You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
None
Research in Artificial Intelligence (AI) is not new, it has been around since 1950’s. AI resurfaced at that time while Moore’s law was on an aggressive path of scaling, with the transformation of NMOS and later bipolar technology to CMOS for high performance, low power as well as low cost applications.Several breakthroughs in the electronics industry helped to push Moore’s law in chip miniaturization along with increased computing power (parallel and distributed processing) and memory bandwidth. Once this paradigm shift occurred it naturally opened doors for AI as it required big data manipulations, and thus AI could thrive again. AI has already shown success in industries such as fina...
This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios. Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer thr...
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledg
This thesis addresses the need to balance the use of facial recognition systems with the need to protect personal privacy in machine learning and biometric identification. As advances in deep learning accelerate their evolution, facial recognition systems enhance security capabilities, but also risk invading personal privacy. Our research identifies and addresses critical vulnerabilities inherent in facial recognition systems, and proposes innovative privacy-enhancing technologies that anonymize facial data while maintaining its utility for legitimate applications. Our investigation centers on the development of methodologies and frameworks that achieve k-anonymity in facial datasets; levera...
Noting the need for clear and detailed information on Chinese herbal medicine, Jennes presents a volume (a reprint from 2004) for practitioners, students, pharmacologists, and researchers. He covers the potential for toxicity in general, types of interactions, and medicines that have been noted as harmful. The bulk of the book comprises 100 formula