Design Automation and Applications for Emerging Reconfigurable Nanotechnologies


Book Description

This book is a single-source solution for anyone who is interested in exploring emerging reconfigurable nanotechnology at the circuit level. It lays down a solid foundation for circuits based on this technology having considered both manual as well as automated design flows. The authors discuss the entire design flow, consisting of both logic and physical synthesis for reconfigurable nanotechnology-based circuits. The authors describe how transistor reconfigurable properties can be exploited at the logic level to have a more efficient circuit design flow, as compared to conventional design flows suited for CMOS. Further, the book provides insights into hardware security features that can be intrinsically developed using the runtime reconfigurable features of this nanotechnology.




Information Security and Cryptology – ICISC 2022


Book Description

This book constitutes the refereed proceedings of the 25th International Conference, ICISC 2022, held in Seoul, South Korea, during November 30–December 2, 2022. The 24 full papers included in this book were carefully reviewed and selected from 69 submissions. They were organized in topical sections as follows: ​Public Key Encryption with Hierarchical Authorized Keyword Search, Implicit Key-stretching Security of Encryption Schemes.







Computer Vision – ECCV 2022


Book Description

The 39-volume set, comprising the LNCS books 13661 until 13699, constitutes the refereed proceedings of the 17th European Conference on Computer Vision, ECCV 2022, held in Tel Aviv, Israel, during October 23–27, 2022. The 1645 papers presented in these proceedings were carefully reviewed and selected from a total of 5804 submissions. The papers deal with topics such as computer vision; machine learning; deep neural networks; reinforcement learning; object recognition; image classification; image processing; object detection; semantic segmentation; human pose estimation; 3d reconstruction; stereo vision; computational photography; neural networks; image coding; image reconstruction; object recognition; motion estimation.




Trends in Functional Programming


Book Description

This book constitutes revised selected papers from the 24th International Symposium on Trends in Functional Programming, TFP 2023, held in Boston, MA, USA, during January 12–15, 2023. The 6 full papers presented in this volume were carefully reviewed and selected from 14 submissions. They span a wide variety of topics including DSL design and implementation, dependent type systems, instruction set architecture, data structures, and logic programming.




Advanced Boolean Techniques


Book Description

This book describes recent findings in the domain of Boolean logic and Boolean algebra, covering application domains in circuit and system design, but also basic research in mathematics and theoretical computer science. Content includes invited chapters and a selection of the best papers presented at the 15th annual International Workshop on Boolean Problems.




Neuromorphic Computing Systems for Industry 4.0


Book Description

As artificial intelligence (AI) processing moves from the cloud to the edge of the network, battery-powered and deeply embedded devices are challenged to perform AI functions such as computer vision and voice recognition. Microchip Technology Inc., via its Silicon Storage Technology (SST) subsidiary, is addressing this challenge by significantly reducing power with its analog memory technology, the memBrain Memory Solution. The memBrain solution is being adopted by today’s companies looking to advance machine learning capacities in edge devices. Due to its ability to significantly reduce power, this analog in-memory computer solution is ideal for an AI application. Neuromorphic Computing Systems for Industry 4.0 covers the available literature in the field of neural computing-based microchip technology. It provides further research opportunities in this dynamic field. Covering topics such as emotion recognition, biometric authentication, and neural network protection, this premier reference source is an essential resource for technology developers, computer scientists, engineers, students and educators of higher education, librarians, researchers, and academicians.




Codes, Cryptology and Information Security


Book Description

This book constitutes the refereed proceedings of the 4th International Conference on Codes, Cryptology and Information Security, C2SI 2023, held in Rabat, Morocco, during May 29–31, 2023. The 21 full papers included in this book were carefully reviewed and selected from 62 submissions. They were organized in topical sections as follows: Invited Papers, Cryptography, Information Security, Discrete Mathematics, Coding Theory.




Unlocking Artificial Intelligence


Book Description

This open access book provides a state-of-the-art overview of current machine learning research and its exploitation in various application areas. It has become apparent that the deep integration of artificial intelligence (AI) methods in products and services is essential for companies to stay competitive. The use of AI allows large volumes of data to be analyzed, patterns and trends to be identified, and well-founded decisions to be made on an informative basis. It also enables the optimization of workflows, the automation of processes and the development of new services, thus creating potential for new business models and significant competitive advantages. The book is divided in two main parts: First, in a theoretically oriented part, various AI/ML-related approaches like automated machine learning, sequence-based learning, deep learning, learning from experience and data, and process-aware learning are explained. In a second part, various applications are presented that benefit from the exploitation of recent research results. These include autonomous systems, indoor localization, medical applications, energy supply and networks, logistics networks, traffic control, image processing, and IoT applications. Overall, the book offers professionals and applied researchers an excellent overview of current exploitations, approaches, and challenges of AI/ML-related research.