- Добавил: literator
- Дата: 13-01-2023, 19:12
- Комментариев: 0
Название: Frontiers of Quality Electronic Design (QED): AI, IoT and Hardware Security
Автор: Ali Iranmanesh
Издательство: Springer
Год: 2023
Страниц: 619
Язык: английский
Формат: pdf (true)
Размер: 23.6 MB
Quality Electronic Design (QED)’s landscape spans a vast region where territories of many participating disciplines and technologies overlap. This book explores the latest trends in several key topics related to quality electronic design, with emphasis on Hardware Security, Cybersecurity, Machine Learning, and application of Artificial Intelligence (AI). The book includes topics in nonvolatile memories (NVM), Internet of Things (IoT), FPGA, and Neural Networks. Field programmable gate arrays (FPGAs) have gained popularity over the years and slowly made their way into advanced applications like Machine Learning, Artificial Intelligence, cloud services, military, and aerospace. Due to their flexibility in programming, FPGAs have become prevalent in system prototyping, hardware implementation for low-volume products, replacing obsolete components in legacy systems, and implementing hardware security modules.
Автор: Ali Iranmanesh
Издательство: Springer
Год: 2023
Страниц: 619
Язык: английский
Формат: pdf (true)
Размер: 23.6 MB
Quality Electronic Design (QED)’s landscape spans a vast region where territories of many participating disciplines and technologies overlap. This book explores the latest trends in several key topics related to quality electronic design, with emphasis on Hardware Security, Cybersecurity, Machine Learning, and application of Artificial Intelligence (AI). The book includes topics in nonvolatile memories (NVM), Internet of Things (IoT), FPGA, and Neural Networks. Field programmable gate arrays (FPGAs) have gained popularity over the years and slowly made their way into advanced applications like Machine Learning, Artificial Intelligence, cloud services, military, and aerospace. Due to their flexibility in programming, FPGAs have become prevalent in system prototyping, hardware implementation for low-volume products, replacing obsolete components in legacy systems, and implementing hardware security modules.