You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Shrinking feature size and diminishing supply voltage are making circuits sensitive to supply voltage fluctuations within the microprocessor, caused by normal workload activity changes. If left unattended, voltage fluctuations can lead to timing violations or even transistor lifetime issues that degrade processor robustness. Mechanisms that learn to tolerate, avoid, and eliminate voltage fluctuations based on program and microarchitectural events can help steer the processor clear of danger, thus enabling tighter voltage margins that improve performance or lower power consumption. We describe the problem of voltage variation and the factors that influence this variation during processor desi...
Prospects of Hydrogen-fueled Power Generation brings together experts to explore the various challenges and opportunities of hydrogen as a fuel in power generation, transportation, storage, and safety. Special interest is given to proton exchange membrane fuel cell (PEMFC) fuel cells, hydrogen energy, and the conversion methods. The usage of clean fuel in road transportation, marine transportation, and the power generation sector are also discussed in detail. Additionally, performance investigations reveal information about the system's energy and exergy analysis. Hydrogen-fueled power generation is the process of generating electricity using hydrogen as the primary fuel source. This process...
The Bush administration has twice proposed reducing the Workforce Investment Act's (WIA) budget, citing large amounts of states' unspent funds carried over from the prior year. However, in light of current economic conditions, state & local workforce officials have expressed a need for more funds, not less. This report assesses whether the Dept. of Labor's spending info. is a true reflection of states' available funds. Examined the spending rate for states, what Labor does to determine how states are managing their spending, & what factors affect states' WIA expenditure. Recommends that Labor collaborate with states to clarify its definition of obligations & include this info. in determining states' available funds. Charts & tables.
With growing interest in computer security and the protection of the code and data which execute on commodity computers, the amount of hardware security features in today's processors has increased significantly over the recent years. No longer of just academic interest, security features inside processors have been embraced by industry as well, with a number of commercial secure processor architectures available today. This book aims to give readers insights into the principles behind the design of academic and commercial secure processor architectures. Secure processor architecture research is concerned with exploring and designing hardware features inside computer processors, features whi...
This book presents select proceedings of the international conference on Innovations in Clean Energy Technologies (ICET 2020) and examines a range of durable, energy efficient and next-generation smart green technologies for sustainable future by reflecting on the trends, advances and development taking place all across the globe. The topics covered include smart technologies based product, energy efficient systems, solar and wind energy, carbon sequestration, green transportation, green buildings, energy material, biomass energy, smart cites, hydro power, bio-energy and fuel cell. The book also discusses various performance attributes of these clean energy technologies and their workability and carbon footprint. The book will be a valuable reference for beginners, researchers and professionals interested in clean energy technologies.
As the world grapples with the transition to sustainable energy sources, the demand for materials with high-performance electrodes, electrolytes, and catalysts has become paramount. The energy transition necessitates materials with increased energy and power density for advanced energy storage devices, while the emergence of future fuels like hydrogen requires economically viable electrocatalysts for mass production. In response to these challenges, Engineering Materials for Efficient Energy Storage and Conversion addresses these pressing concerns through an interdisciplinary lens that combines materials science, chemistry, physics, and engineering. Within the pages of Engineering Materials ...
To date, the most common form of simulators of computer systems are software-based running on standard computers. One promising approach to improve simulation performance is to apply hardware, specifically reconfigurable hardware in the form of field programmable gate arrays (FPGAs). This manuscript describes various approaches of using FPGAs to accelerate software-implemented simulation of computer systems and selected simulators that incorporate those techniques. More precisely, we describe a simulation architecture taxonomy that incorporates a simulation architecture specifically designed for FPGA accelerated simulation, survey the state-of-the-art in FPGA-accelerated simulation, and describe in detail selected instances of the described techniques. Table of Contents: Preface / Acknowledgments / Introduction / Simulator Background / Accelerating Computer System Simulators with FPGAs / Simulation Virtualization / Categorizing FPGA-based Simulators / Conclusion / Bibliography / Authors' Biographies
Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer architecture student, researcher, or practitioner to the basic concepts of security and threat-based design. Past work in different security communities can inform our thinking and provide a rich set of technologies for building architectural support for security into all future computers and embedded computing devices and appliances. I have tried to keep the book short, which means that many interesting topics and applications could not be included. What the book focuses on are the fundamental security concepts, across different security communities, that should be understood by any computer architect trying to design or evaluate security-aware computer architectures.
Understanding and implementing the brain's computational paradigm is the one true grand challenge facing computer researchers. Not only are the brain's computational capabilities far beyond those of conventional computers, its energy efficiency is truly remarkable. This book, written from the perspective of a computer designer and targeted at computer researchers, is intended to give both background and lay out a course of action for studying the brain's computational paradigm. It contains a mix of concepts and ideas drawn from computational neuroscience, combined with those of the author. As background, relevant biological features are described in terms of their computational and communica...