- Table View
- List View
Harcourt Science Workbook
by Harcourt School PublishersTopics broadly covered in this book include investigating matter, energy, forces, earth cycles, space, land, plants and animals.
Hard Disk Drive: Mechatronics and Control (Automation and Control Engineering #23)
by Abdullah Al Mamun GuoXiao Guo Chao BiThe hard disk drive is one of the finest examples of the precision control of mechatronics, with tolerances less than one micrometer achieved while operating at high speed. Increasing demand for higher data density as well as disturbance-prone operating environments continue to test designers' mettle. Explore the challenges presented by modern hard disk drives and learn how to overcome them with Hard Disk Drive: Mechatronics and Control.Beginning with an overview of hard disk drive history, components, operating principles, and industry trends, the authors thoroughly examine the design and manufacturing challenges. They start with the head positioning servomechanism followed by the design of the actuator servo controller, the critical aspects of spindle motor control, and finally, the servo track writer, a critical technology in hard disk drive manufacturing. By comparing various design approaches for both single- and dual-stage servomechanisms, the book shows the relative pros and cons of each approach. Numerous examples and figures clarify and illustrate the discussion.Exploring practical issues such as models for plants, noise reduction, disturbances, and common problems with spindle motors, Hard Disk Drive: Mechatronics and Control avoids heavy theory in favor of providing hands-on insight into real issues facing designers every day.
Hard Facts About Soft Machines: The Ergonomics Of Seating
by Rani Lueder; Kageyu NoroAlthough work furniture has had so much more attention recently there is a long way to go before this is translated into action in the wider world. Increased international concern for the health and safety of people at work is one of the driving forces behind this book.; The Science of Seating brings together researchers in ergonomics and posture with industrial designers, to review and assess the current state of chair design, with implications for cultural, behavioural and occupational aspects of health. The contributions are a significant step in the science of seating and should lead to a better understanding of the mechanics, dynamics and the effects of seating on the sitter.; They point to ways in which seats might become easier-to-use and adjust, offering both comfort and postural support without compromising freedom of movement: and in the not-too-distant furture, "the intelligent chair" will "remember" the sitter's preferences for position, cushiness and so on.; Topics covered include: Adjustability, Anthropometics, Posture, Back Pain, Biomechanics, Seat Pressure Distributions, School children, Special Needs of Users, Design Applications, Industry Perspectives, VDT Standards.; It is aimed at researchers and practising seating designers, ergonomists, design engineers, occupational health workers and physiotherapists and furniture manufacturers.
Hard Fighting: Israel in Lebanon and Gaza
by David E. JohnsonLike Israel in 2006, the United States today is likely ill prepared for hybrid warfare. To identify lessons that the U. S. military might learn from the Israeli experience in Lebanon, the author examines the state of the Israeli military before the Second Lebanon War, the lessons it learned during that conflict, the reforms it undertook to address its deficiencies, and how it fared during Operation Cast Lead three years later.
Hard Hat Zone (Penguin Core Concepts)
by Theo BakerHard Hat Zone covers the concepts Community Workers & Helpers and Problem Solving.Construction sites are some of the most interesting places, especially for young boys. Join the workers as they use dump trucks, cranes, concrete mixers, backhoes, and payloaders to build a new skyscraper! Full of photographs, Hard Hat Zone is an exciting and informative read for children interested in how things are built.
Hard Landing: A gripping thriller set in a dangerous international airport (The\alex Shanahan Thrillers Ser. #1)
by Lynne HeitmanA gripping and fast-paced thriller introducing the resourceful and brilliant Alex Shanahan. Perfect for fans of Jeffery Deaver and James Patterson'Truly excellent . . . The best white-knuckle ride I've taken in a long time' LEE CHILD__________On a cold afternoon on the North Shore of Massachusetts, the body of Ellen Shepard is found. She leaves no family. She leaves no note. And she leaves vacant her position as the general manager of the notoriously brutal Majestic Airlines operation at Boston's airport.From the moment Alex Shanahan takes control of the operation, she is pulled into the menacing intrigue of her predecessor's death. She is welcomed by an obscene depiction of Ellen's dead body - a warning that secrets can kill and that once she knows them it will already too late.But Alex wants to know the truth. She follows the trail of corruption and betrayal from the loading ramp to the airline's executive suites. What she uncovers could bankrupt the airline and destroy the lives and careers of everyone involved. It could also cost Alex her life . . .__________Book 1 in the Alex Shanahan series
Hard Real-Time Computing Systems: Predictable Scheduling Algorithms and Applications
by Giorgio ButtazzoThis book is a basic treatise on real-time computing, with particular emphasis on predictable scheduling algorithms. The main objectives of the book are to introduce the basic concepts of real-time computing, illustrate the most significant results in the field, and provide the basic methodologies for designing predictable computing systems useful in supporting critical control applications.Hard Real-Time Computing Systems is written for instructional use and is organized to enable readers without a strong knowledge of the subject matter to quickly grasp the material. Technical concepts are clearly defined at the beginning of each chapter, and algorithm descriptions are corroborated through concrete examples, illustrations, and tables. This new, fourth edition includes new sections to explain the variable-rate task model, how to improve predictability and safety in cyber-physical real-time systems that exploit machine learning algorithms, additional coverage on Response Time Analysis, and a new chapter on implementing periodic real-time tasks under Linux..
Hard Rock Hydraulics: An Introduction to Modeling
by Fernando Olavo FrancissHard rock hydraulics concerns arrangements of adjoining intact rock blocks, occurring down to a depth of hundreds of meters, where groundwater percolates within the gaps between these blocks. During the last decades, technical papers related to successful or failed attempts for mining groundwater from hard rocks, and achievements or failures of public or mining developments with respect to these rocks, increased the knowledge of their hydraulics. Examples of activities where the mechanical behavior of these rocks highly interacts with their hydraulics are projects under the sea or groundwater level, such as open pits or underground mines, galleries, tunnels, shafts, underground hydropower plants, oil and LPG storage caverns, and deep disposal of hazardous waste. This book dedicated to hard rock hydraulics assumes some prior knowledge of hydraulics, geology, hydrogeology, and soil and rock mechanics. Chapter I discusses the main issues of modeling; chapter II covers the fundamentals of hard rock hydraulics; chapter III presents concepts regarding approximate solutions; chapter IV discusses data analysis for groundwater modeling; chapter V focuses on finite differences and chapter VI provides examples of some particular unusual applications. This book will help civil and mining engineers and also geologists to solve their practical problems in hydrogeology and public or mining projects.
Hard Rock Mine Reclamation: From Prediction to Management of Acid Mine Drainage
by Bruno Bussière Marie GuittonnyHard rock mines have significant effects on the territories where they operate, through both infrastructure construction as well as resource use. Due to their extractive activities, these mines store large quantities of wastes at the surface, which can be both physically and chemically unstable. Reclamation aims to return a mine site to a satisfactory state, meaning that the site should not threaten human health or security, should not generate in the long term any contaminant that could significantly affect the surrounding environment, and should be aesthetically acceptable to communities. This book focuses on the reclamation of waste storage areas, which constitute the main source of pollution during and after mine operations, and especially issues with acid mine drainage and neutral contaminated drainage. Features: Provides fundamental information and describes practical methods to reclaim mine-waste facilities Compares the different methods and illustrates their application at sites through case studies Identifies new reclamation issues and proposes solutions to address them Presents existing and new technologies to reclaim mine waste disposal areas from hard rock mines in different climatic conditions Integrates reclamation into mine operations and long term performance of techniques used through an interdisciplinary approach With mine site reclamation a young and still emerging science, the training needs for professionals and students working in this field are huge. This book is written from an engineering point of view and in it the authors identify new reclamation issues and propose well-tested as well as innovative approaches to addressing them. Students in graduate programs focused on mines and the environment as well as professionals already working in departments related to mine site reclamation will find this book to be a valuable and essential resource.
Hard Wired
by Len VlahosAfter fifteen-year-old Quinn learns that he is the first fully aware artificial intelligence, that his entire life is a lie, he feels entirely alone until he bonds with Shea, the real girl behind his virtual crush.
Hardrock Tunnel Boring Machines
by Bernhard Maidl Leonhard Schmid Willy Ritz Martin HerrenknechtThis book covers the fundamentals of tunneling machine technology: drilling, tunneling, waste removal and securing. It treats methods of rock classification for the machinery concerned as well as legal issues, using numerous example projects to reflect the state of technology, as well as problematic cases and solutions. The work is structured such that readers are led from the basics via the main functional elements of tunneling machinery to the different types of machine, together with their areas of application and equipment. The result is an overview of current developments. Close cooperation among the authors involved has created a book of equal interest to experienced tunnelers and newcomers.
Hardware Acceleration of Computational Holography
by Tomoyoshi Shimobaba Tomoyoshi ItoThis book explains the hardware implementation of computational holography and hardware acceleration techniques, along with a number ofconcrete example source codes that enable fast computation. Computational holography includes computer-based holographictechnologies such as computer-generated hologram and digital holography, for which acceleration of wave-optics computation is highly desirable.This book describes hardware implementations on CPUs (Central Processing Units), GPUs (Graphics Processing Units) and FPGAs (Field ProgrammableGate Arrays).This book is intended for readers involved in holography as well as anyone interested in hardware acceleration.
Hardware Accelerators in Data Centers
by Christoforos Kachris Babak Falsafi Dimitrios SoudrisThis book provides readers with an overview of the architectures, programming frameworks, and hardware accelerators for typical cloud computing applications in data centers. The authors present the most recent and promising solutions, using hardware accelerators to provide high throughput, reduced latency and higher energy efficiency compared to current servers based on commodity processors. Readers will benefit from state-of-the-art information regarding application requirements in contemporary data centers, computational complexity of typical tasks in cloud computing, and a programming framework for the efficient utilization of the hardware accelerators.
Hardware Architectures for Post-Quantum Digital Signature Schemes
by Deepraj Soni Kanad Basu Mohammed Nabeel Najwa Aaraj Marc Manzano Ramesh KarriThis book explores C-based design, implementation, and analysis of post-quantum cryptography (PQC) algorithms for signature generation and verification. The authors investigate NIST round 2 PQC algorithms for signature generation and signature verification from a hardware implementation perspective, especially focusing on C-based design, power-performance-area-security (PPAS) trade-offs and design flows targeting FPGAs and ASICs.Describes a comprehensive set of synthesizable c code base as well as the hardware implementations for the different types of PQC algorithms including lattice-based, code-based, and multivariate-based;Demonstrates the hardware (FPGA and ASIC) and hardware-software optimizations and trade-offs of the NIST round 2 signature-based PQC algorithms;Enables designers to build hardware implementations that are resilient to a variety of side-channels.
Hardware-Aware Probabilistic Machine Learning Models: Learning, Inference and Use Cases
by Wannes Meert Marian Verhelst Laura Isabel Galindez OlascoagaThis book proposes probabilistic machine learning models that represent the hardware properties of the device hosting them. These models can be used to evaluate the impact that a specific device configuration may have on resource consumption and performance of the machine learning task, with the overarching goal of balancing the two optimally. The book first motivates extreme-edge computing in the context of the Internet of Things (IoT) paradigm. Then, it briefly reviews the steps involved in the execution of a machine learning task and identifies the implications associated with implementing this type of workload in resource-constrained devices. The core of this book focuses on augmenting and exploiting the properties of Bayesian Networks and Probabilistic Circuits in order to endow them with hardware-awareness. The proposed models can encode the properties of various device sub-systems that are typically not considered by other resource-aware strategies, bringing about resource-saving opportunities that traditional approaches fail to uncover. The performance of the proposed models and strategies is empirically evaluated for several use cases. All of the considered examples show the potential of attaining significant resource-saving opportunities with minimal accuracy losses at application time. Overall, this book constitutes a novel approach to hardware-algorithm co-optimization that further bridges the fields of Machine Learning and Electrical Engineering.
Hardware Design for 3D Video Coding: Energy-efficient and High-throughput Architectures for Multiview Plus Depth Video Content (Synthesis Lectures on Engineering, Science, and Technology)
by Vladimir Afonso Murilo Perleberg Bruno Zatt Marcelo Porto Luciano Agostini Altamiro SusinThis book focuses on the research and development challenges posed by 3D video systems based on multi-view plus depth (MVD) technology. This technology can produce a realistic immersive experience generating synthetic video views on the decoder side, reducing the amount of information on the encoder side. The discussion presented in this book explores the MVD characteristics to propose high-throughput and energy-efficient architectures/systems, focusing on 3D-HEVC, the state-of-the-art standard for exploiting the MVD concept. The book includes an extensive discussion of the 3D-HEVC video encoding, followed by an in-depth evaluation of the 3D-HEVC reference software behavior. Then, the book presents in detail a set of high-throughput and energy-efficient architectures targeting the three main prediction steps inside the 3D-HEVC: intra-frame prediction, inter-frame prediction, and inter-view prediction.
Hardware for Quantum Computing
by Chuck EasttomThis book covers extensively the physical implementation of qubits and quantum architecture. The author demonstrates how quantum computing is implemented by the underlying physical implementation of qubits, including trapped ions, nitrogen vacancy centers, frozen neon, and other implementations. The book shows how, ultimately, the physical implementation of the qubit is the foundation of quantum computing, and that the choice of physical qubit will impact such things as decoherence times, computational efficiency, and even error rate. The book explores all the current approaches to physical qubit implementation and includes appendices that review basic quantum computing and physics.
The Hardware Hacker: Adventures in Making and Breaking Hardware
by Andrew Bunnie Huang<P>For over a decade, Andrew "bunnie" Huang, one of the world's most esteemed hackers, has shaped the fields of hacking and hardware, from his cult-classic book Hacking the Xbox to the open-source laptop Novena and his mentorship of various hardware startups and developers. In The Hardware Hacker, Huang shares his experiences in manufacturing and open hardware, creating an illuminating and compelling career retrospective. <P>Huang’s journey starts with his first visit to the staggering electronics markets in Shenzhen, with booths overflowing with capacitors, memory chips, voltmeters, and possibility. He shares how he navigated the overwhelming world of Chinese factories to bring chumby, Novena, and Chibitronics to life, covering everything from creating a Bill of Materials to choosing the factory to best fit his needs. <P>Through this collection of personal essays and interviews on topics ranging from the legality of reverse engineering to a comparison of intellectual property practices between China and the United States, bunnie weaves engineering, law, and society into the tapestry of open hardware. <P>With highly detailed passages on the ins and outs of manufacturing and a comprehensive take on the issues associated with open source hardware, The Hardware Hacker is an invaluable resource for aspiring hackers and makers.
Hardware Hacking Projects for Geeks
by Scott FullamPut a hacker in a room with a Furby for a weekend and you'll hear a conversation that's fairly one-sided in its originality. Toss in an 802.11b network card, a soldering iron, wire cutters, a logic probe, and a few other carefully selected tools and materials and you'll have potential. Add a copy of Hardware Hacking Projects for Geeks and by the end of the weekend that Furby will be saying things you never imagined. From building an Internet toaster to creating a cubicle intrusion detection system, Hardware Hacking Projects for Geeks offers an array of inventive, customized electronics projects for the geek who can't help looking at a gadget and wondering how it might be "upgraded." Beginning with basic hacks, tools, and techniques for those who may not have a background in electronics, the book covers the tools of the hardware hacking trade and basic soldering techniques, then moves into more advanced hacking projects. Clear step-by-step instructions allow even those with no formal electronics- or hardware-engineering skills to hack real hardware in very clever ways. Hacks in the book are rated on a scale of difficulty, cost, and duration. Projects range from those that are truly useful to some things you may have never thought to do, but which are really cool, such as: Building your own arcade game Making radio-controlled cars play laser tag Building an automobile periscope Hacking an 802.11b antenna Building a building size display Perhaps you're an electronics hobbyist who likes to learn by doing. Maybe you hack software and want to see how the other half lives. Or, maybe you've never hacked at all, but you'd like to get started quickly with some projects that do something interesting from the start. If you're any of these, then Hardware Hacking Projects for Geeks will indulge your inner mad scientist. Using the projects in this book as a jumping point for other new and clever hacks, it won't be long before you're looking around, asking, "I wonder what I can improve next?"
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers (Computer Architecture and Design Methodologies)
by Mustafa KhairallahThis book presents the use of tweakable block ciphers for lightweight authenticated encryption, especially applications targeted toward hardware acceleration where such efficient schemes have demonstrated competitive performance and strong provable security with large margins. The first part of the book describes and analyzes the hardware implementation aspects of state-of-the-art tweakable block cipher-based mode ΘCB3. With this approach, a framework for studying a class of tweakable block cipher-based schemes is developed and two family of authenticated encryption algorithms are designed for the lightweight standardization project initiated by the National Institute of Standards and Technology (NIST): Romulus and Remus. The Romulus family is a finalist for standardization and targets a wide range of applications and performance trade-offs which will prove interesting to engineers, hardware designers, and students who work in symmetric key cryptography.
Hardware Security: A Look into the Future
by Mark Tehranipoor Farimah Farahmandi Navid Asadizanjani Kimia Zamiri Azar Hadi Mardani Kamali Fahim RahmanThis book provides a look into the future of hardware and microelectronics security, with an emphasis on potential directions in security-aware design, security verification and validation, building trusted execution environments, and physical assurance. The book emphasizes some critical questions that must be answered in the domain of hardware and microelectronics security in the next 5-10 years: (i) The notion of security must be migrated from IP-level to system-level; (ii) What would be the future of IP and IC protection against emerging threats; (iii) How security solutions could be migrated/expanded from SoC-level to SiP-level; (iv) the advances in power side-channel analysis with emphasis on post-quantum cryptography algorithms; (v) how to enable digital twin for secure semiconductor lifecycle management; and (vi) how physical assurance will look like with considerations of emerging technologies. The main aim of this book is to serve as a comprehensive and concise roadmap for new learners and educators navigating the evolving research directions in the domain of hardware and microelectronic securities. Overall, throughout 11 chapters, the book provides numerous frameworks, countermeasures, security evaluations, and roadmaps for the future of hardware security.
Hardware Security and Trust
by Nicolas Sklavos Ricardo Chaves Giorgio Natale Francesco RegazzoniThis book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to address the conflict between testability and security, the authors describe innovative design-for-testability (DFT) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing, commercial tools. Secure protocols are discussed, which protect access to necessary test infrastructures and enable the design of secure access controllers.
Hardware Security: Challenges and Solutions
by Ashutosh Mishra Mrinal Goswami Manoj Kumar Navin Singh RajputThis book provides a comprehensive overview of hardware security challenges and solutions, making it an essential resource for engineers, researchers, and students in the field. The authors cover a wide range of topics, from hardware design and implementation to attack models and countermeasures. They delve into the latest research and industry practices in the field, including techniques for secure chip design, hardware Trojan detection, side-channel attack mitigation, the threats and vulnerabilities facing modern hardware, the design and implementation of secure hardware, and the latest techniques for testing and verifying the security of hardware systems. The book also covers emerging technologies such as quantum computing and the Internet of Things, and their impact on hardware security. With its practical approach and extensive coverage of the subject, this book is an ideal reference for anyone working in the hardware security industry.
Hardware Security Primitives
by Mark Tehranipoor Nitin Pundir Nidish Vashistha Farimah FarahmandiThis book provides an overview of current hardware security primitives, their design considerations, and applications. The authors provide a comprehensive introduction to a broad spectrum (digital and analog) of hardware security primitives and their applications for securing modern devices. Readers will be enabled to understand the various methods for exploiting intrinsic manufacturing and temporal variations in silicon devices to create strong security primitives and solutions. This book will benefit SoC designers and researchers in designing secure, reliable, and trustworthy hardware.Provides guidance and security engineers for protecting their hardware designs;Covers a variety digital and analog hardware security primitives and applications for securing modern devices;Helps readers understand PUF, TRNGs, silicon odometer, and cryptographic hardware design for system security.