AI-Based Advanced Optimization Techniques for Edge Computing
| AI-Based Advanced Optimization Techniques for Edge Computing |
| Autore | Kumar Mohit |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Newark : , : John Wiley & Sons, Incorporated, , 2025 |
| Descrizione fisica | 1 online resource (481 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
SrivastavaGautam
SinghAshutosh Kumar DubeyKalka |
| ISBN |
9781394287048
1394287046 9781394287062 1394287062 9781394287055 1394287054 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9911020105703321 |
Kumar Mohit
|
||
| Newark : , : John Wiley & Sons, Incorporated, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Federated learning for multimedia data processing and security in industry 5.0 / / edited by Gautam Srivastava and Thippa Reddy Gadekallu
| Federated learning for multimedia data processing and security in industry 5.0 / / edited by Gautam Srivastava and Thippa Reddy Gadekallu |
| Pubbl/distr/stampa | Stevenage, Herts : , : The Institution of Engineering and Technology, , [2025] |
| Descrizione fisica | 1 online resource : illustrations (chiefly color) |
| Collana | IET Security Series |
| Soggetto topico | Federated learning (Machine learning) |
| ISBN |
1-83724-349-2
1-83953-758-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | ; 1 Federated learning-enabled 5G and beyond for Industry 5.0 / Chamitha De Alwis -- ; 2 Federated learning for optimized communication in Industry 5.0 / Dasari Bhulakshmi, Gokul Yenduri, Praveen Kumar Reddy Maddikunta, Celestine Iwendi and Thippa Reddy Gadekallu -- ; 3 Federated learning enabled digital twins for Industry 5.0: perspectives, challenges, and future directions / Dasaradharami Reddy Kandati, Supriya Y, Gokul Yenduri, Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu and Abdul Wahid -- ; 4 Collaborative intelligence: federated learning-enabled edge computing in Industry 5.0 / M Ramalingam, Gokul Yenduri, Praveen Kumar Reddy Maddikunta, Praveen Kumar Donta and Thippa Reddy Gadekallu -- ; 5 Infusion of federated learning for cybersecurity in Industry 5.0 / G. Chemmalar Selvi, G. Deepti Raj, G. Lakshmi Priya, Gokul Yenduri, Praveen Kumar Reddy Maddikunta, Abdul Rehman Javed and Thippa Reddy Gadekallu -- ; 6 Cybersecurity with blockchain for digital twins / Rutvij H. Jhaveri and Ashish Patel -- ; 7 Blockchain-based federated learning for Industry 5.0 applications / Rukhsana Ruby, Zehua Wang and Lu Wang -- ; 8 Blockchain implementation of public key infrastructure for Industry 5.0 applications / Rukhsana Ruby, Salabat Khan, Zehua Wang and Lu Wang -- ; 9 Federated learning for Supply Chain Management 5.0 / Bushra Tahir and Muhammad Tariq -- ; 10 Federated learning for cobots in Industry 5.0 / Pawan Hegde, Gokul Yenduri, Praveen Kumar Reddy Maddikunta, Ben Othman Soufiene and Thippa Reddy Gadekallu -- ; 11 Federated learning in medical education in Industry 5.0 / Y. Supriya, Dasari Bhulakshmi, Sweta Bhattacharya, Thippa Reddy Gadekallu, Rajesh Kaluri, S. Sumathy, Srinivas Koppu, Pratik Vyas, David J. Brown and Mufti Mahmud -- ; 12 A comprehensive survey on enhanced privacy techniques for federated learning in healthcare systems / Dasaradharami Reddy Kandati and Thippa Reddy Gadekallu -- ; 13 FL for secured medical image analysis / Thien Huynh-The and Tan Do-Duy -- Conclusion / Gautam Srivastava. |
| Record Nr. | UNINA-9911006942903321 |
| Stevenage, Herts : , : The Institution of Engineering and Technology, , [2025] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Proceedings of International Conference on Network Security and Blockchain Technology : ICNSBT 2025 / / edited by Debasis Giri, Georgios Kambourakis, SK Hafizul Islam, Gautam Srivastava, Tanmoy Maitra
| Proceedings of International Conference on Network Security and Blockchain Technology : ICNSBT 2025 / / edited by Debasis Giri, Georgios Kambourakis, SK Hafizul Islam, Gautam Srivastava, Tanmoy Maitra |
| Autore | Giri Debasis |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (600 pages) |
| Disciplina | 621.382 |
| Altri autori (Persone) |
KambourakisGeorgios
IslamS. K. Hafizul SrivastavaGautam MaitraTanmoy |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Telecommunication
Computer networks - Security measures Cryptography Data encryption (Computer science) Artificial intelligence Communications Engineering, Networks Mobile and Network Security Cryptology Artificial Intelligence |
| ISBN | 981-9663-48-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | FPGA Implementation of LSB Steganography Without Multiplier and Divider -- Cryptanalysis and improvement on low cost CL-ASS for wireless sensor networks -- Image Steganography with Efficient Utilization of Difference of Gaussian Edge Detection and Dilation -- LBP based Robust medical image watermarking in wavelet domain -- Cryptanalysis over Xu et al.’s CLAS scheme for VANETs -- Optimizing Cybersecurity Defences: Leveraging YARA Rules for Enhanced Detection of Custom PDF Spyware -- Template security in Biometrics system for fingerprint minutiae templates using Fuzzy vault method -- A Multilingual PDF Text-to-Speech Converter with Translation Capabilities -- An Image Watermarking approach using Hybrid GWO-GA in IWT Domain -- Developing a Secure Authentication and Key Agreement Protocol for Internet of Vehicles (IOV) Utilizing 5G Networks -- On Detection of Phishing URLs using Plant Propagation Algorithm -- Phishing URL Detection via Machine Learning: A Comprehensive Survey -- A Novel Synonym-Based Attack Algorithm for Generating Undetectable Adversarial Text Examples in Machine Learning -- Open-Audit: Enhancing Software Compliance with Blockchain and Zero-Knowledge Proofs -- Privacy-Preserved Efficient Contact Tracing in Contact Graph Components of Body Area Networks using Blockchain -- Integration of Blockchain to Internet of Things (IoT) -- Anomaly Detection in IoT Networks Using WGAN-GP: A Novel Approach for Robust IoT Security -- Urban Resilience: Using Autoencoder-Decoder LSTM Model with Green Roofs and Vertical Gardens to Combat Air Pollution -- Smart Cities' Clean Air: Federated Bidirectional Long Short-term Memory for Enhanced Air Quality Index Forecasting -- Min-Cart: An Eco-Friendly Approach to Minimize Air Pollution and Carbon Footprint -- Augmented Transfer Learning for Skin Cancer Detection: Enhancing Accuracy using Edge Detection -- Advanced Brain Tumor Classification with UNet Segmentation and Deep Maxout Classifier Techniques -- Enhancing Classification of Gemstones through Deep Learning Analysis: A Comparative Study -- LSTM-Based Image Enrichment and Description Generation to Enhance Visual Perception for Visually Challenged People -- Deforestation Detection Using Domain Adversarial Neural Network -- GeoLands: Machine Learning-Powered Landslide Risk Assessment -- Performance Improvement of an Automated Alzheimer Classification System -- Integrated Energy-Efficient Air Pollution Prediction and Control Framework -- Automatic Detection and Classification of Brain Tumors Using Deep Learning Model. |
| Record Nr. | UNINA-9911031568003321 |
Giri Debasis
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Recent Advances in Social Data and Artificial Intelligence 2019
| Recent Advances in Social Data and Artificial Intelligence 2019 |
| Autore | Srivastava Hari Mohan |
| Pubbl/distr/stampa | Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 |
| Descrizione fisica | 1 online resource (498 p.) |
| Soggetto topico |
Computer science
Information technology industries |
| Soggetto non controllato |
ABMS
advanced multicomponential discretization models artificial intelligence asymmetry automatic speech recognition behavior analysis blockchain breakpoint test business centrality metric client/server cloud computing color revolution operator combinatorial optimization problem community detection complex networks context-aware contingencies crude oil price cryptography cybernetics data acquisition data management data processing data science data-discretization methods data-mining techniques DBLP platform decision tree deep factorization deep reinforcement learning detection technology digital services digital teacher training digitalization electronic health records Facebook advertising post fashion recommendation feature selection feature-selection methods geometric analysis graph visualisation gravitational degree gravity model greedy strategy H-index Hadoop health information management healthcare data heuristics method hierarchical information ice-snow tourism ICT infrastructure imperialist competitive algorithm industry data applications innovation keyphrase extraction label propagation algorithm lidar scanning signal linear kernel lossless signal transmission machine learning markov switching micro-distortion modularity increment multi-channel weighted fusion loss multi-layer neural network multilayer network multiple granularity features natural language processing nature-inspired algorithm NP-hard problem overlapping community discovery pancreatic cancer partial key exposure attack person re-identification plant root polynomial kernel post engagement predictive analytics preference analysis privacy Python quality of service RBF kernel recommendation system replace face-to-face education robust partial least squares path modeling RSA cryptanalysis RSA cryptosystem security service composition service time-cost Siamese Multiple Granularity Network social behavior social data science social media marketing social network social network simulation social networking satisfaction social networks Spark speech corpus stock market structural change sustainable development symmetrical designing tag information TCD1209DG technology acceptance tele-education telemedicine temporal links prediction text corpus text mining topic model twin support vector machine two expansions two-tier partition algorithm unsupervised method visual analytics visual style weighted non-negative matrix factorization |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910585943903321 |
Srivastava Hari Mohan
|
||
| Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Security and Risk Analysis for Intelligent Edge Computing [[electronic resource] /] / edited by Gautam Srivastava, Uttam Ghosh, Jerry Chun-Wei Lin
| Security and Risk Analysis for Intelligent Edge Computing [[electronic resource] /] / edited by Gautam Srivastava, Uttam Ghosh, Jerry Chun-Wei Lin |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (244 pages) |
| Disciplina | 005.8 |
| Collana | Advances in Information Security |
| Soggetto topico |
Computer networks
Data protection - Law and legislation Machine learning Cryptography Data encryption (Computer science) Computer Communication Networks Privacy Machine Learning Cryptology |
| ISBN | 3-031-28150-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chap I Introduction to Cloud/Edge Computing -- Chap II Big Data Analytics and Security over the Cloud: Characteristics, Analytics, Integration and Security -- Chap III Federated Learning enabled Edge computing -- security for Internet of Medical Things: Concepts, Challenges and Open issues -- Chap IV Embedded Edge and Cloud Intelligence -- Chap V The Analysis on Impact of Cyber Security Threats on Smart Grids -- Chap VI Intelligent Intrusion Detection algorithm based on multi-attack for Edge-Assisted Internet of Things -- Chap VII Secure Data Analysis and Data Privacy -- Chap VIII A Novel Trust evaluation and Reputation data Management based Security System Model for Mobile Edge Computing Network -- Chap IX Network Security System in Mobile Edge Computing-to-IoMT Networks using Distributed Approach -- Chap X Wireless and Mobile Security in Edge Computing -- Chap XI An intelligent facial expression recognizer using modified 1 ResNet-110 using Edge Computing -- Chap XII Blockchain Based Simulated Virtual Machine Placement Hybrid Approach for Decentralized cloud and edge computing environment and Edge Computing. |
| Record Nr. | UNISA-996546823403316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Security and Risk Analysis for Intelligent Edge Computing / / edited by Gautam Srivastava, Uttam Ghosh, Jerry Chun-Wei Lin
| Security and Risk Analysis for Intelligent Edge Computing / / edited by Gautam Srivastava, Uttam Ghosh, Jerry Chun-Wei Lin |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (244 pages) |
| Disciplina | 005.8 |
| Collana | Advances in Information Security |
| Soggetto topico |
Computer networks
Data protection - Law and legislation Machine learning Cryptography Data encryption (Computer science) Computer Communication Networks Privacy Machine Learning Cryptology |
| ISBN | 3-031-28150-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chap I Introduction to Cloud/Edge Computing -- Chap II Big Data Analytics and Security over the Cloud: Characteristics, Analytics, Integration and Security -- Chap III Federated Learning enabled Edge computing -- security for Internet of Medical Things: Concepts, Challenges and Open issues -- Chap IV Embedded Edge and Cloud Intelligence -- Chap V The Analysis on Impact of Cyber Security Threats on Smart Grids -- Chap VI Intelligent Intrusion Detection algorithm based on multi-attack for Edge-Assisted Internet of Things -- Chap VII Secure Data Analysis and Data Privacy -- Chap VIII A Novel Trust evaluation and Reputation data Management based Security System Model for Mobile Edge Computing Network -- Chap IX Network Security System in Mobile Edge Computing-to-IoMT Networks using Distributed Approach -- Chap X Wireless and Mobile Security in Edge Computing -- Chap XI An intelligent facial expression recognizer using modified 1 ResNet-110 using Edge Computing -- Chap XII Blockchain Based Simulated Virtual Machine Placement Hybrid Approach for Decentralized cloud and edge computing environment and Edge Computing. |
| Record Nr. | UNINA-9910734830203321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||