You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book introduces readers to all the necessary components and knowledge to start being a vital part of the IoT revolution. The author discusses how to create smart-IoT solutions to help solve a variety of real problems. Coverage includes the most important aspects of IoT architecture, the various applications of IoT, and the enabling technologies for IoT. This book presents key IoT concepts and abstractions, while showcasing real case studies. The discussion also includes an analysis of IoT strengths, weaknesses, opportunities and threats. Readers will benefit from the in-depth introduction to internet of things concepts, along with discussion of IoT algorithms and architectures tradeoffs. Case studies include smart homes, smart agriculture, and smart automotive.
This book provides comprehensive coverage of various Cryptography topics, while highlighting the most recent trends such as quantum, blockchain, lightweight, Chaotic and DNA cryptography. Moreover, this book covers cryptography primitives and its usage and applications and focuses on the fundamental principles of modern cryptography such as Stream Ciphers, block ciphers, public key algorithms and digital signatures. Readers will gain a solid foundation in cryptography and security. This book presents the fundamental mathematical concepts of cryptography. Moreover, this book presents hiding data techniques such as steganography and watermarking. The author also provides a comparative study of the different cryptographic methods, which can be used to solve security problems.
This book discusses and compares several new trends that can be used to overcome Moore’s law limitations, including Neuromorphic, Approximate, Parallel, In Memory, and Quantum Computing. The author shows how these paradigms are used to enhance computing capability as developers face the practical and physical limitations of scaling, while the demand for computing power keeps increasing. The discussion includes a state-of-the-art overview and the essential details of each of these paradigms.
This book describes the life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection. Various trade-offs in the design process are discussed, including those associated with many of the most common memory cores, controller IPs and system-on-chip (SoC) buses. Readers will also benefit from the author’s practical coverage of new verification methodologies. such as bug localization, UVM, and scan-chain. A SoC case study is presented to compare traditional verification with the new verification methodologies. Discusses the entire life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection; Introduce a deep introduction for Verilog for both implementation and verification point of view. Demonstrates how to use IP in applications such as memory controllers and SoC buses. Describes a new verification methodology called bug localization; Presents a novel scan-chain methodology for RTL debugging; Enables readers to employ UVM methodology in straightforward, practical terms.
This book provides an introduction to Bluetooth technology, with a specific focus on developing a hardware architecture for its modem. The major concepts and techniques involved in Bluetooth technology are discussed, with special emphasis on hardware mapping. The book starts simply to allow the reader to master quickly the basic concepts, before addressing the advanced features. This book differs from existing content in that it presents Bluetooth Transceiver architecture suitable for implementation in an FPGA for IoT Devices. It will examine several digital algorithms for modulation and demodulation of Bluetooth signals, locking on the carrier phase, and synchronizing the symbol. Many of these previously analog designs have been translated to the digital domain.
Cyber-physical systems (CPSs) consist of software-controlled computing devices communicating with each other and interacting with the physical world through sensors and actuators. Because most of the functionality of a CPS is implemented in software, the software is of crucial importance for the safety and security of the CPS. This book presents principle-based engineering for the development and operation of dependable software. The knowledge in this book addresses organizations that want to strengthen their methodologies to build safe and secure software for mission-critical cyber-physical systems. The book: • Presents a successful strategy for the management of vulnerabilities, threats, and failures in mission-critical cyber-physical systems; • Offers deep practical insight into principle-based software development (62 principles are introduced and cataloged into five categories: Business & organization, general principles, safety, security, and risk management principles); • Provides direct guidance on architecting and operating dependable cyber-physical systems for software managers and architects.
This book covers various, leading-edge deep learning technologies. The author discusses new applications of deep learning and gives insight into the integration of deep learning with various application domains, such as autonomous driving, augmented reality, AIOT, 5G and beyond.
Who's Who in the Arab World 2007-2008 compiles information on the most notable individuals in the Arab world. Additionally, the title provides insight into the historical background and the present of this influential and often volatile region. Part I sets out precise biographical details on some 6,000 eminent individuals who influence every sphere of public life in politics, culture and society. Part II surveys the 19 Arab Countries, providing detailed information on the geography, history, constitution, economy and culture of the individual countries. Part III provides information on the historical background of the Arab world. Indexes by country and profession supplement the biographical section. A select bibliography of secondary literature on the Middle East is also included.
This book reports on advanced theories and methods in three related fields of research: applied physics, system science and computers. It is organized in three parts, the first of which covers applied physics topics, including lasers and accelerators; condensed matter, soft matter and materials science; nanoscience and quantum engineering; atomic, molecular, optical and plasma physics; as well as nuclear and high-energy particle physics. It also addresses astrophysics, gravitation, earth and environmental science, as well as medical and biological physics. The second and third parts focus on advances in computers and system science, respectively, and report on automatic circuit control, powe...