Browse Results

Showing 1,076 through 1,100 of 82,908 results

Advanced Artificial Intelligence and Robo-Justice

by Georgios I. Zekos

The book deals with digital technology which is transforming the landscape of dispute resolution. It illustrates the application of AI in the legal field and shows the future prospect of robo-justice for an AAI society in the advanced artificial intelligence era. In other words, the present justice system and the influence of current AI upon courts and arbitration are investigated. The transforming role of AI on all legal fields is examined thoroughly by giving answers concerning AI legal personality and liability. The analysis shows that digital technology is generating an ever-growing number of disputes and at the same time is challenging the effectiveness and reach of traditional dispute resolution avenues. To that extent, the book presents in tandem the impact of AI upon courts and arbitration, and reveals the role of AAI in generating a new robo-justice system.Finally, the end of the perplexing relation of courts and arbitration is evidenced methodically and comprehensively.

Advanced ASIC Chip Synthesis: Using Synopsys® Design Compiler™ Physical Compiler™ and PrimeTime®

by Himanshu Bhatnagar

Advanced ASIC Chip Synthesis: Using Synopsys® Design Compiler® Physical Compiler® and PrimeTime®, Second Edition describes the advanced concepts and techniques used towards ASIC chip synthesis, physical synthesis, formal verification and static timing analysis, using the Synopsys suite of tools. In addition, the entire ASIC design flow methodology targeted for VDSM (Very-Deep-Sub-Micron) technologies is covered in detail. The emphasis of this book is on real-time application of Synopsys tools, used to combat various problems seen at VDSM geometries. Readers will be exposed to an effective design methodology for handling complex, sub-micron ASIC designs. Significance is placed on HDL coding styles, synthesis and optimization, dynamic simulation, formal verification, DFT scan insertion, links to layout, physical synthesis, and static timing analysis. At each step, problems related to each phase of the design flow are identified, with solutions and work-around described in detail. In addition, crucial issues related to layout, which includes clock tree synthesis and back-end integration (links to layout) are also discussed at length. Furthermore, the book contains in-depth discussions on the basis of Synopsys technology libraries and HDL coding styles, targeted towards optimal synthesis solution. Target audiences for this book are practicing ASIC design engineers and masters level students undertaking advanced VLSI courses on ASIC chip design and DFT techniques.

Advanced ASIC Chip Synthesis: Using Synopsys® Design Compiler™ and PrimeTime®

by Himanshu Bhatnagar

Advanced ASIC Chip Synthesis: Using Synopsys® Design Compiler® and PrimeTime® describes the advanced concepts and techniques used for ASIC chip synthesis, formal verification and static timing analysis, using the Synopsys suite of tools. In addition, the entire ASIC design flow methodology targeted for VDSM (Very-Deep-Sub-Micron) technologies is covered in detail. The emphasis of this book is on real-time application of Synopsys tools used to combat various problems seen at VDSM geometries. Readers will be exposed to an effective design methodology for handling complex, sub-micron ASIC designs. Significance is placed on HDL coding styles, synthesis and optimization, dynamic simulation, formal verification, DFT scan insertion, links to layout, and static timing analysis. At each step, problems related to each phase of the design flow are identified, with solutions and work-arounds described in detail. In addition, crucial issues related to layout, which includes clock tree synthesis and back-end integration (links to layout) are also discussed at length. Furthermore, the book contains in-depth discussions on the basics of Synopsys technology libraries and HDL coding styles, targeted towards optimal synthesis solutions. Advanced ASIC Chip Synthesis: Using Synopsys® Design Compiler® and PrimeTime® is intended for anyone who is involved in the ASIC design methodology, starting from RTL synthesis to final tape-out. Target audiences for this book are practicing ASIC design engineers and graduate students undertaking advanced courses in ASIC chip design and DFT techniques. From the Foreword: `This book, written by Himanshu Bhatnagar, provides a comprehensive overview of the ASIC design flow targeted for VDSM technologies using the Synopsis suite of tools. It emphasizes the practical issues faced by the semiconductor design engineer in terms of synthesis and the integration of front-end and back-end tools. Traditional design methodologies are challenged and unique solutions are offered to help define the next generation of ASIC design flows. The author provides numerous practical examples derived from real-world situations that will prove valuable to practicing ASIC design engineers as well as to students of advanced VLSI courses in ASIC design'. Dr Dwight W. Decker, Chairman and CEO, Conexant Systems, Inc., (Formerly, Rockwell Semiconductor Systems), Newport Beach, CA, USA.

Advanced ASP.NET Core 3 Security: Understanding Hacks, Attacks, and Vulnerabilities to Secure Your Website

by Scott Norberg

Incorporate security best practices into ASP.NET Core. This book covers security-related features available within the framework, explains where these feature may fall short, and delves into security topics rarely covered elsewhere. Get ready to dive deep into ASP.NET Core 3.1 source code, clarifying how particular features work and addressing how to fix problems. For straightforward use cases, the ASP.NET Core framework does a good job in preventing certain types of attacks from happening. But for some types of attacks, or situations that are not straightforward, there is very little guidance available on how to safely implement solutions. And worse, there is a lot of bad advice online on how to implement functionality, be it encrypting unsafely hard-coded parameters that need to be generated at runtime, or articles which advocate for certain solutions that are vulnerable to obvious injection attacks. Even more concerning is the functions in ASP.NET Core that are not as secure as they should be by default.Advanced ASP.NET Core 3 Security is designed to train developers to avoid these problems. Unlike the vast majority of security books that are targeted to network administrators, system administrators, or managers, this book is targeted specifically to ASP.NET developers. Author Scott Norberg begins by teaching developers how ASP.NET Core works behind the scenes by going directly into the framework's source code. Then he talks about how various attacks are performed using the very tools that penetration testers would use to hack into an application. He shows developers how to prevent these attacks. Finally, he covers the concepts developers need to know to do some testing on their own, without the help of a security professional. What You Will Learn Discern which attacks are easy to prevent, and which are more challenging, in the frameworkDig into ASP.NET Core 3.1 source code to understand how the security services workEstablish a baseline for understanding how to design more secure softwareProperly apply cryptography in software developmentTake a deep dive into web security conceptsValidate input in a way that allows legitimate traffic but blocks malicious traffic Understand parameterized queries and why they are so important to ASP.NET CoreFix issues in a well-implemented solution Know how the new logging system in ASP.NET Core falls short of security needsIncorporate security into your software development process Who This Book Is ForSoftware developers who have experience creating websites in ASP.NET and want to know how to make their websites secure from hackers and security professionals who work with a development team that uses ASP.NET Core. A basic understanding of web technologies such as HTML, JavaScript, and CSS is assumed, as is knowledge of how to create a website, and how to read and write C#. You do not need knowledge of security concepts, even those that are often covered in ASP.NET Core documentation.

Advanced Audio Visualization Using ThMAD: Creating Amazing Graphics with Open Source Software

by Peter Späth

Learn advanced techniques and improve your audio visualization skills with Thinking Machine Audio Dreams (ThMAD). With this book, you can concentrate on advanced examples and usage patterns, including using shaders in a more profound way, and how to incorporate ThMAD into a tool chain using the professional sound server JACK.Advanced Audio Visualization Using ThMAD provides advanced techniques for generating graphics, improving performance, and providing readers with the skills needed to create more interesting visualizations. You will also learn professional setups with highly developed visual and aural art tool chains.What You'll LearnUse the ThMAD software for advanced setups in their personal and professional projectsGain a pragmatic introduction to using shadersUse JACK sound servers with ThMADControl the timing ThMADWork with advanced configurationsWho This Book Is ForArtists and developers already familiar with ThMAD and looking to enhance their projects. In addition, readers primarily interested in using shaders or the Jack audio server for graphics generation can benefit from the book as well.

Advanced Autonomic Networking and Communication (Whitestein Series in Software Agent Technologies and Autonomic Computing)

by Monique Calisti John C. Strassner

Written by leading scientists and researchers, this book presents a comprehensive reference of state-of-the-art efforts and early results in the area of autonomic networking and communication. This special issue explores different ways that autonomic principles can be applied to existing and future networks. In particular, the book has three main parts, each of them represented by three papers discussing them from industrial and academic perspectives.

Advanced Backend Code Optimization

by Sid Touati Benoit Dupont de Dinechin

This book is a summary of more than a decade of research in the area of backend optimization. It contains the latest fundamental research results in this field. While existing books are often more oriented toward Masters students, this book is aimed more towards professors and researchers as it contains more advanced subjects.It is unique in the sense that it contains information that has not previously been covered by other books in the field, with chapters on phase ordering in optimizing compilation; register saturation in instruction level parallelism; code size reduction for software pipelining; memory hierarchy effects and instruction level parallelism.Other chapters provide the latest research results in well-known topics such as register need, and software pipelining and periodic register allocation.

Advanced Backend Code Optimization

by Sid Touati Benoit Dupont de Dinechin

This book is a summary of more than a decade of research in the area of backend optimization. It contains the latest fundamental research results in this field. While existing books are often more oriented toward Masters students, this book is aimed more towards professors and researchers as it contains more advanced subjects.It is unique in the sense that it contains information that has not previously been covered by other books in the field, with chapters on phase ordering in optimizing compilation; register saturation in instruction level parallelism; code size reduction for software pipelining; memory hierarchy effects and instruction level parallelism.Other chapters provide the latest research results in well-known topics such as register need, and software pipelining and periodic register allocation.

Advanced BASIC Scientific Subroutines

by B. V. Cordingley D. J. Chamund

Advanced Biometrics: International Conference, Icb 2006, Hong Kong, China, January 5-7, 2006, Proceedings (Lecture Notes in Computer Science #3832)

by David Zhang Guangming Lu Lei Zhang

This book describes a range of new biometric technologies, such as high-resolution fingerprint, finger-knuckle-print, multi-spectral backhand, 3D fingerprint, tongueprint, 3D ear, and multi-spectral iris technologies. Further, it introduces readers to efficient feature extraction, matching and fusion algorithms, in addition to developing potential systems of its own. These advanced biometric technologies and methods are divided as follows: 1. High-Resolution Fingerprint Recognition; 2. Finger-Knuckle-Print Verification; 3. Other Hand-Based Biometrics; and 4. New Head-Based Biometrics.Traditional biometric technologies, such as fingerprint, face, iris, and palmprint, have been extensively studied and addressed in many research books. However, all of these technologies have their own advantages and disadvantages, and there is no single type of biometric technology that can be used for all applications. Many new biometric technologies have been developed in recent years, especially in response to new applications. The contributions gathered here focus on how to develop a new biometric technology based on the requirements of essential applications, and how to design efficient algorithms that yield better performance.

Advanced Bioscience and Biosystems for Detection and Management of Diabetes (Springer Series on Bio- and Neurosystems #13)

by Kishor Kumar Sadasivuni John-John Cabibihan Abdulaziz Khalid A M Al-Ali Rayaz A. Malik

This book covers the medical condition of diabetic patients, their early symptoms and methods conventionally used for diagnosing and monitoring diabetes. It describes various techniques and technologies used for diabetes detection. The content is built upon moving from regressive technology (invasive) and adapting new-age pain-free technologies (non-invasive), machine learning and artificial intelligence for diabetes monitoring and management. This book details all the popular technologies used in the health care and medical fields for diabetic patients. An entire chapter is dedicated to how the future of this field will be shaping up and the challenges remaining to be conquered. Finally, it shows artificial intelligence and predictions, which can be beneficial for the early detection, dose monitoring and surveillance for patients suffering from diabetes

Advanced Biosignal Processing

by Amine Naït-Ali

Generally speaking, Biosignals refer to signals recorded from the human body. They can be either electrical (e. g. Electrocardiogram (ECG), Electroencephalogram (EEG), Electromyogram (EMG), etc. ) or non-electrical (e. g. breathing, movements, etc. ). The acquisition and processing of such signals play an important role in clinical routines. They are usually considered as major indicators which provide clinicians and physicians with useful information during diagnostic and monitoring processes. In some applications, the purpose is not necessarily medical. It may also be industrial. For instance, a real-time EEG system analysis can be used to control and analyze the vigilance of a car driver. In this case, the purpose of such a system basically consists of preventing crash risks. Furthermore, in certain other appli- tions,asetof biosignals (e. g. ECG,respiratorysignal,EEG,etc. ) can be used toc- trol or analyze human emotions. This is the case of the famous polygraph system, also known as the “lie detector”, the ef ciency of which remains open to debate! Thus when one is dealing with biosignals, special attention must be given to their acquisition, their analysis and their processing capabilities which constitute the nal stage preceding the clinical diagnosis. Naturally, the diagnosis is based on the information provided by the processing system.

Advanced BlackBerry 6 Development

by Chris King

BlackBerry devices and applications are selling by the millions. As a BlackBerry developer, you need an advanced skill set to successfully exploit the most compelling features of the platform. This book will help you develop that skill set and teach you how to create the most sophisticated BlackBerry programs possible. With Advanced BlackBerry 6 Development, you’ll get a comprehensive look at the new features included with SDK 6, including the web and widgets SDK, the web browser, and more. You’ll also learn how to take advantage of BlackBerry media capabilities such as the camera and video playback. The book also shows you how to send and receive text and multimedia messages, use powerful cryptography libraries, and connect with the user’s personal and business contacts and calendar. Not only will you be learning how to use these APIs, but you’ll also be building a program that takes full advantage of them: a wireless media-sharing app. Each chapter’s lessons will be applied by enhancing the app from a prototype to a fully polished program. Along the way, you'll learn how to differentiate your product from other downloads by fully integrating with the new BlackBerry 6 operating system. Your app will run in the browser and within device menus, just like software that comes with the phone. You will even learn BlackBerry's new Web browser features, Web standards-based software development kit, and more. Once you are comfortable with writing apps, this book will show you how to take them to the next level. You’ll learn how to move from running on one phone to running on all phones, and from one country to all countries. You’ll additionally learn how to support your users with updates. No other resource compares for mastering the techniques needed for expert development on this mobile platform.

Advanced BlackBerry Development

by Chris King

BlackBerry devices and applications are selling by the millions. As a BlackBerry developer, you need an advanced skill set to successfully exploit the most compelling features of the platform. This book will help you develop that skill set and teach you how to create the most sophisticated BlackBerry programs possible. With Advanced BlackBerry Development, you'll learn you how to take advantage of BlackBerry media capabilities, including the camera and video playback. The book also shows you how to send and receive text and multimedia messages, use powerful cryptography libraries, and connect with the user's personal and business contacts and calendar. Not only will you be learning how to use these application programming interfaces, but you'll also be building a program that takes full advantage of them: a wireless media-sharing app. Each chapter's lessons will be applied by enhancing the app from a prototype to a fully polished program. Along the way, yo'll learn how to differentiate your product from other downloads by fully integrating with the operating system. Your app will run in the browser and within device menus, just like software that comes with the phone. Once you are comfortable with writing apps, this book will show you how to take them to the next level. You'll learn how to move from running on one phone to running on all phones, and from one country to all countries. You'll additionally learn how to support your users with updates. No other resource compares for mastering the techniques needed for expert development on this mobile platform.

Advanced Blockchain Development: Build Highly Secure, Decentralized Applications And Conduct Secure Transactions

by Imran Bashir

Starting with the technical foundations of blockchain technology, this Learning Path takes you deep into the theoretical and technical foundations of the blockchain technology to transform you into an expert of decentralized applications and blockchain.

Advanced Blockchain Technology: Frameworks and Enterprise-Level Practices

by Liang Cai Qilei Li Xiubo Liang

This book is a must-have for blockchain developers who want to learn from scratch how to leverage blockchain technology in a real-world setting. The first section provides a brief overview of blockchain technology, including its concepts, history, technology genre, major related companies and typical application scenarios, and presents an ecological map for the blockchain industry by comparing and analyzing some mainstream platforms.The second section systematically introduces Ethereum and HyperLedger, exemplars of well-known open-source blockchain platforms, and demonstrates how to conduct blockchain applications development based on the two platforms.The third section illustrates core technology of enterprise blockchain platforms (to take Hyperchain, an independent, controllable blockchain alliance as an example), and covers Hyperchain based enterprise blockchain applications development technology.The fourth section presents 6 actual blockchain-based applications examples, and analyzes applications development procedure and related key codes. Examples in this book are of great practicability and operability, allowing practitioners to get started easily, and eventually utilize these skills to develop real-life, usable blockchain applications.

Advanced Boolean Techniques: Selected Papers from the 13th International Workshop on Boolean Problems

by Rolf Drechsler Mathias Soeken

This book describes recent findings in the domain of Boolean logic and Boolean algebra, covering application domains in circuit and system design, but also basic research in mathematics and theoretical computer science. Content includes invited chapters and a selection of the best papers presented at the 13th annual International Workshop on Boolean Problems.Provides a single-source reference to the state-of-the-art research in the field of logic synthesis and Boolean techniques;Includes a selection of the best papers presented at the 13th annual International Workshop on Boolean Problems;Covers Boolean algebras, Boolean logic, Boolean modeling, Combinatorial Search, Boolean and bitwise arithmetic, Software and tools for the solution of Boolean problems, Applications of Boolean logic and algebras, Applications to real-world problems, Boolean constraint solving, and Extensions of Boolean logic.

Advanced Boundary Element Methods: Proceedings of the IUTAM Symposium, San Antonio, Texas, April 13–16, 1987 (IUTAM Symposia)

by Thomas A. Cruse

The IUTAM Symposium on Advanced Boundary Element Methods brought together both established and current researchers in the broad context of applications of BEM technology. The goal of the Symposium was to provide both a formal and an informal forum for the interchange of ideas and the stimulation of new research directions.

Advanced Business Analytics

by Fausto Pedro García Márquez Benjamin Lev

The book describes advanced business analytics and shows how to apply them to many different professional areas of engineering and management. Each chapter of the book is contributed by a different author and covers a different area of business analytics. The book connects the analytic principles with business practice and provides an interface between the main disciplines of engineering/technology and the organizational, administrative and planning abilities of management. It also refers to other disciplines such as economy, finance, marketing, behavioral economics and risk analysis. This book is of special interest to engineers, economists and researchers who are developing new advances in engineering management but also to practitioners working on this subject.

Advanced C and C++ Compiling

by Milan Stevanovic

Learning how to write C/C++ code is only the first step. To be a serious programmer, you need to understand the structure and purpose of the binary files produced by the compiler: object files, static libraries, shared libraries, and, of course, executables. Advanced C and C++ Compiling explains the build process in detail and shows how to integrate code from other developers in the form of deployed libraries as well as how to resolve issues and potential mismatches between your own and external code trees. With the proliferation of open source, understanding these issues is increasingly the responsibility of the individual programmer. Advanced C and C++ Compiling brings all of the information needed to move from intermediate to expert programmer together in one place -- an engineering guide on the topic of C/C++ binaries to help you get the most accurate and pertinent information in the quickest possible time.

Advanced CAD/CAM Systems: State-of-the-Art and Future Trends in Feature Technology (IFIP Advances in Information and Communication Technology)

by René Soenen Gustav J. Olling

This book provides up-to-date information about the promising use of feature technology for integrating computer-aided-design with subsequent applications. The book consists of 20 articles based upon the international IFIP conference on this topic held in Valenciennes, France in May 1994.

Advanced CAD Modeling: Explicit, Parametric, Free-form Cad And Re-engineering (Springer Tracts in Mechanical Engineering)

by Nikola Vukašinović Jože Duhovnik

The book discusses the theoretical fundamentals of CAD graphics to enhance readers’ understanding of surface modeling and free-form design by demonstrating how to use mathematical equations to define curves and surfaces in CAD modelers. Additionally, it explains and describes the main approaches to creating CAD models out of 3D scans of physical objects. All CAD approaches are demonstrated with guided examples and supported with comprehensive engineering explanations. Furthermore, each approach includes exercises for independent consolidation of advanced CAD skills. This book is intended for engineers and designers who are already familiar with the basics of modern CAD tools, e.g. feature based and solid based modeling in 3D space, and would like to improve and expand their knowledge and experience. It is also an easy-to use guide and excellent teaching and research aid for academics and practitioners alike.

Advanced Circuit Simulation Using Multisim Workbench (Synthesis Lectures on Digital Circuits & Systems)

by David Baez-Lopez Félix E. Guerrero-Castro Ofelia Delfina Cervantes-Villagómez

Multisim is now the de facto standard for circuit simulation. It is a SPICE-based circuit simulator which combines analog, discrete-time, and mixed-mode circuits. In addition, it is the only simulator which incorporates microcontroller simulation in the same environment. It also includes a tool for printed circuit board design. Advanced Circuit Simulation Using Multisim Workbench is a companion book to Circuit Analysis Using Multisim, published by Morgan & Claypool in 2011. This new book covers advanced analyses and the creation of models and subcircuits. It also includes coverage of transmission lines, the special elements which are used to connect components in PCBs and integrated circuits. Finally, it includes a description of Ultiboard, the tool for PCB creation from a circuit description in Multisim. Both books completely cover most of the important features available for a successful circuit simulation with Multisim. Table of Contents: Models and Subcircuits / Transmission Lines / Other Types of Analyses / Simulating Microcontrollers / PCB Design With Ultiboard

Advanced Circuits and Systems for Healthcare and Security Applications

by Balwinder Raj Brij B. Gupta Jeetendra Singh

VLSI devices downscaling is a very significant part of the design to improve the performance of VLSI industry outcomes, which results in high speed and low power of operation of integrated devices. The increasing use of VLSI circuits dealing with highly sensitive information, such as healthcare information, means adequate security measures are required to be taken for the secure storage and transmission. Advanced Circuits and Systems for Healthcare and Security Applications provides broader coverage of the basic aspects of advanced circuits and security and introduces the corresponding principles. By the end of this book, you will be familiarized with the theoretical frameworks, technical methodologies, and empirical research findings in the field to protect your computers and information from adversaries. Advanced circuits and the comprehensive material of this book will keep you interested and involved throughout. The book is an integrated source which aims at understanding the basic concepts associated with the security of the advanced circuits and the cyber world as a first step towards achieving high-end protection from adversaries and hackers. The content includes theoretical frameworks and recent empirical findings in the field to understand the associated principles, key challenges and recent real-time applications of the advanced circuits and cybersecurity. It illustrates the notions, models, and terminologies that are widely used in the area of circuits and security, identifies the existing security issues in the field, and evaluates the underlying factors that influence the security of the systems. It emphasizes the idea of understanding the motivation of the attackers to establish adequate security measures and to mitigate security attacks in a better way. This book also outlines the exciting areas of future research where the already-existing methodologies can be implemented. Moreover, this book is suitable for students, researchers, and professionals in the who are looking forward to carry out research in the field of advanced circuits and systems for healthcare and security applications; faculty members across universities; and software developers.

Advanced Circuits and Systems for Healthcare and Security Applications

by Balwinder Raj Brij B. Gupta Jeetendra Singh

VLSI devices downscaling is a very significant part of the design to improve the performance of VLSI industry outcomes, which results in high speed and low power of operation of integrated devices. The increasing use of VLSI circuits dealing with highly sensitive information, such as healthcare information, means adequate security measures are required to be taken for the secure storage and transmission. Advanced Circuits and Systems for Healthcare and Security Applications provides broader coverage of the basic aspects of advanced circuits and security and introduces the corresponding principles. By the end of this book, you will be familiarized with the theoretical frameworks, technical methodologies, and empirical research findings in the field to protect your computers and information from adversaries. Advanced circuits and the comprehensive material of this book will keep you interested and involved throughout. The book is an integrated source which aims at understanding the basic concepts associated with the security of the advanced circuits and the cyber world as a first step towards achieving high-end protection from adversaries and hackers. The content includes theoretical frameworks and recent empirical findings in the field to understand the associated principles, key challenges and recent real-time applications of the advanced circuits and cybersecurity. It illustrates the notions, models, and terminologies that are widely used in the area of circuits and security, identifies the existing security issues in the field, and evaluates the underlying factors that influence the security of the systems. It emphasizes the idea of understanding the motivation of the attackers to establish adequate security measures and to mitigate security attacks in a better way. This book also outlines the exciting areas of future research where the already-existing methodologies can be implemented. Moreover, this book is suitable for students, researchers, and professionals in the who are looking forward to carry out research in the field of advanced circuits and systems for healthcare and security applications; faculty members across universities; and software developers.

Refine Search

Showing 1,076 through 1,100 of 82,908 results