×







We sell 100% Genuine & New Books only!

Fundamentals Of Computers at Meripustak

Fundamentals Of Computers by Tehreem Hussain, Excelic Press

Books from same Author: Tehreem Hussain

Books from same Publisher: Excelic Press

Related Category: Author List / Publisher List


  • Price: ₹ 16397.00/- [ 10.00% off ]

    Seller Price: ₹ 14757.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Tehreem Hussain
    PublisherExcelic Press
    ISBN9781642243581
    Pages382
    BindingHardcover
    LanguageEnglish
    Publish YearJanuary 2020

    Description

    Excelic Press Fundamentals Of Computers by Tehreem Hussain

    We have enjoyed explosive growth in the performance and capability of computer systems for over a decade. The beginning of computer and electronic devices has caused in extremely growth of data globally. This growth could be related with increase of novel and current technologies, the internet boom, the integration of electronic devices and the quest for human dependent information. Computer applications, architecture and technology have always been developing together with very strong interface and future will be no exemption in this regard. To understand the trends in computer technology, we need to requisite to analyze the directions in each of these aspects of developing computer technology. This book provides the wide-ranging information about the fundamentals of a computer system, like its architecture, memory management and hardware design, as well as design and performance analysis of the software that run on it. The book discusses the two prevalent cache architectures, namely inclusive and exclusive. New cache architecture for data only called two-type data cache proposed in the literature is presented in the following section. The performance of two-type data cache model is compared with inclusive and exclusive architectures. The energy consumed by inclusive and exclusive caches is mentioned. Methods to reduce the energy consumption are proposed for inclusive and exclusive cache architectures. The hardware and software methods for energy saving are proposed. Text primarily based passwords area unit normally used for authentication in computing surroundings. though passwords area unit thought-about because the initial line of protection for users however they continue to be straightforward to compromise. To improve the security of systems, various password composition polices are adopted. These policies make sure that users are created to decide on robust passwords that facilitate stop on-line breaches and knowledge leaks. However, it additionally build passwords troublesome to study and recall, decreasing theusability. In this book we investigated the usability of password policies and users’ perceptions of password security. Further, the book discloses on hardware design of moving object detection on reconfigurable system, and designing domain-specific heterogeneous architectures from dataflow programs. Additionally, the optimal hardware architecture for computer vision is also revealed. Although several tools has been used in analyzing and simulating big data processes, model base implementation tool are indeed scare, this book provides a soft-computing model in addressing Big data. Following with monitoring system to analyze incidents in computer network, the book further takes a look on automatic configurable hardware code generation for software-defined radios. IoT is a new paradigm in our everyday life. It is created through the interconnection of heterogeneous systems communicating by using different communication technologies. The future growth of IoT will lead to an important usage of technology in our daily life. Thus, this usage of technology aims to boost the human’s quality of life by facilitating everyday tasks. to confirm higher user expertise and improve the usage of IoT applications, a definite service level adore specific IoT services is required to encourage the users to use the IoT applications. Thus, this book closes with a specific mechanism for the lowest layer of our service level based IoT architecture. The book will serve a unique approach through these multi-disciplined topics to share different but thought-provoking interpretations on each of these topics.



    Book Successfully Added To Your Cart