Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 29-01-2022, 05:06
  • Комментариев: 0
The Tactile Internet (2022)Название: The Tactile Internet
Автор: Tara Ali-Yahiya, Wrya Monnet
Издательство: Wiley-ISTE
Год: 2022
Страниц: 256
Язык: английский
Формат: pdf, epub
Размер: 10.4 MB

The Tactile Internet will change the landscape of communication by introducing a new paradigm that enables the remote delivery of haptic data. This book provides an introduction to the Tactile Internet and its case studies, with its impact on the democratization of haptic applications based on the IEEE 1918.1 standard through teleoperations. The case studies are based on cutting-edge technologies that enable the deployment of the Tactile Internet. 5G, and recently 6G, Software-Defined Networking, the different learning techniques in the Artificial Intelligence domain, Edge Computing for service proximity, etc. are all factors that will support the successful deployment of the Tactile Internet. This book is a solid contribution to this research area.
  • Добавил: umkaS
  • Дата: 28-01-2022, 09:44
  • Комментариев: 0
Название: Введение в облачные решения Microsoft
Автор: Савельев А.О.
Издательство: ИНТУИТ
Год: 2021
Cтраниц: 228
Формат: pdf
Размер: 29 мб
Язык: русский

Тема облачных вычислений является на данный момент одной из самых обсуждаемых. Ряд экспертов говорит о замещении «облаками» старых решений. В данном учебном пособии рассмотрены суть облачных вычислений, их возможности, а также технологии облачной платформы Microsoft. В издании изложены различные подходы по внедрению облачных вычислений, их значимости и возможностей для бизнеса, стратегии по развертыванию «облаков».
  • Добавил: literator
  • Дата: 28-01-2022, 04:09
  • Комментариев: 0
Название: Federated Learning for Wireless Networks
Автор: Choong Seon Hong, Latif U. Khan, Mingzhe Chen
Издательство: Springer
Серия: Wireless Networks
Год: 2021
Страниц: 257
Язык: английский
Формат: pdf (true)
Размер: 10.6 MB

Recently Machine Learning schemes have attained significant attention as key enablers for next-generation wireless systems. Currently, wireless systems are mostly using Machine Learning schemes that are based on centralizing the training and inference processes by migrating the end-devices data to a third party centralized location. However, these schemes lead to end-devices privacy leakage. To address these issues, one can use a distributed machine learning at network edge. In this context, Federated Learning (FL) is one of most important distributed learning algorithm, allowing devices to train a shared machine learning model while keeping data locally. However, applying FL in wireless networks and optimizing the performance involves a range of research topics. For example, in FL, training machine learning models require communication between wireless devices and edge servers via wireless links. Therefore, wireless impairments such as uncertainties among wireless channel states, interference, and noise significantly affect the performance of FL. On the other hand, federated-reinforcement learning leverages distributed computation power and data to solve complex optimization problems that arise in various use cases, such as interference alignment, resource management, clustering, and network control. Traditionally, FL makes the assumption that edge devices will unconditionally participate in the tasks when invited, which is not practical in reality due to the cost of model training.
  • Добавил: literator
  • Дата: 27-01-2022, 16:55
  • Комментариев: 0
Advances in Malware and Data-Driven Network SecurityНазвание: Advances in Malware and Data-Driven Network Security
Автор: Brij B. Gupta
Издательство: Information Science Reference, IGI Global
Год: 2022
Страниц: 326
Язык: английский
Формат: pdf (true), epub
Размер: 31.3 MB

Every day approximately three-hundred thousand to four-hundred thousand new malware are registered, many of them being adware and variants of previously known malware. Anti-virus companies and researchers cannot deal with such a deluge of malware - to analyze and build patches. The only way to scale the efforts is to build algorithms to enable machines to analyze malware and classify and cluster them to such a level of granularity that it will enable humans (or machines) to gain critical insights about them and build solutions that are specific enough to detect and thwart existing malware and generic-enough to thwart future variants. Advances in Malware and Data-Driven Network Security comprehensively covers data-driven malware security with an emphasis on using statistical, Machine Learning, and AI as well as the current trends in ML/statistical approaches to detecting, clustering, and classification of cyber-threats. Providing information on advances in malware and data-driven network security as well as future research directions, it is ideal for graduate students, academicians, faculty members, scientists, software developers, security analysts, computer engineers, programmers, IT specialists, and researchers who are seeking to learn and carry out research in the area of malware and data-driven network security.
  • Добавил: literator
  • Дата: 27-01-2022, 16:31
  • Комментариев: 0
Blockchain in the Industrial Internet of ThingsНазвание: Blockchain in the Industrial Internet of Things
Автор: Lakshmana Kumar Ramasamy, Seifedine Kadry
Издательство: IOP Publishing
Год: 2021
Страниц: 142
Язык: английский
Формат: pdf (true)
Размер: 15.4 MB

Blockchain and the Internet of Things (IoT) are separately regarded as highly capable popular technologies. Blockchain is a database used for decentralized transaction purposes. It provides novel directions to store and manage data, whereas the IoT relates to the propagation of linked smart machines through the Internet. A technology significant to the manufacturing business, which is currently experiencing a digital revolution through new equipment and data, leading to the Industrial Internet of Things, or the IIoT. The IIoT has advanced swiftly, but privacy issues and safety vulnerabilities remain concerns. Incorporating blockchain technology with its decentralization and embedded cryptographic principles with the IIoT creates Blockchain for Industrial Internet of Things (BIIoT) which can overcome these security requirements and motivate the further development of Industry 4.0. This book gives a detailed survey of BIIoT and discusses all relevant aspects of this concept, including structural design and open research directions.
  • Добавил: umkaS
  • Дата: 27-01-2022, 12:56
  • Комментариев: 0
Название: Безопасность сетей
Автор: Мэйволд Э.
Издательство: ИНТУИТ
Год: 2021
Cтраниц: 570
Формат: pdf
Размер: 78 мб
Язык: русский

В учебном пособии содержатся пошаговые инструкции по установке и использованию межсетевых экранов, сведения о безопасности беспроводных соединений и настольных компьютеров, о биометрических методах аутентификации и других современных способах защиты.
  • Добавил: literator
  • Дата: 25-01-2022, 19:31
  • Комментариев: 0
The Internet of MaterialsНазвание: The Internet of Materials
Автор: Christos Liaskos
Издательство: CRC Press
Год: 2021
Страниц: 359
Язык: английский
Формат: pdf (true)
Размер: 61.1 MB

The book revolves around artificial materials which can sense electromagnetic waves impinging upon them and alter these waves in ways dictated by software. These materials, such as the recently proposed HyperSurfaces concept, can coat common objects such as walls, doors, and sizeable furniture, exerting logical control over the way wireless propagation occurs within an environment overall, e.g., within a building. Thus, the environmental behavior can be dynamically optimized to the needs of wireless devices, such as mobile phones and laptops, offering unprecedented levels of communication range, data transfer rates, energy efficiency, and security. A core component of HyperSurfaces are the metasurfaces, i.e., planar, artificial structures, which have recently enabled the realization of novel objects with engineered and even unnatural electromagnetic functionalities. Metasurfaces can be designed for any operating frequency and application domain. HyperSurfaces constitute a kind of networked metasurfaces, which can connect to the Internet of Things ecosystem and provide wireless environment optimization under any context.
  • Добавил: TRex
  • Дата: 25-01-2022, 14:24
  • Комментариев: 0
Название: (ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide, 3rd Edition
Автор: Michael S. Wills,
Издательство: John Wiley & Sons
Год: 2022
Формат: ePUB
Страниц: 792
Размер: 10 Mb
Язык: English

The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is a well-known vendor-neutral global IT security certification. The SSCP is designed to show that holders have the technical skills to implement, monitor, and administer IT infrastructure using information security policies and procedures.
  • Добавил: TRex
  • Дата: 25-01-2022, 09:26
  • Комментариев: 0
Название: Internet of Things: Robotic and Drone Technology
Автор: Nitin Goyal, Sharad Sharma, Arun Kumar Rana, and Suman Lata Tripathi
Издательство: CRC Press
Год: 2022
Формат: True PDF
Страниц: 289
Размер: 15,4 Mb
Язык: English

This reference text discusses intelligent robotic and drone technology with embedded Internet of Things (IoT) for smart applications. The text discusses future directions of optimization methods with various engineering and science fundamentals used in robotics and drone-based applications. Its emphasis is on covering deep learning and similar models of neural network-based learning techniques employed in solving optimization problems of different engineering and science applications. It covers important topics including sensors and actuators in the internet of things (IoT), internet-of-robotics-things (IoRT), IoT in agriculture and food processing, routing challenges in flying Ad-hoc networks, and smart cities.
  • Добавил: TRex
  • Дата: 24-01-2022, 19:35
  • Комментариев: 0
Название: An Introduction to Cyber Analysis and Targeting
Автор: Jerry M. Couretas
Издательство: Springer
Год: 2022
Формат: PDF
Страниц: 325
Размер: 10 Mb
Язык: English

This book provides a comprehensive view of cyber operations, analysis and targeting, including operational examples viewed through a lens of conceptual models available in current technical and policy literature. Readers will gain a better understanding of how the current cyber environment developed, as well as how to describe it for future defense. The author describes cyber analysis first as a conceptual model, based on well-known operations that span from media to suspected critical infrastructure threats. He then treats the topic as an analytical problem, approached through subject matter interviews, case studies and modeled examples that provide the reader with a framework for the problem, developing metrics and proposing realistic courses of action.