|
Showing 1 - 12 of
12 matches in All Departments
This book provides comprehensive coverage of various Cryptography
topics, while highlighting the most recent trends such as quantum,
blockchain, lightweight, Chaotic and DNA cryptography. Moreover,
this book covers cryptography primitives and its usage and
applications and focuses on the fundamental principles of modern
cryptography such as Stream Ciphers, block ciphers, public key
algorithms and digital signatures. Readers will gain a solid
foundation in cryptography and security. This book presents the
fundamental mathematical concepts of cryptography. Moreover, this
book presents hiding data techniques such as steganography and
watermarking. The author also provides a comparative study of the
different cryptographic methods, which can be used to solve
security problems.
This Book discusses machine learning for model order reduction,
which can be used in modern VLSI design to predict the behavior of
an electronic circuit, via mathematical models that predict
behavior. The author describes techniques to reduce significantly
the time required for simulations involving large-scale ordinary
differential equations, which sometimes take several days or even
weeks. This method is called model order reduction (MOR), which
reduces the complexity of the original large system and generates a
reduced-order model (ROM) to represent the original one. Readers
will gain in-depth knowledge of machine learning and model order
reduction concepts, the tradeoffs involved with using various
algorithms, and how to apply the techniques presented to circuit
simulations and numerical analysis. Introduces machine learning
algorithms at the architecture level and the algorithm levels of
abstraction; Describes new, hybrid solutions for model order
reduction; Presents machine learning algorithms in depth, but
simply; Uses real, industrial applications to verify algorithms.
This Book discusses machine learning for model order reduction,
which can be used in modern VLSI design to predict the behavior of
an electronic circuit, via mathematical models that predict
behavior. The author describes techniques to reduce significantly
the time required for simulations involving large-scale ordinary
differential equations, which sometimes take several days or even
weeks. This method is called model order reduction (MOR), which
reduces the complexity of the original large system and generates a
reduced-order model (ROM) to represent the original one. Readers
will gain in-depth knowledge of machine learning and model order
reduction concepts, the tradeoffs involved with using various
algorithms, and how to apply the techniques presented to circuit
simulations and numerical analysis. Introduces machine learning
algorithms at the architecture level and the algorithm levels of
abstraction; Describes new, hybrid solutions for model order
reduction; Presents machine learning algorithms in depth, but
simply; Uses real, industrial applications to verify algorithms.
This book describes the life cycle process of IP cores, from
specification to production, including IP modeling, verification,
optimization, and protection. Various trade-offs in the design
process are discussed, including those associated with many of the
most common memory cores, controller IPs and system-on-chip (SoC)
buses. Readers will also benefit from the author's practical
coverage of new verification methodologies. such as bug
localization, UVM, and scan-chain. A SoC case study is presented to
compare traditional verification with the new verification
methodologies. Discusses the entire life cycle process of IP cores,
from specification to production, including IP modeling,
verification, optimization, and protection; Introduce a deep
introduction for Verilog for both implementation and verification
point of view. Demonstrates how to use IP in applications such as
memory controllers and SoC buses. Describes a new verification
methodology called bug localization; Presents a novel scan-chain
methodology for RTL debugging; Enables readers to employ UVM
methodology in straightforward, practical terms.
This book describes the life cycle process of IP cores, from
specification to production, including IP modeling, verification,
optimization, and protection. Various trade-offs in the design
process are discussed, including those associated with many of the
most common memory cores, controller IPs and system-on-chip (SoC)
buses. Readers will also benefit from the author's practical
coverage of new verification methodologies. such as bug
localization, UVM, and scan-chain. A SoC case study is presented to
compare traditional verification with the new verification
methodologies. Discusses the entire life cycle process of IP cores,
from specification to production, including IP modeling,
verification, optimization, and protection; Introduce a deep
introduction for Verilog for both implementation and verification
point of view. Demonstrates how to use IP in applications such as
memory controllers and SoC buses. Describes a new verification
methodology called bug localization; Presents a novel scan-chain
methodology for RTL debugging; Enables readers to employ UVM
methodology in straightforward, practical terms.
This book provides an introduction to Bluetooth technology, with a
specific focus on developing a hardware architecture for its modem.
The major concepts and techniques involved in Bluetooth technology
are discussed, with special emphasis on hardware mapping. The book
starts simply to allow the reader to master quickly the basic
concepts, before addressing the advanced features. This book
differs from existing content in that it presents Bluetooth
Transceiver architecture suitable for implementation in an FPGA for
IoT Devices. It will examine several digital algorithms for
modulation and demodulation of Bluetooth signals, locking on the
carrier phase, and synchronizing the symbol. Many of these
previously analog designs have been translated to the digital
domain.
This book provides an introduction to Bluetooth technology, with a
specific focus on developing a hardware architecture for its modem.
The major concepts and techniques involved in Bluetooth technology
are discussed, with special emphasis on hardware mapping. The book
starts simply to allow the reader to master quickly the basic
concepts, before addressing the advanced features. This book
differs from existing content in that it presents Bluetooth
Transceiver architecture suitable for implementation in an FPGA for
IoT Devices. It will examine several digital algorithms for
modulation and demodulation of Bluetooth signals, locking on the
carrier phase, and synchronizing the symbol. Many of these
previously analog designs have been translated to the digital
domain.
This book provides comprehensive coverage of various Cryptography
topics, while highlighting the most recent trends such as quantum,
blockchain, lightweight, Chaotic and DNA cryptography. Moreover,
this book covers cryptography primitives and its usage and
applications and focuses on the fundamental principles of modern
cryptography such as Stream Ciphers, block ciphers, public key
algorithms and digital signatures. Readers will gain a solid
foundation in cryptography and security. This book presents the
fundamental mathematical concepts of cryptography. Moreover, this
book presents hiding data techniques such as steganography and
watermarking. The author also provides a comparative study of the
different cryptographic methods, which can be used to solve
security problems.
This book introduces readers to all the necessary components and
knowledge to start being a vital part of the IoT revolution. The
author discusses how to create smart-IoT solutions to help solve a
variety of real problems. Coverage includes the most important
aspects of IoT architecture, the various applications of IoT, and
the enabling technologies for IoT. This book presents key IoT
concepts and abstractions, while showcasing real case studies. The
discussion also includes an analysis of IoT strengths, weaknesses,
opportunities and threats. Readers will benefit from the in-depth
introduction to internet of things concepts, along with discussion
of IoT algorithms and architectures tradeoffs. Case studies include
smart homes, smart agriculture, and smart automotive.
This book discusses and compares several new trends that can be
used to overcome Moore's law limitations, including Neuromorphic,
Approximate, Parallel, In Memory, and Quantum Computing. The author
shows how these paradigms are used to enhance computing capability
as developers face the practical and physical limitations of
scaling, while the demand for computing power keeps increasing. The
discussion includes a state-of-the-art overview and the essential
details of each of these paradigms.
This book discusses and compares several new trends that can be
used to overcome Moore's law limitations, including Neuromorphic,
Approximate, Parallel, In Memory, and Quantum Computing. The author
shows how these paradigms are used to enhance computing capability
as developers face the practical and physical limitations of
scaling, while the demand for computing power keeps increasing. The
discussion includes a state-of-the-art overview and the essential
details of each of these paradigms.
This book introduces readers to all the necessary components and
knowledge to start being a vital part of the IoT revolution. The
author discusses how to create smart-IoT solutions to help solve a
variety of real problems. Coverage includes the most important
aspects of IoT architecture, the various applications of IoT, and
the enabling technologies for IoT. This book presents key IoT
concepts and abstractions, while showcasing real case studies. The
discussion also includes an analysis of IoT strengths, weaknesses,
opportunities and threats. Readers will benefit from the in-depth
introduction to internet of things concepts, along with discussion
of IoT algorithms and architectures tradeoffs. Case studies include
smart homes, smart agriculture, and smart automotive.
|
You may like...
Caracal
Disclosure
CD
R50
Discovery Miles 500
|