computing power keeps increasing. The discussion includes a state-of-the-art overview and the essential details of each of these paradigms.
|
You may like...
Eight Days In July - Inside The Zuma…
Qaanitah Hunter, Kaveel Singh, …
Paperback
(1)
|