MILCOM ...
Title | MILCOM ... PDF eBook |
Author | Institute of Electrical and Electronics Engineers |
Publisher | |
Pages | |
Release | 1900* |
Genre | |
ISBN |
MILCOM 2016
Title | MILCOM 2016 PDF eBook |
Author | |
Publisher | |
Pages | |
Release | 2016 |
Genre | |
ISBN | 9781509037810 |
International Reference Guide to Space Launch Systems
Title | International Reference Guide to Space Launch Systems PDF eBook |
Author | Steven J. Isakowitz |
Publisher | AIAA |
Pages | 622 |
Release | 1999 |
Genre | Reference |
ISBN | 9781563473531 |
This best-selling reference guide contains the most reliable and up-to-date material on launch programs in Brazil, China, Europe, India, Israel, Japan, Russia, Ukraine, and the United States. Packed with illustrations and figures, the third edition has been extensively updated and expanded, and offers a quick and easy data retrieval source for policymakers, planners, engineers, launch buyers, and students.
Mobile Edge Computing
Title | Mobile Edge Computing PDF eBook |
Author | Anwesha Mukherjee |
Publisher | Springer Nature |
Pages | 598 |
Release | 2021-11-18 |
Genre | Computers |
ISBN | 3030698939 |
Mobile Edge Computing (MEC) provides cloud-like subscription-oriented services at the edge of mobile network. For low latency and high bandwidth services, edge computing assisted IoT (Internet of Things) has become the pillar for the development of smart environments and their applications such as smart home, smart health, smart traffic management, smart agriculture, and smart city. This book covers the fundamental concept of the MEC and its real-time applications. The book content is organized into three parts: Part A covers the architecture and working model of MEC, Part B focuses on the systems, platforms, services and issues of MEC, and Part C emphases on various applications of MEC. This book is targeted for graduate students, researchers, developers, and service providers interested in learning about the state-of-the-art in MEC technologies, innovative applications, and future research directions.
Signal
Title | Signal PDF eBook |
Author | |
Publisher | |
Pages | 714 |
Release | 1999 |
Genre | Armed Forces |
ISBN |
Applied Soft Computing and Communication Networks
Title | Applied Soft Computing and Communication Networks PDF eBook |
Author | Sabu M. Thampi |
Publisher | Springer Nature |
Pages | 340 |
Release | 2021-07-01 |
Genre | Technology & Engineering |
ISBN | 9813361735 |
This book constitutes thoroughly refereed post-conference proceedings of the International Applied Soft Computing and Communication Networks (ACN 2020) held in VIT, Chennai, India, during October 14–17, 2020. The research papers presented were carefully reviewed and selected from several initial submissions. The book is directed to the researchers and scientists engaged in various fields of intelligent systems.
AI, Machine Learning and Deep Learning
Title | AI, Machine Learning and Deep Learning PDF eBook |
Author | Fei Hu |
Publisher | CRC Press |
Pages | 347 |
Release | 2023-06-05 |
Genre | Computers |
ISBN | 1000878872 |
Today, Artificial Intelligence (AI) and Machine Learning/ Deep Learning (ML/DL) have become the hottest areas in information technology. In our society, many intelligent devices rely on AI/ML/DL algorithms/tools for smart operations. Although AI/ML/DL algorithms and tools have been used in many internet applications and electronic devices, they are also vulnerable to various attacks and threats. AI parameters may be distorted by the internal attacker; the DL input samples may be polluted by adversaries; the ML model may be misled by changing the classification boundary, among many other attacks and threats. Such attacks can make AI products dangerous to use. While this discussion focuses on security issues in AI/ML/DL-based systems (i.e., securing the intelligent systems themselves), AI/ML/DL models and algorithms can actually also be used for cyber security (i.e., the use of AI to achieve security). Since AI/ML/DL security is a newly emergent field, many researchers and industry professionals cannot yet obtain a detailed, comprehensive understanding of this area. This book aims to provide a complete picture of the challenges and solutions to related security issues in various applications. It explains how different attacks can occur in advanced AI tools and the challenges of overcoming those attacks. Then, the book describes many sets of promising solutions to achieve AI security and privacy. The features of this book have seven aspects: This is the first book to explain various practical attacks and countermeasures to AI systems Both quantitative math models and practical security implementations are provided It covers both "securing the AI system itself" and "using AI to achieve security" It covers all the advanced AI attacks and threats with detailed attack models It provides multiple solution spaces to the security and privacy issues in AI tools The differences among ML and DL security and privacy issues are explained Many practical security applications are covered