Computer architecture and logic design Books
O'Reilly Media Knative Cookbook
Book SynopsisWith more than 60 practical recipes, this cookbook helps you solve these issues with Knativethe first serverless platform natively designed for Kubernetes. Each recipe contains detailed examples and exercises, along with a discussion of how and why it works.
£33.74
O'Reilly Media Migrating to AWS A Managers Guide
Book SynopsisBring agility, cost savings, and a competitive edge to your business by migrating your IT infrastructure to AWS. With this practical book, executive and senior leadership and engineering and IT managers will examine the advantages, disadvantages, and common pitfalls when moving your company's operations to the cloud.
£39.74
Taylor & Francis Inc Generic and EnergyEfficient ContextAware Mobile
Book SynopsisElaborating on the concept of context awareness, this book presents up-to-date research and novel framework designs for context-aware mobile sensing. Generic and Energy-Efficient Context-Aware Mobile Sensing proposes novel context-inferring algorithms and generic framework designs that can help readers enhance existing tradeoffs in mobile sensing, especially between accuracy and power consumption.The book presents solutions that emphasize must-have system characteristics such as energy efficiency, accuracy, robustness, adaptability, time-invariance, and optimal sensor sensing. Numerous application examples guide readers from fundamental concepts to the implementation of context-aware-related algorithms and frameworks.Covering theory and practical strategies for context awareness in mobile sensing, the book will help readers develop the modeling and analysis skills required to build futuristic context-aware framework designs for resource-constrained pTable of ContentsContext Awareness for Mobile Sensing. Context Inference: Posture Detection. Context-Aware Framework: A Basic Design. Energy Efficiency in Physical Hardware. Context-Aware Framework: A Complex Design. Probabilistic Context Modeling.
£130.50
Taylor & Francis Inc Contemporary High Performance Computing
Book SynopsisHPC is used to solve a number of complex questions in computational and data-intensive sciences. These questions include the simulation and modeling of physical phenomena, such as climate change, energy production, drug design, global security, and materials design; the analysis of large data sets such as those in genome sequencing, astronomical observation, and cybersecurity; and the intricate design of engineered products, such as airplanes and automobiles.This second volume of Contemporary High Performance Computing: From Petascale toward Exascale continues to document international HPC ecosystems, including the sponsors and sites that host them. Each chapter is punctuated with a site''s flagship system and: Presents highlights of applications, workloads, and benchmarks Describes hardware architectures, system software, and programming systems Explores storage, visualization, and analytics<Trade ReviewPraise for the First Volume "Jeffrey S. Vetter has organized and edited a definitive state-of-the-practice volume on high-end high performance computing (HPC), as it exists right now. What is provided is an insider's view of major HPC ecosystems, in a world where petascale computing is the reality. ... Consistent editing and parallel presentations contribute to the usefulness of this volume. Numerous figures and tables complement the text. ... [It is] an important reference for the high-end HPC community." -Computing Reviews, July 2013Table of ContentsIntroduction. ARCHER. Enabling Extreme Scale Science at NERSC. HLRN-III at Zuse Institute Berlin. The K Computer. Lindgren—The Swedish Tier-1 System. Peregrine at the National Renewable Energy Laboratory. Yellowstone: A Dedicated Resource for Earth System Science.
£94.99
Taylor & Francis Inc Analog Electronics Applications
Book SynopsisThis comprehensive text discusses the fundamentals of analog electronics applications, design, and analysis. Unlike the physics approach in other analog electronics books, this text focuses on an engineering approach, from the main components of an analog circuit to general analog networks. Concentrating on development of standard formulae for conventional analog systems, the book is filled with practical examples and detailed explanations of procedures to analyze analog circuits. The book covers amplifiers, filters, and op-amps as well as general applications of analog design. Trade Review"Although, there are several textbooks available on analog electronics, this is one of the few books which provides a clear, concise explanations of complex concepts of analog circuits in a simple way through practical examples. This book covers comprehensively the main aspects of analog components, circuits and applications." — Ali Ahmadinia, California State University San Marcos, USA"It is an extremely comprehensive book covering all aspects of analogue electronics at the undergraduate level. It also includes review material on the prerequisites like circuit theory. Important topics which are often covered briefly or omitted in other books, like feedback, transistor models and active filters, to name a few, are fully developed in this book." — Carlos Gamio, Glasgow Caledonian University, Scotland"The chapters of the textbook...represent a good basis of study for junior undergraduate students of electrical and electronic engineering. The content is, in general, accurate and relevant." — Barry Beggs, Glasgow Caledonian University, Scotland"Although, there are several textbooks available on analog electronics, this is one of the few books which provides a clear, concise explanations of complex concepts of analog circuits in a simple way through practical examples. This book covers comprehensively the main aspects of analog components, circuits and applications." — Ali Ahmadinia, California State University San Marcos, USA"It is an extremely comprehensive book covering all aspects of analogue electronics at the undergraduate level. It also includes review material on the prerequisites like circuit theory. Important topics which are often covered briefly or omitted in other books, like feedback, transistor models and active filters, to name a few, are fully developed in this book." — Carlos Gamio, Glasgow Caledonian University, Scotland"The chapters of the textbook...represent a good basis of study for junior undergraduate students of electrical and electronic engineering. The content is, in general, accurate and relevant." — Barry Beggs, Glasgow Caledonian University, ScotlandTable of ContentsIntroduction to Analog Electronics. Electric Circuits. Bipolar Junction Transistor BJT. Field Effect Transistors FET. Bipolar Junction Transistor Biasing. Modelling Transistors. Small Signal Analysis of an Amplifier Under Different Models. Amplifiers Frequency Response. The Common Collector Amplifier/Emitter Follower. The Common Base Amplifier. Common emitter Amplifier in Cascade. Field Effect Transistor Biasing. Field Effect Transistor as Amplifiers. Transfer Function and Bode Diagrams. Feedback in amplifiers. Differential Amplifiers. Operational Amplifiers Op-Amps. Filters. Applications of Analogue Electronics. Future Trend of Analog Electronics. Computer Aided Simulation of Practical Assignments.
£171.00
Taylor & Francis Inc Smart Grid
Book SynopsisSmart Grid: Networking, Data Management, and Business Models delivers a comprehensive overview of smart grid communications, discussing the latest advances in the technology, the related cyber security issues, and the best ways to manage user demand and pricing. Comprised of 16 chapters authored by world-renowned experts, this book: Considers the use of cognitive radio and software-defined networking in the smart grid Explores the space of attacks in the energy management process, the need for a smart grid simulator, and the management issues that arise around smart cities Describes a real-time pricing scheme that aims to reduce the peak-to-average load ratio Explains how to realize low-carbon economies and the green smart grid through the pervasive management of demand Presents cutting-edge research on microgrids, electric vehicles, and energy trading in the smart grid Thus, Smart Grid: NetworTrade Review"… an authoritative volume … readily accessible to novice readers. At the same time, the volume provides detailed, in-depth accounts of a comprehensive set of advanced topic areas that are highly informative and have high reference value for expert readers."—Martin Reisslein, Arizona State University, Tempe, USA "This is a well-planned book … that elicits the state of the art of the smart grid."—Nirwan Ansari, New Jersey Institute of Technology, Newark, USA Table of ContentsSmart Grid Communications. Smart Grid Security and Management. Demand Response Management and Business Models. Microgrids, Electric Vehicles, and Energy Trading.
£166.25
Taylor & Francis Inc Emerging Communication Technologies Based on
Book SynopsisEmerging Communication Technologies Based on Wireless Sensor Networks: Current Research and Future Applications fills a gap in the existing literature by combining a plethora of WSN-based emerging technologies into a single source so that researchers can form opinions regarding these technologies. It presents different types of emerging communication technologies based on WSNs and describes how wireless sensor networks can be integrated with other communication technologies. It covers many of the new techniques and demonstrates the application of WSNs. The book's 14 chapters are divided into four parts.The first part covers the basics of wireless sensor networks and their principal working methods. The authors then move on to discuss different types of WSNs, characteristics of different types of emerging technologies based on WSNs, renewable energy sources, battery replenishment strategies, and application-specific energy challenges of WSNs. The secondTable of ContentsOVERVIEW OF WIRELESS SENSOR NETWORKS. Role of Wireless Sensor Network in Emerging Communication Technologies: A Review. A Review on Renewable Energy Sources, Battery Replenishment Strategies, and Application-Specific Energy Challenges of Wireless Sensor Networks. WIRELESS BODY AREA NETWORKS. Wearable Wireless Sensor Networks: Applications, Standards, and Research Trends. Revisiting Routing in Wireless Body Area Networks. Thermal-Aware Communication Protocols for Body Sensor Networks. WSNs IN EMERGING COMMUNICATION TECHNOLOGIES. Electromagnetic Wireless Nanoscale Sensor Networks. Evolution of Wireless Sensor Networks toward Internet of Things. Wireless Sensor Network Management Using Satellite Communication Technologies. Use of Wireless Sensor Networks in Smart Homes. Realizing Cognitive Radio Technology for Wireless Sensor Networks. WSNs PROTOCOLS AND ALGORITHMS. Energy-Efficient Data Collection Techniques in Wireless Sensor Networks. A Pairwise Key Distribution Mechanism and Distributed Trust Evaluation Model for Secure Data Aggregation in Mobile Sensor Networks. Distributed Data Gathering Algorithms for Mobile Sensor Networks. Sensor Proxy Mobile IPv6: A Novel Scheme for Mobility-Supported IP-WSN.
£152.00
Taylor & Francis Inc Practical Cloud Security
Book SynopsisMelvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes, not the least of which is documenting the breadth and severity of the challenges that today's enterprises face, and the breadth of programmatic elements required to address these challenges. This has become a boardroom issue: Executives must not only exploit the potential of information technologies, but manage their potential risks. Key Features Provides a cross-industry view of contemporary cloud computing security challenges, solutions, and lessons learned Offers clear guidance for the development and execution of industry-specific cloud computing business and cybersecurity strategies Provides insight into the interaction and croTable of Contents Practical Cloud Security
£71.24
Taylor & Francis Inc Reconfigurable and Adaptive Computing
Book SynopsisReconfigurable computing techniques and adaptive systems are some of the most promising architectures for microprocessors. Reconfigurable and Adaptive Computing: Theory and Applications explores the latest research activities on hardware architecture for reconfigurable and adaptive computing systems.The first section of the book covers reconfigurable systems. The book presents a software and hardware codesign flow for coarse-grained systems-on-chip, a video watermarking algorithm for the H.264 standard, a solution for regular expressions matching systems, and a novel field programmable gate array (FPGA)-based acceleration solution with MapReduce framework on multiple hardware accelerators.The second section discusses network-on-chip, including an implementation of a multiprocessor system-on-chip platform with shared memory access, end-to-end quality-of-service metrics modeling based on a multi-application environment in network-on-chip, aTable of ContentsReconfigurable Systems. Network-on-Chip. Systems Codesign.
£180.50
Taylor & Francis Inc Cyber Security for Industrial Control Systems
Book SynopsisCyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of 10 chapters, which are divided into three parts.The first three chapters extensively introduce secure state estimation technologies, providing a systematic presentation on the latest progress in security issues regarding state estimation. The next five chapters focus on the design of secure feedback control technologies in industrial control systems, displaying an extraordinary difference from that of traditional secure defending approaches from the viewpoint of network and communication. The last two chapters elaborate on the systematic secure control architecture and algorithms for various concrete application scenarios.The authors provide detailed dTable of ContentsSECURE STATE ESTIMATION. A Game—Theoretic Approach to Jamming Attacks. Secure State Estimation against Stealthy Attack. Secure State Estimation in Industrial Control Systems. RESILIENT CONTROL THEORY. Best DoS Attack Policy against Wireless Systems. Specification-Based FDI Detection Technique. Resilient Control System Hierarchical Architectures. Topology Control in Secure WSNs. Resilient Distributed Control in Energy CPSs. SECURITY ISSUES IN APPLICATION FIELDS. Resilient Control of Operator-Vehicle Networks. Privacy-Preserving Data Access Control.
£156.75
Taylor & Francis Inc Mobile Crowdsensing
Book SynopsisMobile crowdsensing is a technology that allows large scale, cost-effective sensing of the physical world. In mobile crowdsensing, mobile personal devices such as smart phones or smart watches come equipped with a variety of sensors that can be leveraged to collect data related to environment, transportation, healthcare, safety and so on. This book presents the first extensive coverage of mobile crowdsensing, with examples and insights drawn from the authors' extensive research on this topic as well as from the research and development of a growing community of researchers and practitioners working in this emerging field. Throughout the text, the authors provide the reader with various examples of crowdsensing applications and the building blocks to creating the necessary infrastructure, explore the related concepts of mobile sensing and crowdsourcing, and examine security and privacy issues introduced by mobile crowdsensing platforms. Provides a comprehensivTable of ContentsChapter 1. Introduction Chapter 2. Mobile Sensing. Chapter 3. Mobile Crowdsourcing. Chapter 4. What is Mobile Crowdsensing? Chapter 5. Applications. Chapter 6. Systems and Platforms. Chapter 7. Incentive Mechanisms for Participants. Chapter 8. Security and Privacy. Chapter 9. Future Directions. Chapter 10. Conclusions
£147.13
Taylor & Francis Inc Mobile Ad Hoc Networks
Book SynopsisIn recent years, a lot of work has been done in an effort to incorporate Swarm Intelligence (SI) techniques in building an adaptive routing protocol for Mobile Ad Hoc Networks (MANETs). Since centralized approach for routing in MANETs generally lacks in scalability and fault-tolerance, SI techniques provide a natural solution through a distributed approach for the adaptive routing for MANETs. In SI techniques, the captivating features of insects or mammals are correlated with the real world problems to find solutions. Recently, several applications of bio-inspired and nature-inspired algorithms in telecommunications and computer networks have achieved remarkable success. The main aims/objectives of this book, Mobile Ad Hoc Networks: Bio-Inspired Quality of Service Aware Routing Protocols, are twofold; firstly it clearly distinguishes between principles of traditional routing protocols and SI based routing protocols, while explaining in detail the analogy between MANETs and SITable of ContentsIntroduction. Swarm Intelligence Techniques. SI Solutions to Routing in MANETs. SI Solutions to QoS in MANETs. SI Solutions to Security Issues in MANETs. Conclusions and Future Directions. Appendix. References.
£147.25
Taylor & Francis Inc Vehicular Social Networks
Book SynopsisThe book provides a comprehensive guide to vehicular social networks. The book focuses on a new class of mobile ad hoc networks that exploits social aspects applied to vehicular environments. Selected topics are related to social networking techniques, social-based routing techniques applied to vehicular networks, data dissemination in VSNs, architectures for VSNs, and novel trends and challenges in VSNs. It provides significant technical and practical insights in different aspects from a basic background on social networking, the inter-related technologies and applications to vehicular ad-hoc networks, the technical challenges, implementation and future trends.Table of Contents Introduction to VSNs Kardelen Cepni, Mustafa Ozger, and Ozgur B. Akan, "Vehicular Social Sensor Networks" Flavio Esposito, "Architectures for Social Vehicular Network Programmability" Data Dissemination in VSNs Leandros A. Maglaras, Pavlos Basaras, Dimitrios Katsaros, and Helge Janicke, "Social Clustering of Vehicles" Mahmoud Hashem Eiza and Qi Shi, "Social Evolving Graph-Based Connectivity Model for Vehicular Social Networks" Felipe D. da Cunha, Guilherme Maia, Leandro Villas, Aline Carneiro Viana, Raquel Mini, and Antonio A. F. Loureiro, "Socially Inspired Dissemination in VSNs" Applications and Security in VSNs Syed Fakhar Abbas, William Liu, Quan Bai, Adnan Al-Anbuky and Aminu Bello Usman, "Revealing the Role of Structural Transitivity in Building the Sustainable Community-Aware Vehicular Social Networks" Elif Bozkaya and Berk Canberk, "Crowdsourcing Applications for Vehicular Social Networks" 8 Farzad Safaei, "Efficacy of ridesharing as the basis for a dependable public transport system for Vehicular Social Networks" 9 Hongyu Jin, Mohammad Khodaei, and Panos Papadimitratos, "Security and Privacy in Vehicular Social Networks"
£166.25
Taylor & Francis Inc Location Privacy in Wireless Sensor Networks
Book SynopsisToday all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor networks.Location Privacy in Wireless Sensor Networks focuses on location privacy, by which an attacker might determine the source and destination of communications with simple techniques. This poses a serious threat as the attacker might use this information to reach the assets or individuals being monitored or even to destroy or compromise the whole network. This book will aid in the protection against this serious privacy threat.Table of Contents Introduction. Suitability of Computer-based Anonymity Systems. Analysis of Location Privacy Solution. Context-Aware Source-Location Privacy. Probabilistic Receiver-Location Privacy. Conclusion.
£133.00
Taylor & Francis Inc Advances in Smart Cities
Book SynopsisThis is an edited book based on the selected submissions made to the conference titled International Conference in Smart Cities. The project provides an innovative and new approach to holistic management of cities physical, socio-economic, environmental, transportation and political assets across all domains, typically supported by ICT and open data.Table of ContentsAdoption and Acceptance of Mandatory Electronic Public Services by Citizens in the Developing World. Self-Sustainable Integrated Township. Smart People for Smart Cities. How Smart Cities influence Governance? Role of Manufacturing Sector to Develop Smart Economy. Concept of Smart Village in India. Smart City. Smart City Technologies. A Cloud-Based Mobile Application for Cashless Payments. Financial Viability of Energy Conservation using Natural Light. Information Risk for Digital Services. Mobile Commerce Research for Individual, Business and Society. The Shift Toward a Sustainable Urban Mobility through Decision Support Systems.
£133.00
Taylor & Francis Inc Magnetic Communications From Theory to Practice
Book SynopsisThis book covers comprehensively the theories and practical design of magnetic communications. It emphasizes the differences between it and RF communications. It first provides the models and signal propagation principles of magnetic communication systems. Then it describes the hardware architecture of the system, including transmitter, MODEM, inductors, coils, etc. Then, it discusses the corresponding communication software design principles and cases. Finally, it presents several types of practical implementations and applications.Table of ContentsPreface. Part 1: Fundamental Theories. 1. Magnetic Signals. Communication Models. 2. Architecture of Magnetic Communication Systems. 3. Comparisons with RF and Acoustic Communications. Part 2: Hardware Design. 4. Inductors. 5. Coils. 6. Magnetic Data Transmitters. 7. Receiver Circuit. Part 3: Communication Software. 8. Data to Magnetic Conversion. 9. Magnetic to Data Interpretation. 10. Magnetic Communication Protocols. 12. Power Control. 13. Interface to Signal Processing Software. Part 4: Advanced Design. 14. Security and Privacy Issues. 15. Integration with Sensors. 16. Network Topology Control. Part 5: Systems and Applications. 17. Underground Mining. 18. Medical Sensor Communications. 19. Underwater Monitoring. 20. Other Practical Applications.
£94.50
O'Reilly Media Using and Managing PPP
Book SynopsisThis volume is for network administrators and others who have to set up computer systems to use PPP (Point-to-Point Protocol). It covers all aspects of the protocol, including how to set up dial-in servers, authentication, debugging and PPP options. In addition, it contains overviews of related areas, like serial communications, DNS setup, and routing. Topics include: configuring modems and serial links; how to set up dial-out and dial-in; PPP support in Solaris, Windows NT (client and server), and Windows 95 (client only); and related technologies that users need to understand.Table of ContentsPreface. 1. What Is PPP? Early Remote Access and Networking Serial Line Internet Protocol (SLIP) Point-to-Point Protocol (PPP) Open Systems Interconnect Model What You Need to Know 2. Serial Interfaces and Modems Serial Interfacing Modems 3. How PPP Works PPP Frame Format PPP Connection States Link Control Protocol Authentication in PPP Network Control Protocol Internet Protocol Control Protocol Compressed Datagram What PPP Doesn't Provide 4. TCP/IP The Internet Protocol Van Jacobson Compression IP Addresses Media Access Control Addresses Routing 5. Selecting Hardware, Software, and Services Selecting Serial Connections PPP Hardware PPP Software. 6. Dial-out PPP Setup PPP Sign-on Procedures General PPP Setup Steps Linux PPP-2.3 Solaris PPP Windows 3.1 Windows 98 (and 95) Windows NT 4.0 Workstation 7. Dial-in PPP Setup Dial-in PPP Architecture for Internet Access Communication Servers Linux PPP-2.3 Solaris PPP Windows NT 4.0 Server. 8. Network Architectures Incorporating PPP Choosing Network Architectures Proxy ARP Split Subnet Unnumbered PPP in a Subnet Multipoint PPP in a Subnet. 9. Routing to PPP Connections Routing Entries Using Default Routes Using Subnet Routes Using Host-Specific Routes Dynamic Routing Protocols. 10. Domain Name System Domain Name System Hierarchy Using DNS DNS Records for PPP Setting up DNS Name Resolution DNS Servers. 11. Customizing and Tuning PPP PPP Startup Options for Dial-in Servers PPP Startup Options for dial-out Servers Adjustable LCP Options Authentication Policy Adjustable IPCP Options Setting IP Addresses Other Adjustable Settings. 12. Authentication Password Authentication Protocol Challenge Handshake Authentication Protocol Microsoft CHAP Authenticating Outside PPP Call Back Security Tokens. 13. Private Networks Private Network Setup Application Layer Proxies Network Address Translation. 14. Virtual Private Networking and Tunneling Virtual Private Network Architectures Tunneling Protocols Redirecting Serial Input/Output Setting up Outgoing PPP Tunnels Setting up Incoming PPP Tunnels Routing with Tunnels Network Security. 15. Troubleshooting Troubleshooting Approaches Trace and Activity Logs Checking the Serial Connection Checking Modems Chat Script Problems PPP Failures Checking TCP/IP. 16. What's New for PPP? Communication Services Network Layer Protocols PPP Extensions Developments Relating to PPP Product Obsolescence A. PPP Assigned Numbers B. Serial Interface Emulation
£20.99
Artech House Publishers Enterprise Architecture for Integration: Rapid Delivery Methods and Technologies
Book SynopsisWith the fast pace of change in today's business environment, the need to transform organizations into agile enterprises that can respond quickly to change has never been greater. Methods and computer technologies are needed to enable rapid business and system change, and this practical book shows professionals how to achieve this agility. The solution lies in Enterprise Integration (both business and technology integration). For business integration, the book explains how to use enterprise architecture methods to integrate data, processes, locations, people, events and business plans throughout an organization.
£113.00
Universal Publishers The 8051/8052 Microcontroller: Architecture, Assembly Language, and Hardware Interfacing
£45.44
Nova Science Publishers Inc Fuzzy Logic: Theory, Programming & Applications
Book SynopsisFuzzy logic is a form of multi-valued logic derived from fuzzy set theory to deal with reasoning that is approximate rather than precise. Just as in fuzzy set theory the set membership values can range (inclusively) between 0 and 1, in fuzzy logic the degree of truth of a statement can range between 0 and 1 and is not constrained to the two truth values {true, false} as in classic predicate logic. And when linguistic variables are used, these degrees may be managed by specific functions, as discussed below. Some Current areas of application include: Automobile and other vehicle subsystems, such as automatic transmissions, ABS and cruise control (e.g. Tokyo monorail) Air conditioners, The Massive engine used in the Lord of the Rings films, which helped huge scale armies create random, yet orderly movements , Cameras, Digital image processing, such as edge detection, Rice cookers, Dishwashers, Elevators, Washing machines and other home appliances, Video game artificial intelligence, Language filters on message boards and chat rooms for filtering out offensive text, Pattern recognition in Remote Sensing, This book brings together the latest research in the field.
£176.24
Purdue University Press Practical Digital Design: An Introduction to VHDL
Book SynopsisThe VHSIC Hardware Description Language (VHDL) is one of the two most popular languages used to design digital logic circuits. This book provides a comprehensive introduction to the syntax and the most commonly used features of VHDL. It also presents a formal digital design process and the best-case design practices that have been developed over more than twenty-five years of VHDL design experience by the author in military ground and satellite communication systems. Unlike other books on this subject, this real-world professional experience captures not only the what of VHDL, but also the how. Throughout the book, recommended methods for performing digital design are presented along with the common pitfalls and the techniques used to successfully avoid them. Written for students learning VHDL for the first time as well as professional development material for experienced engineers, this book's contents minimize design time while maximizing the probability of first-time design success.Table of Contents PREFACE ACKNOWLEDGMENTS ABOUT THE AUTHOR CHAPTER 1 INTRODUCTION CHAPTER 2 SIGNALS, TIME, AND THE SIMULATION CYCLE CHAPTER 3 THE VHDL DESIGN ENVIRONMENT CHAPTER 4 DECLARATIONS CHAPTER 5 LIBRARIES AND DESIGN UNITS CHAPTER 6 CONCURRENT STATEMENTS CHAPTER 7 SEQUENTIAL STATEMENTS CHAPTER 8 THE PROCESS STATEMENT CHAPTER 9 MODELING CASE STUDIES CHAPTER 10 SUBPROGRAMS CHAPTER 11 SIMULATION AND TEST BENCHES CHAPTER 12 TEST BENCH DEVELOPMENT CHAPTER 13 TEST BENCH CASE STUDIES CHAPTER 14 LOGIC SYNTHESIS CHAPTER 15 ASIC AND FPGA TECHNOLOGY CHAPTER 16 SYNTHESIS CODE EXAMPLES CHAPTER 17 SPECIALIZED CODE EXAMPLES CHAPTER 18 STATE MACHINES CHAPTER 19 FUNCTIONAL DECOMPOSITION CHAPTER 20 FILTER DESIGN EXAMPLE CHAPTER 21 DESIGN REUSE APPENDIX A CODING STYLE GUIDELINES APPENDIX B FUNCTIONAL DESCRIPTION EXAMPLE APPENDIX C VHDL RESERVED WORDS STATEMENT INDEX SUBJECT INDEX
£69.30
Manning Publications Infrastructure as Code, Patterns and Practices:
Book SynopsisEssential Infrastructure as Code teaches patterns for scaling systems and supporting infrastructure for mission-critical applications. The book is fullof flexible automation techniques and universal principles that are easy toapply to almost any use case, from data centers, to public cloud, to software-as-a-Service. The book is full of techniques that work whether you're managing your personal projects or making live network changes across a large enterprise. Infrastructure as Code (IaC) replaces time-consuming manual provisioning and configuration with automation via configuration managers or provisioning tools like Hashicorp Terraform. Managing your infrastructure as code makes it easy to test changes and implement new features, scale systems without downtime or operational toil, and rapidly roll back mistakes.Trade Review“This book has a refreshing take on infrastructure as code.” Stanford S.Guillory “Loved the content, especially since the author talks about stuff we've been asking ourselves since forever but never found a clear answer!” SylvainMartel “The author provides real-world, hands-on guidance that cuts through the nuances of framework specifics and gets to the heart of great IaC as she discusses tools, techniques and sound practice.” JeremyBryan “Provides precious hints to automate the creation of structured infrastructures by coding.” Cosimo Attanasi “Kudos all around, very timely and necessary, breaking down this subject in such a clear way.” Sean Booker
£40.85
Manning Publications Street Coder
Book SynopsisSoftware development isn't an "ivory tower" exercise.Street coders get the job done by prioritizing tasks, making quick decisions, and knowing which rules to break. Street Coder: Rules to break and how to break themis a programmer's survival guide, full of tips, tricks, and hacks that will make you a more efficient programmer. This book's rebel mindset challenges status quo thinking and exposes the important skills you need on the job. You'll learnthe crucial importance of algorithms and data structures, turn programming chores into programming pleasures, and shatter dogmatic principles keeping you from your full potential. Every new coder starts out with a lot of theory; the "streetsmarts" come with experience. To be successful, you need to know how toput theory into action, understand why "best practices" are the best, and know when to go rogue and break the unbreakable rules.Trade Review“An incredible book to learn the craft of software development through a new perspective: One thatis not fuelled by religion or blind following of best practices, but one that actively challenges best practices and thus requires you to think about their prosand cons.!” Sebastian Felling “This is like having a mentor in a book who is sharing all their mistakes and notes on what they've learned in a nice little package.“ Joseph Perenia “A fun, broad, anddeep conversation with an experienced programmer about coding, packed withpractical advice.” Adail Retamal “I wish I couldread this book several years ago, thus, I could have saved a lot of time.” XuYang “Contains the pragmatism an experienced software developer has gained over the years of being at the trenches (or streets as he prefers to call it).” Orlando MéndezMorales “Great book for thenew and used, self-taught, formally educated, and otherwise curious programmers doing dirt -aka street coders.” Robert Wilk
£37.99
£32.25
SDC Publications Designing with Creo Parametric 4.0
Book SynopsisDesigning with Creo Parametric 4.0 provides the high school student, college student, or practicing engineer with a basic introduction to engineering design while learning the 3D modeling Computer-Aided Design software called Creo Parametric from PTC. The topics are presented in tutorial format with exercises at the end of each chapter to reinforce the concepts covered. It is richly illustrated with computer screen shots throughout. Above all, this text is designed to help the reader expand their creative talents and communicate their ideas through the graphics language.
£94.04
SDC Publications Engineering Graphics Essentials with AutoCAD 2019
Book SynopsisEngineering Graphics Essentials with AutoCAD 2019 Instruction gives students a basic understanding of how to create and read engineering drawings by presenting principles in a logical and easy to understand manner. It covers the main topics of engineering graphics, including tolerancing and fasteners.
£59.85
SDC Publications Autodesk Inventor 2019 and Engineering Graphics
Book Synopsis
£52.25
SDC Publications Learning Autodesk Inventor 2019
Book SynopsisThis book will teach you everything you need to know to start using Autodesk Inventor 2019 with easy to understand, step-by-step tutorials. This book features a simple robot design used as a project throughout the book. You will learn to model parts, create assemblies, run simulations and even create animations of your robot design.
£54.14
Manning Publications Podman in Action
Book SynopsisDiscover Podman, a next-generation container engine that manages containers rootlessly and provides extra layers of exceptional security unavailable in Docker and other container platforms. In Podman in Action you will learn how to: Build and run containers in rootless mode Develop and manage pods Use SystemD to oversee a container's lifecycle Work with the Podman service via Python Keep your containers confined using Podman security features Manage containerized applications on edge devices Podman in Action shows you how to deploy containerized applications on Linux, Windows, and MacOS systems using Podman. Written by Daniel Walsh, who leads the Red Hat Podman team, this book teaches you how to securely manage the entire application lifecycle without human intervention. It also demonstrates how, with Podman, you can easily convert containerized applications into Kubernetes-based microservices. about the technology Podman is a daemonless container engine that lets you build and run containers on all Linux distributions, Windows, and MacOS. It supports the fork exec model for running containers, which allows for better integration with a system and makes it easier to run rootless. It also boasts unique advanced features, such as the ability to create and run Pods that are similar to Kubernetes, and execute Kubernetes YAML. And if you're not ready to completely move on from Docker, Podman can run as a service and support the Docker API in a way that works with docker-compose and docker-py. about the reader For developers or system administrators experienced with Linux and the basics of Docker.
£45.99
Manning Publications Data Mesh in Action
Book SynopsisRevolutionize the way your organization approaches data with a data mesh! This new decentralized architecture outpaces monolithic lakes and warehouses and can work for a company of any size. Data Mesh in Action reveals how this ground breaking architecture looks for both small start-ups and large enterprises. You'll see a datamesh in action as you explore both an extended case study andmultiple real-world examples. As you go, you'll be expertly guidedthrough discussions around Socio-Technical Architecture and Domain-Driven Design with the goal of building a sleek data-as-a-productsystem.
£45.04
Murphy & Moore Publishing Modern Computer Architecture
Book Synopsis
£108.07
Pragmatic Bookshelf Quantum Computing: Program Next-Gen Computers for
Book SynopsisYou've heard that quantum computing is going to change the world. Now you can check it out for yourself. Learn how quantum computing works, and write programs that run on the IBM Q quantum computer, one of the world's first functioning quantum computers. Learn a simple way to apply quantum mechanics to computer programming. Create algorithms to solve intractable problems for classical computers, and discover how to explore the entire problem space at once to determine the optimal solution. Get your hands on the future of computing today. Quantum computing overhauls computer science. Problems such as designing life-saving drugs and super-large logistics problems that have been difficult or impossible for classical computers to handle can now be solved in moments. Quantum computing makes it possible to explore all possible solutions simultaneously and determine those that work, instead of iterating through each possibility sequentially. Work with quantum computers directly, instead of talking about them theoretically. Work with qubits, the fundamental elements of quantum computing. Discover what makes them different from classical bits. Model complex problems with logic gates specific to quantum computing. Learn how quantum mechanics offers ways to write programs that explore all solutions simultaneously. Create quantum circuits to solve problems that classical computers struggle with. Dive into quantum optimization and cryptography. Use the IBM Q quantum computer to both simulate quantum effects, and actually run your programs on a real quantum machine. Get a head start on the technology that will drive computer science into the future. What You Need: Access to the IBM quantum computer, via any internet connection
£35.14
Morgan & Claypool Publishers Principles of Secure Processor Architecture
Book SynopsisThis book presents the different challenges of secure processor architecture design for architects working in industry who want to add security features to their designs as well as graduate students interested in research on architecture and hardware security.It educates readers about how the different challenges have been solved in the past and what are the best practices, i.e., the principles, for design of new secure processor architectures. Based on the careful review of past work by many computer architects and security researchers, readers also will come to know the five basic principles needed for secure processor architecture design. The book also presents existing research challenges and potential new research directions. Finally, it presents numerous design suggestions, as well as discussing pitfalls and fallacies that designers should avoid.With growing interest in computer security and the protection of the code and data which execute on commodity computers, the amount of hardware security features in today's processors has increased significantly over the recent years. No longer of just academic interest, security features inside processors have been embraced by industry as well, with a number of commercial secure processor architectures available today. This book gives readers insights into the principles behind the design of academic and commercial secure processor architectures. Secure processor architecture research is concerned with exploring and designing hardware features inside computer processors, features which can help protect confidentiality and integrity of the code and data executing on the processor. Unlike traditional processor architecture research that focuses on performance, efficiency, and energy as the first-order design objectives, secure processor architecture design has security as the first-order design objective (while still keeping the others as important design aspects that need to be considered).Table of Contents Preface Acknowledgments Introduction Basic Computer Security Concepts Secure Processor Architectures Trusted Execution Environments Hardware Root of Trust Memory Protections Multiprocessor and Many-Core Protections Side-Channel Threats and Protections Security Verification of Processor Architectures Principles of Secure Processor Architecture Design Bibliography Online Resources Author's Biography
£88.20
No Starch Press,US Dive Into Systems: A Gentle Introduction to
Book SynopsisThis is a crash course in the hard and soft components of any computer system. In introductory-level computer science classes, it'll guide readers to understand computers at various layers of abstraction. Early chapters begin with the basics of the C programming language and the inner workings of operating systems. Later, how to optimize code for various architectures, how memory management works in multi-core CPUs and much more is also covered. Accessible and easy to follow, this book uses images and exercises to break down these complex topics.Trade Review"I’ve read a lot of books on computers in my time—some focused on the hardware and others centered on programming—but I’ve never seen one quite like Dive into Systems. On the one hand, this is a fantastic introduction to C programming for those who already know Python; on the other hand, it dives into the depths of the underlying hardware architecture. And then, after popping up to take a deep breath, there’s another deep dive into the world of assembly language. Suffice it to say that I’ll certainly be recommending this little beauty to my Python-obsessed friends."—Clive “Max” Maxfield, author of Bebop to the Boolean Boogie and How Computers Do Math"Dive into Systems does a great job of introducing hardware architecture, including the language that is often used to communicate with it - the C programming language. C programming concepts were explained by contrasting it with Python concepts and examples, so any experienced Python user will feel right at home with the explanations."—Emily Liu, Security Consultant and Advanced Reviewer"Dive into Systems takes interested developers on tour through computer architecture from the C programming language perspective. The authors take great care to explain critical computer systems concepts with many well-illustrated examples. Each chapter builds on the previous content, providing a rich history and a meticulously constructed dive into computer architecture."—George D., Advanced Reviewer"This is an outstanding book for those teaching an Introduction to Systems Programming class with only a CS 1 prerequisite! The book fills a void, allowing instructors to use one book for C programming, computer organization, assembly language, and systems programming topics instead of needing multiple books for their courses."—David Toth, Associate Professor of Computer Science and Chair of Computer Science Program at Centre College"By introducing students to low-level programming gently through C programming, Matthews, Newhall and Webb have managed to make the fundamental concepts of assembly language approachable and comprehensible. The genius of the book is that it begins the journey at the point that students understand—high level programming—and slowly peel back the abstractions to reveal the reality underneath all computer programs. My students have never understood memory, the fetch-decode-execute cycle and assembly programming in general like they have with this approach. Dive Into Systems brings the revolution in teaching low-level computer concepts . . . to the masses."—John Barr, Computer Science Professor, Ithaca College"An ideal textbook for introductory computer science curriculums. . . . Unreservedly recommended for personal, professional, community, and academic library Computer Science collections" —Midwest Book Review
£56.99
BCS Learning & Development Limited Solution Architecture Foundations
Book SynopsisSolution architecture is a relatively new specialism but is at the very heart of the relationship between business and IT. This book is an authoritative and practical introduction, suitable for new entrants to the field but also of benefit to experienced professionals wishing to consolidate their knowledge and skills. The tools and techniques of solution architecture are presented in the context of a framework and life cycle, taking a problem or idea through logical steps to design a holistic and evidence-based solution. There is a focus on collaboration with the business as well as other disciplines such as enterprise architecture, business analysis and cyber security.Trade ReviewThis book is an enjoyable and refreshing read, offering readers a comprehensive and contextual introduction to the discipline of solution architecture. As organisations are reimagining traditional business models, adopting agile ways of working and accelerating digital transformation agendas, this book highlights the importance of communication and collaboration throughout a solution architecture lifecycle including the voice of the customer and ongoing stakeholder interactions. This book provides a complementary framework for solution architecture that refreshingly re-enforces that ‘…unlike a strict methodology where activities are mandated, a framework is meant to be a guide, not a driver or constraint.' -- Chris Banks MBCS CITP, Director, Workplace Fusion LtdThis book provides a good overview of Solution Architecture Process and its alignment with Enterprise Architecture, -- Sachin Bansal, Enterprise / Lead Solution Architect, IBM Services, UK * *Note - Opinions expressed here are purely personal in individual capacity and do not reflect any endorsement by IBM or any other current/former employers *I recommend this book for those who want to grow their careers in Solution Architecture and for those considering related career roles. Complementing knowledge in specific technologies, this book can enable readers to grow from techniques and ways of thinking that can be applied for varying projects, delivery environments, and stakeholders. With a highly accessible style it will appeal to people with a range of backgrounds or career experiences. -- Mike Broomhead FBCS CITPAt last, a comprehensive study of a complex and often misunderstood subject. In addition to clarifying many aspects of Solution Architecture, the author has added personal insights based on his many years of experience. I particularly liked the sections where Solution Architecture is put into context with Business Architecture and other enterprise wide strategic domains. An excellent and enlightening book for all those interested in the topic of Solution Architecture. -- Paul Turner FBCS, BCS Author and Examiner'The book provides a good, clear, readable introduction to Solution Architecture. The topics are logically presented so that there is progressive style with concepts being illustrated through use of examples drawn from a realistic case study. There are also a good number of activities that the reader can work through. Reference is made to standards and methodologies without becoming fixated on them. It was very enjoyable and easy to read.' -- Dr Quentin Vaughan, Managing Client Partner, IBM Global Business ServicesTable of Contents Introduction to Solution Architecture Solution Architecture in the Context of Business and Enterprise Architecture A Framework for Solution Architecture Inputs to Solution Architecture Gap Analysis Stakeholder Interaction Solution Technology Definition Implementation
£33.24
BCS Learning & Development Limited Security Architecture
Book SynopsisSecurity Architecture is a driver for proactive, strategic, and comprehensive protection. Whether you are a seasoned security professional or an emerging architect, this book provides actionable insights to help you navigate the complex landscape of modern cybersecurity.
£34.99
Octopus Publishing Group The Nostalgia Nerd's Retro Tech: Computer,
Book SynopsisRemember what a wild frontier the early days of home gaming were? Manufacturers releasing new consoles at a breakneck pace; developers creating games that kept us up all night, then going bankrupt the next day; and what self-respecting kid didn't beg their parents for an Atari or a Nintendo? This explosion of computers, consoles, and games was genuinely unlike anything the tech world has seen before or since.This thoroughly researched and geeky trip down memory lane pulls together the most entertaining stories from this dynamic era, and brings you the classic tech that should never be forgotten.
£17.09
Paragon Publishing Enterprise Data Architecture: How to navigate its landscape
£22.99
Business Science Reference Tools and Technologies for the Development of
Book SynopsisWith the continual development of professional industries in today's modernized world, certain technologies have become increasingly applicable. Cyber-physical systems, specifically, are a mechanism that has seen rapid implementation across numerous fields. This is a technology that is constantly evolving, so specialists need a handbook of research that keeps pace with the advancements and methodologies of these devices.Tools and Technologies for the Development of Cyber-Physical Systems is an essential reference source that discusses recent advancements of cyber-physical systems and its application within the health, information, and computer science industries. Featuring research on topics such as autonomous agents, power supply methods, and software assessment, this book is ideally designed for data scientists, technology developers, medical practitioners, computer engineers, researchers, academicians, and students seeking coverage on the development and various applications of cyber-physical systems.
£999.99
IGI Global Applications and Approaches to Object-Oriented
Book SynopsisIn today's modernized environment, a growing number of software companies are changing their traditional engineering approaches in response to the rapid development of computing technologies. As these businesses adopt modern software engineering practices, they face various challenges including the integration of current methodologies and contemporary design models and the refactoring of existing systems using advanced approaches.Applications and Approaches to Object-Oriented Software Design: Emerging Research and Opportunities is a pivotal reference source that provides vital research on the development of modern software practices that impact maintenance, design, and developer productivity. While highlighting topics such as augmented reality, distributed computing, and big data processing, this publication explores the current infrastructure of software systems as well as future advancements. This book is ideally designed for software engineers, IT specialists, data scientists, business professionals, developers, researchers, students, and academicians seeking current research on contemporary software engineering methods.
£999.99
ISTE Ltd and John Wiley & Sons Inc Model Driven Engineering for Distributed
Book SynopsisModel-based development methods, and supporting technologies, can provide the techniques and tools needed to address the dilemma between reducing system development costs and time, and developing increasingly complex systems. This book provides the information needed to understand and apply model-drive engineering (MDE) and model-drive architecture (MDA) approaches to the development of embedded systems. Chapters, written by experts from academia and industry, cover topics relating to MDE practices and methods, as well as emerging MDE technologies. Much of the writing is based on the presentations given at the Summer School “MDE for Embedded Systems” held at Brest, France, in September 2004.Table of ContentsChapter Summary xi Chapter 1. Model Transformation: A Survey of the State of the Art 1 Tom MENS 1.1. Model-driven engineering 1 1.2. Model transformation 2 1.3. Model transformation languages 5 1.4. Model transformation activities 8 1.5. Conclusion 14 1.6. Acknowledgements 14 1.7. Bibliography 15 Chapter 2. Model-Based Code Generation 21 Chris RAISTRICK 2.1. Introduction 21 2.2. The model-driven architecture (MDA) process 22 2.3. The automated approach to code generation 23 2.4. Domain modeling 25 2.5. The executable UML (xUML) formalism 29 2.6. System generation 31 2.7. Executable UML to code mappings 34 2.8. Conclusions 41 2.9. Bibliography 42 Chapter 3. Testing Model Transformations: A Case for Test Generation from Input Domain Models 43 Benoit BAUDRY 3.1. Introduction 43 3.2. Challenges for testing systems with large input domains 46 3.3. Selecting test data in large domains 52 3.4. Metamodel-based test input generation 58 3.5. Conclusion 67 3.6. Acknowledgements 68 3.7. Bibliography 68 Chapter 4. Symbolic Execution-Based Techniques for Conformance Testing 73 Christophe GASTON, Pascale LE GALL, Nicolas RAPIN and Assia TOUIL 4.1. Context 73 4.2. Input output symbolic transition systems 79 4.3. Symbolic execution 84 4.4. Conformance testing for IOSTS 87 4.5. Concluding remarks 96 4.6. Bibliography 101 Chapter 5. Using MARTE and SysML for Modeling Real-Time Embedded Systems 105 Huascar ESPINOZA, Daniela CANCILA, Sébastien GÉRARD and Bran SELIC 5.1. Introduction 105 5.2. Background 108 5.3. Scenarios of combined usage 113 5.4. Combination Strategies 125 5.5. Related work 130 5.6. Conclusion 133 5.7. Acknowledgements 134 5.8. Bibliography 134 Chapter 6. Software Model-based Performance Analysis 139 Dorina C. PETRIU 6.1. Introduction 139 6.2. Performance models 142 6.3. Software model with performance annotations 148 6.4. Mapping from software to performance model 155 6.5. Using a pivot language: Core Scenario Model (CSM) 158 6.6. Case study performance model 160 6.7. Conclusions 162 6.8. Acknowledgements 163 6.9. Bibliography 163 Chapter 7. Model Integration for Formal Qualification of Timing-Aware Software Data Acquisition Components 167 Jean-Philippe BABAU, Philippe DHAUSSY and Pierre-Yves PILLAIN 7.1. Introduction 167 7.2. System modeling 170 7.3. Variation points modeling 182 7.4. Experiments and results 189 7.5. Conclusion 194 7.6. Bibliography 195 Chapter 8. SoC/SoPC Development using MDD and MARTE Profile 201 Denis AULAGNIER, Ali KOUDRI, Stéphane LECOMTE, Philippe SOULARD, Joël CHAMPEAU, Jorgiano VIDAL, Gilles PERROUIN and Pierre LERAY 8.1. Introduction 201 8.2. Related works 203 8.3. MOPCOM process and models 206 8.4. Application 210 8.5. System analysis 211 8.6. Abstract modeling level 214 8.7. Execution modeling level 216 8.8. Detailed modeling level 220 8.9. Tooling Support 223 8.10. HDL Code Generation 225 8.11. Conclusion 228 8.12. Acknowledgements 229 8.13. Bibliography 229 List of Authors 233 Index 237
£132.00
ISTE Ltd and John Wiley & Sons Inc Safety of Computer Architectures
Book SynopsisIt is currently quite easy for students or designers/engineers to find very general books on the various aspects of safety, reliability and dependability of computer system architectures, and partial treatments of the elements that comprise an effective system architecture. It is not so easy to find a single source reference for all these aspects of system design. However, the purpose of this book is to present, in a single volume, a full description of all the constraints (including legal contexts around performance, reliability norms, etc.) and examples of architectures from various fields of application, including: railways, aeronautics, space, automobile and industrial automation. The content of the book is drawn from the experience of numerous people who are deeply immersed in the design and delivery (from conception to test and validation), safety (analysis of safety: FMEA, HA, etc.) and evaluation of critical systems. The involvement of real world industrial applications is handled in such as a way as to avoid problems of confidentiality, and thus allows for the inclusion of new, useful information (photos, architecture plans/schematics, real examples).Trade Review"The text is clearly written, well-illustrated, and includes a helpful glossary." (Booknews, 1 February 2011)Table of ContentsIntroduction xiii Chapter 1. Principles 1 Jean-Louis BOULANGER 1.1. Introduction 1 1.2. Presentation of the basic concepts: faults, errors and failures 1 1.3. Safe and/or available architecture 7 1.4. Resetting a processing unit 7 1.5. Overview of safety techniques 8 1.6. Conclusion 45 1.7. Bibliography 45 Chapter 2. Railway Safety Architecture 47 Jean-Louis BOULANGER 2.1. Introduction 47 2.2. Coded secure processor 47 2.3. Other applications 53 2.4. Regulatory and normative context 60 2.5. Conclusion 66 2.6. Bibliography 66 Chapter 3. From the Coded Uniprocessor to 2oo3 69 Gilles LEGOFF and Christophe GIRARD 3.1. Introduction 69 3.2. From the uniprocessor to the dual processor with voter 71 3.3. CSD: available safety computer 80 3.4. DIVA evolutions 93 3.5. New needs and possible solutions 99 3.6. Conclusion 101 3.7. Assessment of installations 102 3.8. Bibliography 103 Chapter 4. Designing a Computerized Interlocking Module: a Key Component of Computer-Based Signal Boxes Designed by the SNCF 105 Marc ANTONI 4.1. Introduction 105 4.2. Issues 107 4.3. Railway safety: fundamental notions 116 4.4. Development of the computerized interlocking module 124 4.5. Conclusion 145 4.6. Bibliography 147 Chapter 5. Command Control of Railway Signaling Safety: Safety at Lower Cost 149 Daniel DRAGO 5.1. Introduction 149 5.2. A safety coffee machine 149 5.3. History of the PIPC 150 5.4. The concept basis 155 5.5. Postulates for safety requirements 157 5.6. Description of the PIPC architecture7 159 5.7. Description of availability principles 173 5.8. Software architecture 176 5.9. Protection against causes of common failure 186 5.10. Probabilistic modeling 188 5.11. Summary of safety concepts 194 5.12. Conclusion 197 5.13. Bibliography 198 Chapter 6. Dependable Avionics Architectures: Example of a Fly-by-Wire system 199 Pascal TRAVERSE, Christine BEZARD, Jean-Michel CAMUS, Isabelle LACAZE, Hervé LEBERRE, Patrick RINGEARD and Jean SOUYRIS 6.1. Introduction 199 6.2. System breakdowns due to physical failures 205 6.3. Manufacturing and design errors 215 6.4. Specific risks 223 6.5. Human factors in the development of flight controls 225 6.6. Conclusion 229 6.7. Bibliography 229 Chapter 7. Space Applications 233 Jean-Paul BLANQUART and Philippe MIRAMONT 7.1. Introduction 233 7.2. Space system 233 7.3. Context and statutory obligation 237 7.4. Specific needs 243 7.5. Launchers: the Ariane 5 example 252 7.6. Satellite architecture 281 7.7. Orbital transport: ATV example 292 7.8. Summary and conclusions 302 7.9. Bibliography 304 Chapter 8. Methods and Calculations Relative to “Safety Instrumented Systems” at TOTAL 307 Yassine CHAABI and Jean-Pierre SIGNORET 8.1. Introduction 307 8.2. Specific problems to be taken into account 308 8.3. Example 1: system in 2/3 modeled by fault trees 322 8.4. Example 2: 2/3 system modeled by the stochastic Petri net 328 8.5. Other considerations regarding HIPS 333 8.6. Conclusion 342 8.7. Bibliography 343 Chapter 9. Securing Automobile Architectures 345 David LIAIGRE 9.1. Context 345 9.2. More environmentally-friendly vehicles involving more embedded electronics 347 9.3. Mastering the complexity of electronic systems 348 9.4. Security concepts in the automotive field 350 9.5. Which security concepts for which security levels of the ISO 26262 standard? 364 9.6. Conclusion 376 9.7. Bibliography 377 Chapter 10. SIS in Industry 379 Grégory BUCHHEIT and Olaf MALASSE 10.1. Introduction 379 10.2. Safety loop structure 384 10.3. Constraints and requirements of the application 407 10.4. Analysis of a safety loop 413 10.5. Conclusion 423 10.6. Bibliography 424 Chapter 11. A High-Availability Safety Computer 425 Sylvain BARO 11.1. Introduction 425 11.2. Safety computer 426 11.3. Applicative redundancy 433 11.4. Integrated redundancy 433 11.5. Conclusion 443 11.6. Bibliography 446 Chapter 12. Safety System for the Protection of Personnel in the CERN Large Hadron Collider 447 Pierre NININ, Silvia GRAU, Tomasz LADZINSKI and Francesco VALENTINI 12.1. Introduction 447 12.2. LACS 450 12.3. LASS 452 12.4. Functional safety methodology 459 12.5. Test strategy 466 12.6. Feedback 472 12.7. Conclusions 473 12.8. Bibliography 474 Glossary 477 List of Authors 485 Index 487
£132.00
ISTE Ltd and John Wiley & Sons Inc Smart SOA Platforms in Cloud Computing
Book SynopsisThis book is intended to introduce the principles of the Event-Driven and Service-Oriented Architecture (SOA 2.0) and its role in the new interconnected world based on the cloud computing architecture paradigm. In this new context, the concept of “service” is widely applied to the hardware and software resources available in the new generation of the Internet. The authors focus on how current and future SOA technologies provide the basis for the smart management of the service model provided by the Platform as a Service (PaaS) layer.Table of Contents1. ESBay Case Study. 2. Service-Oriented and Cloud Computing Architectures. 3. SPaaS 1.0 Cookbook. 4. SSOAPaaS 1.0 Cookbook. 5. SSOAPaaS 2.0 Cookbook. 6. SSOAPaaS 3.0 Cookbook.
£125.06
ISTE Ltd and John Wiley & Sons Inc Software Architecture 1
Book SynopsisOver the past 20 years, software architectures have significantly contributed to the development of complex and distributed systems. Nowadays, it is recognized that one of the critical problems in the design and development of any complex software system is its architecture, i.e. the organization of its architectural elements. Software Architecture presents the software architecture paradigms based on objects, components, services and models, as well as the various architectural techniques and methods, the analysis of architectural qualities, models of representation of architectural templates and styles, their formalization, validation and testing and finally the engineering approach in which these consistent and autonomous elements can be tackled.Table of ContentsPreface ix Chapter 1. Object-Oriented, Component-Based, Agent-Oriented and Service-Oriented Paradigms in Software Architectures 1Abdelkrim AMIRAT, Anthony HOCK-KOON and Mourad Chabane OUSSALAH 1.1. Introduction 2 1.2. History 3 1.2.1. Object-oriented paradigm 3 1.2.2. Component-based paradigm 4 1.2.3. Agent-oriented paradigm 4 1.2.4. Service-oriented paradigm 5 1.3. Software architecture 8 1.3.1. Object-oriented software architecture 8 1.3.2. Component-based software architecture 10 1.3.3. Agent-oriented software architecture 11 1.3.4. Service-oriented architecture 13 1.4. The two dimensions of the conceptual framework for comparison: quantitative and qualitative 15 1.4.1. Conceptual differences 16 1.4.2. Quantitative dimension 25 1.4.3. Qualitative dimension 32 1.5. Approaches for integrating development paradigms 43 1.6. Summary and discussion 45 1.7. Conclusion 48 1.8. Bibliography 48 Chapter 2. Reference Architectures 55Elisa Yumi NAKAGAWA, Flavio OQUENDO and Jose Carlos MALDONADO 2.1. Introduction 55 2.2. Definition of reference architecture. 56 2.2.1. Reference architecture versus reference model 57 2.2.2. Reference architecture versus product line architecture 57 2.3. A model for reference architectures 59 2.4. Reference architecture engineering 63 2.4.1. Information source investigation 64 2.4.2. Architectural requirements establishment 66 2.4.3. Reference architecture design 67 2.4.4. Reference architecture evaluation 69 2.5. Uses of reference architectures 70 2.6. Examples of reference architectures 74 2.7. Future perspectives of reference architectures 75 2.8. Final remarks 78 2.9. Bibliography 78 Chapter 3. Multihierarchy/Multiview Software Architectures 83Ahmad KHEIR, Hala NAJA and Mourad Chabane OUSSALAH 3.1. Introduction 83 3.2. Existing viewpoint approaches 84 3.2.1. Introduction 84 3.2.2. Views in requirements specifications 85 3.2.3. Views in systems modeling 85 3.2.4. Views within programming 86 3.3. Views in software architecture 87 3.3.1. Contributions of the views in software architecture. 87 3.3.2. "4+1" view model 88 3.3.3. ISO/IEC/IEEE 42010 89 3.3.4. The views and beyond approach 91 3.3.5. Summary 93 3.3.6. Limitation of current approaches to software architecture 96 3.4. Definitions and basic concepts of multihierarchy/multiview software architectures 96 3.4.1. Definitions 96 3.4.2. Concepts and basics 98 3.5. MoVAL: architecture based on models, views and levels of abstraction 107 3.5.1. Introduction 107 3.5.2. MoVAL 108 3.5.3. MoVAL metamodel 112 3.5.4. Case study 114 3.6. Conclusion 117 3.7. Bibliography 118 Chapter 4. Software Architecture and Tools: Distributed and Coordinated Dynamic Reconfiguration Management 121Mohamed ZOUARI, Maria-Teresa SEGARRA and Khalil DRIRA 4.1. Introduction 122 4.2. Context 123 4.3. Dynamic reconfiguration management mechanisms of distributed applications. 125 4.3.1. Centralized dynamic reconfiguration management 126 4.3.2. Limitations of the centralized solution for distributed systems 129 4.3.3. The stakes of distributed reconfiguration management 130 4.3.4. Existing coordination mechanisms 131 4.4. Specialization of reconfiguration infrastructures 134 4.4.1. Specialization of behavior 134 4.4.2. Specialization of the distribution of adaptation mechanisms 135 4.5. Summary of the limitations and challenges of dynamic reconfiguration of distributed systems 137 4.6. An approach for the implementation of reconfiguration management mechanisms 138 4.7. Architectural model for distributed dynamic reconfiguration management 140 4.7.1. Component types for adaptation management 141 4.7.2. Distribution of dynamic reconfiguration management 142 4.7.3. Architectural model of the adaptation manager 144 4.7.4. Specialization of reconfiguration mechanisms 146 4.7.5. Coordination of reconfiguration processes 149 4.8. Conclusion 164 4.9. Bibliography 165 Chapter 5. Software Architecture for Product Lines 171Hugo ARBOLEDA, Rubby CASALLAS, Jaime CHAVARRIAGA and Jean-Claude ROYER 5.1. Introduction to software product lines 171 5.1.1. Three development styles 174 5.1.2. Variability management 175 5.1.3. The concept of architecture in product lines 177 5.2. The music store example 179 5.2.1. The field 179 5.2.2. The SongStock product line 180 5.2.3. Functional requirements 180 5.2.4. The other main requirements 181 5.3. Domain engineering 182 5.3.1. Domain analysis 182 5.3.2. Use case with integrated variability 183 5.3.3. The features model 184 5.3.4. Domain design 185 5.3.5. Designing the architecture of the line 186 5.4. Product engineering 190 5.4.1. The configuration of a product 191 5.4.2. Product derivation 193 5.5. The reference architecture design process 194 5.6. Further reading 197 5.6.1. PLA and reference architecture 198 5.6.2. Influential older works 200 5.7. Conclusion 203 5.8. Bibliography 204 Chapter 6. Software Architecture: Service Adaptation Techniques in the Context of Web Services Composition 211Kamel BARKAOUI and Maryam ESLAMICHALANDAR 6.1. Introduction. 211 6.2. Web service composition and verification 214 6.3. Web service incompatibility and adaptation 219 6.4. Adaptation approaches 222 6.5. Conclusion 234 6.6. Bibliography 234 List of Authors 241 Index 243
£125.06
ISTE Ltd and John Wiley & Sons Inc Software Architecture 2
Book SynopsisOver the past 20 years, software architectures have significantly contributed to the development of complex and distributed systems. Nowadays, it is recognized that one of the critical problems in the design and development of any complex software system is its architecture, i.e. the organization of its architectural elements. Software Architecture presents the software architecture paradigms based on objects, components, services and models, as well as the various architectural techniques and methods, the analysis of architectural qualities, models of representation of architectural templates and styles, their formalization, validation and testing and finally the engineering approach in which these consistent and autonomous elements can be tackled.Table of ContentsChapter 1. Metamodeling in Software Architectures 1 Adel SMEDA and Mourad Chabane OUSSALAH 1.1. Introduction 1 1.2. Metamodeling, why? 3 1.3. Software architecture metamodeling 3 1.4. MADL: a meta-architecture description language 5 1.4.1. Four levels of modeling in software architectures 5 1.4.2. MADL: reflexive core dedicated to the meta-meta-architecture 7 1.4.3. MADL structure 8 1.4.4. MADL instantiation: example of the ADL Acme 11 1.4.5. Comparison of MADL and MDA/MOF 13 1.5. Mapping of ADLs to UML 17 1.5.1. Why to map an ADL to UML? 18 1.5.2. ADL mapping to UML 19 1.6. A mapping example: the case of the Acme language. 31 1.7. Some remarks on the mapping of ADL concepts to UML 32 1.7.1. UML 2.0 as an ADL 32 1.7.2. Mapping strategies 33 1.8. Conclusion 34 1.9. Bibliography 34 Chapter 2. Architecture Constraints 37 Chouki TIBERMACINE 2.1. Introduction 38 2.2. State of the art 40 2.2.1. Expression of architecture constraints in the design phase 40 2.2.2. Expression of architecture constraints in the implementation phase 49 2.3. Architecture constraints on object-oriented applications 57 2.3.1. Architecture constraints in the design phase 57 2.3.2. Architecture constraints in the implementation phase 61 2.4. Architecture constraints on component-based applications 68 2.4.1. Architecture constraints in the design phase 69 2.4.2. Architecture constraints in the implementation phase 75 2.5. Architecture constraints on service-oriented applications 79 2.6. Conclusion 85 2.7. Bibliography 86 Chapter 3. Software Architectures and Multiple Variability 91 Mathieu ACHER, Philippe COLLET and Philippe LAHIRE 3.1. Introduction 91 3.2. Variability: foundations and principles 95 3.2.1. Variability and product lines 95 3.2.2. Feature models 97 3.3. Framework of studies and connected work 99 3.3.1. From multiplicity to variability 100 3.3.2. Extraction and evolution of architectural variability 101 3.4. Video surveillance component architecture 102 3.4.1. Case study 102 3.4.2. Accounting for multiple variability 104 3.4.3. Results 108 3.5. SOA for scientific workflows 110 3.5.1. Case study 110 3.5.2. Accounting for multiple variability 112 3.5.3. Results 114 3.6. Reverse engineering plugin-based architecture 116 3.6.1. Case study 116 3.6.2. Accounting for multiple variability 118 3.6.3. Results 120 3.7. Evaluation 122 3.7.1. The necessity of tooling 122 3.7.2. Summary of case studies 123 3.8. Conclusion 125 3.9. Bibliography 126 Chapter 4. Architecture and Quality of Software Systems 133 Nicole LÉVY, Francisca LOSAVIO and Yann POLLET 4.1. Introduction 133 4.2. Quality approach 135 4.2.1. ISO 25010 quality 135 4.2.2. Quality reference 137 4.2.3. Quality model of a system 138 4.2.4. Functional quality model 139 4.2.5. Quality model of the architecture 140 4.3. Approach for architecture development of a domain 142 4.3.1. General principles 142 4.3.2. Functional quality model 145 4.3.3. Architectural quality model 145 4.3.4. Reference architecture 145 4.3.5. Transition from domain level to system level 147 4.4. Development of the reference architecture in a functional domain 148 4.4.1. Example of functional domain 148 4.4.2. Functional refinement 148 4.4.3. Development of the FQM 150 4.4.4. Definition of the preliminary architecture 151 4.4.5. Development of architectural quality model 152 4.4.6. Integration of the reference architecture of the domain 152 4.5. Architectures at system level 156 4.5.1. Functional refinement 156 4.5.2. Functional quality model 157 4.5.3. Basic architecture 158 4.5.4. Architectural quality model 158 4.5.5. Architecture of the Dopamine and Samarkand systems 159 4.6. Related work 161 4.7. Conclusion 166 4.8. Bibliography 167 Chapter 5. Software Architectures and Multiagent Systems 171 Jean-Paul ARCANGELI, Victor NOËL and Frédéric MIGEON 5.1. Introduction 172 5.2. MAS and agent-oriented software engineering 172 5.2.1. Agent 173 5.2.2. System and interactions 174 5.2.3. MAS 175 5.2.4. Examples of MAS 177 5.2.5. Agent-oriented software engineering 178 5.3. MAS as an architectural style 183 5.3.1. Positioning the “MAS” style 183 5.3.2. Characteristics in terms of abstraction 184 5.3.3. Characteristics in terms of (de)composition 188 5.3.4. Link with the requirements 190 5.3.5. A family of architectural styles 194 5.4. The architectural gap 195 5.4.1. State of the practice 196 5.4.2. Analysis from an architectural point of view 197 5.4.3. Assessment 200 5.5. How to fill the architectural gap 200 5.5.1. Limitations of existing solutions 200 5.5.2. Realization of the microarchitecture 201 5.6. Conclusion 204 5.7. Bibliography 205 Chapter 6. Software Architectures and Software Processes 209 Fadila AOUSSAT, Mourad Chabane OUSSALAH and Mohamed AHMED-NACER 6.1. Introduction 209 6.2. Software process architectures 211 6.2.1. Software process models: definition 211 6.2.2. Modeling software architecture-based software processes 213 6.3. Comparison framework for SA-based SP model reuse solutions 214 6.3.1. The software process axis evaluation criteria 217 6.3.2. The software architecture axis evaluation criteria 220 6.3.3. The quality axis evaluation criteria 223 6.4. Evaluation of SA-based SP modeling and execution approaches 225 6.4.1. SP axis evaluation of SA-based SP reuse approaches 225 6.4.2. SA axis evaluation of SA-based SP reuse approaches 229 6.4.3. Quality axis evaluation of SA-based SP reuse approaches 232 6.4.4. Assessment and discussions 234 6.5. Conclusion 235 6.6. Bibliography 236 List of Authors 241 Index 243
£125.06
ISTE Ltd and John Wiley & Sons Inc Transformation of Collective Intelligences:
Book SynopsisThere is a great transformation of the production of knowledge and intelligibility. The "digital fold of the world" (with the convergence of NBIC) affects the collective assemblages of “thought”, of research. The aims of these assemblages are also controversial issues. From a general standpoint, these debates concern “performative science and performative society”. But one emerges and strengthens that has several names: transhumanism, post-humanism, speculative post-humanism. It appears as a great narration, a large story about the future of our existence, facing our entry into the Anthropocene. It is also presented as a concrete utopia with an anthropological and technical change. In this book, we proposed to show how collective intelligences stand in the middle of the coupling of ontological horizons and of the “process of bio-technical maturation”.Table of ContentsIntroduction ix Chapter 1. Elements of the General Configuration and Adaptive Landscape of Collective Intelligences 1 1.1. The intertwined narratives of tangible utopias and brilliant futures 1 1.2. Intelligence is “always already collective and machined” 5 1.3. Collective intelligences in the weaving of data 9 1.4. Semiotics and statistics 13 1.5. Data cities and human becomings: the new milieus of intelligence 17 1.5.1. Open Data (OD): a heterogeneous movement, the contribution to novel forms of knowledge in question 22 1.6. Coupling OD/big data/data mining 32 1.7. The semantic web as intellectual technology 34 1.8. Toward understanding onto-ethologies 42 1.9. Marketing intelligences: data and graphs in the heat of passions 50 1.10. Personal data: private property as an open and unstable process 59 1.11. The figures of the network 64 1.12. Machinic interfaces: social subjection and enslavement 67 1.13. Collective intelligences and anthropological concerns 70 1.14. Toward a new encyclopedic state: first overview 74 1.15. Controversies and boundaries 78 1.16. The milieus of intelligence and knowledge 84 1.17. Which criteria for writings? 86 1.18. Collective intelligences of usage and doxic collective intelligences: the status of short forms 90 1.19. Collective intelligences, self-organization, “swarm” intelligences 92 1.20. Short forms, relinkage, relaunching 99 1.21. Insomniac commentary as a catastrophic correction of short forms 100 1.22. Twitter as a Markovian Territory: a few remarks 103 Chapter 2. Post- and Transhumanist Horizons 107 2.1. Some bioanthropotechnical transformations 107 2.2. What to do with our brain? 113 2.3. About transhumanism and speculative posthumanism 122 2.4. Epigenetic and epiphylogenetic plasticity 125 2.5. Speculative uncertainties 127 2.6. Trans- and posthumanism as they present themselves 152 Chapter 3. Fragmented Encyclopedism 169 3.1. Collective intelligences and the encyclopedic problem 169 3.2. The political utopia in store 170 3.3. Encyclopedism and digital publishing modes 174 3.4. A new documentary process 176 3.5. Fragmented encyclopedism: education/interfaces 190 3.6. Encyclopedism and correlations 192 3.6.1. “Correlation is enough”: the Anderson controversy, and the J. Gray paradigm and their limits 192 3.7. “Perplication” in knowledge 198 3.7.1. Doxic tension in fragmented encyclopedism and format accordingly 198 3.8. Networks of the digital environment 199 3.8.1. Variations of speed and slowness at the center of encyclopedic pragmatics 200 3.9. Knowledge and thought in fragmented encyclopedism 201 3.10. What criteriology for encyclopedic writings? 202 3.11. Borders in fragmented encyclopedism: autoimmune disorders and disagreement 205 3.12. Fragmented encyclopedism: a habitat for controversies? 207 3.13. Encyclopedism according to the semantic and sociosemantic web (ontologies and web): mapping(s) and semantic levels 209 3.14. From ontologies to “onto-ethologies” and assemblages 212 3.15. Fragmented encyclopedism in the digital age: metalanguage and combinatorial 214 3.15.1. Encyclopedism and doxic immanence field: the proliferation of short forms 216 3.16. From fragmented encyclopedism to gaseous encyclopedism 217 Bibliography 219 Index 233Conclusion
£125.06
College Publications Beyond Alignment: Applying Systems Thinking in Architecting Enterprises
£24.70
Taylor & Francis Ltd How to Set Up Information Systems: A
Book SynopsisThis introductory user's guide to systems analysis and systems design focuses on building sustainable information systems to meet tomorrow's needs. It shows how practitioners can apply multiple participatory perspectives in development, so as to avoid future problems. As a practical guide, it is presented to be readily comprehensible and is organized to enable users to concentrate on their goals efficiently, and with minimum theoretical elaboration. The chapters follow the sequence involved in planning an information system, explaining key words, the time involved in each step, ending with a tutorial or exercises.Trade Review[An] excellent book.' Guy Fitzgerald, , Professor of Information Systems, Brunel University 'The book stands out in its field through the intelligent and constructive use of the soft systems methodology to develop the themes' Peter Roberts, former Visiting Professor, Open University and City University 'A useful text for teachers and practitioners of a Multiview approach to information analysis and design. It has matured and gained focus in this new edition' Gilbert Mansell, Head of Department of Multimedia and Information Systems, University of Huddersfield 'A textbook for people intending to practice information systems analysis and design.' SciTech Book NewsTable of ContentsInformation Systems and Organization * What is Systems Analysis and Systems Design? * The Role of the Systems Planner or Systems Analyst * Selecting Planning and Development Tools * The Human Activity System: Making a Model * Information Modelling: Making a Workable System * Technical and Social Needs: The Balance * The Human-Computer Interface * Technical Aspects: What is Needed? * Total Design, Training, Hardware, Software and Implementation * Glossary, Appendices, Further Reading, Index
£123.50