Normally-Off Computing
- Takashi Nakada
- 2017-01-18
Author: Takashi Nakada
Publisher: Springer
ISBN: 9784431565055
Category: Computers
Page: 136
View: 764
As a step toward ultimate low-power computing, this book introduces normally-off computing, which involves inactive components of computer systems being aggressively powered off with the help of new non-volatile memories (NVMs). Because the energy consumption of modern information devices strongly depends on both hardware and software, co-design and co-optimization of hardware and software are indispensable to improve energy efficiency. The book discusses various topics including (1) details of low-power technologies including power gating, (2) characteristics of several new-generation NVMs, (3) normally-off computing architecture, (4) important technologies for implementing normally-off computing, (5) three practical implementations: healthcare, mobile information devices, and sensor network systems for smart city applications, and (6) related research and development. Bridging computing methodology and emerging memory devices, the book is designed for both hardware and software designers, engineers, and developers as comprehensive material for understanding normally-off computing.Intelligent Computing Techniques for Smart Energy Systems
- Akhtar Kalam
- 2019-12-16
Author: Akhtar Kalam
Publisher: Springer Nature
ISBN: 9789811502149
Category: Technology & Engineering
Page: 1046
View: 367
The book compiles the research works related to smart solutions concept in context to smart energy systems, maintaining electrical grid discipline and resiliency, computational collective intelligence consisted of interaction between smart devices, smart environments and smart interactions, as well as information technology support for such areas. It includes high-quality papers presented in the International Conference on Intelligent Computing Techniques for Smart Energy Systems organized by Manipal University Jaipur. This book will motivate scholars to work in these areas. The book also prophesies their approach to be used for the business and the humanitarian technology development as research proposal to various government organizations for funding approval.Physics and Technology of Crystalline Oxide Semiconductor CAAC-IGZO
- Shunpei Yamazaki
- 2016-12-27
Author: Shunpei Yamazaki
Publisher: John Wiley & Sons
ISBN: 9781119247340
Category: Technology & Engineering
Page: 377
View: 798
This book describes the application of c-axis aligned crystalline In-Ga-Zn oxide (CAAC-IGZO) technology in large-scale integration (LSI) circuits. The applications include Non-volatile Oxide Semiconductor Random Access Memory (NOSRAM), Dynamic Oxide Semiconductor Random Access Memory (DOSRAM), central processing unit (CPU), field-programmable gate array (FPGA), image sensors, and etc. The book also covers the device physics (e.g., off-state characteristics) of the CAAC-IGZO field effect transistors (FETs) and process technology for a hybrid structure of CAAC-IGZO and Si FETs. It explains an extremely low off-state current technology utilized in the LSI circuits, demonstrating reduced power consumption in LSI prototypes fabricated by the hybrid process. A further two books in the series will describe the fundamentals; and the specific application of CAAC-IGZO to LCD and OLED displays. Key features: • Outlines the physics and characteristics of CAAC-IGZO FETs that contribute to favorable operations of LSI devices. • Explains the application of CAAC-IGZO to LSI devices, highlighting attributes including low off-state current, low power consumption, and excellent charge retention. • Describes the NOSRAM, DOSRAM, CPU, FPGA, image sensors, and etc., referring to prototype chips fabricated by a hybrid process of CAAC-IGZO and Si FETs.Essential Computer and it Fundamentals for Engineering And S
- N.B.Venkateswarlu
- 2012
Author: N.B.Venkateswarlu
Publisher: S. Chand Publishing
ISBN: 9788121940474
Category: Computers
Page:
View: 570
Essential Computer and it Fundamentals for Engineering And SHandbook of Magnetic Materials
- Ekkes Bruck
- 2022-11-25
Author: Ekkes Bruck
Publisher: Academic Press
ISBN: 9780323986021
Category: Science
Page: 82
View: 284
Handbook of Magnetic Materials, Volume 31 highlights new advances in the field, with this new volume presenting interesting chapters on a variety of timely and field specific topics, each contributed to by an international board of authors. Provides the authority and expertise of leading contributors from an international board of authors Presents the latest release in the Handbook of Magnetic Materials seriesEmerging Non-volatile Memory Technologies
- Wen Siang Lew
- 2021-01-09
Author: Wen Siang Lew
Publisher: Springer Nature
ISBN: 9789811569128
Category: Science
Page: 438
View: 902
This book offers a balanced and comprehensive guide to the core principles, fundamental properties, experimental approaches, and state-of-the-art applications of two major groups of emerging non-volatile memory technologies, i.e. spintronics-based devices as well as resistive switching devices, also known as Resistive Random Access Memory (RRAM). The first section presents different types of spintronic-based devices, i.e. magnetic tunnel junction (MTJ), domain wall, and skyrmion memory devices. This section describes how their developments have led to various promising applications, such as microwave oscillators, detectors, magnetic logic, and neuromorphic engineered systems. In the second half of the book, the underlying device physics supported by different experimental observations and modelling of RRAM devices are presented with memory array level implementation. An insight into RRAM desired properties as synaptic element in neuromorphic computing platforms from material and algorithms viewpoint is also discussed with specific example in automatic sound classification framework.Computer Science & Perl Programming
- Jon Orwant
- 2002-11-04
Author: Jon Orwant
Publisher: "O'Reilly Media, Inc."
ISBN: 9781449371357
Category: Computers
Page: 760
View: 281
In its first five years of existence, The Perl Journal ran 247 articles by over 120 authors. Every serious Perl programmer subscribed to it, and every notable Perl guru jumped at the opportunity to write for it. TPJ explained critical topics such as regular expressions, databases, and object-oriented programming, and demonstrated Perl's utility for fields as diverse as astronomy, biology, economics, AI, and games. The magazine gave birth to both the Obfuscated Perl Contest and the Perl Poetry contest, and remains a proud and timeless achievement of Perl during one of its most exciting periods of development.Computer Science and Perl Programming is the first volume of The Best of the Perl Journal, compiled and re-edited by the original editor and publisher of The Perl Journal, Jon Orwant. In this series, we've taken the very best (and still relevant) articles published in TPJ over its 5 years of publication and immortalized them into three volumes. This volume has 70 articles devoted to hard-core computer science, advanced programming techniques, and the underlying mechanics of Perl.Here's a sample of what you'll find inside: Jeffrey Friedl on Understanding Regexes Mark Jason Dominus on optimizing your Perl programs with Memoization Damian Conway on Parsing Tim Meadowcroft on integrating Perl with Microsoft Office Larry Wall on the culture of Perl Written by 41 of the most prominent and prolific members of the closely-knit Perl community, this anthology does what no other book can, giving unique insight into the real-life applications and powerful techniques made possible by Perl.Other books tell you how to use Perl, but this book goes far beyond that: it shows you not only how to use Perl, but what you could use Perl for. This is more than just The Best of the Perl Journal -- in many ways, this is the best of Perl.Confident Computing for the Over 50s
- Bob Reeves
- 2010-03-26
Author: Bob Reeves
Publisher: Hachette UK
ISBN: 9781444129236
Category: Computers
Page: 300
View: 264
Do you feel that you have been left behind in the technological revolution? Assuming no prior knowledge of using a computer, this book is written in a practical, light-hearted and non-technical style to take the terror out of the technology. Bob Reeves approaches the subject in a highly accessible way, focusing on the computer applications of most interest to middle and third agers, including correspondence, photography, shopping online, personal budgets and researching your family history. It begins with the very basics and ends with an invaluable 'jargonbuster' glossary. The book is made up of a series of self-contained chapters, with the emphasis on what the computer is being used for, rather than the software needed. For example: rather than a chapter on 'word-processing', there is a chapter on 'letter writing'; rather than 'desktop publishing' there is 'making a newsletter' and 'making cards for all occasions'; rather than one on 'digital photography' there is ' getting photographs on to the computer' etc. There will be clear instructions supported with screenshots, tips and hints throughout. This approach sets it apart from other books on basic computer skills as it covers what you really want to do with your computer, breaking down any technical barriers and making the book totally relevant to the novice computer user. NOT GOT MUCH TIME? One, five and ten-minute introductions to key principles to get you started. AUTHOR INSIGHTS Lots of instant help with common problems and quick tips for success, based on the author's many years of experience. TEST YOURSELF Tests in the book and online to keep track of your progress. EXTEND YOUR KNOWLEDGE Extra online articles at www.teachyourself.com to give you a richer understanding of computing. FIVE THINGS TO REMEMBER Quick refreshers to help you remember the key facts. TRY THIS Innovative exercises illustrate what you've learnt and how to use it.Computer Vision - ACCV 2010
- Ron Kimmel
- 2011-03-02
Author: Ron Kimmel
Publisher: Springer
ISBN: 9783642193156
Category: Computers
Page: 510
View: 167
The four-volume set LNCS 6492-6495 constitutes the thoroughly refereed post-proceedings of the 10th Asian Conference on Computer Vision, ACCV 2009, held in Queenstown, New Zealand in November 2010. All together the four volumes present 206 revised papers selected from a total of 739 Submissions. All current issues in computer vision are addressed ranging from algorithms that attempt to automatically understand the content of images, optical methods coupled with computational techniques that enhance and improve images, and capturing and analyzing the world's geometry while preparing the higher level image and shape understanding. Novel gemometry techniques, statistical learning methods, and modern algebraic procedures are dealt with as well.Computer Design
Author:
Publisher:
ISBN: UCSD:31822020304358
Category: Computer engineering
Page: 902
View: 355
The Ultimate Security Survey
- James L Schaub
- 1998-08-28
Author: James L Schaub
Publisher: Gulf Professional Publishing
ISBN: 0750670916
Category: Business & Economics
Page: 440
View: 863
This new edition of The Ultimate Security Survey has been revised and updated to include more topics than the original 1994 edition. The book and its accompanying disk have been completely overhauled and now address the current electronic information security environment. Contains more than 3,000 questions for security professionals to use in designing their own security surveys An accompanying disk allows users to create surveys without typing Completely up-to-dateComputer and Information Security Handbook
- John R. Vacca
- 2012-11-05
Author: John R. Vacca
Publisher: Newnes
ISBN: 9780123946126
Category: Computers
Page: 1200
View: 710
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security, information management, cyber warfare and security, encryption technology, privacy, data storage, physical security, and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more. Chapters by leaders in the field on theory and practice of computer and information security technology, allowing the reader to develop a new level of technical expertise Comprehensive and up-to-date coverage of security issues allows the reader to remain current and fully informed from multiple viewpoints Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions