Computer architecture and logic design Books
John Wiley & Sons Inc Design of HighPerformance Microprocessor Circuits
Book SynopsisThis book covers the design of next generation microprocessors in deep submicron CMOS technologies. The chapters in Design of High Performance Microprocessor Circuits were written by some of the world's leading technologists, designers, and researchers.Table of ContentsPreface. OVERVIEW. Impact of Physical Technology on Architecture (John H. Edmondson). TECHNOLOGY ISSUES. CMOS Scaling and Issues in SUB-0.25µm Systems (Yuan Taur). Techniques for Leakage Power Reduction (Vivek De, Yibin Ye, et al.). Low-Voltage Technologies (Tadahiro Kuroda and Takayasu Sakurai). SOI Technology and Circuits (Ghavam G. Shahidi, Fari Assaderaghi and Dimitri Antoniadis). Models of Process Variations in Device and Interconnect (Duane Boning and Sani Nassif). CIRCUIT STYLES FOR LOGIC. Basic Logic Families (Kerry Bernstein). Issues in Dynamic Logic Design (Paul Gronowski). Self-Timed Pipelines (Ted Williams). High-Speed VLSI Arithmetic Units: Adders and Multipliers (Vojin G. Oklobdzija). CLOCKING. Clocked Storage Elements (Hamid Partovi). Design of High-Speed CMOS PLLs and DLLs (John George Maneatis). Clock Distribution (Daniel W. Bailey). MEMORY SYSTEM DESIGN. Register Files and Caches (Ronald Preston). Embedded DRAM (Tadaaki Yamauchi and Michihiro Yamada). INTERCONNECT AND I/O. Analyzing On-Chip Interconnect Effects (Noel Menezes and Lawrence Pileggi). Techniques for Driving Interconnect (Shannon V. Morton). I/O and ESD Circuit Design (Stephen C. Thierauf and Warren R. Anderson). High-Speed Electrical Signaling (Stefanos Sidropoulos, Chih-Kong Ken Yang, and Mark Horowitz). RELIABILITY. Electromigration Reliability (J. Joseph Clement). Hot Carrier Reliability (Kaizad Mistry). CAD TOOLS AND TEST. Overview of Computer-Aided Design Tools (Yao-Tsung Yen). Timing Verification (Victor Peng). Design and Analysis of Power Distribution Networks (David Blaauw, Rajendran Panda, and Rajat Chaudhry). Testing of High-Performance Processors (Dilip K. Bhavsar). Index.
£197.06
IEEE Computer Society Press,U.S. Performance Modeling for Computer Architects
Book SynopsisAs computers become more complex, the number and complexity of the tasks facing the computer architect have increased. Computer performance often depends in complex way on the design parameters and intuition that must be supplemented by performance studies to enhance design productivity. This book introduces computer architects to computer system performance models and shows how they are relatively simple, inexpensive to implement, and sufficiently accurate for most purposes. It discusses the development of performance models based on queuing theory and probability. The text also shows how they are used to provide quick approximate calculations to indicate basic performance tradeoffs and narrow the range of parameters to consider when determining system configurations. It illustrates how performance models can demonstrate how a memory system is to be configured, what the cache structure should be, and what incremental changes in cache size can have on the miss rate. A part
£73.76
IEEE Computer Society Press,U.S. Parallel Architectures for Artificial Neural
Book SynopsisThis excellent reference for all those involved in neural networks research and application presents, in a single text, the necessary aspects of parallel implementation for all major artificial neural network models. The book details implementations on varoius processor architectures (ring, torus, etc.) built on different hardware platforms, ranging from large general purpose parallel computers to custom built MIMD machines using transputers and DSPs. Experts who performed the implementations author the chapters and research results are covered in each chapter. These results are divided into three parts. Theoretical analysis of parallel implementation schemes on MIMD message passing machines. Details of parallel implementation of BP neural networks on a general purpose, large, parallel computer. Four chapters each describing a specific purpose parallel neural computer configuration. This book is aimed at graduate students
£99.86
Taylor & Francis Inc Unsupervised Signal Processing
Book SynopsisUnsupervised Signal Processing: Channel Equalization and Source Separation provides a unified, systematic, and synthetic presentation of the theory of unsupervised signal processing. Always maintaining the focus on a signal processing-oriented approach, this book describes how the subject has evolved and assumed a wider scope that covers several topics, from well-established blind equalization and source separation methods to novel approaches based on machine learning and bio-inspired algorithms.From the foundations of statistical and adaptive signal processing, the authors explore and elaborate on emerging tools, such as machine learning-based solutions and bio-inspired methods. With a fresh take on this exciting area of study, this book: Provides a solid background on the statistical characterization of signals and systems and on linear filtering theory Emphasizes the link between supervised and unsupervised processing from thTable of ContentsIntroduction. Statistical Characterization of Signals and Systems. Linear Optimal and Adaptive Filtering. Unsupervised Channel Equalization. Unsupervised Multichannel Equalization. Blind Source Separation. Nonlinear Filtering and Machine Learning. Bio-Inspired Optimization Methods. Appendices.
£161.50
Taylor & Francis Ltd WiMAX
Book SynopsisWith market value expected to reach $5 billion by 2007 and the endorsement of some of the biggest names in telecommunications, World Interoperability for Microwave Access (WiMAX) is poised to change the broadband wireless landscape. But how much of WiMAX's touted potential is merely hype? Now that several pre-WiMAX networks have been deployed, what are the operators saying about QoS and ROI? How and when will device manufacturers integrate WiMAX into their products? What is the business case for using WiMAX rather than any number of other established wireless alternatives?WiMAX: Taking Wireless to the MAX examines the evolution of wireless, broadband, and the wireless broadband landscape with exhaustive coverage of technological advances and evolving topologies. It sets the tone for the journey towards untouched wireless heights - WiMAX. The author builds a complete understanding of Broadband Wireless Access (BWA) Technologies, elaborating on past developments, present needsTable of ContentsIntroduction. Setting the Stage. Telecommunication: A Connecting Mechanism. The Internet Takes Off. The Broader the Better. Wired versus Wireless. Broadband Unwired. Understanding the Technology. Surveying the Landscape. Identifying the Market. Predicting the Future. Analyzing the Model. Planning the Strategy. Conclusion.
£114.00
Taylor & Francis Ltd Linux with Operating System Concepts
Book SynopsisA True Textbook for an Introductory Course, System Administration Course, or a Combination CourseLinux with Operating System Concepts, Second Edition merges conceptual operating system (OS) and Unix/Linux topics into one cohesive textbook for undergraduate students. The book can be used for a one- or two-semester course on Linux or Unix. It is complete with review sections, problems, definitions, concepts and relevant introductory material, such as binary and Boolean logic, OS kernels and the role of the CPU and memory hierarchy.Details for Introductory and Advanced UsersThe book covers Linux from both the user and system administrator positions. From a user perspective, it emphasizes command-line interaction. From a system administrator perspective, the text reinforces shell scripting with examples of administration scripts that support the automation of administrator tasks.Thorough Coverage of Concepts and Linux CommandsTable of ContentsPreface. Acknowledgments and Contributions. Author. Chapter 1 Linux: What, Why, Who and When, and How. Chapter 2 Bash. Chapter 3 Linux File Commands. Chapter 4 Managing Processes. Chapter 5 Regular Expressions. Chapter 6 Shell Scripting. Chapter 7 User Accounts. Chapter 8 Administering Linux File Systems. Chapter 9 System Initialization and Services. Chapter 10 Network Configuration. Chapter 11 Software Installation and Maintenance. Chapter 12 Maintaining and Troubleshooting Linux. Bibliography. Index.
£78.84
Taylor & Francis Ltd Systems Architecting
Book SynopsisDerived from industry-training classes that the author teaches at the Embedded Systems Institute at Eindhoven, the Netherlands and at Buskerud University College at Kongsberg in Norway, Systems Architecting: A Business Perspective places the processes of systems architecting in a broader context by juxtaposing the relationship of the systems architect with enterprise and management. This practical, scenario-driven guide fills an important gap, providing systems architects insight into the business processes, and especially into the processes to which they actively contribute.The book uses a simple reference model to enable understanding of the inside of a system in relation to its context. It covers the impact of tool selection and brings balance to the application of the intellectual tools versus computer-aided tools. Stressing the importance of a clear strategy, the authors discuss methods and techniques that facilitate the architect's contributioTable of ContentsProcess and Organization. Role and Task of the Systems Architect. From Customer Understanding to Requirements. Systems Architect Methods and Means. Strategy.Harvesting Synergy, Product Families. Supporting Processes. Systems and Software. Boardroom Presentation. Human Side. Reflection and Wrap-Up. References. Pictorial Index.
£37.99
Taylor & Francis Ltd DataDriven Intelligence in Wireless Networks
Book SynopsisThis book highlights the importance of data-driven techniques to solve wireless communication problems. It presents a number of problems (e.g., related to performance, security, and social networking), and provides solutions using various data-driven techniques, including machine learning, deep learning, federated learning, and artificial intelligence.This book details wireless communication problems that can be solved by data-driven solutions. It presents a generalized approach toward solving problems using specific data-driven techniques. The book also develops a taxonomy of problems according to the type of solution presented and includes several case studies that examine data-driven solutions for issues such as quality of service (QoS) in heterogeneous wireless networks, 5G/6G networks, and security in wireless networks. The target audience of this book includes professionals, researchers, professors, and students working in the field of networking, communicationTable of ContentsPart 1: Data-Driven Wireless Networks: Design and ApplicationsChapter 1: Data-Driven Wireless Networks: A PerspectiveChapter 2: A Collaborative Data-Driven Intelligence for Future Wireless NetworksChapter 3: Federated learning Technique in Enabling Data-driven Design for Wireless CommunicationChapter 4: Application of Wireless Network Data Driver using Edge Computing and Deep Learning in Intelligent TransportationChapter 5: Data-Driven Agriculture and the Role of AI in Smart FarmingPart II: Data-Driven Techniques and Security Issues in Wireless NetworksChapter 6: Data-Driven Techniques and Security Issues in Wireless NetworkChapter 7: Data-Driven Techniques for Intrusion Detection in Wireless NetworksPart III: Advanced Topics in Data-Driven Intelligence for Wireless NetworksChapter 8: Policy-based Data Analytic for Software-Defined WirelessChapter 9: Data-Driven Coexistence in Next-Generation Heterogeneous Cellular NetworksChapter 10: Programming Languages, Tools, and Technique
£99.75
CRC Press Smart Proxy Modeling
Book SynopsisNumerical simulation models are used in all engineering disciplines for modeling physical phenomena to learn how the phenomena work, and to identify problems and optimize behavior. Smart Proxy Models provide an opportunity to replicate numerical simulations with very high accuracy and can be run on a laptop within a few minutes, thereby simplifying the use of complex numerical simulations, which can otherwise take tens of hours. This book focuses on Smart Proxy Modeling and provides readers with all the essential details on how to develop Smart Proxy Models using Artificial Intelligence and Machine Learning, as well as how it may be used in real-world cases. Covers replication of highly accurate numerical simulations using Artificial Intelligence and Machine Learning Details application in reservoir simulation and modeling and computational fluid dynamics Includes real case studies based on commercially available simulators Table of Contents 1. Artificial Intelligence and Machine Learning. 2. Numerical simulation and modeling. 3. Proxy modeling. 4. Smart Proxy Modeling for numerical reservoir simulation. 5. Smart Proxy Modeling for computational fluid dynamics (CFD).
£87.39
CRC Press Internet of Drones
Book SynopsisThis book covers different aspects of Internet of Drones (IoD) including fundamentals in drone design, deployment challenges, and development of applications. It starts with a detailed description of concepts and processes in designing an efficient system, and architecture. It details different applications of IoD and its implementations in smart cities, agriculture, health care, defense, security, logistics, GIS mapping, and so forth. Recent developments in IoD design, application of AI techniques, case studies, and future directions are covered.Features: Focuses on important perspectives of the Internet of Drones (IoD) Emphasizes drone deployment in smart cities, smart agriculture, smart health care, and 3D mapping Covers challenges in drone design for applications with security and privacy issues Reviews diversified drone applications with real-use cases from modern drone players ranging from start-up companies to big giants in the dTable of Contents1. Internet Of Drones: Applications, Challenges, Opportunities. 2. Modelling, Simulation, and Analysis Hybrid Unmanned Aerial Vehicle with C-Wing. 3. Influence of Machine Learning Technique in Unmanned Aerial Vehicle. 4. Review of Medical Drones in Healthcare Applications. 5. CoVacciDrone: An Algorithmic-Drone-Based COVID-19 Vaccine Distribution Strategy. 6. Ambulance Drone for Rescue - A Perspective on Conceptual Design, Life Detection Systems, and Prototype Development. 7. A Comprehensive Review on Internet of Agro Drones for Precision Agriculture. 8. A Smart WeeDrone for Sustainable Agriculture. 9. Internet of Agro Drones for Precision Agriculture. 10. IOD-Enabled Swarm of Drones for Air Space Control. 11. Drones for Disaster Response and Management.
£118.75
Taylor & Francis Ltd Data Science and Analytics Strategy
Book SynopsisThis book describes how to establish data science and analytics capabilities in organisations using Emergent Design, an evolutionary approach that increases the chances of successful outcomes while minimising upfront investment. Based on their experiences and those of a number of data leaders, the authors provide actionable advice on data technologies, processes, and governance structures so that readers can make choices that are appropriate to their organisational contexts and requirements.The book blends academic research on organisational change and data science processes with real-world stories from experienced data analytics leaders, focusing on the practical aspects of setting up a data capability. In addition to a detailed coverage of capability, culture, and technology choices, a unique feature of the book is its treatment of emerging issues such as data ethics and algorithmic fairness.Data Science and Analytics Strategy: An Emergent DesTrade Review"Not only does the discipline of data science need this book, it holds critical insights and lessons for other facets of enterprise IT too. For the first time, the critically important ideas of Emergent Design practice have been weaved into the hyper-rational world of data science in an accessible and practical way. Kailash Awati and Alex Scriven have written the first Data Science book of its kind – a must read for anyone interested in the governance of data and the complex problems that data and analytics seeks to help solve." -Paul Culmsee, Managing Partner, Seven Sigma Business Solutions"If you are passionate about the successful implementation of Data Science and Analytics strategies, then put this book on your required reading list. You will learn why and how to define a direction by finding and framing problems that matter to people across the organisation." -Zanne Van Wyk, Worldwide Education Industry Architect at Microsoft"Data Science and Analytics Strategy covers a wide range of topics like building analytics and data science capability, building data driven culture in the organization and ethical aspects of practicing data science. It includes advice which are easy and very practical to use in real world scenarios. All in all, a great read for all those who want to setup analytics and data science practises within their organization. " - Duhita Khadepau Director (Analytics and Data Science), Assignar"A refreshingly practical approach to success in data science and machine learning. The value of Awati and Scriven's contribution to this field is that emergent design lends to data science a coherence that previously was missed in the chasm between the promise of new tech and the organisational change required to harness it. They've bridged that gap with a highly accessible read, weaving the wealth of their collective experience with the rigour of leading researchers, intellectuals and practitioners into a lively jaunt covering the full vocabulary of concepts for leaders (from deep learning to tech stack to GDPR) that will hold 'aha' moments for even the most seasoned data and analytics professionals and (hopefully!) spawn a new generation of strategic leadership and emergent practice in this space." -Passiona Cottee, Associate Director, NSW Government."Succeeding with Data Science and Analytics is no easy ride, however this book gives the reader a range of ideas and actions to combat the challenges faced by professionals in this field. Finding a path to success requires new approaches and this book provides a refreshing perspective for practitioners to consider as they strive for success." -Sandra Hogan, Co-founder Amperfii. Table of ContentsForeword. Preface. Acknowledgements. Contributors. 1. Introduction. 2. What Is Data Science? 3. The Principles of Emergent Design. 4. Charting a Course. 5. Capability and Culture. 6. Technical Choices. 7. Doing Data Science: From Planning to Production. 8. Doing the Right Thing. 9. Coda. Index.
£40.84
Taylor & Francis Ltd Machine Learning and Artificial Intelligence in
Book SynopsisThis book provides applications of machine learning in healthcare systems and seeks to close the gap between engineering and medicine by combining design and problem-solving skills of engineering with health sciences to advance healthcare treatment. Machine Learning and Artificial Intelligence in Healthcare Systems: Tools and Techniques discusses AI-based smart paradigms for reliable prediction of infectious disease dynamics; such paradigms can help prevent disease transmission. It highlights the different aspects of using extended reality for diverse healthcare applications and aggregates the current state of research. The book offers intelligent models of the smart recommender system for personal well-being services and computer-aided drug discovery and design methods. Case studies illustrating the business processes that underlie the use of big data and health analytics to improve healthcare delivery are center stage. Innovative techniques used for extractingTable of Contents1. Artificial Intelligence Challenges, Principles, and Applications in Smart Healthcare Systems. 2. Systematic View and Impact of Artificial Intelligence in Smart Healthcare Systems, principles, challenges and Applications. 3. Application of Machine Learning Techniques in COVID-19 Epidemiology: A Glimpse. 4. Automated Seven-Level Skin Cancer Staging Diagnosis in Dermoscopic images using Deep Learning. 5. Ensemble Classifier Based Predictive Model for Type-2 Diabetes Mellitus Prediction. 6. Machine Learning Approaches for Analysis in Smart Healthcare Informatics. 7. Smart Approaches for Diagnosis of Brain Disorders using Artificial Intelligence. 8. Bridging the Gap Between Technology and Medicine: Approaches of Artificial Intelligence in Healthcare. 9. Brain Tumor Classification using Transfer Learning. 10. Advanced Bayesian Estimation Of Weibull In Early Stage Eye Loss Prediction In Diabetic Retinopathy. 11. Automated Sleep Staging Using Single-Channel EEG SIgnal based on Machine Learning Approaches. 12. Machine Learning Based Intelligent Assistant for Smart Healthcare. 13. AI-Enabled Sentiment Analysis on COVID-19 Vaccination: A Twitter based study. 14. An Early Diagnosis of Lung Nodule Using CT Images based on Hybrid Machine Learning techniques. 15. Early Detection of Alzheimer’s Disease Assisted by AI-Powered Human-Robot Communication.
£142.50
Taylor & Francis Ltd Knowledge Integration Methods for Probabilistic
Book SynopsisKnowledge-based systems and solving knowledge integrating problems have seen a great surge of research activity in recent years. Knowledge Integration Methods provides a wide snapshot of building knowledge-based systems, inconsistency measures, methods for handling consistency, and methods for integrating knowledge bases. The book also provides the mathematical background to solving problems of restoring consistency and integrating probabilistic knowledge bases in the integrating process. The research results presented in the book can be applied in decision support systems, semantic web systems, multimedia information retrieval systems, medical imaging systems, cooperative information systems, and more. This text will be useful for computer science graduates and PhD students, in addition to researchers and readers working on knowledge management and ontology interpretation.Table of Contents1. Introduction 2. Probabilistic Knowledge-based Systems 3. Consistency Measures for Probabilistic Knowledge Bases 4. Methods for Restoring Consistency in Probabilistic Knowledge Bases 5. Distance-Based Methods for Integrating Probabilistic Knowledge Bases 6. Value-based Method for Integrating Probabilistic Knowledge Bases 7. Experiments and Applications 8. Conclusions and Open Problems
£94.99
Taylor & Francis Ltd Network Evolution and Applications
Network Evolution and Applications provides a comprehensive, integrative, and easy approach to understanding the technologies, concepts, and milestones in the history of networking. It provides an overview of different aspects involved in the networking arena that includes the core technologies that are essential for communication and important in our day-to-day life. It throws some light on certain past networking concepts and technologies that have been revolutionary in the history of science and technology and have been highly impactful. It expands on various concepts like Artificial Intelligence, Software Defined Networking, Cloud Computing, and Internet of Things, which are very popular at present. This book focuses on the evolutions made in the world of networking. One can't imagine the world without the Internet today; with the Internet and the present- day networking, distance doesn't matter at all. The COVID-19 pandemic has resulted in a tough time worldwide
£58.89
CRC Press Intelligent Cities
Book SynopsisThe emergence of highly promising and potent technologies has enabled the transition of ordinary objects into smart artifactsproviding wider connectivity of digitized entities that can facilitate the building of connected cities. This book provides readers with a solid foundation on the latest technologies and tools required to develop and enhance smart cities around the world.The book begins by examining the rise of the cloud as the fundamental technology for establishing and sustaining smart cities and enterprises. Explaining the principal technologies and platform solutions for implementing intelligent cities, the book details the role of various technologies, standards, protocols, and tools in establishing flexible homes and the buildings of the future. Examines IT platforms and tools from various product vendors Considers service-oriented architecture and event-driven architecture for smart city applications Explains how to leverage big data aTrade ReviewIn this book, the authors have presented a large number of right and relevant details on realizing and sustaining intelligent cities (the system of systems) across the world. ... this book will be informative and inspiring for readers, especially business executives, technical experts, solution architects, city planners and consultants, and government officials. The book has been designed and developed to be comprehensive and compact in explaining the nitty-gritty of promising smart city technologies, IT solutions, and use cases.—Sandesh Bhat, Vice President, India Software Labs, IBM Table of ContentsEnvisioning Intelligent Cities. Mobile Technologies and Applications for Intelligent Cities. The Role and Relevance of Software-Defined Cloud Infrastructures. Big Data Analytics for Real-Time City Insights. The Internet of Things for Connected and Cognitive Cities. Social Media Analytics for People Empowerment. Intelligent Cities: Strategy-Making and Governance. Smart Homes and Buildings. Smart Energy, Utility, and Transport. Intelligent Airports. Next-Generation Healthcare Systems. Security Management of Intelligent Cities.
£42.74
CRC Press Research Advances in Intelligent Computing
Book SynopsisSince the invention of computers and other similar machines, scientists and researchers have been trying very hard to enhance their capabilities to perform various tasks. As a result, the capabilities of computers are growing exponentially day by day in terms of diverse working domains, versatile jobs, processing speed, and reduced size. Now, we are in the race to make these machines as intelligent as human beings. Artificial intelligence (AI) came up as a way of making a computer or computer software think in a similar manner to the way that humans think. AI is inspired by the study of human brain, including how humans think, learn, decide, and act while trying to solve a problem. The outcomes of this study are the basis of developing intelligent software and systems or intelligent computing (IC). An IC system has the capabilities of reasoning, learning, problem-solving, perception, and linguistic intelligence. IC systems consist of AI techniques as well as other emerging techniques that make a system intelligent. The use of IC has been seen in almost every sub-domain of computer science such as networking, software engineering, gaming, natural language processing, computer vision, image processing, data science, robotics, expert systems, and security. Nowadays, IC is also useful for solving various complex problems in diverse domains such as for predicting disease in medical science, predicting land fertility or crop productivity in agricultural science, predicting market growth in economics, and weather forecasting. For all these reasons, this book presents the advances in AI techniques, under the umbrella of IC. In this context, the book includes recent research that has been done in the areas of machine learning, neural networks, deep learning, evolutionary algorithms, genetic algorithms, swarm intelligence, fuzzy systems, and so on. This book discusses recent theoretical, algorithmic, simulation, and implementation-based advancements related to IC.
£48.16
Taylor & Francis Ltd Web Hacking Arsenal
Book SynopsisIn the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide To Modern Web Pentesting emerges as an essential guide to mastering the art and science of web application pentesting. This book, penned by an expert in the field, ventures beyond traditional approaches, offering a unique blend of real-world penetration testing insights and comprehensive research. It''s designed to bridge the critical knowledge gaps in cybersecurity, equipping readers with both theoretical understanding and practical skills. What sets this book apart is its focus on real-life challenges encountered in the field, moving beyond simulated scenarios to provide insights into real-world scenarios.The core of Web Hacking Arsenal is its ability to adapt to the evolving nature of web security threats. It prepares the reader not just for the challenges of today but also for the unforeseen complexities of the future. This
£33.24
CRC Press Designing for Situation Awareness
Book SynopsisDeveloped by the leading scientists in the field, Designing for Situation Awareness: An Approach to User-Centered Design, Third Edition offers a systematic and successful methodology for supporting the situation awareness (SA) of individuals and teams who work in complex and demanding environments.Newly updated to reflect the latest research on SA, this new edition provides needed background on common SA challenges, the cognitive processes people use to form and maintain SA, and the agile design processes that the SA-Oriented Design processes can compliment. The chapters feature detailed examples of SA-Oriented Design focused on SA in driving, SA in healthcare, SA in command and control, SA in unmanned and remotely operated vehicles, and SA with augmented reality. It also includes 60 detailed design principles for engineers and designers who want to improve the SA provided by their systems based on leading research in the field, as well as 12 principles and proven approaches for developing effective SA training. Design principles focus on supporting peopleâs SA processes and dealing with common SA challenges, supporting an understanding of information certainty, dealing with complexity and alarms, and the effects of automation and AI on SA, as well as supporting the unique SA needs of teams.This book will appeal to any engineer, human factors practitioner, system designer, or other professional interested in situation awareness. It will be highly pertinent to aviation engineers, military engineers, intelligence professionals, emergency management personnel, medical practitioners, air traffic controllers, automobile engineers, financial and business management workers, and power and process control room staff.
£87.39
Taylor & Francis Ltd Machine Learning with oneAPI
Book SynopsisoneAPI is a unified programming model and software development kit (SDK) from Intel that empowers software developers to generate high-performance applications that can run on different devices, comprising CPUs, GPUs, FPGAs, and other accelerators. It lets developers write code once and deploy it on multiple architectures, decreasing the complexity as well as the cost and time of software development. One of the significant strengths of oneAPI is in its capability to support an eclectic range of devices and architectures, including artificial intelligence, high-performance computing, and data analytics. Along with libraries, tools, and compilers, oneAPI makes it cool for developers to create optimized code for an extensive variety of applications, making it an indispensable tool for any developer who wants to create high-performance software and reap the benefit of the latest hardware technologies. The versatility of oneAPI, by means of appropriate theory and practical implementatioTable of ContentsChapter 1 Intel oneAPI: An Introductory DiscussionChapter 2 The Intel oneAPI Toolkits: An Exploration Chapter 3 The Intel DevCloud and Jupyter Notebooks Chapter 4 What Is Machine Learning?: An Introduction! Chapter 5 Tools and Pre-requisites Chapter 6 Supervised Learning Chapter 7 Support Vector Machines (SVM): An Exploration Chapter 8 Decision Trees Chapter 9 Bagging Chapter 10 Boosting and Stacking Chapter 11 Clustering Techniques and Principial Component Analysis Chapter 12 More Intel Tools for Enhanced Developm ent Experience
£42.74
Taylor & Francis Ltd Dark World
Book SynopsisDiscover the hidden depths of the digital underworld in this comprehensive, interdisciplinary exploration of the dark web.Ideal for security agencies, professionals, counter-terrorism experts, and policymakers alike, this work offers invaluable insights that will enhance understanding and fortify strategies. By shedding particular light on the nuances of the dark market,' this book provides readers with a detailed understanding of the dark web, encompassing both its sinister underbelly and unexpected potential.This book also uncovers the latest trends and cutting-edge mitigation techniques. From illicit transactions to thriving business ventures, it examines the key domains and sectors that thrive within this clandestine environment. This book consolidates myriad perspectives on security and threats on the dark web.Table of Contents1. Cybersecurity and The Dark Web. 2. A Guide to The Dark and Deep Web. 3. Dark Web Access with TOR Browser. 4. The Dark Web's Perils. 5. Cybercrime on The Dark Web. 6. Red Room Deep Web. 7. Terrorist Acts on The Surface and Dark Web. 8. Dark Web Markets. 9. We Are Anonymous. 10. Hitman for Hire. 11. The Positive and Evil Side of The Dark Web. 12. Techniques for Analyzing Dark Web Content. 13. Information Extraction from Dark Web Contents and Logs. 14. Dark Web Forensics. 15. OSINT Opensource Intelligence. 16. Emerging Dark Web Trends and Mitigation Techniques. 17. The Dark Web's Future. 18. Your Business on The Dark Web. Glossary. Bibliography.
£42.74
Taylor & Francis Ltd Raspberry Pi OS System Administration with
Book SynopsisThe second in a new series exploring the basics of Raspberry Pi Operating System administration, this installment builds on the insights provided in Volume 1 to provide a compendium of easy-to-use and essential Raspberry Pi OS system administration for the novice user, with specific focus on Python and Python3.The overriding idea behind system administration of a modern, 21st-century Linux system such as the Raspberry Pi OS is the use of systemd to ensure that the Linux kernel works efficiently and effectively to provide these three foundation stones of computer operation and management: computer system concurrency, virtualization, and secure persistence. Exercises are included throughout to reinforce the readers' learning goals with solutions and example code provided on the accompanying GitHub site.This book is aimed at students and practitioners looking to maximize their use of the Raspberry Pi OS. With plenty of practical examples, projects, and exercises, this volTable of ContentsSeries Preface. Volume 2 Preface. 0. "Quick Start" into Sysadmin for the Raspberry Pi OS. 1. Raspberry Pi OS System Administration Fundamentals. 2. Python3. Questions, Problems, and Projects. Index.
£42.74
CRC Press Cyber CISO Marksmanship
Book SynopsisCyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively bring together the best of the best on what works and what doesnât, as a CISO, in a unique storytelling format. This book is designed for a Chief Information Security Officer (CISO) or an individual seeking this role and also has value to other types of cyber leaders. Knowledge and understanding of traditional books can only get you so far â Cyber CISO Marksmanship has powerful perspectives, real-world accounts, and insights you wonât find anywhere else!Key features included with Cyber CISO Marksmanship: Over a century of CISO experience is represented by the authors of this book Unique storytelling format based upon real-world accounts from leading CISOs Sharpshooter perspectives from multiple CISOs for each story Bottom Line Up Front (BLUF) for quick referenc
£42.74
CRC Press Applications of Federated Learning in Technological Advancements
Book SynopsisThis book explores the applications and advancements of Federated Learning across diverse sectors, focusing on its integration with cutting-edge technologies like IoT, AI, Blockchain, and Digital Twins. Real-world examples and case studies illustrate Federated Learningâs role in healthcare, smart cities, and maritime applications while addressing critical concerns such as security. It provides insights into Federated Learning's transformative potential, offering practical strategies for intelligent systems and sustainable environments. Focuses on the Federated Learning-based Model Optimization, addressing the significance of IoT and Federated Learning in the evolution of intelligent systems for various applications Describes the different optimisation techniques of federated learning systems from a practical point of view Highlights economic, social, and environmental impacts of smart technologies and provides insights into IoT, 5G/6G communication, and computing standards Provides analysis of the use cases of federated learning regarding the development of IoT, AI, Blockchain, Digital twins Offers strategies to overcome challenges for overcoming challenges associated with Federated Learning systems, including connectivity, computation, threats, privacy and security issues. It covers fundamental concepts, practical implementations, and trends to serve as a reference resource for professionals and researchers in the field.
£144.01
CRC Press Artificial Intelligence of Things for Smarter
Book SynopsisThis book takes readers on a captivating journey into the transformative role of Artificial Intelligence (AI) and AI of Things (AIoT) technologies in reshaping sustainable urban development. By combining comprehensive theoretical analyses, synthesized empirical evidence, and practical case studies, it offers pioneering interdisciplinary insights and unifying frameworks. The book highlights the synergistic integration of Urban Brain (UB), Urban Digital Twin (UDT), Smart Urban Metabolism (SUM), and platform urbanism, underscored by their collaborative potential to revolutionize the environmental management, planning, and governance of smarter ecoâcities and sustainable smart cities. It leverages cuttingâedge technologies and dataâdriven approaches to optimize urban systems, resource efficiency, and resilience. This approach provides a holistic understanding of the rapidly evolving landscape of AIâ and AIoTâdriven sustainable urban development.Targeting a broad and diverse audie
£90.24
O'Reilly Media Nginx Cookbook
Book SynopsisNGINX is one of the most widely used web servers available today, in part because of its capabilities as a load balancer and reverse proxy server for HTTP and other network protocols. This revised cookbook provides easy-to-follow examples of real-world problems in application delivery.
£35.99
Cambridge University Press Elements of Logical Reasoning
Book SynopsisSome of our earliest experiences of the conclusive force of an argument come from school mathematics: faced with a mathematical proof, we cannot deny the conclusion once the premises have been accepted. Behind such arguments lies a more general pattern of 'demonstrative arguments' that is studied in the science of logic. Logical reasoning is applied at all levels, from everyday life to advanced sciences, and a remarkable level of complexity is achieved in everyday logical reasoning, even if the principles behind it remain intuitive. Jan von Plato provides an accessible but rigorous introduction to an important aspect of contemporary logic: its deductive machinery. He shows that when the forms of logical reasoning are analysed, it turns out that a limited set of first principles can represent any logical argument. His book will be valuable for students of logic, mathematics and computer science.Trade Review'Elements of Logical Reasoning fills a gap by providing some much needed explanation and motivation to an otherwise dry literature.' Henry Towsner, The Mathematical IntelligencerTable of ContentsPart I. First Steps in Logical Reasoning: 1. Starting points; 2. Rules of proof; 3. Natural deduction; 4. Proof search; 5. Classical natural deduction; 6. Proof search in classical logic; 7. The semantics of propositional logic; Part II. Logical Reasoning with the Quantifiers: 8. The quantifiers; 9. Derivations in predicate logic; 10. The semantics of predicate logic; Part III. Beyond Pure Logic: 11. Equality and axiomatic theories; 12. Elements of the proof theory of arithmetic; Part IV. Complementary Topics: 13. Normalization and cut elimination; 14. Deductive machinery from Aristotle to Heyting.
£22.99
Cambridge University Press Mathematical Logic and Computation
Book SynopsisThis book presents mathematical logic from the syntactic point of view, with an emphasis on aspects that are fundamental to computer science. It is an excellent introduction for graduate students and advanced undergraduates interested in logic in mathematics, computer science, and philosophy, and an invaluable reference for professional logicians.Trade Review'Avigad provides a much needed introduction to mathematical logic that foregrounds the role of syntax and computability in our understanding of consistency and inconsistency. The result provides a jumping off point to any of the fields of modern logic, not only teaching the technical groundwork, but also providing a window into how to think like a logician.' Henry Towsner, University of Pennsylvania'This book by one of the most knowledgeable researchers in the field covers a remarkably broad selection of material without sacrificing depth. Its clear organization and unified approach - focused on a syntactic approach and on the role of computation - make it suitable for a wide range of introductory logic sequences at the upper-level undergraduate and graduate level, as well as a valuable resource for background material in more advanced logic courses.' Denis Hirschfeldt, University of Chicago'… an excellent addition to the literature, with plenty more than enough divergences and side-steps from the more well-trodden paths through the material to be consistently interesting … this is most certainly a book to make sure your library gets.' Peter Smith, Logic MattersTable of ContentsPreface; 1. Fundamentals; 2. Propositional Logic; 3. Semantics of Propositional Logic; 4. First-Order Logic; 5. Semantics of First-Order Logic; 6. Cut Elimination; 7. Properties of First-Order Logic; 8. Primitive Recursion; 9. Primitive Recursive Arithmetic; 10. First-Order Arithmetic; 11. Computability 12. Undecidability and Incompleteness; 13. Finite Types; 14. Arithmetic and Computation; 15. Second-Order Logic and Arithmetic; 16. Subsystems of Second-Order Arithmetic; 17. Foundations; Appendix; References; Notation; Index.
£56.99
Cambridge University Press The Dialogical Roots of Deduction
Book SynopsisThis comprehensive account of the concept and practices of deduction is the first to bring together perspectives from philosophy, history, psychology and cognitive science, and mathematical practice. Catarina Dutilh Novaes draws on all of these perspectives to argue for an overarching conceptualization of deduction as a dialogical practice: deduction has dialogical roots, and these dialogical roots are still largely present both in theories and in practices of deduction. Dutilh Novaes'' account also highlights the deeply human and in fact social nature of deduction, as embedded in actual human practices; as such, it presents a highly innovative account of deduction. The book will be of interest to a wide range of readers, from advanced students to senior scholars, and from philosophers to mathematicians and cognitive scientists.Trade Review'The Dialogical Roots of Deduction displays a formidable command of an impressive range of sources from ancient and mediaeval logic to the latest work in cognitive science. The depth of Catarina Dutilh Novaes's scholarship is evident throughout as she defends a novel and provocative thesis: that deduction as dialogue is conceptually and historically prior to its conventional monologue presentation. I expect the book to be influential and widely discussed.' Andrew Aberdein, Florida Institute of Technology'Reframing the philosophy of logic, this pathbreaking book develops a historically informed and philosophically powerful new conception of how the pragmatic foundations of logical deductive relations, and so the semantics of logical concepts, can be found in dialogic social practices that suitably balance cooperation and competition.' Bob Brandom, University of Pittsburgh'Philosophers and scientists working on human cognition have much to gain from assimilating the careful research put into this book.' Tricia Mae Barcelita, Metascience'Dutilh Novaes has already made a substantial contribution to this literature, and her new book develops this program in new and exciting directions by drawing on a tradition of deductive reasoning that descends from the public debates of the Athenian democracy, through a central strand in Western intellectual history, and into current scientific research into human cognition. Philosophers and scientists working on human cognition have much to gain from assimilating the careful research put into this book.' Preston Stovall, Metascience'This book is required reading not only for those interested in the history and philosophy of logic. It has something to teach any of us who are interested in what we are doing when we reason together. The lessons we learn will help us address some of our old questions from new perspectives, and will leave us asking fresh questions, too.' Greg Restall, MINDTable of ContentsPreface; Part I. The Philosophy of Deduction: 1. The trouble with deduction; 2. Back to the roots of deduction; 3. The Prover-Skeptic dialogues; 4. Deduction as a dialogical notion; Part II. The History of Deduction: 5. Deduction in mathematics and dialectic in Ancient Greece; 6. Aristotle's syllogistic, and other ancient logical traditions; 7. Logic and deduction in the Middle Ages and the modern period; Part III. Deduction and Cognition: 8. How we reason, individually and in groups; 9. The ontogeny of deductive reasoning; 10. The phylogeny of deductive reasoning; 11. A dialogical account of proofs in mathematical practice; Conclusions.
£23.74
John Wiley & Sons Inc 802.1aq Shortest Path Bridging Design and
Book SynopsisFacilitates both the understanding and adoption of 802.1aq as a networking solution 802.1aq Shortest Path Bridging (SPB) is a technology that greatly simplifies the creation and configuration of carrier, enterprise, and cloud computing networksby using modern computing power to deprecate signaling, and to integrate multicast, multipath routing, and large-scale virtualization. It is arguably one of the most significant enhancements in Ethernet''s history. 802.1aq Shortest Path Bridging Design and Evolution explains both the what and the why of the technology standard being set today. It covers which decisions were elective and which were dictated by the design goals by using a multipart approach that first explains what SPB is, before transitioning into narrative form to describe the design processes and decisions behind it. To make SPB accessible to the data networking professional from multiple perspectives, the book: Provides a RTable of Contents Figures vii Acknowledgments ix Introduction xi Abbreviations xvii 1. IEEE 802.1aq in a Nutshell: Antecedents and Technology 1 2. Why SPB Looks as It Does 36 3. Why the SPB Control Plane Looks as It Does 74 4. Practical Deployment Considerations 130 5. Applications of SPB 150 6. Futures 158 Conclusion 186 References 188 Index 190
£54.86
John Wiley & Sons Inc Learning Computer Architecture with Raspberry Pi
Book SynopsisUse your Raspberry Pi to get smart about computing fundamentals In the 1980s, the tech revolution was kickstarted by a flood of relatively inexpensive, highly programmable computers like the Commodore. Now, a second revolution in computing is beginning with the Raspberry Pi. Learning Computer Architecture with the Raspberry Pi is the premier guide to understanding the components of the most exciting tech product available. Thanks to this book, every Raspberry Pi owner can understand how the computer works and how to access all of its hardware and software capabilities. Now, students, hackers, and casual users alike can discover how computers work with Learning Computer Architecture with the Raspberry Pi. This book explains what each and every hardware component does, how they relate to one another, and how they correspond to the components of other computing systems. You''ll also learn how programming works and how the operating system relates to tTable of ContentsIntroduction 1 Cambridge 1 Cut to the Chase 3 The Knee in the Curve 4 Forward the Foundation 5 Chapter 1 The Shape of a Computer Phenomenon 7 Growing Delicious, Juicy Raspberries 7 System-on-a-Chip 10 An Exciting Credit Card-Sized Computer 12 What Does the Raspberry Pi Do? 14 Meeting and Greeting the Raspberry Pi Board 14 GPIO Pins 15 Status LEDs 16 USB Receptacles 18 Ethernet Connection 18 Audio Out 19 Composite Video 21 CSI Camera Module Connector 21 HDMI 22 Micro USB Power 22 Storage Card 23 DSI Display Connection 24 Mounting Holes 25 The Chips 25 The Future 25 Chapter 2 Recapping Computing 27 The Cook as Computer 28 Ingredients as Data 28 Basic Actions 30 The Box That Follows a Plan 31 Doing and Knowing 31 Programs are Data 32 Memory 33 Registers 34 The System Bus 36 Instruction Sets 36 Voltages, Numbers and Meaning 37 Binary: Counting in 1s and 0s 37 The Digit Shortage 40 Counting and Numbering and 0 40 Hexadecimal as a Shorthand for Binary 41 Doing Binary and Hexadecimal Arithmetic 43 Operating Systems: The Boss of the Box 44 What an Operating System Does 44 Saluting the Kernel 46 Multiple Cores 46 Chapter 3 Electronic Memory 47 There Was Memory Before There Were Computers 47 Rotating Magnetic Memory 48 Magnetic Core Memory 50 How Core Memory Works 50 Memory Access Time 52 Static Random Access Memory (SRAM) 53 Address Lines and Data Lines 54 Combining Memory Chips into Memory Systems 56 Dynamic Random Access Memory (DRAM) 59 How DRAM Works 60 Synchronous vs. Asynchronous DRAM 62 SDRAM Columns, Rows, Banks, Ranks and DIMMs 64 DDR, DDR2 DDR3 and DDR4 SDRAM 66 Error-Correcting Code (ECC) Memory 69 The Raspberry Pi Memory System 70 Power Reduction Features 70 Ball-Grid Array Packaging 71 Cache 72 Locality of Reference 72 Cache Hierarchy 72 Cache Lines and Cache Mapping 74 Direct Mapping 76 Associative Mapping 78 Set-Associative Cache 79 Writing Cache Back to Memory 81 Virtual Memory 81 The Virtual Memory Big Picture 82 Mapping Virtual to Physical 83 Memory Management Units: Going Deeper 84 Multi-Level Page Tables and the TLB 88 The Raspberry Pi Swap Problem 88 Watching Raspberry Pi Virtual Memory 90 Chapter 4 ARM Processors and Systems-on-a-Chip 93 The Incredible Shrinking CPU 93 Microprocessors 94 Transistor Budgets 95 Digital Logic Primer 95 Logic Gates 96 Flip-Flops and Sequential Logic 97 Inside the CPU 99 Branching and Flags 101 The System Stack 102 System Clocks and Execution Time 105 Pipelining 106 Pipelining in Detail 108 Deeper Pipelines and Pipeline Hazards 109 The ARM11 Pipeline 112 Superscalar Execution 113 More Parallelism with SIMD 115 Endianness 118 Rethinking the CPU: CISC vs. RISC 119 RISC's Legacy 121 Expanded Register Files 122 Load/Store Architecture 122 Orthogonal Machine Instructions 123 Separate Caches for Instructions and Data 123 ARMs from Little Acorns Grow 124 Microarchitectures, Cores and Families 125 Selling Licenses Rather Than Chips 125 ARM11 126 The ARM Instruction Set 126 Processor Modes 129 Modes and Registers 131 Fast Interrupts 137 Software Interrupts 137 Interrupt Priority 138 Conditional Instruction Execution 139 Coprocessors 142 The ARM Coprocessor Interface 143 The System Control Coprocessor 143 The Vector Floating Point (VFP) Coprocessor 144 Emulating Coprocessors 145 ARM Cortex 145 Multiple-Issue and Out-Of-Order Execution 146 Thumb 2 147 Thumb EE 147 big.LITTLE 147 The NEON Coprocessor for SIMD 148 ARMv8 and 64-Bit Computing 148 Systems on a Single Chip 150 The Broadcom BCM2835 SoC 150 Broadcom's Second- and Third-Generation SoC Devices 151 How VLSI Chips Happen 151 Processes, Geometries and Masks 152 IP: Cells, Macrocells and Cores 153 Hard and Soft IP 154 Floorplanning, Layout and Routing 154 Standards for On-Chip Communication: AMBA 155 Chapter 5 Programming 159 Programming from a Height 159 The Software Development Process 160 Waterfall vs. Spiral vs. Agile 162 Programming in Binary 165 Assembly Language and Mnemonics 166 High-Level Languages 167 Après BASIC, Le Deluge 170 Programming Terminology 171 How Native-Code Compilers Work 173 Preprocessing 174 Lexical Analysis 175 Semantic Analysis 175 Intermediate Code Generation 176 Optimisation 176 Target Code Generation 176 Compiling C: A Concrete Example 177 Linking Object Code Files to Executable Files 183 Pure Text Interpreters 184 Bytecode Interpreted Languages 186 P-Code 186 Java 187 Just-In-Time (JIT) Compilation 189 Bytecode and JIT Compilation Beyond Java 191 Android, Java and Dalvik 191 Data Building Blocks 192 Identifiers, Reserved Words, Symbols and Operators 192 Values, Literals and Named Constants 193 Variables, Expressions and Assignment 193 Types and Type Definitions 194 Static and Dynamic Typing 196 Two's Complement and IEEE 754 198 Code Building Blocks 200 Control Statements and Compound Statements 200 If/Then/Else 200 Switch and Case 202 Repeat Loops 205 While Loops 205 For Loops 207 The Break and Continue Statements 208 Functions 210 Locality and Scope 211 Object-Oriented Programming 214 Encapsulation 217 Inheritance 219 Polymorphism 221 OOP Wrapup 224 A Tour of the GNU Compiler Collection Toolset 224 gcc as Both Compiler and Builder 225 Using Linux Make 228 Chapter 6 Non-Volatile Storage 231 Punched Cards and Tape 232 Punched Cards 232 Tape Data Storage 232 The Dawn of Magnetic Storage 235 Magnetic Recording and Encoding Schemes 236 Flux Transitions 237 Perpendicular Recording 238 Magnetic Disk Storage 240 Cylinders, Tracks and Sectors 240 Low-Level Formatting 242 Interfaces and Controllers 244 Floppy Disk Drives 246 Partitions and File Systems 247 Primary Partitions and Extended Partitions 247 File Systems and High-Level Formatting 249 The Future: GUID Partition Tables (GPTs) 249 Partitions on the Raspberry Pi SD Card 250 Optical Discs 252 CD-Derived Formats 254 DVD-Derived Formats 254 Ramdisks 255 Flash Storage 257 ROMs, PROMs and EPROMs 257 Flash as EEPROM 258 Single-Level vs. Multi-Level Storage 260 NOR vs. NAND Flash 261 Wear Levelling and the Flash Translation Layer 265 Garbage Collection and TRIM 267 SD Cards 268 eMMC 270 The Future of Non-Volatile Storage 271 Chapter 7 Wired and Wireless Ethernet 273 The OSI Reference Model for Networking 274 The Application Layer 276 The Presentation Layer 276 The Session Layer 278 The Transport Layer 278 The Network Layer 279 The Data Link Layer 281 The Physical Layer 282 Ethernet 282 Thicknet and Thinnet 283 The Basic Ethernet Idea 283 Collision Detection and Avoidance 285 Ethernet Encoding Systems 286 PAM-5 Encoding 290 10BASE-T and Twisted-Pair Cabling 291 From Bus Topology to Star Topology 292 Switched Ethernet 293 Routers and the Internet 296 Names vs. Addresses 296 IP Addresses and TCP Ports 297 Local IP Addresses and DHCP 300 Network Address Translation 302 Wi-Fi 304 Standards within Standards 305 Facing the Real World 305 Wi-Fi Equipment in Use 309 Infrastructure Networks vs. Ad Hoc Networks 311 Wi-Fi Distributed Media Access 312 Carrier Sense and the Hidden Node Problem 314 Fragmentation 315 Amplitude Modulation, Phase Modulation and QAM 316 Spread-Spectrum Techniques 319 Wi-Fi Modulation and Coding in Detail 320 How Wi-Fi Connections Happen 323 Wi-Fi Security 325 Wi-Fi on the Raspberry Pi 326 Even More Networking 329 Chapter 8 Operating Systems 331 Introduction to Operating Systems 333 History of Operating Systems 333 The Basics of Operating Systems 336 The Kernel: The Basic Facilitator of Operating Systems 343 Operating System Control 344 Modes 345 Memory Management 346 Virtual Memory 347 Multitasking 347 Disk Access and File Systems 348 Device Drivers 349 Enablers and Assistants to the Operating System 349 Waking Up the OS 349 Firmware 353 Operating Systems for Raspberry Pi 354 NOOBS 354 Third-Party Operating Systems 356 Other Available Operating Systems 356 Chapter 9 Video Codecs and Video Compression 359 The First Video Codecs 360 Exploiting the Eye 361 Exploiting the Data 363 Understanding Frequency Transform 367 Using Lossless Encoding Techniques 371 Changing with the Times 373 The Latest Standards from MPEG 374 H.265 378 Motion Search 378 Video Quality 381 Processing Power 382 Chapter 10 3D Graphics 383 A Brief History of 3D Graphics 383 The Graphical User Interface (GUI) 384 3D Graphics in Video Games 386 Personal Computing and the Graphics Card 387 Two Competing Standards 390 The OpenGL Graphics Pipeline 391 Geometry Specification and Attributes 393 Geometry Transformation 396 Lighting and Materials 400 Primitive Assembly and Rasterisation 403 Pixel Processing (Fragment Shading) 405 Texturing 407 Modern Graphics Hardware 411 Tiled Rendering 411 Geometry Rejection 413 Shading 415 Caching 416 Raspberry Pi GPU 417 Open VG 421 General Purpose GPUs 423 Heterogeneous Architectures 423 OpenCL 425 Chapter 11 Audio 427 Can You Hear Me Now? 427 MIDI 428 Sound Cards 428 Analog vs. Digital 429 Sound and Signal Processing 430 Editing 431 Compression 431 Recording with Effects 432 Encoding and Decoding Information for Communication 433 1-Bit DAC 434 I2S 436 Raspberry Pi Sound Input/Output 437 Audio Output Jack 437 HDMI 438 Sound on the Raspberry Pi 438 Raspberry Pi Sound on Board 439 Manipulating Sound on the Raspberry Pi 439 Chapter 12 Input/Output 447 Introducing Input/Output 448 I/O Enablers 451 Universal Serial Bus 452 USB Powered Hubs 455 Ethernet 457 Universal Asynchronous Receiver/Transmitters 458 Small Computer Systems Interface 459 Parallel ATA 459 Serial Advanced Technology Attachment 460 RS-232 Serial 460 High Definition Media Interface 461 I2S 462 I2C 463 Raspberry Pi Display, Camera Interface and JTAG 464 Raspberry Pi GPIO 464 GPIO Overview and the Broadcom SoC 465 Meeting the GPIO 466 Programming GPIO 473 Alternative Modes 479 GPIO Experimentation the Easy Way 480 Index 481
£20.40
John Wiley & Sons Inc 3D IC and RF SiPs Advanced Stacking and Planar
Book SynopsisAn interdisciplinary guide to enabling technologies for 3D ICs and 5G mobility, covering packaging, design to product life and reliability assessments Features an interdisciplinary approach to the enabling technologies and hardware for 3D ICs and 5G mobility Presents statistical treatments and examples with tools that are easily accessible, such as Microsoft's Excel and Minitab Fundamental design topics such as electromagnetic design for logic and RF/passives centric circuits are explained in detail Provides chapter-wise review questions and powerpoint slides as teaching tools Table of Contents1 MM and MTM for Mobility 1 1.1 Convergence in Communications and the Future, 5G 3 1.1.1 From 1980 (1G) to 2010 (4G) 3 1.1.2 LTE-A and Rel 10 in 2010s 6 1.1.3 The Future: 5G and IoT (Targeting 2020) 8 1.2 Review of Key Products in Communication Networks 14 1.2.1 Wired Communications 14 1.2.2 Wireless Communications 21 1.3 MM and MTM, an Intro to Hardware Technology 31 1.3.1 Moore’s Law 31 1.3.2 More Than Moore 43 1.3.3 MTM Packaging Map and MM MTM Business Model 53 2 Interconnects 67 2.1 Hierarchy of Interconnection 69 2.1.1 On Chip (Level 0) Interconnections 69 2.1.2 Peripheral Pads on Semiconductor ICs (Level 0) 72 2.1.3 Al pads (Wirebond and Flip Chip) 73 2.1.4 Cu/Low K Re-Distribution Using Damascene Techniques (Flip Chip) 74 2.1.5 Au Pads (III–V) 77 2.1.6 Level 1 Interconnections: WB and FC—Why FC Interconnections are Preferred? 78 2.2 Level 1, Interconnection Gap in FC-PBGA, and Level 0.5 80 2.2.1 Wirebonds 80 2.2.2 Flip Chip Bumps with UBM 85 2.2.3 TSV and Microbumps, Cu or Au Stud Bumps (Level 0.5) 91 2.3 Changing Dynamics of Semiconductor Manufacturing 100 2.3.1 Bumping Itself is a Business 100 2.3.2 Cu/Low-K in BEOL 102 2.3.3 Wafer Fab Foundry and OSAT are Competing for Their Business Shares 102 3 State of the Art IC Packages, Modules, and Substrates 111 3.1 Single-Chip Packages (SCPs): Standardized Packages 113 3.1.1 Lead Frame Based: SO, QFP/QFN, and TAB 114 3.1.2 Organic Interposer Based: BGA/CSP and LGA 114 3.1.3 Known Good Bare Die 120 3.1.4 Single-Chip Packaging Processes 121 3.1.5 IC Testing 123 3.2 Advanced IC Substrates and Assembly 124 3.2.1 MLO Substrates for ICs 126 3.2.2 Multi-Layered Organic (MLO) for IC Packages 127 3.3 Customized Assemblies: MCP/MCMs and Modules 130 3.3.1 Multi-Chip Module (MCM) or Multi-Chip Package (MCP) 131 3.3.2 Modules 132 4 Passives Technology 139 4.1 Thick-Film Ceramic Technology (TFC) for MLC 146 4.1.1 Green Tapes 146 4.1.2 Thick-Film Fabrication 149 4.1.3 LTCC EPs, Thick-Film IPD, and LTCC-Based RF Modules 151 4.1.4 SMT (or SMD) 155 4.2 MLO Passives by Laminate Organic (LO) 156 4.2.1 MLO-Based RF Modules 156 4.2.2 Laminates 156 4.2.3 MLO Fabrication 157 4.2.4 MLO EPs and RF Modules 159 4.3 On-Chip Passives 166 4.3.1 RF Isolation (BCM4330) 166 4.3.2 Monolithic FEOL On-Chip Passives 168 4.3.3 Rs, Ls, and Cs in BEOL Layers 170 4.3.4 Goals 172 4.4 Thin-Film Multilayer (TFM) and IPD 173 4.5 Summary on Passives Fabrication Technologies: Solutions for RF-Passives Systems 191 5 Electrical Design for 5G Hardware—Digital Focus 199 5.1 Introduction to PCB 201 5.2 Signal Transmission Techniques: Singled-Ended and Differential Signals 202 5.2.1 Single-Ended and Differential 202 5.3 Co-Design Examples 216 5.3.1 Interconnection RF Models and Library 216 5.3.2 Chip-Package and Chip-Package-Board Co-Designs 219 5.4 Wide I/O Memory Using TSVs 228 5.4.1 JEDEC Memory Standards 230 5.4.2 Data Structure Using TSV-Based Wide I/O 230 6 Electrical Design for 5G Hardware—RF Focus 239 6.1 PHY, Modulated RF Carriers; a PoP Possible? 240 6.1.1 Frequency Bands and Wave Propagation Characteristics 240 6.1.2 Narrow-Band Process and CW Carrier for Digital Signals 242 6.2 Antennas 244 6.2.1 Two Often Encountered RF Passive Structures in Modern Portable Electronics: Antenna and Its Feed 244 6.2.2 Types of Antennas: Linear, Microstrip-Patch, and Multi-Element Antenna 245 6.2.3 Active-Integrated Antennas and Measurement of Antenna Performance 251 6.3 RF Functional Components 256 6.3.1 Bandpass Filters 256 6.3.2 Baluns 257 6.3.3 Switches and Duplexers 262 6.4 EMI/EMC 263 6.4.1 Sources of Interference 264 6.4.2 Diagnostic and Regulations Conformation Techniques 264 6.4.3 Containment Techniques 267 7 Product, Process Development, and Control 271 7.1 Business Processes 272 7.1.1 Strategic Management (Product and Process Development) 272 7.1.2 Design and Manufacturing; Outsourced or Not 273 7.2 History of Statistical Approach for Quality Management 273 7.2.1 Quality Guidelines and Standards 274 7.2.2 Semiconductor Process Development and Characterization 274 7.3 APQP—An Iterative Process for Product and Process Development 275 7.3.1 Translate Product Ideas Into Processes 275 7.4 FMEA, Control Plan, and Initial Process Study 276 7.4.1 RPN 276 7.4.2 Locating the Root Causes 281 7.4.3 Pre-Launch Control Plan 283 7.4.4 Initial Process Study 284 7.5 PPAP and SPC 287 7.5.1 PPAP 287 7.5.2 SPC 287 8 Product Life and Reliability Assessment 291 8.1 Product Life Prediction 292 8.1.1 Calculate MTTF from Processes and Theoretical Distributions 293 8.1.2 Practices to Obtain the Expected Product Life 296 8.1.3 Activation Energy 300 8.2 Reliability Assessment 301 8.2.1 Assessment Variables for Reliability Tests 302 8.2.2 Reliability Assessment Practices 303 8.2.3 Discussions on Weibull Analysis and Weibull Plotting 309 9 Hardware Solutions for 5G Mobility 317 9.1 5G Mobility Products and Planar Solutions 318 9.1.1 High-Density and Logic Products 319 9.1.2 RF-Passives Systems 326 9.1.3 A Summary: WLP and LPP Used for Both HD&L and RF-Passives Products 333 9.2 Advanced Interconnection and Future Business Model 336 9.2.1 Advanced Interconnection 336 9.2.2 New Business Model 341 9.3 Finale—What’s Not 343 9.3.1 New from Wafer Foundries 343 9.3.2 System and Architectural Design of Mobile Handsets 345 9.3.3 Thermo-Mechanical and Thermal Science 349 9.3.4 Sensors and IoT 349 A Failure Mechanisms and Failure Analysis 357 A.1 Failure Mechanisms, or Macroscopic Models 358 A.1.1 Silicon Oxide Breakdown 359 A.1.2 Stress-Induced Migration (SM) 360 A.1.3 Electro-Migration (EM) and Hillocks 360 A.1.4 Spiking 362 A.1.5 IMC, Purple plague (Gold-Al Intermetallics) 363 A.1.6 Fatigue and Creeping 364 A.1.7 Die Cracking 366 A.1.8 Delamination and Popcorning 366 A.1.9 Corrosion 367 A.2 Failure Analysis (FA) Techniques and FA Tools 368 A.2.1 De-Processing (or De-Capping) Techniques 368 A.2.2 Microscopic and Analytical Tools 369 B ANOVA 375 B.1 One-Way ANOVA 376 B.2 Two-Way ANOVA 377 C Gauge R&R and DOE 381 C.1 GR&R 381 C.1.1 AIAG’s Xbar/Range Method for Gauge R&R Study 381 C.1.2 Minitab 383 C.1.3 GR&R Casted in the ANOVA Format 383 C.1.4 Criteria 384 C.2 DOE 384 C.2.1 DOE Guidelines 385 C.2.2 2k Runs, Unreplicated Case 386 C.2.3 Fractional Factorial Designs, 2k-p Run, p = 1, 2,.., < k 399 D Statistics Tables 409 D.1 F Distribution 409 D.2 Poisson Table of Expected # of Occurrences at a Confidence Level (C.L.) 409 D.3 MR Percentile Table 409
£104.36
John Wiley & Sons Inc Systems Engineering Neural Networks
Book SynopsisSYSTEMS ENGINEERING NEURAL NETWORKS A complete and authoritative discussion of systems engineering and neural networks In Systems Engineering Neural Networks, a team of distinguished researchers deliver a thorough exploration of the fundamental concepts underpinning the creation and improvement of neural networks with a systems engineering mindset. In the book, you'll find a general theoretical discussion of both systems engineering and neural networks accompanied by coverage of relevant and specific topics, from deep learning fundamentals to sport business applications. Readers will discover in-depth examples derived from many years of engineering experience, a comprehensive glossary with links to further reading, and supplementary online content. The authors have also included a variety of applications programmed in both Python 3 and Microsoft Excel. The book provides: A thorough introduction to neural networks, introduced as key element of complex systems Practical discussions of sTable of ContentsABOUT THE AUTHORS ACKNOWLEDGEMENTS 7 HOW TO READ THIS BOOK 8 Part I 9 1 A BRIEF INTRODUCTION 9 THE SYSTEMS ENGINEERING APPROACH TO ARTIFICIAL INTELLIGENCE (AI) 14 SOURCES 18 CHAPTER SUMMARY 18 QUESTIONS 19 2 DEFINING A NEURAL NETWORK 20 BIOLOGICAL NETWORKS 22 FROM BIOLOGY TO MATHEMATICS 24 WE CAME A FULL CIRCLE 25 THE MODEL OF McCULLOCH-PITTS 25 THE ARTIFICIAL NEURON OF ROSENBLATT 26 FINAL REMARKS 33 SOURCES 35 CHAPTER SUMMARY 36 QUESTIONS 37 3 ENGINEERING NEURAL NETWORKS 38 A BRIEF RECAP ON SYSTEMS ENGINEERING 40 THE KEYSTONE: SE4AI AND AI4SE 41 ENGINEERING COMPLEXITY 41 THE SPORT SYSTEM 45 ENGINEERING A SPORT CLUB 51 OPTIMISATION 52 AN EXAMPLE OF DECISION MAKING 56 FUTURISM AND FORESIGHT 60 QUALITATIVE TO QUANTITATIVE 61 FUZZY THINKING 64 IT IS ALL IN THE TOOLS 74 SOURCES 77 CHAPTER SUMMARY 77 QUESTIONS 78 Part II 79 4 SYSTEMS THINKING FOR SOFTWARE DEVELOPMENT 79 PROGRAMMING LANGUAGES 82 ONE MORE THING: SOFTWARE ENGINEERING 94 CHAPTER SUMMARY 101 QUESTIONS 102 SOURCES 102 5 PRACTICE MAKES PERFECT 103 EXAMPLE 1: COSINE FUNCTION 105 EXAMPLE 2: CORROSION ON A METAL STRUCTURE 112 EXAMPLE 3: DEFINING ROLES OF ATHLETES 127 EXAMPLE 4: ATHLETE’S PERFORMANCE 134 EXAMPLE 5: TEAM PERFORMANCE 142 A human-defined-system 142 Human Factors 143 The sport team as system of interest 144 Impact of Human Error on Sports Team Performance 145 EXAMPLE 6: TREND PREDICTION 156 EXAMPLE 7: SYMPLEX AND GAME THEORY 163 EXAMPLE 8: SORTING MACHINE FOR LEGO® BRICKS 168 Part III 174 6 INPUT/OUTPUT, HIDDEN LAYER AND BIAS 174 INPUT/OUTPUT 175 HIDDEN LAYER 180 BIAS 184 FINAL REMARKS 186 CHAPTER SUMMARY 187 QUESTIONS 188 7 ACTIVATION FUNCTION 189 TYPES OF ACTIVATION FUNCTIONS 191 ACTIVATION FUNCTION DERIVATIVES 194 ACTIVATION FUNCTIONS RESPONSE TO W AND b VARIABLES 200 FINAL REMARKS 202 CHAPTER SUMMARY 204 QUESTIONS 205 SOURCES 205 8 COST FUNCTION, BACK-PROPAGATION AND OTHER ITERATIVE METHODS 206 WHAT IS THE DIFFERENCE BETWEEN LOSS AND COST? 209 TRAINING THE NEURAL NETWORK 212 BACK-PROPAGATION (BP) 214 ONE MORE THING: GRADIENT METHOD AND CONJUGATE GRADIENT METHOD 218 ONE MORE THING: NEWTON’S METHOD 221 CHAPTER SUMMARY 223 QUESTIONS 224 SOURCES 224 9 CONCLUSIONS AND FUTURE DEVELOPMENTS 225 GLOSSARY AND INSIGHTS 233
£88.65
John Wiley & Sons Inc Security Patterns in Practice
Book SynopsisLearn to combine security theory and code to produce secure systems Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work.
£36.80
Taylor & Francis Ltd Exascale Scientific Applications
Book SynopsisFrom the Foreword:The authors of the chapters in this book are the pioneers who will explore the exascale frontier. The path forward will not be easy... These authors, along with their colleagues who will produce these powerful computer systems will, with dedication and determination, overcome the scalability problem, discover the new algorithms needed to achieve exascale performance for the broad range of applications that they represent, and create the new tools needed to support the development of scalable and portable science and engineering applications. Although the focus is on exascale computers, the benefits will permeate all of science and engineering because the technologies developed for the exascale computers of tomorrow will also power the petascale servers and terascale workstations of tomorrow. These affordable computing capabilities will empower scientists and engineers everywhere. Thom H. Dunning, Jr., Pacific Northwest National Laboratory and University Trade Review"Numerical simulation is now a need in many fields of science, technology, and industry. The complexity of the simulated systems coupled with the massive use of data makes the HPC essential to move towards predictive simulations. Advances in computer architecture have so far permitted scientific advances, but at the cost of continually adapting algorithms and applications. The next technological breaks force us to rethink the applications by taking energy consumption into account. These profound modifications require not only anticipation and sharing but also a paradigm shift in application design to ensure the sustainability of developments by guaranteeing a certain independence of the applications to the profound modifications of the architectures: it is the passage from optimal performance to the portability of performance. It is the challenge of this book to demonstrate by example the approach that one can adopt for the development of applications offering a portability of the performances in spite of the profound changes of the computing architectures."— Christophe Calvin, CEA, Fundamental Research Division, Scalay, France"This comprehensive summary of applications targeting Exascale at the three DoE labs is a must read."— Rio Yokota, Tokyo Institute of Technology, Tokyo, Japan"Three editors, one from each of the High Performance Computer Centers at Lawrence Berkeley, Argonne, and Oak Ridge National Laboratories, have complied a very useful set of chapters aimed at describing software developments for the next generation exa-scale computers. Such a book is needed for scientists and engineers to see where the field is going and how they will be able to exploit such architectures for their own work. The book will also benefit students as it provides insights into how to develop software for such computer architectures. Overall, this book fills an important need in showing how to design and implement algorithms for exa-scale architectures which are heterogeneous and have unique memory systems. The book discusses issues with developing user codes for these architectures and how to address these issues including actual coding examples.’ — Dr. David A. Dixon, Robert Ramsay Chair, The University of Alabama, USA"Numerical simulation is now a need in many fields of science, technology, and industry. The complexity of the simulated systems coupled with the massive use of data makes the HPC essential to move towards predictive simulations. Advances in computer architecture have so far permitted scientific advances, but at the cost of continually adapting algorithms and applications. The next technological breaks force us to rethink the applications by taking energy consumption into account. These profound modifications require not only anticipation and sharing but also a paradigm shift in application design to ensure the sustainability of developments by guaranteeing a certain independence of the applications to the profound modifications of the architectures: it is the passage from optimal performance to the portability of performance. It is the challenge of this book to demonstrate by example the approach that one can adopt for the development of applications offering a portability of the performances in spite of the profound changes of the computing architectures."— Christophe Calvin, CEA, Fundamental Research Division, Scalay, France"This comprehensive summary of applications targeting Exascale at the three DoE labs is a must read."— Rio Yokota, Tokyo Institute of Technology, Tokyo, Japan"Three editors, one from each of the High Performance Computer Centers at Lawrence Berkeley, Argonne, and Oak Ridge National Laboratories, have complied a very useful set of chapters aimed at describing software developments for the next generation exa-scale computers. Such a book is needed for scientists and engineers to see where the field is going and how they will be able to exploit such architectures for their own work. The book will also benefit students as it provides insights into how to develop software for such computer architectures. Overall, this book fills an important need in showing how to design and implement algorithms for exa-scale architectures which are heterogeneous and have unique memory systems. The book discusses issues with developing user codes for these architectures and how to address these issues including actual coding examples.’ — Dr. David A. Dixon, Robert Ramsay Chair, The University of Alabama, USATable of Contents1. Portable Methodologies for Energy Optimization on Large-Scale Power-Constrained Systems 2. Performance Analysis and Debugging Tools at Scale 3. Exascale Challenges in Numerical Linear and Multilinear Algebras 4. Exposing Hierarchical Parallelism in the FLASH Code for Supernova Simulation on Summit and Other Architectures 5. NAMD: Scalable Molecular Dynamics Based on the Charm++ Parallel Runtime System 6. Developments in Computer Architecture and the Birth and Growth of Computational Chemistry 7. On Preparing the Super Instruction Architecture and Aces4 for Future Computer Systems 8. Transitioning NWChem to the Next Generation of Manycore Machines 9. Exascale Programming Approaches for Accelerated Climate Modeling for Energy 10. Preparing the Community Earth System Model for Exascale Computing 11. Large Eddy Simulation of Reacting Flow Physics and Combustion 12. S3D-Legion: An Exascale Software for Direct Numerical Simulation of Turbulent Combustion with Complex Multicomponent Chemistry 13. Data and Work_ow Management for Exascale Global Adjoint Tomography 14. Scalable Structured Adaptive Mesh Refinement with Complex Geometry 15. Extreme Scale Unstructured Adaptive CFD for Aerodynamic Flow Control 16. Lattice Quantum Chromodynamics and Chroma 17. PIC Codes on the Road to Exascale Architectures 18. Extreme-Scale De Novo Genome Assembly 19. Exascale Scientific Applications: Programming Approaches for Scalability, Performance, and Portability: KKRnano 20. Real-Space Multiple-Scattering Theory and Its Applications at Exascale 21 Development of QMCPACK for Exascale Scientific Computing 22. Preparing an Excited-State Materials Application for Exascale 23. Global Gyrokinetic Particle-in-Cell Simulation 24. The Fusion Code XGC: Enabling Kinetic Study of Multiscale Edge Turbulent Transport in ITER
£117.00
CRC Press Handbook on Mobile and Ubiquitous Computing
Book SynopsisConsolidating recent research in the area, the Handbook on Mobile and Ubiquitous Computing: Status and Perspective illustrates the design, implementation, and deployment of mobile and ubiquitous systems, particularly in mobile and ubiquitous environments, modeling, database components, and wireless infrastructures.Supplying an overarching perspective, the book is ideal for researchers, graduate students, and industry practitioners in computer science and engineering interested in recent developments in mobile and ubiquitous computing. It discusses new trends in intelligent systems, reviews sensory input and multimedia information, and examines embedded real-time systems. With coverage that spans security, privacy, and trust, the book is divided into six parts: Mobile and Ubiquitous Computingâillustrates the concepts, design, implementation, and deployment of mobile and ubiquitous systems Smart Environments and Agent SystemsâdiscTable of ContentsMobile and Ubiquitous Computing. Smart Environments and Agent Systems. Human–Computer Interaction (HCI) and Multimedia Computing. Security, Privacy, and Trust Management. Embedded Real-Time Systems. Networking Sensing and Communications.
£46.54
Taylor & Francis Ltd FrequencyDomain Receiver Design for Doubly
Book SynopsisFrequency-Domain Receiver Design for Doubly-Selective Channels discusses broadband wireless transmission techniques, which are serious candidates to be implemented in future broadband wireless and cellular systems, aiming at providing high and reliable data transmission and concomitantly high mobility. This book provides an overview of the channel impairments that may affect performance of single carrier and multi-carrier block transmission techniques in mobile environments. Moreover, it also provides a new insight into the new receiver designs able to cope with double selectivity that affects present and future broadband high speed mobile communication systems. Trade Review"The book presents a strong analytical rigor and very interesting solutions to some of the most important challenges that wireless communication engineers face. All the analytical derivations and innovative results are well supported by a large set of figures which turns the book a very useful tool. It also presents an important revision of existing techniques, which clearly enrich its quality."— João Guerreiro, Instituto de Telecomunicações, Lisbon, Portugal"The book covers a timely and important topic for current and future wireless communication systems." — Imad Barhumi, United Arab Emirates University, Al Ain, Abu Dhabi"Advanced receiver designs for frequency selective channels was, from the beginning, a disruptive idea which opened horizons to up-until-then unimaginable data rates and system capacities in wireless systems. This book offers a fresh look at receiver designs, and looks at its combination with SC-FDE and OFDM, and the impact at the system-level. Receiver designs remains a pillar of high-speed systems beyond 4G which incorporate massive MIMO and network coding at the physical layer."—Mário Marques da Silva, Universidade Autónoma de Lisboa, Portugal"There are not many books addressing the treatment of Doubly Selective Channels, and none devoted especially to the design of frequency domain receivers….this book appears to treat both block based single carrier and multicarrier communications, comparing them both in detail, on the contrary of most books devoted to multicarrier, with special emphasis on OFDM, although the growing importance of SC-FDE for uplink transmissions. This book seems to fill this void, providing a current view on the state-of-the-art." — Marco Alexandre Cravo Gomes, University of Coimbra, Portugal"This book addresses the state of the art in OFDM and SC-FDE bock transmission schemes. It includes an easy to read overview accompanied by a formal definition of the block transmission schemes and channels models. The most interesting parts cover advanced analytical tools for channel estimation and receiver design for asynchronous networks and for multipath channels with strong Doppler effects. Asynchronous access is envisioned in the transmission schemes for future 5G systems. On the other end, Doppler effects are gaining importance as higher carrier frequencies and broader bands are used. Given the tutorial presentation, these physical layer models can be quite helpful in the design and analysis of cross-layer optimized systems."—Luis Bernardo, Instituto de Telecomunicações, Lisbon, Portugal"Frequency-Domain Receiver Design for Doubly Selective Channels summarizes extensive research work on wireless communication between OFDM and SC-FDE and suggests the optimum approach. In so doing, it might revolutionize wireless communication technology."—IEEE Microwave Magazine, July/August 2018Table of ContentsList of Abbreviations. List of Symbols. Introduction. Motivation and Scope. Book Structure. Fading. Large Scale Fading. Path-Loss. Shadowing. Small Scale Fading. The Multipath Channel. Time-Varying Channel. Block Transmission Techniques. Transmission Structure of a Multicarrier Modulation. Receiver Structure of a Multicarrier Modulation. Multi-Carrier Modulations or Single Carrier Modulations. OFDM Modulations. Analytical Characterization of the OFDM Modulations. Transmission Structure. Reception Structure. SC-FDE Modulations. Transmission Structure. Receiving Structure. Comparative Analysis Between OFDM and SC-FDE. DFE Iterative Receivers. IB-DFE Receiver Structure. IB-DFE with Soft Decisions. Turbo FDE Receiver. Approaching the Matched Filter Bound. Matched Filter Bound. Approaching the Matched Filter Bound. Analytical Computation of the MFB. System Characterization. Performance Results. Performance Results without Channel Coding. Performance Results with Channel Coding. Efficient Channel Estimation for Single Frequency Networks. System Characterization. Channel Estimation. Channel Estimation Enhancement. Decision-Directed Channel Estimation. Performance Results. Conclusions. Asynchronous Single Frequency Networks. SFN Channel Characterization. Impact of Carrier Frequency Offset Effects. Channel and CFO Estimation. Frame Structure. Tracking the Variations of the Equivalent Channel. Adaptive Receivers for SFN with Different CFOs. Method I Method II Method III. Performance Results. Multipath Channels with Strong Doppler Effects. Doppler Frequency Shift due to Movement. Modeling Short-Term Channel Variations. Generic Model for Short-Term Channel Variations. A Novel Model for Short-Term Channel Variations. Channel Estimation and Tracking. Channel Estimation. Tracking of the Channel Variations. Using the Sampling Theorem to Track the Channel Variations. Novel Tracking Technique. Receiver Design. Performance Results.Important Statistical Parameters. Rayleigh Distribution. Rician Distribution. Nakagami-m Distribution. Complex Baseband Representation. Minimum Error Variance.
£137.75
McGraw Hill Education India Loose Leaf for Fundamentals of Digital Logic with
Book Synopsis
£174.60
Cambridge University Press Computer Architecture for Scientists
Book SynopsisThe dramatic increase in computer performance has been extraordinary, but not for all computations: it has key limits and structure.Software architects, developers, and even data scientists need to understand how exploit the fundamental structure of computer performance to harness it for future applications. Ideal for upper level undergraduates, Computer Architecture for Scientists covers four key pillars of computer performance and imparts a high-level basis for reasoning with and understanding these concepts: Small is fast how size scaling drives performance; Implicit parallelism how a sequential program can be executed faster with parallelism; Dynamic locality skirting physical limits, by arranging data in a smaller space; Parallelism increasing performance with teams of workers. These principles and models provide approachable high-level insights and quantitative modelling without distracting low-level detail. Finally, the text covers the GPU and machine-learning accelerators tTrade Review'Andrew Chien's Computer Architecture for Scientists: Principles and Practice is a timely and much-needed treatment of how computer architecture impacts the scalability and performance of the computing systems and the data-driven processes that operate at the upper levels of the software stack. Aimed at software engineers and data scientists, this book provides a holistic and principled coverage of technology-agnostic concepts that govern the interplay between hardware capabilities and software performance. Understanding this interplay is crucial as it allows practitioners not only to reason about the performance of the systems they develop, but in fact to design these systems in a way that leverages the architectural features of the hardware systems on which they are built.' Azer Bestavros, Associate Provost for Computing and Data Sciences, Boston University'This is a very timely book on computer architecture aimed at the new generation of computational scientists and data scientists. The end of Dennard Scaling, coupled with the breakthrough of Deep Neural Networks in Machine Learning, has led to the need for a radical re-think in the teaching of computer architecture. Andrew Chien's book addresses this need and gives scientific software developers a high-level understanding of the emerging computer architectures and the design principles they require to obtain maximum computer performance from their programs.' Tony Hey, Chief Data Scientist, Rutherford Appleton Lab, U.K.'Hurray for Computer Architecture for Scientists! Finally, a book aimed squarely at the rising complexities at the intersection of Moore's Law scaling of technology and the dizzying array of diverse computer architectures that have resulted. General versus special-purpose, programmable versus configurable, and a growing basket of colors and flavors of parallelism. While these make sense to working computer architects and chip designers – what of scientists and engineers just trying to get stuff done? Chien does a splendid job of translating and demystifying why and how computer architectures matter, how users can understand them, and use these insights to wrestle them into submission to do good science.' Rob A. Rutenbar, Distinguished Professor of Computer Science and Electrical and Computer Engineering, University of Pittsburgh'Andrew Chien's book connects the dots from interdependent architectural choices to underlying calculus of performance and in the process strikes a balance between high-level view of the machine and its realizations. It is essential that users of these tools have an intimate understanding of the principles and mechanisms that make computing machines deliver efficient and high performance without becoming hardware designers themselves. The book provides such insights through its succinctly stated principles that both educate and enlighten about fundamental abstractions in computing.' Rajesh Gupta, Professor of Computer Science and Engineering, University of California, San DiegoTable of ContentsPreface; 1. Computing and the transformation of society; 2. Instruction sets, software, and instruction execution; 3. Processors: small is fast and scaling; 4. Sequential abstraction, but parallel implementation; 5. Memories: exploiting dynamic locality; 6. The general-purpose computer; 7. Beyond sequential: parallelism in multi-core and the Cloud; 8. Accelerators: customized architectures for performance; 9. Computing performance: past, present, and future; References, Index.
£49.99
Xlibris IT Architecture in Action
£23.00
Taylor & Francis Inc EnergyAware Memory Management for Embedded
Book SynopsisEnergy-Aware Memory Management for Embedded Multimedia Systems: A Computer-Aided Design Approach presents recent computer-aided design (CAD) ideas that address memory management tasks, particularly the optimization of energy consumption in the memory subsystem. It explains how to efficiently implement CAD solutions, including theoretical methods and novel algorithms. The book covers various energy-aware design techniques, including data-dependence analysis techniques, memory size estimation methods, extensions of mapping approaches, and memory banking approaches. It shows how these techniques are used to evaluate the data storage of an application, reduce dynamic and static energy consumption, design energy-efficient address generation units, and much more.Providing an algebraic framework for memory management tasks, this book illustrates how to optimize energy consumption in memory subsystems using CAD solutions. The algorithmic style ofTable of ContentsComputer-Aided Design for the Energy Optimization in the Memory Architecture of Embedded Systems. The Power of Polyhedra. Computation of Data Storage Requirements for Affine Algorithmic Specifications. Polyhedral Techniques for Parametric Memory Requirement Estimation. Storage Allocation for Streaming-Based Register File. Optimization of the Dynamic Energy Consumption and Signal Mapping in Hierarchical Memory Organizations. Leakage Current Mechanisms and Estimation in Memories and Logic. Leakage Control in SoCs. Energy-Efficient Memory Port Assignment. Energy-Efficient Address-Generation Units and Their Design Methodology. Index.
£180.50
Taylor & Francis Inc Performance Evaluation of Computer and
Book SynopsisThis book is written for computer engineers and scientists active in the development of software and hardware systems. It supplies the understanding and tools needed to effectively evaluate the performance of individual computer and communication systems. It covers the theoretical foundations of the field as well as specific software packages being employed by leaders in the field.Trade Review… written by a scientist successful in performance evaluation, it is based on his experience and provides many ideas not only to laymen entering the field, but also to practitioners looking for inspiration. The work can be read systematically as a textbook on how to model and test the derived hypotheses on the basis of simulations. Also, separate parts can be studied, as the chapters are self-contained. … the book can be successfully used either for self-study or as a supplementary book for a lecture. I believe that different types of readers will like it: practicing engineers and researchers dealing with new solutions, as well as graduate students starting their adventures in the jungle of performance evaluation. —Piotr Cholda, in IEEE Communications Magazine, October 2011Table of ContentsMethodologyWhat is Performance Evaluation ? Factors Evaluation Methods The Scientific Method Performance Patterns Summarizing Performance Data, Confidence IntervalsSummarized Performance DataConfidence IntervalsThe Independence AssumptionPrediction IntervalWhich Summarization To Use?Other Aspects of Confidence/Prediction IntervalsProofs Model FittingModel Fitting CriteriaLinear Regression Linear Regression with Norm Minimization Choosing a DistributionHeavy TailProofs TestsThe Neyman Pearson FrameworkLikelihood Ratio TestsANOVAAsymptotic ResultsOther TestsProofs ForecastingWhat is Forecasting ? Linear Regression The Overfitting ProblemDifferencing the DataFitting Differenced Data to an ARMA ModelSparse ARMA and ARIMA ModelsProofs Discrete Event SimulationWhat is a Simulation?Simulation TehniquesComputing the Accuracy of Stochastic SimulationsMonte Carlo SimulationRandom Number GeneratorsHow to Sample from a DistributionImportance SamplingProofs Palm Calculus, or the Importance of the ViewpointAn Informal IntroductionPalm CalculusOther Useful Palm Calculus ResultsSimulation Defined as Stochastic RecurrenceApplication to Markov Chain Models and the PASTA PropertyAppendix: Quick Review of Markov ChainsProofsReview Questions Queuing Theory for Those Who Cannot WaitDeterministic AnalysisOperational Laws For Queuing SystemsClassical Results for a Single QueueDefinitions for Queuing NetworksThe Product-Form Theorem Computational AspectsWhat This Tells UsMathematical Details About Product-Form Queuing NetworksCase Study Proofs Each chapter concludes with a Review that includes review questions.
£92.00
Xlibris VLSI HighSpeed IO Circuits
£39.78
Author Solutions Inc VLSI HighSpeed IO Circuits
£44.53
Taylor & Francis Inc Encyclopedia of Computer Science and Technology
Book SynopsisWith breadth and depth of coverage, the Encyclopedia of Computer Science and Technology, Second Edition has a multi-disciplinary scope, drawing together comprehensive coverage of the inter-related aspects of computer science and technology. The topics covered in this encyclopedia include: General and reference Hardware Computer systems organization Networks Software and its engineering Theory of computation Mathematics of computing Information systems Security and privacy Human-centered computing Computing methodologies Applied computing Professional issues Leading figures in the history of computer science The encyclopedia is structured according to the ACM Computing Classification System (CCS), first published in 1988 but subsequently revised in 2012. This classification system is the most comprehensive and is considered the de facto ontolo
£1,852.50
Apple Academic Press Inc. Interconnections for Computer Communications and
Book SynopsisThis book introduces different interconnection networks applied to different systems. Interconnection networks are used to communicate processing units in a multi-processor system, routers in communication networks, and servers in data centers. Queuing techniques are applied to interconnection networks to support a higher utilization of resources. There are different queuing strategies, and these determine not only the performance of the interconnection network, but also the set of requirements to make them work effectively and their cost. Routing algorithms are used to find routes to destinations and directions in what information travels. Additional properties, such as avoiding deadlocks and congestion, are sought. Effective routing algorithms need to be paired up with these networks. The book will introduce the most relevant interconnection networks, queuing strategies, and routing algorithm. It discusses their properties and how these leverage the performance of the whole iTrade Review"The organization of the book is very convenient. It is easy to read each part separately. Moving around the book is easy with a table of contents at the beginning of the book and separate tables of contents starting each chapter. In addition, every chapter ends with sample exercises. All parts of the book are richly illustrated with numerous figures. According to the saying that one image is worth a thousand words, drawings make it much easier for a reader to follow the discussion.The book ends with a very solid bibliography containing 191 positions. The largest part of the bibliography gathers positions from the 1990s and 2000s, but some positions from the three most recent years are also included. Interested readers will then be able to broaden their self-studies on interconnection networks. The bibliography is followed by the useful terms index. In my opinion, this book is mostly aimed at undergraduate students interested in modern telecommunication and computer networks. Nevertheless, graduate students will also find this book a helpful textbook for their learning efforts."—IEEE Communications Magazine, July 2017 IssueTable of ContentsPart I: Processor Interconnections. Multiprocessor Interconnection Networks. Routing. Part II: Data Networks. Internet Protocol (IP) Address Lookup. Packet Classification. Basics of Packet Switching. Input-Queued Switches. Shared-Memory Packet Switches. Load-Balancing Switches. Clos-Network Packet Switches. Buffer Management in Routers. Part III: Data-Center Networks. Data Center Networks.
£147.25
APress Everyday Enterprise Architecture
Book SynopsisDiscover what needs to happen in enterprise-architecture practice-and not just its outcomes, but also the activities from which those outcomes would arise. This book reveals how business and enterprise architects can deliver fast solutions to an always-on-the-go business world.To begin, you''ll review a new technique called context-space mapping, which provides a structured method for sense-making across the entire context of an enterprise. Throughout the book, you''ll concentrate on the routine practices that underpin each of the architecture disciplines. Working step-by-step through a real 10-day architecture project, this book explores the activities that underpin the strategy, structures and solutions in the real-time turmoil of an enterprise architect''s everyday work. You''ll explore how and why and when the various documents, artefacts and items of ''theory-stuff'' come into the practice - all those mainstream methods, frameworkTable of Contents Chapter 1: Introduction Chapter Goal: Describe the purpose of the book, how to use it, and what the various elements are No of pages 4 Sub -Topics 1. Main project: How to use architecture ideas and activities to describe what actually happens in a real enterprise-architecture project, and the business-reasons and business-value for each of those activities 2. Secondary project: Worked-example 3. Application: How to adapt each chapter’s content to our own work Chapter 2: Day 1: Get Started Chapter Goal: Show how to get started on a project, and summarise how the allocated ten days will be used No of pages 16 Sub -Topics 1 Do an initial assessment 2 Show how to use the project-diary and other tools 3 Show how to do an initial assessment 4 Show how to apply any ‘lessons-learned’ in our own projects Chapter 3: Day 2: Purpose, scope and context Chapter Goal: Set up and start the main and secondary projects No of pages: 16 Sub - Topics 1 Introduce the main project as exploring ‘the architecture of architecture’ 2 Show how to use the step-by-step action-task sequence 3 Introduce the secondary project: customer-breakdown at a bank 4 Show how to use the same step-by-step-step sequence for the bank content Chapter 4: Day 3: What’s going on? Chapter Goal: Learn how to do an architecture-assessment No of pages : 18 Sub - Topics: 1 Explore how to do a ‘to-be’ (futures) assessment 2 Explore how to do an ‘as-was’ (past) assessment 3 Explore how to identify issues that need to be addressed 4 Learn how to cope with the challenges and stresses of the work Chapter 5: Day 4: What do we want? Chapter Goal: Learn how to establish a baseline No of pages: 12 Sub - Topics: 1 Explore how to do an ‘as-is’ (present) assessment 2 How to do social-enquiry with stakeholders 3 How to tackle the politics of architecture 4 Architecture as decision-support for stakeholders, not decision-making Chapter 6: Day 5: What’s the difference? Chapter Goal: How to identify gaps where change is needed No of pages 14 Sub -Topics 1 Identify and build the skillsets needed for comparison-assessments 2 How to do comparisons to identify gaps (including hidden-gaps) 3 How to prioritise gaps and derive requirements 4 How and why to avoid the temptation to rush to ‘solutions’ Chapter 7: Day 6: How do we get from here to there? Chapter Goal: Guiding the transition to solution-design No of pages 10 Sub -Topics 1 How to identify the roles and specialisms needed for solution-design 2 How to identify, work with and hand over to the change-team 3 How to refine and simplify change-requirements 4 Politics reminder: architecture is decision-support, not decision-making Chapter 8: Day 7: Step-by-step details Chapter Goal: Learn the relative roles and relations between architecture and design No of pages 12 Sub -Topics 1 Role of architect as generalist, to connect specialists together 2 How to develop and use sense-making skills 3 Role of architect to assist in finding missing-detail 4 How to identify common missing-detail (system-failure, timescale, decommission) Chapter 9: Day 8: Putting it into practice Chapter Goal: What to do when the stakeholders themselves are the solutions No of pages 14 Sub -Topics 1 How to design a change-programme for stakeholders 2 How to deliver and guide a change-programme for stakeholders 3 How to guide stakeholders in sensemaking and decision-making 4 Introduce sense-making tools such as context-space mapping Chapter 10: Day 9: What did we achieve? Chapter Goal: How to do and use an after-action review No of pages 12 Sub -Topics 1 Purpose and value of an after-action review 2 Elements of an after-action review 3 How to do and document an after-action review 4 How to derive new change-tasks from an after-action review Chapter 11: Day 10: How To Review and Learn Chapter Goal: How to review and learn from our own projects No of pages 10 Sub -Topics 1 Reprise on how to do and assess an after-action review 2 How to derive our own insights from work done with others 3 How to apply and test those insights for our own architecture-practice 4 How to derive and enact change-tasks for our own continuous-improvement Appendix 1: The architecture information-stores Chapter Goal: How to capture, retrieve and reuse architectural information No of pages 6 Sub -Topics 1 Identify types, roles and uses of architecture-information 2 Identify how and why to store each type of architectural information 3 Identify how to retrieve and reuse each type of architectural information 4 Identify how and when to delete architectural information Appendix 2: More on context-space mapping Chapter Goal: Present context-space mapping as a sensemaking tool for architecture No of pages 18 Sub -Topics 1 Describe purpose and underlying principles for context-space mapping 2 Explore how context-space mapping works as a sensemaking method 3 Provide detailed worked-examples of context-space mapping 4 Show outcomes and value of context-space mapping in sensemaking Appendix 3: Resources Chapter Goal: Provide additional support for the practices in this book No of pages 2 Sub -Topics 1 Example books and other publications 2 Websites and other online resources
£41.24
O'Reilly Media Hack and HHVM
Book SynopsisHow can you take advantage of the HipHop Virtual Machine (HHVM) and the Hack programming language, two new technologies that Facebook developed to run their web servers? With this practical guide, Owen Yamauchi-a member of Facebook's core Hack and HHVM teams-shows you how to get started with these battle-tested open-source tools.
£23.99
O'Reilly Media Frontend Architecture for Design Systems
Book SynopsisThis practical book takes experienced web developers through the new discipline of frontend architecture, including the latest tools, standards, and best practices that have elevated frontend web development to an entirely new level.
£20.39