This book discusses the details of random number generation (RNG) as a key technology that is used for information security in various fields, such as electronic commerce and authentication.
This book discusses the details of random number generation (RNG) as a key technology that is used for information security in various fields, such as electronic commerce and authentication.
This book discusses the complex technology of building CMOS computer chips and covers some of the unusual problems that can occur during chip manufacturing.
This book discusses the complex technology of building CMOS computer chips and covers some of the unusual problems that can occur during chip manufacturing.
Working in the ever-evolving field of smart chip design within an AI-powered design environment, the authors of this book draw on their experiences in successfully developing system-on-chip (SoC) solutions, having grappled with the emerging design environment, innovative tools, domain-specific challenges, and major design decisions for SOC-based solutions.
This book provides a comprehensive overview of hardware security challenges and solutions, making it an essential resource for engineers, researchers, and students in the field.
This book provides a comprehensive overview of hardware security challenges and solutions, making it an essential resource for engineers, researchers, and students in the field.
This book focuses on the emerging topic of embedded artificial intelligence and provides a systematic summary of its principles, platforms, and practices.
This book focuses on the emerging topic of embedded artificial intelligence and provides a systematic summary of its principles, platforms, and practices.
Discover ground-breaking advancements in wireless biomedical device technology with our comprehensive book, which delves into the latest innovations revolutionizing HealthcareChapter 1 introduces wireless power transfer (WPT) techniques, offering a solution to the frequent battery replacements required by cardiovascular implantable medical devices (cIMDs).
This book provides readers with an overview of the next generation of Cloud computing with AI, evolving to minimize latency and address privacy/security concerns of many customers.
This book provides readers with an overview of the next generation of Cloud computing with AI, evolving to minimize latency and address privacy/security concerns of many customers.
This book deals with formal and practical approaches for early fast modeling and verification of complex digital processor hardware and software using SystemC-based virtual prototypes.
This book deals with formal and practical approaches for early fast modeling and verification of complex digital processor hardware and software using SystemC-based virtual prototypes.
This book describes machine learning-based new principles, methods of design and optimization of high-speed integrated circuits, included in one electronic system, which can exchange information between each other up to 128/256/512 Gbps speed.
This book describes machine learning-based new principles, methods of design and optimization of high-speed integrated circuits, included in one electronic system, which can exchange information between each other up to 128/256/512 Gbps speed.
This book provides a comprehensive overview of security vulnerabilities and state-of-the-art countermeasures using explainable artificial intelligence (AI).
This book provides a comprehensive overview of security vulnerabilities and state-of-the-art countermeasures using explainable artificial intelligence (AI).