Download or read book Mobile Edge Computing written by Anwesha Mukherjee and published by Springer Nature. This book was released on 2021-11-18 with total page 598 pages. Available in PDF, EPUB and Kindle. Book excerpt: Mobile Edge Computing (MEC) provides cloud-like subscription-oriented services at the edge of mobile network. For low latency and high bandwidth services, edge computing assisted IoT (Internet of Things) has become the pillar for the development of smart environments and their applications such as smart home, smart health, smart traffic management, smart agriculture, and smart city. This book covers the fundamental concept of the MEC and its real-time applications. The book content is organized into three parts: Part A covers the architecture and working model of MEC, Part B focuses on the systems, platforms, services and issues of MEC, and Part C emphases on various applications of MEC. This book is targeted for graduate students, researchers, developers, and service providers interested in learning about the state-of-the-art in MEC technologies, innovative applications, and future research directions.
Download or read book Proceedings of Third International Conference on Sustainable Expert Systems written by Subarna Shakya and published by Springer Nature. This book was released on 2023-02-22 with total page 1025 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book features high-quality research papers presented at the 3rd International Conference on Sustainable Expert Systems (ICSES 2022), held in Nepal during September 9–10, 2022. The book focuses on the research information related to artificial intelligence, sustainability and expert systems applied in almost all the areas of industries, government sectors and educational institutions worldwide. The main thrust of the book is to publish the conference papers that deal with the design, implementation, development, testing and management of intelligent and sustainable expert systems and also to provide both theoretical and practical guidelines for the deployment of these systems.
Download or read book Proceedings of International Conference on Communication Circuits and Systems written by Sukanta Kumar Sabut and published by Springer Nature. This book was released on 2021-04-02 with total page 575 pages. Available in PDF, EPUB and Kindle. Book excerpt: The book proposes new technologies and discusses innovative solutions to various problems in the field of communication, circuits, and systems, as reflected in high-quality papers presented at International Conference on Communication, Circuits, and Systems (IC3S 2020) held at KIIT, Bhubaneswar, India from 16 – 18 October 2020. It brings together new works from academicians, scientists, industry professionals, scholars, and students together to exchange research outcomes and open up new horizons in the areas of signal processing, communications, and devices.
Download or read book NASA Formal Methods written by Aaron Dutle and published by Springer Nature. This book was released on 2021-05-19 with total page 402 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the proceedings of the 13th International Symposium on NASA Formal Methods, NFM 2021, held virtually in May 2021. The 21 full and 3 short papers presented in this volume were carefully reviewed and selected from 66 submissions. The papers aim to identify challenges and provide solutions to achieve assurance in mission-critical and safety-critical systems. Examples of such systems include advanced separation assurance algorithms for aircraft, next-generation air transportation, autonomous rendezvous and docking of spacecraft, on-board software for unmanned aerial systems (UAS), UAS traffic management, autonomous robots, and systems for fault detection, diagnosis, and prognostics.
Download or read book Proceedings of International Conference on Computational Intelligence written by Ritu Tiwari and published by Springer Nature. This book was released on with total page 714 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Extended Selected Papers of the 14th International Conference on Information Intelligence Systems and Applications written by Nikolaos Bourbakis and published by Springer Nature. This book was released on with total page 439 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Emerging Technology Trends in Internet of Things and Computing written by Panos Liatsis and published by Springer Nature. This book was released on 2022-03-24 with total page 391 pages. Available in PDF, EPUB and Kindle. Book excerpt: This volume constitutes selected papers presented at the First International Conference on Emerging Technology Trends in IoT and Computing, TIOTC 2021, held in Erbil, Iraq, in June 2021. The 26 full papers were thoroughly reviewed and selected from 182 submissions. The papers are organized in the following topical sections: Internet of Things (IOT): services and applications; Internet of Things (IOT) in healthcare industry; IOT in networks, communications and distributed computing; real world application fields in information science and technology.
Download or read book IoT for Defense and National Security written by Robert Douglass and published by John Wiley & Sons. This book was released on 2023-01-19 with total page 532 pages. Available in PDF, EPUB and Kindle. Book excerpt: IoT for Defense and National Security Practical case-based guide illustrating the challenges and solutions of adopting IoT in both secure and hostile environments IoT for Defense and National Security covers topics on IoT security, architecture, robotics, sensing, policy, operations, and more, including the latest results from the premier IoT research initiative of the U.S. Defense Department, the Internet of Battle Things. The text also discusses challenges in converting defense industrial operations to IoT and summarizes policy recommendations for regulating government use of IoT in free societies. As a modern reference, this book covers multiple technologies in IoT including survivable tactical IoT using content-based routing, mobile ad-hoc networks, and electronically formed beams. Examples of IoT architectures include using KepServerEX for edge connectivity and AWS IoT Core and Amazon S3 for IoT data. To aid in reader comprehension, the text uses case studies illustrating the challenges and solutions for using robotic devices in defense applications, plus case studies on using IoT for a defense industrial base. Written by leading researchers and practitioners of IoT technology for defense and national security, IoT for Defense and National Security also includes information on: Changes in warfare driven by IoT weapons, logistics, and systems IoT resource allocation (monitoring existing resources and reallocating them in response to adversarial actions) Principles of AI-enabled processing for Internet of Battlefield Things, including machine learning and inference Vulnerabilities in tactical IoT communications, networks, servers and architectures, and strategies for securing them Adapting rapidly expanding commercial IoT to power IoT for defense For application engineers from defense-related companies as well as managers, policy makers, and academics, IoT for Defense and National Security is a one-of-a-kind resource, providing expansive coverage of an important yet sensitive topic that is often shielded from the public due to classified or restricted distributions.
Download or read book Blockchain and Applications written by Javier Prieto and published by Springer Nature. This book was released on 2021-09-02 with total page 383 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the refereed proceedings of the 1st International Congress on Blockchain and Applications 2021, BLOCKCHAIN’21, held in Salamanca, Spain, in October 2021. Among the scientific community, blockchain and artificial intelligence are a promising combination that will transform the production and manufacturing industry, media, finance, insurance, e-government, etc. Nevertheless, there is no consensus with schemes or best practices that would specify how blockchain and artificial intelligence should be used together. The 38 full papers presented were carefully reviewed and selected from over 44 submissions. They contain the latest advances on blockchain and artificial intelligence and on their application domains, exploring innovative ideas, guidelines, theories, models, technologies, and tools and identifying critical issues and challenges that researchers and practitioners must deal with in future research.
Download or read book Advanced Network Technologies and Intelligent Computing written by Isaac Woungang and published by Springer Nature. This book was released on 2022-02-17 with total page 852 pages. Available in PDF, EPUB and Kindle. Book excerpt: This volume constitutes the selected papers presented at the First International Conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2021, hed in Varanasi, India, in December 2021. Due to the COVID-19 pandemic the conference was held online. The 61 papers presented were thoroughly reviewed and selected from 593 submissions. They are organized in topical sections on advanced network technologies and intelligent computing. ;
Download or read book AI Machine Learning and Deep Learning written by Fei Hu and published by CRC Press. This book was released on 2023-06-05 with total page 420 pages. Available in PDF, EPUB and Kindle. Book excerpt: Today, Artificial Intelligence (AI) and Machine Learning/ Deep Learning (ML/DL) have become the hottest areas in information technology. In our society, many intelligent devices rely on AI/ML/DL algorithms/tools for smart operations. Although AI/ML/DL algorithms and tools have been used in many internet applications and electronic devices, they are also vulnerable to various attacks and threats. AI parameters may be distorted by the internal attacker; the DL input samples may be polluted by adversaries; the ML model may be misled by changing the classification boundary, among many other attacks and threats. Such attacks can make AI products dangerous to use. While this discussion focuses on security issues in AI/ML/DL-based systems (i.e., securing the intelligent systems themselves), AI/ML/DL models and algorithms can actually also be used for cyber security (i.e., the use of AI to achieve security). Since AI/ML/DL security is a newly emergent field, many researchers and industry professionals cannot yet obtain a detailed, comprehensive understanding of this area. This book aims to provide a complete picture of the challenges and solutions to related security issues in various applications. It explains how different attacks can occur in advanced AI tools and the challenges of overcoming those attacks. Then, the book describes many sets of promising solutions to achieve AI security and privacy. The features of this book have seven aspects: This is the first book to explain various practical attacks and countermeasures to AI systems Both quantitative math models and practical security implementations are provided It covers both "securing the AI system itself" and "using AI to achieve security" It covers all the advanced AI attacks and threats with detailed attack models It provides multiple solution spaces to the security and privacy issues in AI tools The differences among ML and DL security and privacy issues are explained Many practical security applications are covered
Download or read book Computational Intelligence in Data Mining written by Janmenjoy Nayak and published by Springer Nature. This book was released on 2022-05-06 with total page 757 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book addresses different methods and techniques of integration for enhancing the overall goal of data mining. The book is a collection of high-quality peer-reviewed research papers presented in the Sixth International Conference on Computational Intelligence in Data Mining (ICCIDM 2021) held at Aditya Institute of Technology and Management, Tekkali, Andhra Pradesh, India, during December 11–12, 2021. The book addresses the difficulties and challenges for the seamless integration of two core disciplines of computer science, i.e., computational intelligence and data mining. The book helps to disseminate the knowledge about some innovative, active research directions in the field of data mining, machine and computational intelligence, along with some current issues and applications of related topics.
Download or read book Advances in Information and Communication written by Kohei Arai and published by Springer Nature. This book was released on with total page 675 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Micro Electronics and Telecommunication Engineering written by Devendra Kumar Sharma and published by Springer Nature. This book was released on 2022-02-28 with total page 813 pages. Available in PDF, EPUB and Kindle. Book excerpt: The book presents high-quality papers from the Fourth International Conference on Microelectronics and Telecommunication Engineering (ICMETE 2021). It discusses the latest technological trends and advances in major research areas such as microelectronics, wireless communications, optical communication, signal processing, image processing, big data, cloud computing, artificial intelligence and sensor network applications. This book includes the contributions of national and international scientists, researchers, and engineers from both academia and the industry. The contents of this volume will be useful to researchers, professionals, and students alike.
Download or read book Blockchain Cybersecurity Trust and Privacy written by Kim-Kwang Raymond Choo and published by Springer Nature. This book was released on 2020-03-02 with total page 291 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace. Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data. Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP’s issues in the digital world. Topics of interest for this book include but not limited to: Blockchain-based authentication, authorization and accounting mechanisms Applications of blockchain technologies in digital forensic and threat hunting Blockchain-based threat intelligence and threat analytics techniques Formal specification of smart contracts Automated tools for outsmarting smart contracts Security and privacy aspects of blockchain technologies Vulnerabilities of smart contracts Blockchain for securing cyber infrastructure and internet of things networks Blockchain-based cybersecurity education systems This book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data will find this book useful as well.
Download or read book Science of Cyber Security written by Chunhua Su and published by Springer Nature. This book was released on 2022-09-29 with total page 575 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the proceedings of the 4th International Conference on Science of Cyber Security, SciSec 2022, held in Matsu, Japan in August 2022. The 36 full papers presented in this volume were carefully reviewed and selected from 88 submissions. The papers are organized in the following topical sections: blockchain and applications; cryptography and applications; network security; cyber-physical system; malware; mobile system security; system and web security; security in financial industry; social engineering and personalized security; privacy and anonymity.
Download or read book Joint Communications and Sensing written by Kai Wu and published by John Wiley & Sons. This book was released on 2022-12-13 with total page 327 pages. Available in PDF, EPUB and Kindle. Book excerpt: Authoritative resource systematically introducing JCAS technologies and providing valuable information and knowledge to researchers and engineers Based on over six years of dedicated research to joint communications and sensing (JCAS) by the authors and their collaborators and students, Joint Communications and Sensing is the first book to comprehensively cover the subject of JCAS, which is expected to deliver huge cost and energy savings, and therefore has become a hallmark of future 6G and next generation radar technologies. The book has three parts. Part I presents the basic JCAS concepts and applications and the basic signal processing algorithms to support JCAS. Part II covers communications-centric JCAS designs that describe how sensing can be integrated into communications networks such as 5G and 6G. Part III presents ways to integrate communications in various radar sensing technologies and platforms. Specific sample topics covered in Joint Communications and Sensing include: Three categories of JCAS systems, potential sensing applications of JCAS, signal processing fundamentals, and channel models for communications and radar Frameworks for perceptive mobile networks (PMNs), system modifications to enable PMN sensing, and PMN system issues Orthogonal time-frequency space waveform-based JCAS for IoT, including signal models, echo pre-processing, and target parameter estimation Joint Communications and Sensing provides valuable information and knowledge to researchers and engineers in the communications and radar sensing communities and industries, enabling them to upskill and prepare for JCAS technology research and development. The text is of particular interest to engineers in the wireless communications industry who are pursuing new capabilities in 6G.