Embedded Computing Systems: Applications, Optimization, and Advanced Design

Embedded Computing Systems: Applications, Optimization, and Advanced Design

Author: Khalgui, Mohamed

Publisher: IGI Global

ISBN: 9781466639232

Category: Computers

Page: 356

View: 830

Get eBOOK →
Embedded computing systems play an important and complex role in the functionality of electronic devices. With our daily routines becoming more reliant on electronics for personal and professional use, the understanding of these computing systems is crucial. Embedded Computing Systems: Applications, Optimization, and Advanced Design brings together theoretical and technical concepts of intelligent embedded control systems and their use in hardware and software architectures. By highlighting formal modeling, execution models, and optimal implementations, this reference source is essential for experts, researchers, and technical supporters in the industry and academia.

Prototyping of Concurrent Control Systems Implemented in FPGA Devices

Prototyping of Concurrent Control Systems Implemented in FPGA Devices

Author: Remigiusz Wiśniewski

Publisher: Springer

ISBN: 9783319458113

Category: Technology & Engineering

Page: 173

View: 739

Get eBOOK →
This book focuses on prototyping aspects of concurrent control systems and their further implementation and partial reconfiguration in programmable devices. Further, it lays out a full prototyping flow for concurrent control systems. Based on a given primary specification, a system is described with an interpreted Petri net, which naturally reflects the concurrent and sequential relationships of the design. The book shows that, apart from the traditional option of static configuration of the entire system, the latest programmable devices (especially FPGAs) offer far more sophistication. Partial reconfiguration allows selected parts of the system to be replaced without having to reprogram the entire structure of the device. Approaches to dynamic and static partial reconfiguration of concurrent control systems are presented and described in detail.“/p> The theoretical work is illustrated by examples drawn from various applications, with a milling machine and a traffic-light controller highlighted as representative interpreted Petri nets. Given the ubiquity of concurrent control systems in a huge variety of technological areas including transportation, medicine, artificial intelligence, manufacturing, security and safety and planetary exploration, the innovative software and hardware design methods described here will be of considerable interest to control engineers and systems and circuits researchers in many areas of industry and academia.

Network Security Technologies: Design and Applications

Network Security Technologies: Design and Applications

Author: Amine, Abdelmalek

Publisher: IGI Global

ISBN: 9781466647909

Category: Computers

Page: 330

View: 417

Get eBOOK →
Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested in improving their understanding of the strategic role of trust at different levels of information and knowledge society.

Analyzing Security, Trust, and Crime in the Digital World

Analyzing Security, Trust, and Crime in the Digital World

Author: Nemati, Hamid R.

Publisher: IGI Global

ISBN: 9781466648579

Category: Computers

Page: 281

View: 749

Get eBOOK →
In the digital era, information is the most valuable resource, and protecting one’s assets is a constant struggle for both individuals and organizations. Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to further defend their own systems and protect the information therein.

Multidisciplinary Perspectives on Telecommunications, Wireless Systems, and Mobile Computing

Multidisciplinary Perspectives on Telecommunications, Wireless Systems, and Mobile Computing

Author: Hu, Wen-Chen

Publisher: IGI Global

ISBN: 9781466647169

Category: Technology & Engineering

Page: 305

View: 632

Get eBOOK →
The development of new information and communication technologies has a considerable impact on the way humans interact with each other and their environment. The proper use of these technologies is an important consideration in the success of modern human endeavors. Multidisciplinary Perspectives on Telecommunications, Wireless Systems, and Mobile Computing explores some of the latest advances in wireless communication technologies, making use of empirical research and analytical case studies to evaluate best practices in the discipline. This book will provide insight into the next generation of information and communication technologies for developers, engineers, students, researchers, and managers in the telecommunications field.

Formalized Probability Theory and Applications Using Theorem Proving

Formalized Probability Theory and Applications Using Theorem Proving

Author: Hasan, Osman

Publisher: IGI Global

ISBN: 9781466683167

Category: Mathematics

Page: 298

View: 212

Get eBOOK →
Scientists and engineers often have to deal with systems that exhibit random or unpredictable elements and must effectively evaluate probabilities in each situation. Computer simulations, while the traditional tool used to solve such problems, are limited in the scale and complexity of the problems they can solve. Formalized Probability Theory and Applications Using Theorem Proving discusses some of the limitations inherent in computer systems when applied to problems of probabilistic analysis, and presents a novel solution to these limitations, combining higher-order logic with computer-based theorem proving. Combining practical application with theoretical discussion, this book is an important reference tool for mathematicians, scientists, engineers, and researchers in all STEM fields.

HCI Challenges and Privacy Preservation in Big Data Security

HCI Challenges and Privacy Preservation in Big Data Security

Author: Lopez, Daphne

Publisher: IGI Global

ISBN: 9781522528647

Category: Computers

Page: 275

View: 537

Get eBOOK →
Privacy protection within large databases can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. HCI Challenges and Privacy Preservation in Big Data Security is an informative scholarly publication that discusses how human-computer interaction impacts privacy and security in almost all sectors of modern life. Featuring relevant topics such as large scale security data, threat detection, big data encryption, and identity management, this reference source is ideal for academicians, researchers, advanced-level students, and engineers that are interested in staying current on the advancements and drawbacks of human-computer interaction within the world of big data.

New Threats and Countermeasures in Digital Crime and Cyber Terrorism

New Threats and Countermeasures in Digital Crime and Cyber Terrorism

Author: Dawson, Maurice

Publisher: IGI Global

ISBN: 9781466683464

Category: Computers

Page: 369

View: 946

Get eBOOK →
Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find solutions, negative uses of technology continue to create new security threats to users. New Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.

Industrial Communication Technology Handbook

Industrial Communication Technology Handbook

Author: Richard Zurawski

Publisher: CRC Press

ISBN: 9781482207330

Category: Technology & Engineering

Page: 1756

View: 106

Get eBOOK →
Featuring contributions from major technology vendors, industry consortia, and government and private research establishments, the Industrial Communication Technology Handbook, Second Edition provides comprehensive and authoritative coverage of wire- and wireless-based specialized communication networks used in plant and factory automation, automotive applications, avionics, building automation, energy and power systems, train applications, and more. New to the Second Edition: 46 brand-new chapters and 21 substantially revised chapters Inclusion of the latest, most significant developments in specialized communication technologies and systems Addition of new application domains for specialized networks The Industrial Communication Technology Handbook, Second Edition supplies readers with a thorough understanding of the application-specific requirements for communication services and their supporting technologies. It is useful to a broad spectrum of professionals involved in the conception, design, development, standardization, and use of specialized communication networks as well as academic institutions engaged in engineering education and vocational training.

Measurement, Modeling, and Evaluation of Computing Systems and Dependability and Fault Tolerance

Measurement, Modeling, and Evaluation of Computing Systems and Dependability and Fault Tolerance

Author: Jens B. Schmitt

Publisher: Springer Science & Business Media

ISBN: 9783642285394

Category: Computers

Page: 343

View: 503

Get eBOOK →
This book constitutes the refereed proceedings of the 16th International GI/ITG Conference on Measurement, Modeling and Evaluation of Computing Systems and Dependability and Fault Tolerance, MMB & DFT 2012, held in Kaiserslautern, Germany, in March 2012. The 16 revised full papers presented together with 5 tool papers and 5 selected workshop papers were carefully reviewed and selected from 54 submissions. MMB & DFT 2012 covers diverse aspects of performance and dependability evaluation of systems including networks, computer architectures, distributed systems, software, fault-tolerant and secure systems.

Proceedings of the 2015 Federated Conference on Software Development and Object Technologies

Proceedings of the 2015 Federated Conference on Software Development and Object Technologies

Author: Jan Janech

Publisher: Springer

ISBN: 9783319465357

Category: Technology & Engineering

Page: 386

View: 462

Get eBOOK →
This book presents the proceedings of the International Conference SDOT which was organized at the University in Žilina, Faculty of Management Sciences and Informatics, Slovak Republic in November 19, 2015. The conference was truly international both in terms of the amount of foreign contributions and in terms of composition of steering and scientific committees. The book and the conference serves as a platform of professional exchange of knowledge and experience for the latest trends in software development and object-oriented technologies (theory and practice). This proceedings present information on the latest developments and mediate the exchange of experience between practitioners and academia.