Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book discusses the latest developments and outlines future trends in the fields of microelectronics, electromagnetics and telecommunication. It contains original research works presented at the International Conference on Microelectronics, Electromagnetics and Telecommunication (ICMEET 2021), held in Bhubaneswar, Odisha, India during 27-28 August, 2021. The papers were written by scientists, research scholars and practitioners from leading universities, engineering colleges and R&D institutes from all over the world and share the latest breakthroughs in and promising solutions to the most important issues facing today's society.
The book discusses the latest developments and outlines future trends in the fields of microelectronics, electromagnetics, and telecommunication. It contains original research works presented at the International Conference on Microelectronics, Electromagnetics and Telecommunication (ICMEET 2023), organized by Department of Electronics and Communication Engineering, National Institute of Technology Mizoram, India, during 6¿7 October 2023. The book is divided into two volumes, and it covers papers written by scientists, research scholars, and practitioners from leading universities, engineering colleges, and R&D institutes from all over the world and shares the latest breakthroughs in and promising solutions to the most important issues facing today¿s society.
In the realm of technological advancement, Artificial Intelligence stands as an unparalleled frontier, revolutionizing the way we perceive, interact with, and shape the world. "Artificial Intelligence: Building Intelligent Systems" represents a comprehensive journey through the multifaceted landscape of AI, offering a holistic understanding and practical insights into constructing systems that simulate human intelligence. This book is an amalgamation of cutting-edge theories, methodologies, and real-world applications carefully crafted to serve as a guiding beacon for students, researchers, and professionals navigating the intricate domain of AI.In the pages that follow, readers will embark on a captivating exploration of AI's evolution, from its foundational principles to its intricate complexities. Through a meticulously curated blend of theoretical foundations and hands-on practices, this book aims not only to elucidate the inner workings of AI but also to empower enthusiasts to harness its potential. With a focus on fostering a deep comprehension of AI algorithms, ethical considerations, and innovative implementations, this book aspires to equip its readers with the tools and wisdom necessary to contribute meaningfully to the burgeoning field of Artificial Intelligence.
"Digital Logic and Design: Mastering the Fundamentals" provides a comprehensive overview of essential concepts in digital logic and design. Through clear explanations and practical examples, this book equips readers with the knowledge and skills needed to understand and apply fundamental principles in digital circuit design. Ideal for students and enthusiasts seeking to master the basics of digital logic and design.
This textbook for courses in Embedded Systems introduces students to necessary concepts, through a hands-on approach.LEARN BY EXAMPLE ¿ This book is designed to teach the material the way it is learned, through example. Every concept is supported by numerous programming examples that provide the reader with a step-by-step explanation for how and why the computer is doing what it is doing.LEARN BY DOING ¿ This book targets the Texas Instruments MSP430 microcontroller. This platform is a widely popular, low-cost embedded system that is used to illustrate each concept in the book. The book is designed for a reader that is at their computer with an MSP430FR2355 LaunchPadTM Development Kit plugged in so that each example can be coded and run as they learn.LEARN BOTH ASSEMBLY AND C ¿ The book teaches the basic operation of an embedded computer using assembly language so that the computer operation can be explored at a low-level. Once more complicated systems are introduced (i.e., timers, analog-to-digital converters, and serial interfaces), the book moves into the C programming language. Moving to C allows the learner to abstract the operation of the lower-level hardware and focus on understanding how to ¿make things work¿.BASED ON SOUND PEDAGOGY - This book is designed with learning outcomes and assessment at its core. Each section addresses a specific learning outcome that the student should be able to ¿dö after its completion. The concept checks and exercise problems provide a rich set of assessment tools to measure student performance on each outcome.
This book describes machine learning-based new principles, methods of design and optimization of high-speed integrated circuits, included in one electronic system, which can exchange information between each other up to 128/256/512 Gbps speed. The efficiency of methods has been proven and is described on the examples of practical designs. This will enable readers to use them in similar electronic system designs. The author demonstrates newly developed principles and methods to accelerate communication between ICs, working in non-standard operating conditions, considering signal deviation compensation with linearity self-calibration. The observed circuit types also include but are not limited to mixed-signal, high performance heterogeneous integrated circuits as well as digital cores.
This book is a basic treatise on real-time computing, with particular emphasis on predictable scheduling algorithms. The main objectives of the book are to introduce the basic concepts of real-time computing, illustrate the most significant results in the field, and provide the basic methodologies for designing predictable computing systems useful in supporting critical control applications.Hard Real-Time Computing Systems is written for instructional use and is organized to enable readers without a strong knowledge of the subject matter to quickly grasp the material. Technical concepts are clearly defined at the beginning of each chapter, and algorithm descriptions are corroborated through concrete examples, illustrations, and tables. This new, fourth edition includes new sections to explain the variable-rate task model, how to improve predictability and safety in cyber-physical real-time systems that exploit machine learning algorithms, additional coverage on Response Time Analysis, and a new chapter on implementing periodic real-time tasks under Linux..
This book provides a comprehensive overview of security vulnerabilities and state-of-the-art countermeasures using explainable artificial intelligence (AI). Specifically, it describes how explainable AI can be effectively used for detection and mitigation of hardware vulnerabilities (e.g., hardware Trojans) as well as software attacks (e.g., malware and ransomware). It provides insights into the security threats towards machine learning models and presents effective countermeasures. It also explores hardware acceleration of explainable AI algorithms. The reader will be able to comprehend a complete picture of cybersecurity challenges and how to detect them using explainable AI. This book serves as a single source of reference for students, researchers, engineers, and practitioners for designing secure and trustworthy systems.
This book provides readers with a comprehensive, state-of-the-art reference to the design automation aspects of quantum computers. Given roadmaps calling for quantum computers with 2000 qubits in a few years, readers will benefit from the practical implementation aspects covered in this book. The authors discuss real hardware to the extent possible.Provides an up-to-date, single-source reference to design automation aspects of quantum computers;Presentation is not just theoretical, but substantiated with real quantum hardware;Covers multi-faceted aspects of quantum computers, providing readers with valuable information, no matter the direction in which technology moves.
This book provides readers with a single-source reference to static-single assignment(SSA)-based compiler design. It is the first (and up to now only) book that coversin a deep and comprehensive way how an optimizing compiler can be designed usingthe SSA form. After introducing vanilla SSA and its main properties, the authorsdescribe several compiler analyses and optimizations under this form. They illustratehow compiler design can be made simpler and more efficient, thanks to the SSA form.This book also serves as a valuable text/reference for lecturers, making the teaching ofcompilers simpler and more effective. Coverage also includes advanced topics, such ascode generation, aliasing, predication and more, making this book a valuable referencefor advanced students and practicing engineers.
Networks are pervasive. Very large scale integrated (VLSI) systems are no different, consisting of dozens of interconnected subsystems, hundreds of modules, and many billions of transistors and wires. Graph theory is crucial for managing and analyzing these systems. In this book, VLSI system design is discussed from the perspective of graph theory. Starting from theoretical foundations, the authors uncover the link connecting pure mathematics with practical product development. This book not only provides a review of established graph theoretic practices, but also discusses the latest advancements in graph theory driving modern VLSI technologies, covering a wide range of design issues such as synchronization, power network models and analysis, and interconnect routing and synthesis.Provides a practical introduction to graph theory in the context of VLSI systems engineering;Reviews comprehensively graph theoretic methods and algorithms commonly used during VLSI product development process;Includes a review of novel graph theoretic methods and algorithms for VLSI system design.
A subtle change that leads to disastrous consequences-hardware Trojans undoubtedly pose one of the greatest security threats to the modern age. How to protect hardware against these malicious modifications? One potential solution hides within logic locking; a prominent hardware obfuscation technique. In this book, we take a step-by-step approach to understanding logic locking, from its fundamental mechanics, over the implementation in software, down to an in-depth analysis of security properties in the age of machine learning. This book can be used as a reference for beginners and experts alike who wish to dive into the world of logic locking, thereby having a holistic view of the entire infrastructure required to design, evaluate, and deploy modern locking policies.
This book provides readers with the current state-of-the-art research and technology on quantum computing. The authors provide design paradigms of quantum computing. Topics covered include multi-programming mechanisms on near-term quantum computing, Lagrange interpolation approach for the general parameter-shift rule, architecture-aware decomposition of quantum circuits, software for massively parallel quantum computing, machine learning in quantum annealing processors, quantum annealing for real-world machine learning applications, queuing theory models for (Fault-Tolerant) quantum circuits, machine learning for quantum circuit reliability assessment, and side-channel leakage in Suzuki stack circuits.
Understand essential IoT concepts to build smart IoT projects at reduced costs using the Arduino IoT Cloud platform, Arduino, ESP32 series boards, Amazon Alexa Voice Assistant, and MQT-135 with this practical guideKey FeaturesLearn about the Arduino IoT Cloud from scratch with hands-on projectsGain a solid understanding of IoT application development from basics to advanced featuresExplore the Arduino IoT Cloud's capabilities for commercial IoT solutions in depthPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThe Arduino IoT Cloud offers a variety of features for building modern IoT solutions while reducing time and costs for prototyping and deployment. This book is a step-by-step guide, helping you master the powerful Arduino IoT Cloud ecosystem. This book begins by introducing you to the IoT landscape including its architecture, communication technologies, and protocols and then to the capabilities of the Arduino IoT Cloud platform and the Cloud Editor. With practical projects, such as monitoring air quality, building a portable asset tracker, and creating a remote alarm system using the LoRaWAN specification, you'll learn how to implement real-world IoT applications. Next, you'll explore communication between IoT devices and cloud platforms as well as the implementation of the Arduino IoT Cloud SDK and JavaScript for advanced customization. You'll also find out how to program IoT nodes, analyze the surrounding environment data, and visualize it on dashboards. Additionally, you'll get to grips with advanced features such as task scheduling, synchronization, remote over-the-air updates for IoT nodes, and scripting with CCLI, through hands-on examples.By the end of this book, you'll have learned how to work with the Arduino IoT Cloud platform and related hardware devices and will be able to develop industry-specific and cost-effective IoT solutions, such as smart homes and smart agriculture.What you will learnGain a solid understanding of IoT fundamentals and conceptsBuild creative IoT projects using Arduino MKR boards, Pulse sensors, and moreMaster various communication technologies, including LoRaWAN and 3G/4GHarness data exchange between IoT devices and cloud platforms using Zapier or IFTTTExplore advanced features like scheduling, over-the-air updates, and scriptingUnderstand easy-to-sync properties across multiple devices with no-codeDevelop voice-assisted home automation and heart rate tracking applicationsWho this book is forThis book is for aspiring IoT developers and seasoned professionals eager to harness the potential of Arduino and cloud integration as well as technology enthusiasts, students, and hobbyists interested in experimenting with IoT technologies. Prior knowledge of basic electronics and embedded systems, cloud computing, Arduino, and programming languages like C and JavaScript is needed.Table of ContentsIntroduction to IoT and ArduinoFirst Look at the Arduino IoT CloudInsights into the Arduino IoT Cloud Platform and the Cloud EditorProject #1 - A Smarter Setup for Sensing the EnvironmentProject #2 - Creating a Portable Thing Tracker Using MKR GSM 1400Project #3 - A Remote Asset Tracking Application with LoRaWANEnabling Communication between Different DevicesWorking with the Arduino IoT Cloud SDK and JavaScriptProject #4 - Collecting Data from the Soil and Environment for Smart FarmingProject #5 - Making Your Home Smarter by Voice Assistant(N.B. Please use the Look Inside option to see further chapters)
This book introduces the concept of approximate computing for software and hardware designs and its impact on the reliability of embedded systems. It presents approximate computing methods and proposes approximate fault tolerance techniques applied to programmable hardware and embedded software to provide reliability at low computational costs. The book also presents fault tolerance techniques based on approximate computing, thus presenting how approximate computing can be applied to safety-critical systems.
This book covers the state-of-the-art research in design of modern electronic systems used in safety-critical applications such as medical devices, aircraft flight control, and automotive systems. The authors discuss lifetime reliability of digital systems, as well as an overview of the latest research in the field of reliability-aware design of integrated circuits. They address modeling approaches and techniques for evaluation and improvement of lifetime reliability for nano-scale CMOS digital circuits, as well as design algorithms that are the cornerstone of Computer Aided Design (CAD) of reliable VLSI circuits. In addition to developing lifetime reliability analysis and techniques for clocked storage elements (such as flip-flops), the authors also describe analysis and improvement strategies targeting commercial digital circuits.
This book provides readers with an overview of the fundamental definitions and features of Multiple-Valued Logic (MVL). The authors include a brief discussion of the historical development of MVL technologies, while the main goal of the book is to present a comprehensive review of different technologies that are being explored to implement multiple-valued or beyond-binary memory circuits and systems. The discussion includes the basic features, prospects, and challenges of each technology, while highlighting the significant works done on different branches of MVL memory architecture, such as sequential circuits, random access memory, Flash memory, etc.
This book examines in detail how a semiconductor device is designed and fabricated to satisfy best the requirements of the target application. The author presents and explains both basic and state-of-art semiconductor industry standards used in large/small signal equivalent circuit models for semiconductor devices that electronics engineers routinely use in their design calculations. The presentation includes detailed, step-by-step information on how a semiconductor device is fabricated, and the very sophisticated supporting technologies used in the process flow. The author also explains how standard laboratory equipment can be used to extract useful performance metrics of a semiconductor device.
This book presents recent advances towards the goal of enabling efficient implementation of machine learning models on resource-constrained systems, covering different application domains. The focus is on presenting interesting and new use cases of applying machine learning to innovative application domains, exploring the efficient hardware design of efficient machine learning accelerators, memory optimization techniques, illustrating model compression and neural architecture search techniques for energy-efficient and fast execution on resource-constrained hardware platforms, and understanding hardware-software codesign techniques for achieving even greater energy, reliability, and performance benefits.Discusses efficient implementation of machine learning in embedded, CPS, IoT, and edge computing;Offers comprehensive coverage of hardware design, software design, and hardware/software co-design and co-optimization;Describes real applications todemonstrate how embedded, CPS, IoT, and edge applications benefit from machine learning.
This book provides an easy-to-read introduction into quantum computing as well as classical simulation of quantum circuits. The authors showcase the enormous potential that can be unleashed when doing these simulations using decision diagrams¿a data structure common in the design automation community but hardly used in quantum computing yet. In fact, the covered algorithms and methods are able to outperform previously proposed solutions on certain use cases and, hence, provide a complementary solution to established approaches. The award-winning methods are implemented and available as open-source under free licenses and can be easily integrated into existing frameworks such as IBM¿s Qiskit or Atos¿ QLM.
"e;This book is a comprehensive text for the design of safety critical, hard real-time embedded systems. It offers a splendid example for the balanced, integrated treatment of systems and software engineering, helping readers tackle the hardest problems of advanced real-time system design, such as determinism, compositionality, timing and fault management. This book is an essential reading for advanced undergraduates and graduate students in a wide range of disciplines impacted by embedded computing and software. Its conceptual clarity, the style of explanations and the examples make the abstract concepts accessible for a wide audience."e;Janos Sztipanovits, DirectorE. Bronson Ingram Distinguished Professor of EngineeringInstitute for Software Integrated SystemsVanderbilt UniversityReal-Time Systems focuses on hard real-time systems, which are computing systems that must meet their temporal specification in all anticipated load and fault scenarios. The book stresses the system aspects of distributed real-time applications, treating the issues of real-time, distribution and fault-tolerance from an integral point of view. A unique cross-fertilization of ideas and concepts between the academic and industrial worlds has led to the inclusion of many insightful examples from industry to explain the fundamental scientific concepts in a real-world setting. Compared to the Second Edition, new developments in communication standards for time-sensitive networks, such as TSN and Time-Triggered Ethernet are addressed. Furthermore, this edition includes a new chapter on real-time aspects in cloud and fog computing.The book is written as a standard textbook for a high-level undergraduate or graduate course on real-time embedded systems or cyber-physical systems. Its practical approach to solving real-time problems, along with numerous summary exercises, makes it an excellent choice for researchers and practitioners alike.
This book discusses the Versatile Video Coding (VVC), the ISO and ITU state-of-the-art video coding standard. VVC reaches a compression efficiency significantly higher than its predecessor standard (HEVC) and it has a high versatility for efficient use in a broad range of applications and different types of video content, including Ultra-High Definition (UHD), High-Dynamic Range (HDR), screen content, 360 videos, and resolution adaptivity. The authors introduce the novel VVC tools for block partitioning, intra-frame and inter-frames predictions, transforms, quantization, entropy coding, and in-loop filtering. The authors also present some solutions exploring VVC encoding behavior at different levels to accelerate the intra-frame prediction, applying statistical-based heuristics and machine learning (ML) techniques.
This textbook provides readers with a comprehensive introduction to various noise sources that significantly reduce performance and reliability in nanometer-scale integrated circuits. The author covers different types of noise, such as crosstalk noise caused by signal switching of adjacent wires, power supply noise or IR voltage drop in the power line due to simultaneous buffer / gate switching events, substrate coupling noise, radiation-induced transients, thermally induced noise and noise due to process and environmental Coverages also includes the relationship between some of these noise sources, as well as compound effects, and modeling and mitigation of noise mechanisms.
This book describes a comprehensive combination of methodologies that strongly enhance the modern Virtual Prototype (VP)-based verification flow for heterogeneous systems-on-chip (SOCs). In particular, the book combines verification and analysis aspects across various stages of the VP-based verification flow, providing a new perspective on verification by leveraging advanced techniques, like metamorphic testing, data flow testing, and information flow testing. In addition, the book puts a strong emphasis on advanced coverage-driven methodologies to verify the functional behavior of the SOC as well as ensure its security.Provides an extensive introduction to the modern VP-based verification flow for heterogeneous SOCs;Introduces a novel metamorphic testing technique for heterogeneous SOCs which does not require reference models;Includes automated advanced data flow coverage-driven methodologies tailored for SystemC/AMS-based VPs;Describes enhanced functional coverage-driven methodologies to verify various functional behaviors of RF amplifiers.
This practical guide to building embedded and IoT devices securely is an essential resource for current and future developers tasked with protecting users from the potential threats of these ubiquitous devices.As an engineer, you know that countless devices—from industrial components to smart household appliances—rely on embedded computer systems. But how do you balance the need for robust security with performance and innovative product design?Engineering Secure Devices will guide you through crafting secure devices—from protecting crucial assets to the nature of attackers and the risks they pose. You’ll explore the technical intricacies and pros and cons of symmetric and asymmetric cryptography and learn how to use and analyze random number generators and cryptographic algorithms. You’ll learn how to ensure confidential data storage and secure memory, and devise secure device identity solutions and communication protocols to reinforce system architecture against potential threats. And finally, you’ll learn how to properly design secure boot and secure update processes, manage access control, and perform system monitoring to secure IoT devices.Real-world case studies throughout highlight practical applications, solutions, and obstacles, such as firmware updates with SWUpdate, secure communication with MQTT, and advanced access control with AppArmor.You’ll also dig into topics like: Analyzing the performance of cryptographic implementations in both hardware and softwareConsiderations for secure boot and software update processes to ensure ongoing firmware integrityDesigning robust device architectures that withstand attacks while maintaining critical operationsDeveloping strategies to detect and respond to anomalies or security breaches in embedded systemsWhether you’re an IoT developer or an embedded system architect, Engineering Secure Devices equips you with the indispensable knowledge to design, secure, and support the next generation of smart devices—from webcams to four-legged robots.
"Smart Embedded Systems: Advances and Applications" is a comprehensive guide that demystifies the complex world of embedded technology.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.