Добавить в избранное
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Найти книгу:
Вход на сайт


Название: Federated Learning for Future Intelligent Wireless Networks
Автор: Yao Sun, Chaoqun You, Gang Feng
Издательство: Wiley-IEEE Press
Год: 2024
Страниц: 306
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Explore the concepts, algorithms, and applications underlying Federated Learning. In Federated Learning for Future Intelligent Wireless Networks, a team of distinguished researchers deliver a robust and insightful collection of resources covering the foundational concepts and algorithms powering Federated Learning, as well as explanations of how they can be used in wireless communication systems. The editors have included works that examine how communication resource provision affects Federated Learning performance, accuracy, convergence, scalability, and security and privacy. Federated Learning (FL) has been widely acknowledged as one of the most essential enablers to bring network edge intelligence into reality, as it can enable collaborative training of ML models while enhancing individual user privacy and data security. Empowered by the growing computing capabilities of UEs, FL trains ML models locally on each device where the raw data never leaves the device. Specifically, FL uses an iterative approach that requires a number of global iterations to achieve a global model accuracy. In each global iteration, UEs take a number of local iterations up to a local model accuracy. This book would explore recent advances in the theory and practice of FL, especially when it is applied to wireless communication systems.
Разместил: Ingvar16 21-02-2024, 05:35 | Комментарии: 0 | Подробнее
Название: Communication Efficient Federated Learning for Wireless Networks
Автор: Mingzhe Chen, Shuguang Cui
Издательство: Springer
Серия: Wireless Networks
Год: 2024
Страниц: 189
Язык: английский
Формат: pdf (true), epub
Размер: 24.2 MB

This book provides a comprehensive study of Federated Learning (FL) over wireless networks. It consists of three main parts: (a) Fundamentals and preliminaries of FL, (b) analysis and optimization of FL over wireless networks, and © applications of wireless FL for Internet-of-Things systems. In particular, in the first part, the authors provide a detailed overview on widely-studied FL framework. In the second part of this book, the authors comprehensively discuss three key wireless techniques including wireless resource management, quantization, and over-the-air computation to support the deployment of FL over realistic wireless networks. It also presents several solutions based on optimization theory, graph theory and machine learning to optimize the performance of FL over wireless networks. In the third part of this book, the authors introduce the use of wireless FL algorithms for autonomous vehicle control and mobile edge computing optimization. Machine Learning and data-driven approaches have recently received considerable attention as key enablers for next-generation intelligent networks. Currently, most existing learning solutions for wireless networks rely on centralizing the training and inference processes by uploading data generated at edge devices to data centers.
Разместил: Ingvar16 21-02-2024, 04:44 | Комментарии: 0 | Подробнее
Название: Learning Techniques for the Internet of Things
Автор: Praveen Kumar Donta, Abhishek Hazra, Lauri Loven
Издательство: Springer
Год: 2024
Страниц: 334
Язык: английский
Формат: pdf (true), epub
Размер: 31.7 MB

Learning for the Internet of Things is a combination of advanced learning techniques for the Internet of Things (IoT) encompassing a range of cutting-edge approaches, including Deep Learning with CNNs, RNNs, and transformers, Federated Learning, edge AI for local data processing, reinforcement learning for autonomous decision-making, and their applications in real time. The book is structured into thirteen chapters; each comes with its own dedicated contributions and future research directions. Chapter 1 introduces IoT and the use of Edge computing, particularly cloud computing, and mobile edge computing. This chapter also mentions the use of edge computing in various real-time applications such as healthcare, manufacturing, agriculture, and transportation. Chapter 2 motivates mathematical modeling for Federated Learning systems with respect to IoT and its applications. Further Chapter 3 extends the discussion of Federated Learning for IoT, which has emerged as a privacy-preserving distributed Machine Learning approach.
Разместил: Ingvar16 20-02-2024, 20:03 | Комментарии: 0 | Подробнее
Название: Защита информации в компьютерных системах и сетях
Автор: В. Ф. Шаньгин
Издательство: ДМК Пресс
Год: 2012
Cтраниц: 590
Формат: pdf/djvu
Размер: 47 мб
Язык: русский

Книга посвящена методам и средствам многоуровневой защиты информации в компьютерных системах и сетях. Формулируются основные понятия защиты информации, анализируются угрозы информационной безопасности в компьютерных информационных системах. Обсуждаются базовые понятия и принципы политики информационной безопасности. Анализируются международные и отечественные стандарты информационной безопасности. Описываются криптографические методы и алгоритмы защиты информации. Обсуждаются методы и средства идентификации, аутентификации и управления доступом в корпоративных информационных системах. Обосновывается комплексный многоуровневый подход к обеспечению информационной безопасности корпоративных систем.
Разместил: rivasss 19-02-2024, 19:31 | Комментарии: 0 | Подробнее
Название: The Zero Trust Framework and Privileged Access Management (PAM)
Автор: Ravindra Das
Издательство: CRC Press
Год: 2024
Страниц: 126
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business is segmented into smaller islands, each having its own lines of defense. This is primarily achieved through the use of Multifactor Authentication (MFA), where at least three more authentication layers are used, preferably being different from one another. Another key aspect of the Zero Trust Framework is known as Privileged Access Management (PAM). This is an area of Cybersecurity where the protection of superuser accounts, rights, and privileges must be protected at all costs from Cyberattackers. In this regard, this is where the Zero Trust Framework and PAM intertwine, especially in a Cloud-based platform, such as Microsoft Azure. However, as it has been reviewed in one of our previous books, the use of passwords is now becoming a nemesis, not only for individuals but for businesses as well. It is hoped that by combining the Zero Trust Framework with PAM, password use can be eradicated altogether, thus giving rise to a passwordless society.
Разместил: Ingvar16 18-02-2024, 05:54 | Комментарии: 0 | Подробнее
Название: Artificial Intelligence for Cyber Defense and Smart Policing
Автор: S. Vijayalakshmi, P. Durgadevi, Lija Jacob, Balamurugan Balusamy, Parma Nand
Издательство: CRC Press
Год: 2024
Страниц: 187
Язык: английский
Формат: pdf (true)
Размер: 27.8 MB

The future policing ought to cover identification of new assaults, disclosure of new ill-disposed patterns, and forecast of any future vindictive patterns from accessible authentic information. Such keen information will bring about building clever advanced proof handling frameworks that will help cops investigate violations. Artificial Intelligence for Cyber Defense and Smart Policing will describe the best way of practicing Artificial Intelligence for cyber defense and smart policing. Organizations share information about cyber attacks as a crucial component of cyber threat intelligence, in order to enhance their understanding of potential threats and proactively safeguard their systems and networks. Cyber-attacks and defenses both rely heavily on Machine Learning, but neither of them achieve their goals when they rely on it completely. A malware sniffer can detect malware in encrypted traffic based on an analysis of encrypted traffic elements in network telemetry. The algorithms of Machine Learning uncover threats hidden in encryption, instead of decrypting them.
Разместил: Ingvar16 16-02-2024, 20:31 | Комментарии: 0 | Подробнее
Название: CCNP and CCIE Enterprise Core ENCOR 350-401 (Official Cert Guide), 2nd Edition
Автор: Brad Edgeworth, Ramiro Garza Rios, Dave Hucaby, Jason Gooley
Издательство: Cisco Press
Год: 2024
Страниц: 1149
Язык: английский
Формат: pdf (true)
Размер: 17.8 MB

Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for the CCNP and CCIE ENCOR 350-401 exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide, Second Edition helps you master the concepts and techniques that ensure your exam success and is the only self-study resource approved by Cisco. Expert authors Brad Edgeworth, Ramiro Garza Rios, Jason Gooley, and Dave Hucaby share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This fully updated second edition includes the latest topics and additional information covering changes to the latest ENCOR 350-401 exam.
Разместил: Ingvar16 16-02-2024, 18:35 | Комментарии: 0 | Подробнее
Название: Network Security and Cryptography: A Self-Teaching Introduction, 2nd Edition
Автор: Sarhan M. Musa
Издательство: Mercury Learning & Information
Год: 2022
Страниц: 611
Язык: английский
Формат: pdf (true)
Размер: 20.3 MB

This new edition introduces the basic concepts in computer networks, blockchain, and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features a new chapter on Artificial Intelligence security and the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, Big Data analytics, and more. Primarily intended as a textbook for courses in computer science, electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas.
Разместил: Ingvar16 15-02-2024, 17:47 | Комментарии: 0 | Подробнее
Название: Online Security Tricks & Tips - 17th Edition 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Страниц: 110
Язык: английский
Формат: pdf
Размер: 46.3 MB

"Советы и рекомендации по безопасности в Интернете" - это идеальное цифровое издание для пользователей, которые хотят поднять свои навыки на новый уровень. Хотите ли вы улучшить свои пользовательские навыки? Хотите ли вы получить инсайдерские знания? Хотите ли вы учиться непосредственно у экспертов в этой области? На страницах нового руководства для продвинутых пользователей вы узнаете все, что нужно знать, чтобы стать более уверенным, более компетентным и более опытным пользователем. Пользователем, который знает, как пользоваться устройством, и поэтому получает от него максимальную отдачу. Этого мы можем достичь, передавая вам навыки, которые мы вырабатывали десятилетиями, и предоставляя вам индивидуальную поддержку.
Разместил: Ingvar16 15-02-2024, 05:03 | Комментарии: 0 | Подробнее
Название: 5G Technology: 3GPP Evolution to 5G-Advanced, 2nd Edition
Автор: Harri Holma, Antti Toskala, Takehiro Nakamura
Издательство: CRC Press
Год: 2024
Страниц: 650
Язык: английский
Формат: pdf (true)
Размер: 11.7 MB

An Essential Insider’s View of the Development Work of 5G Technology Up to Release 18. 5G brings new technology solutions to the 5G mobile networks, including new spectrum options, antenna structures, physical layer and protocols designs, and network architectures. 5G Technology: 3GPP Evolution to 5G-Advanced is an accessible and comprehensive resource that offers explanations of 5G specifications and performance evaluations, aspects of device design, practical deployment considerations and illustrative examples from field experiences. With contributions from a panel of international experts on the topic (industry insiders working at the forefront of development), the book presents the main new technology components in 5G and describes the physical layer, radio protocols, and network performance indicators associated with them. It has intentionally been written to cater to individuals at all levels of 5G expertise. 5G Technology: 3GPP Evolution to 5G-Advanced serves as a complete resource for wireless researchers, network planners, lecturers in universities, technology analysts, R&D engineers, application developers, and spectrum regulators who wish to thoroughly understand the latest in 5G technology and get ahead of the curve with regards to its potential applications in a wide variety of industries.
Разместил: Ingvar16 15-02-2024, 03:07 | Комментарии: 0 | Подробнее

 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности