High Speed Serdes Devices and Applications


Book Description

The simplest method of transferring data through the inputs or outputs of a silicon chip is to directly connect each bit of the datapath from one chip to the next chip. Once upon a time this was an acceptable approach. However, one aspect (and perhaps the only aspect) of chip design which has not changed during the career of the authors is Moore’s Law, which has dictated substantial increases in the number of circuits that can be manufactured on a chip. The pin densities of chip packaging technologies have not increased at the same pace as has silicon density, and this has led to a prevalence of High Speed Serdes (HSS) devices as an inherent part of almost any chip design. HSS devices are the dominant form of input/output for many (if not most) high-integration chips, moving serial data between chips at speeds up to 10 Gbps and beyond. Chip designers with a background in digital logic design tend to view HSS devices as simply complex digital input/output cells. This view ignores the complexity associated with serially moving billions of bits of data per second. At these data rates, the assumptions associated with digital signals break down and analog factors demand consideration. The chip designer who oversimplifies the problem does so at his or her own peril.




Information and Communication Technologies


Book Description

This book constitutes the proceedings of the International Conference on Information and Communication Technologies held in Kochi, Kerala, India in September 2010.










Forensic Computing


Book Description

In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how the contents of computer systems can be recovered, even when hidden or subverted by criminals. Equally important, they demonstrate how to insure that computer evidence is admissible in court. Updated to meet ACPO 2003 guidelines, Forensic Computing: A Practitioner's Guide offers: methods for recovering evidence information from computer systems; principles of password protection and data encryption; evaluation procedures used in circumventing a system’s internal security safeguards, and full search and seizure protocols for experts and police officers.




5G Wireless Technologies


Book Description

Mobile data traffic is expected to exceed traffic from wired devices in the next couple of years. This book presents a roadmap of 5G, from advanced radio technologies to innovative resource management approaches and novel network architectures and system concepts.




The Handbook of Human-Machine Interaction


Book Description

The Handbook of Human-Machine Interaction features 20 original chapters and a conclusion focusing on human-machine interaction (HMI) from analysis, design and evaluation perspectives. It offers a comprehensive range of principles, methods, techniques and tools to provide the reader with a clear knowledge of the current academic and industry practice and debate that define the field. The text considers physical, cognitive, social and emotional aspects and is illustrated by key application domains such as aerospace, automotive, medicine and defence. Above all, this volume is designed as a research guide that will both inform readers on the basics of human-machine interaction from academic and industrial perspectives and also provide a view ahead at the means through which human-centered designers, including engineers and human factors specialists, will attempt to design and develop human-machine systems.




Principles of Communication


Book Description




Toeplitz and Circulant Matrices


Book Description

The fundamental theorems on the asymptotic behavior of eigenvalues, inverses, and products of banded Toeplitz matrices and Toeplitz matrices with absolutely summable elements are derived in a tutorial manner. Mathematical elegance and generality are sacrificed for conceptual simplicity and insight in the hope of making these results available to engineers lacking either the background or endurance to attack the mathematical literature on the subject. By limiting the generality of the matrices considered, the essential ideas and results can be conveyed in a more intuitive manner without the mathematical machinery required for the most general cases. As an application the results are applied to the study of the covariance matrices and their factors of linear models of discrete time random processes. The fundamental theorems on the asymptotic behavior of eigenvalues, inverses, and products of banded Toeplitz matrices and Toeplitz matrices with absolutely summable elements are derived in a tutorial manner. Mathematical elegance and generality are sacrificed for conceptual simplicity and insight in the hope of making these results available to engineers lacking either the background or endurance to attack the mathematical literature on the subject. By limiting the generality of the matrices considered, the essential ideas and results can be conveyed in a more intuitive manner without the mathematical machinery required for the most general cases. As an application the results are applied to the study of the covariance matrices and their factors of linear models of discrete time random processes.




IEEE Guide for Protective Relay Applications to Transmission Lines


Book Description

This newly developed guide compiles information on the application considerations of protective relays to ac transmission lines. The guide describes accepted transmission line protection schemes and the different electrical system parameters and situations that affect their application. Its purpose is to provide a reference for the selection of relay schemes and to assist less experienced protective relaying engineers in their application.