|
|
|
|
|
|
|
| |
|
Название: AI and IoT Technology and Applications for Smart Healthcare Systems Автор: Alex Khang Издательство: CRC Press Год: 2024 Страниц: 422 Язык: английский Формат: pdf (true) Размер: 30.4 MB
In recent years, the application of Artificial Intelligence (AI) and Internet of Things (IoT) technologies in smart healthcare has been increasing. We are approaching a world where connected smart devices tell people when they need to visit a doctor because these devices will be able to detect health problems and discover symptoms of illness that may need medical care. AI-collaborative IoT technologies can help medical professionals with decision-making. These technologies can also help develop a sustainable and smart healthcare system. Internet of Things (IoT)-enabled technologies and devices have several applications in healthcare. A larger role for IoT in healthcare would be beneficial for both patients and professionals. Medical apps for mobile devices and wearable technology that collect health information from patients are two examples of how healthcare IoT is being put to use. The Internet of Things is used in crisis facilities to follow the whereabouts of patients, clinical gear, and staff. IoT refers to the network of devices, sensors, and objects that are connected to the Internet, allowing them to communicate with each other and collect and transmit data. IoT technology provides capabilities such as identification, communication, services, computing, sensing, and data transfer. These functions enable various applications in healthcare and other fields. |
Разместил: Ingvar16 22-03-2024, 21:10 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Secure Coordination Control of Networked Robotic Systems: From a Control Theory Perspective Автор: Xiaolei Li, Jiange Wang, Xiaoyuan Luo, Xinping Guan Издательство: Springer Год: 2024 Страниц: 246 Язык: английский Формат: pdf (true), epub Размер: 32.3 MB
As a typical cyber-physical system (CPS), networked robotic systems refer to a collection of robotic devices or agents that are interconnected through a network, allowing them to communicate, share information, and coordinate their actions. These systems combine robotics with networked communication technologies to enable robots to work together or with other devices, often remotely, to perform tasks and achieve objectives. As one of the core equipments and actuators, robotic technology has attracted much attention and has made great progress. However, a single robotic system is often unable to handle complex tasks due to limitations in sensors, microprocessors, actuators, and the ability to handle complex situations. With the development of distributed control and microprocessing technology, networked robotic systems have greatly expanded their perceptual, computational, and execution capabilities, with high efficiency, low cost, and strong functionality advantages. In this book, we conduct research on the secure coordination problem of networked robotic systems from a control theory perspective, given the limited communication bandwidth and the increasingly prominent network security threats. This book showcases several continuous-time and event-triggered secure control design and analysis methods for networked robotic systems under different types of cyberattacks. |
Разместил: Ingvar16 21-03-2024, 17:36 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Healthcare Services in the Metaverse: Game Theory, AI, IoT, and Blockchain Автор: Saurav Mallik, Anjan Bandyopadhyay, Ruifeng Hu Издательство: CRC Press Год: 2024 Страниц: 241 Язык: английский Формат: pdf (true) Размер: 10.4 MB
This book focuses on game theory approaches utilized on various domains viz., IoT, blockchain and their applications to biomedical and healthcare services. The book bridges the gap between radiologists and Artificial Intelligence (AI)-driven automated systems by investigating various techniques such as game theoretic approach, blockchain technology basically utilized for security, and IoT applied on metaverse. Healthcare Services in the Metaverse: Game Theory, AI, IoT, and Blockchain, identifies the potential areas where game theory and block chain techniques can be harnessed in the metaverse. The book discusses the integration of virtual reality (VR) with augmented reality to identify the new emerging techniques in healthcare to metaverse, where doctors and/or patients can see any kind of operation in the VR metaverse. The authors use game theoretical and blockchain approaches to understand healthcare issues, with the aim of utilizing different technologies of metaverse platform for health informatics. This book is written to help healthcare practitioners and individuals across academia and research, as well as for those who work in biomedical, Internet of Things (IoT), Artificial Intelligence (AI), Metaverse, VR, blockchain, and related technologies. |
Разместил: Ingvar16 20-03-2024, 04:41 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Blockchain and Digital Twin Enabled IoT Networks: Privacy and Security Perspectives Автор: Randhir Kumar, Prabhat Kumar, Sobin C.C. Издательство: CRC Press Год: 2025 Страниц: 235 Язык: английский Формат: pdf (true) Размер: 10.1 MB
This book reviews research works in recent trends in blockchain, AI, and Digital Twin based IoT data analytics approaches for providing the privacy and security solutions for Fog-enabled IoT networks. Due to the large number of deployments of IoT devices, an IoT is the main source of data and a very high volume of sensing data is generated by IoT systems such as smart cities and smart grid applications. To provide a fast and efficient data analytics solution for Fog-enabled IoT systems is a fundamental research issue. For the deployment of the Fog-enabled-IoT system in different applications such as healthcare systems, smart cities and smart grid systems, security, and privacy of big IoT data and IoT networks are key issues. The current centralized IoT architecture is heavily restricted with various challenges such as single points of failure, data privacy, security, robustness, etc. This book emphasizes and facilitates a greater understanding of various security and privacy approaches using the advances in Digital Twin and Blockchain for data analysis using machine/deep learning, federated learning, edge computing and the countermeasures to overcome these vulnerabilities. |
Разместил: Ingvar16 19-03-2024, 21:15 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Toward Connected, Cooperative and Intelligent IoV: Frontier Technologies and Applications Автор: Kai Liu, Penglin Dai, Victor C. S. Lee, Joseph Kee-Yin Ng, Sang Hyuk Son Издательство: Springer Год: 2024 Страниц: 327 Язык: английский Формат: pdf (true) Размер: 23.5 MB
This book offers a comprehensive introduction to technological advances in Internet of Vehicles (IoV), including vehicular communications, vehicular system architectures, data dissemination algorithms, resource allocation schemes, and AI-enabled applications. It focuses on the state-of-the-art IoV with regard to three major directions, namely networking, cooperation, and intelligence, including advanced wireless communication technologies, algorithm theory, optimization mechanisms, and AI technologies. In addition, the book includes a number of case studies with system prototype implementation and hands-on experiments in IoV, making it suitable both as a technical reference work for professionals and as a textbook for graduate students. Driven by cutting-edge technologies on wireless communication, mobile computing, and Artificial Intelligence (AI), Internet of Vehicles (IoV) is thriving in an era of unprecedented development and innovation. On the other hand, the global automobile industry is accelerating its transformation towards electrification, networking, intelligence, and sharing, where IoV is emerging as the most fundamental platform for realizing future Intelligent Transportation Systems (ITSs) and smart cities. |
Разместил: Ingvar16 19-03-2024, 14:17 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Emerging Technologies and the Application of WSN and IoT: Smart Surveillance, Public Security, and Safety Challenges Автор: Shalli Rani Издательство: CRC Press Год: 2024 Страниц: 281 Язык: английский Формат: pdf (true) Размер: 17.1 MB
The Internet of Things (IoT) has numerous applications, including smart cities, industries, cloud-based apps, smart homes, and surveillance. The Internet of Things (IoT) enables smarter living by connecting devices, people, and objects. As networking became a crucial aspect of the Internet, rigorous design analysis led to the development of new research areas. The Internet of Things has revolutionized daily living in countless ways. It enables communication between buildings, people, portable gadgets, and vehicles, facilitating mobility. Smart cities and cloud-based data have transformed corporate practices. With billions of connected gadgets, everything will soon be able to communicate remotely. IoT networks, whether public or private, rely significantly on machine learning and software-defined networking. Indian and other governments have approved various research projects on IoT-based networking technologies. This field of study will significantly impact society in the future. This resource includes real-world applications and case studies for smart city technology, enormous data management, and Machine Learning prediction, all with confidentiality and safety problems. |
Разместил: Ingvar16 19-03-2024, 03:32 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Защита компьютерной информации. Эффективные методы и средства Автор: В. Ф. Шаньгин Издательство: ДМК Пресс Год: 2010 Cтраниц: 545 Формат: pdf/djvu Размер: 28 мб Язык: русский
Формулируются основные понятия и определения защиты информации, анализируются угрозы информационной безопасности в компьютерных системах и сетях. Обсуждаются базовые понятия и принципы политики безопасности. Анализируются международные и отечественные стандарты информационной безопасности. Описываются основные криптографические методы и алгоритмы защиты компьютерной информации. Обосновываются многоуровневая защита и комплексный подход к обеспечению информационной безопасности корпоративных систем и сетей. Рассматривается защита информации в распространенных операционных системах. Описываются базовые технологии защиты межсетевого обмена данными. Обсуждаются методы и средства антивирусной защиты. Описывается организационно-правовое обеспечение информационной безопасности на основе государственных стандартов и руководящих документов Государственной технической комиссии России. |
Разместил: rivasss 15-03-2024, 12:36 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Reliable and Intelligent Optimization in Multi-Layered Cloud Computing Architectures Автор: Madhusudhan H.S., Satish Kumar T., Punit Gupta Издательство: CRC Press Год: 2024 Страниц: 224 Язык: английский Формат: pdf (true) Размер: 10.1 MB
One of the major developments in the computing field is Cloud Computing, which enables users to do complicated computations that local devices are unable to handle. The finest feature of cloud computing is the pay-per-use model, which requires customers to pay only for the resources they use for a specified amount of time rather than receiving payment for the entire year or month. A collaborative environment is provided by multi-layered cloud computing, where diverse resources in the form of data centers support various services. Data centers are a diverse group of resources that are deployed across multiple geographic locations in multi-layered cloud computing and have varied computational capacity, architecture, and performance. Reliable and Intelligent Optimization in Multi-Layered Cloud Computing Architectures examines ways to meet these challenges. It discusses virtual machine placement techniques and task scheduling techniques that optimize resource utilization and minimize energy consumption of cloud data centers. Placement techniques presented can provide an optimal solution to the optimization problem using multiple objectives. The book focuses on basic design principles and analysis of virtual machine placement techniques and task allocation techniques. |
Разместил: Ingvar16 14-03-2024, 04:57 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Understand the Cyber Attacker Mindset: Build a Strategic Security Programme to Counteract Threats Автор: Sarah Armstrong-Smith Издательство: Kogan Page Limited Год: 2024 Страниц: 305 Язык: английский Формат: pdf (true), epub Размер: 17.3 MB
To counteract a cyber attacker, organizations need to learn to think like one.Understand the Cyber Attacker Mindset explores the psychology of cyber warfare and how organizations can defend themselves against attacks. This book provides a comprehensive look at the inner workings of cyber attackers in the digital age and presents a set of strategies that organizations can deploy to counteract them. With technological advancements in cybersecurity, attackers are increasingly falling back to social engineering and preying on people's vulnerabilities. This book examines different types of cyber attackers, explores their motivations, and examines the methods used. It also reviews key industry developments such as cybercrime as a service, brokers and syndicates, nation-sponsored actors, insider sabotage and the challenges faced by law enforcement in tracking and apprehending attackers. |
Разместил: Ingvar16 14-03-2024, 03:56 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: The Complete Internet Security Manual - 21th Edition 2024 Автор: Papercut Limited Издательство: Papercut Limited Год: 2024 Страниц: 196 Язык: английский Формат: pdf Размер: 83.6 MB
Вирусы, вредоносное ПО, ransomware, фишинг, мошенничество, фишинг и социальная инженерия... Необычные цифровые угрозы растут с каждым днем, и не проходит и дня, чтобы какая-нибудь атака не попала в новости. Данные стоят дороже нефти или золота, и ваши личные данные становятся мишенью для киберпреступников, мошенников и хакеров. Готовы ли вы встретить эту новую эру цифровых диверсий и краж? Сможет ли ваш компьютер с Windows выдержать неумолимый натиск современного кибермира? Мы поможем вам защитить ваш компьютер, сеть и устройства от подобных угроз и обезопасить вас от потенциальных угроз и атак с помощью нашего простого руководства. Родители и опекуны также могут узнать, как защитить своих детей в Интернете, а также получить советы от экспертов отрасли. Оставайтесь в безопасности и будьте готовы к предстоящим цифровым угрозам. |
Разместил: Ingvar16 13-03-2024, 05:15 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|