You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book offers the latest research results in security and privacy for Intelligent Edge Computing Systems. It presents state-of-the art content and provides an in-depth overview of the basic background in this related field. Practical areas in both security and risk analysis are addressed as well as connections directly linked to Edge Computing paradigms. This book also offers an excellent foundation on the fundamental concepts and principles of security, privacy and risk analysis in Edge Computation infrastructures. It guides the reader through the core ideas with relevant ease. Edge Computing has burst onto the computational scene offering key technologies for allowing more flexibility a...
Mechatronics and automation technology has led to technological change and innovation in all engineering fields, affecting various disciplines, including machine technology, electronics, and computing. It plays a vital role in improving production efficiency, reducing energy consumption and improving product quality and safety, and will be central to the further advancement of technology and industry, bringing convenience and innovation to even more areas. This book presents the proceedings of ICMAT 2023, the 2nd International Conference on Mechatronics and Automation Technology, held as a virtual event on 27 October 2023. The aim of the conference was to provide a platform for scientists, s...
Applied mathematics, together with modeling and computer simulation, is central to engineering and computer science and remains intrinsically important in all aspects of modern technology. This book presents the proceedings of AMMCS 2022, the 2nd International Conference on Applied Mathematics, Modeling and Computer Simulation, held in Wuhan, China, on 13 and 14 August 2022, with online presentations available for those not able to attend in person due to continuing pandemic restrictions. The conference served as an open forum for the sharing and spreading of the newest ideas and latest research findings among all those involved in any aspect of applied mathematics, modeling and computer sim...
This book addresses the issues with privacy and security in Internet of things (IoT) networks which are susceptible to cyber-attacks and proposes deep learning-based approaches using artificial neural networks models to achieve a safer and more secured IoT environment. Due to the inadequacy of existing solutions to cover the entire IoT network security spectrum, the book utilizes artificial neural network models, which are used to classify, recognize, and model complex data including images, voice, and text, to enhance the level of security and privacy of IoT. This is applied to several IoT applications which include wireless sensor networks (WSN), meter reading transmission in smart grid, vehicular ad hoc networks (VANET), industrial IoT and connected networks. The book serves as a reference for researchers, academics, and network engineers who want to develop enhanced security and privacy features in the design of IoT systems.
This is the proceedings of the International Conference On Computational Vision and Bio Inspired Computing (ICCVBIC 2017) held at RVS Technical Campus, September 21-22, 2017. It includes papers on state of the art innovations in bio-inspired computing applications, where new algorithms and results are produced and described. Additionally, this volume addresses evolutionary computation paradigms, artificial neural networks and biocomputing. It focuses mainly on research based on visual interference on the basis of biological images. Computation of data sources also plays a major role in routine day-to-day life for the purposes such as video transmission, wireless applications, fingerprint recognition and processing, big data intelligence, automation, human centric recognition systems. With the advantage of processing bio-inspired computations, a variety of computational paradigms can be processed. Finally, this book also treats the formation of neural networks by enabling local connectivity within it with the aid of vision sensing elements. The work also provides potential directions for future research.
This book promotes and facilitates exchanges of research knowledge and findings across different disciplines on the design and investigation of machine learning-based data analytics of IoT infrastructures. This book is focused on the emerging trends, strategies, and applications of IoT in both healthcare and industry data analytics perspectives. The data analytics discussed are relevant for healthcare and industry to meet many technical challenges and issues that need to be addressed to realize this potential. The IoT discussed helps to design and develop the intelligent medical and industry solutions assisted by data analytics and machine learning. At the end of every chapter readers are encouraged to check their understanding by means of brainstorming summary, discussion, exercises and solutions.
As the progression of the internet continues, society is finding easier, quicker ways of simplifying their needs with the use of technology. With the growth of lightweight devices, such as smart phones and wearable devices, highly configured hardware is in heightened demand in order to process the large amounts of raw data that are acquired. Connecting these devices to fog computing can reduce bandwidth and latency for data transmission when associated with centralized cloud solutions and uses machine learning algorithms to handle large amounts of raw data. The risks that accompany this advancing technology, however, have yet to be explored. Architecture and Security Issues in Fog Computing ...