Computers

Normally-Off Computing

Normally-Off Computing

Author: Takashi Nakada

Publisher: Springer

ISBN: 9784431565055

Category: Computers

Page: 136

View: 764

As a step toward ultimate low-power computing, this book introduces normally-off computing, which involves inactive components of computer systems being aggressively powered off with the help of new non-volatile memories (NVMs). Because the energy consumption of modern information devices strongly depends on both hardware and software, co-design and co-optimization of hardware and software are indispensable to improve energy efficiency. The book discusses various topics including (1) details of low-power technologies including power gating, (2) characteristics of several new-generation NVMs, (3) normally-off computing architecture, (4) important technologies for implementing normally-off computing, (5) three practical implementations: healthcare, mobile information devices, and sensor network systems for smart city applications, and (6) related research and development. Bridging computing methodology and emerging memory devices, the book is designed for both hardware and software designers, engineers, and developers as comprehensive material for understanding normally-off computing.
Technology & Engineering

Intelligent Computing Techniques for Smart Energy Systems

Intelligent Computing Techniques for Smart Energy Systems

Author: Akhtar Kalam

Publisher: Springer Nature

ISBN: 9789811502149

Category: Technology & Engineering

Page: 1046

View: 367

The book compiles the research works related to smart solutions concept in context to smart energy systems, maintaining electrical grid discipline and resiliency, computational collective intelligence consisted of interaction between smart devices, smart environments and smart interactions, as well as information technology support for such areas. It includes high-quality papers presented in the International Conference on Intelligent Computing Techniques for Smart Energy Systems organized by Manipal University Jaipur. This book will motivate scholars to work in these areas. The book also prophesies their approach to be used for the business and the humanitarian technology development as research proposal to various government organizations for funding approval.
Technology & Engineering

Physics and Technology of Crystalline Oxide Semiconductor CAAC-IGZO

Physics and Technology of Crystalline Oxide Semiconductor CAAC-IGZO

Author: Shunpei Yamazaki

Publisher: John Wiley & Sons

ISBN: 9781119247340

Category: Technology & Engineering

Page: 377

View: 798

This book describes the application of c-axis aligned crystalline In-Ga-Zn oxide (CAAC-IGZO) technology in large-scale integration (LSI) circuits. The applications include Non-volatile Oxide Semiconductor Random Access Memory (NOSRAM), Dynamic Oxide Semiconductor Random Access Memory (DOSRAM), central processing unit (CPU), field-programmable gate array (FPGA), image sensors, and etc. The book also covers the device physics (e.g., off-state characteristics) of the CAAC-IGZO field effect transistors (FETs) and process technology for a hybrid structure of CAAC-IGZO and Si FETs. It explains an extremely low off-state current technology utilized in the LSI circuits, demonstrating reduced power consumption in LSI prototypes fabricated by the hybrid process. A further two books in the series will describe the fundamentals; and the specific application of CAAC-IGZO to LCD and OLED displays. Key features: • Outlines the physics and characteristics of CAAC-IGZO FETs that contribute to favorable operations of LSI devices. • Explains the application of CAAC-IGZO to LSI devices, highlighting attributes including low off-state current, low power consumption, and excellent charge retention. • Describes the NOSRAM, DOSRAM, CPU, FPGA, image sensors, and etc., referring to prototype chips fabricated by a hybrid process of CAAC-IGZO and Si FETs.
Computers

Essential Computer and it Fundamentals for Engineering And S

Essential Computer and it Fundamentals for Engineering And S

Author: N.B.Venkateswarlu

Publisher: S. Chand Publishing

ISBN: 9788121940474

Category: Computers

Page:

View: 570

Essential Computer and it Fundamentals for Engineering And S
Science

Handbook of Magnetic Materials

Handbook of Magnetic Materials

Author: Ekkes Bruck

Publisher: Academic Press

ISBN: 9780323986021

Category: Science

Page: 82

View: 284

Handbook of Magnetic Materials, Volume 31 highlights new advances in the field, with this new volume presenting interesting chapters on a variety of timely and field specific topics, each contributed to by an international board of authors. Provides the authority and expertise of leading contributors from an international board of authors Presents the latest release in the Handbook of Magnetic Materials series
Science

Emerging Non-volatile Memory Technologies

Emerging Non-volatile Memory Technologies

Author: Wen Siang Lew

Publisher: Springer Nature

ISBN: 9789811569128

Category: Science

Page: 438

View: 902

This book offers a balanced and comprehensive guide to the core principles, fundamental properties, experimental approaches, and state-of-the-art applications of two major groups of emerging non-volatile memory technologies, i.e. spintronics-based devices as well as resistive switching devices, also known as Resistive Random Access Memory (RRAM). The first section presents different types of spintronic-based devices, i.e. magnetic tunnel junction (MTJ), domain wall, and skyrmion memory devices. This section describes how their developments have led to various promising applications, such as microwave oscillators, detectors, magnetic logic, and neuromorphic engineered systems. In the second half of the book, the underlying device physics supported by different experimental observations and modelling of RRAM devices are presented with memory array level implementation. An insight into RRAM desired properties as synaptic element in neuromorphic computing platforms from material and algorithms viewpoint is also discussed with specific example in automatic sound classification framework.
Computers

Computer Science & Perl Programming

Computer Science & Perl Programming

Author: Jon Orwant

Publisher: "O'Reilly Media, Inc."

ISBN: 9781449371357

Category: Computers

Page: 760

View: 281

In its first five years of existence, The Perl Journal ran 247 articles by over 120 authors. Every serious Perl programmer subscribed to it, and every notable Perl guru jumped at the opportunity to write for it. TPJ explained critical topics such as regular expressions, databases, and object-oriented programming, and demonstrated Perl's utility for fields as diverse as astronomy, biology, economics, AI, and games. The magazine gave birth to both the Obfuscated Perl Contest and the Perl Poetry contest, and remains a proud and timeless achievement of Perl during one of its most exciting periods of development.Computer Science and Perl Programming is the first volume of The Best of the Perl Journal, compiled and re-edited by the original editor and publisher of The Perl Journal, Jon Orwant. In this series, we've taken the very best (and still relevant) articles published in TPJ over its 5 years of publication and immortalized them into three volumes. This volume has 70 articles devoted to hard-core computer science, advanced programming techniques, and the underlying mechanics of Perl.Here's a sample of what you'll find inside: Jeffrey Friedl on Understanding Regexes Mark Jason Dominus on optimizing your Perl programs with Memoization Damian Conway on Parsing Tim Meadowcroft on integrating Perl with Microsoft Office Larry Wall on the culture of Perl Written by 41 of the most prominent and prolific members of the closely-knit Perl community, this anthology does what no other book can, giving unique insight into the real-life applications and powerful techniques made possible by Perl.Other books tell you how to use Perl, but this book goes far beyond that: it shows you not only how to use Perl, but what you could use Perl for. This is more than just The Best of the Perl Journal -- in many ways, this is the best of Perl.
Computers

Confident Computing for the Over 50s

Confident Computing for the Over 50s

Author: Bob Reeves

Publisher: Hachette UK

ISBN: 9781444129236

Category: Computers

Page: 300

View: 264

Do you feel that you have been left behind in the technological revolution? Assuming no prior knowledge of using a computer, this book is written in a practical, light-hearted and non-technical style to take the terror out of the technology. Bob Reeves approaches the subject in a highly accessible way, focusing on the computer applications of most interest to middle and third agers, including correspondence, photography, shopping online, personal budgets and researching your family history. It begins with the very basics and ends with an invaluable 'jargonbuster' glossary. The book is made up of a series of self-contained chapters, with the emphasis on what the computer is being used for, rather than the software needed. For example: rather than a chapter on 'word-processing', there is a chapter on 'letter writing'; rather than 'desktop publishing' there is 'making a newsletter' and 'making cards for all occasions'; rather than one on 'digital photography' there is ' getting photographs on to the computer' etc. There will be clear instructions supported with screenshots, tips and hints throughout. This approach sets it apart from other books on basic computer skills as it covers what you really want to do with your computer, breaking down any technical barriers and making the book totally relevant to the novice computer user. NOT GOT MUCH TIME? One, five and ten-minute introductions to key principles to get you started. AUTHOR INSIGHTS Lots of instant help with common problems and quick tips for success, based on the author's many years of experience. TEST YOURSELF Tests in the book and online to keep track of your progress. EXTEND YOUR KNOWLEDGE Extra online articles at www.teachyourself.com to give you a richer understanding of computing. FIVE THINGS TO REMEMBER Quick refreshers to help you remember the key facts. TRY THIS Innovative exercises illustrate what you've learnt and how to use it.
Computers

Computer Vision - ACCV 2010

Computer Vision - ACCV 2010

Author: Ron Kimmel

Publisher: Springer

ISBN: 9783642193156

Category: Computers

Page: 510

View: 167

The four-volume set LNCS 6492-6495 constitutes the thoroughly refereed post-proceedings of the 10th Asian Conference on Computer Vision, ACCV 2009, held in Queenstown, New Zealand in November 2010. All together the four volumes present 206 revised papers selected from a total of 739 Submissions. All current issues in computer vision are addressed ranging from algorithms that attempt to automatically understand the content of images, optical methods coupled with computational techniques that enhance and improve images, and capturing and analyzing the world's geometry while preparing the higher level image and shape understanding. Novel gemometry techniques, statistical learning methods, and modern algebraic procedures are dealt with as well.
Computer engineering

Computer Design

Computer Design

Author:

Publisher:

ISBN: UCSD:31822020304358

Category: Computer engineering

Page: 902

View: 355

Business & Economics

The Ultimate Security Survey

The Ultimate Security Survey

Author: James L Schaub

Publisher: Gulf Professional Publishing

ISBN: 0750670916

Category: Business & Economics

Page: 440

View: 863

This new edition of The Ultimate Security Survey has been revised and updated to include more topics than the original 1994 edition. The book and its accompanying disk have been completely overhauled and now address the current electronic information security environment. Contains more than 3,000 questions for security professionals to use in designing their own security surveys An accompanying disk allows users to create surveys without typing Completely up-to-date
Computers

Computer and Information Security Handbook

Computer and Information Security Handbook

Author: John R. Vacca

Publisher: Newnes

ISBN: 9780123946126

Category: Computers

Page: 1200

View: 710

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security, information management, cyber warfare and security, encryption technology, privacy, data storage, physical security, and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more. Chapters by leaders in the field on theory and practice of computer and information security technology, allowing the reader to develop a new level of technical expertise Comprehensive and up-to-date coverage of security issues allows the reader to remain current and fully informed from multiple viewpoints Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions