Browse
Author profile
Load More
TRAINING MAJORS
- Khoa Điện - Tự động hóa (667)
- Khoa Công nghệ thông tin (342)
- Khoa Cơ khí (275)
- Khoa Dệt may và Thời Trang (94)
- Khoa Công nghệ thực phẩm (78)
Load More
Học liệu điện tử (Electronic learning materials)
Browsing Học liệu điện tử (Electronic learning materials) by Topic "Ngành Mạng máy tính và Truyền thông dữ liệu"
Now showing 1 - 13 of 13
Results Per Page
Sort Options
- PublicationAI and Blockchain Technology in 6G Wireless Network(Springer, 2022) Borah, Malaya Dutta; Singh, Pushpa; Deka, Ganesh ChandraThis book highlights future research directions and latent solutions by integrating AI and Blockchain 6G networks, comprising computation efficiency, algorithms robustness, hardware development and energy management. This book brings together leading researchers in Academia and industry from diverse backgrounds to deliver to the technical community an outline of emerging technologies, advanced architectures, challenges, open issues and future directions of 6G networks. This book is written for researchers, professionals and students to learn about the integration of technologies such as AI and Blockchain into 6G network and communications. This book addresses the topics such as consensus protocol, architecture, intelligent dynamic resource management, security and privacy in 6G to integrate AI and Blockchain and new real-time application with further research opportunities.
- PublicationBlockchain Security From the Bottom Up : Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts(Wiley, 2022) Poston III, Howard E.The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, accomplished blockchain and cybersecurity consultant and educator Howard E. Poston delivers an authoritative exploration of blockchain and crypto cybersecurity. In the book, the author shows you exactly how cybersecurity should be baked into the blockchain at every layer of the technology's ecosystem. You'll discover how each layer can be attacked and learn how to prevent and respond to those attacks in an environment of constant technological change and evolution.
- PublicationCircuits, Packets, and Protocols : Entrepreneurs and Computer Communications, 1968-1988(ACM Books, 2022) Pelkey, James L.; Russell, Andrew L.; Robbins, Loring G.As recently as 1968, computer scientists were uncertain how best to interconnect even two computers. The notion that within a few decades the challenge would be how to interconnect millions of computers around the globe was too far-fetched to contemplate. Yet, by 1988, that is precisely what was happening. The products and devices developed in the intervening years—such as modems, multiplexers, local area networks, and routers—became the linchpins of the global digital society. How did such revolutionary innovation occur? This book tells the story of the entrepreneurs who were able to harness and join two factors: the energy of computer science researchers supported by governments and universities, and the tremendous commercial demand for Internetworking computers.
- PublicationCloud Ethics : Algorithms and the Attributes of Ourselves and Others(Duke University Press Books, 2020) Amoore, LouiseIn Cloud Ethics Louise Amoore examines how machine learning algorithms are transforming the ethics and politics of contemporary society. Conceptualizing algorithms as ethicopolitical entities that are entangled with the data attributes of people, Amoore outlines how algorithms give incomplete accounts of themselves, learn through relationships with human practices, and exist in the world in ways that exceed their source code. In these ways, algorithms and their relations to people cannot be understood by simply examining their code, nor can ethics be encoded into algorithms. Instead, Amoore locates the ethical responsibility of algorithms in the conditions of partiality and opacity that haunt both human and algorithmic decisions. To this end, she proposes what she calls cloud ethics—an approach to holding algorithms accountable by engaging with the social and technical conditions under which they emerge and operate.
- PublicationComputer Security and Encryption : An Introduction(Mercury Learning & Information, 2020) Chauhan, S. R.; Jangra, S.Because of the rapid growth of cybercrime, cryptography and system security may be the fastest growing technologies in our culture today. This book describes various aspects of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices in the design of networks and systems. The first portion of the book presents the overall system security concepts and provides a general overview of its features, such as object model and inter-object communications. The objective is to provide an understanding of the cryptography underpinnings on which the rest of the book is based.
- PublicationDeep Learning-Powered Technologies : Autonomous Driving, Artificial Intelligence of Things (AIoT), Augmented Reality, 5G Communications and Beyond(Springer, 2023) Mohamed, Khaled SalahThis book covers various, leading-edge deep learning technologies. The author discusses new applications of deep learning and gives insight into the integration of deep learning with various application domains, such as autonomous driving, augmented reality, AIOT, 5G and beyond.
- PublicationEssentials of Python for Artificial Intelligence and Machine Learning(Springer, 2024) Gupta, Pramod; Bagchi, AnupamThis book introduces the essentials of Python for the emerging fields of Machine Learning (ML) and Artificial Intelligence (AI). The authors explore the use of Python's advanced module features and apply them in probability, statistical testing, signal processing, financial forecasting, and various other applications. This includes mathematical operations with array data structures, Data Manipulation, Data Cleaning, machine learning, Data pipeline, probability density functions, interpolation, visualization, and other high-performance benefits using the core scientific packages NumPy, Pandas, SciPy, Sklearn/Scikit learn and Matplotlib. Readers will gain a deep understanding with problem-solving experience on these powerful platforms when dealing with engineering and scientific problems related to Machine Learning and Artificial Intelligence.
- PublicationLimits of AI - Theoretical, Practical, Ethical(Springer, 2024) Mainzer, Klaus; Kahle, ReinhardArtificial intelligence is a key technology with great expectations in science, industry, and everyday life. This book discusses both the perspectives and the limitations of this technology. This concerns the practical, theoretical, and conceptual challenges that AI has to face. In an early phase of symbolic AI, AI focused on formal programs (e.g., expert systems), in which rule-based knowledge was processed with the help of symbolic logic. Today, AI is dominated by statistics-based machine learning methods and Big Data. While this sub-symbolic AI is extremely successful (e.g., chatbots like ChatGPT), it is often not transparent. The book argues for explainable and reliable AI, in which the logical and mathematical foundations of AI-algorithms become understandable and verifiable.
- PublicationMachine Learning Empowered Intelligent Data Center Networking : Evolution, Challenges and Opportunities(Springer, 2023) Ting, Wang; Bo, Li; Mingsong, Chen; Shui, YuAn Introduction to the Machine Learning Empowered Intelligent Data Center Networking Fundamentals of Machine Learning in Data Center Networks. This book reviews the common learning paradigms that are widely used in data centernetworks, and offers an introduction to data collection and data processing in data centers. Additionally, it proposes a multi-dimensional and multi-perspective solution quality assessment system called REBEL-3S. The book offers readers a solid foundation for conducting research in the field of AI-assisted data center networks. Comprehensive Survey of AI-assisted Intelligent Data Center Networks. This book comprehensively investigates the peer-reviewed literature published in recent years. The wide range of machine learning techniques is fully reflected to allow fair comparisons.
- PublicationOnline Social Networks Security : Principles, Algorithm, Applications, and Perspectives(CRC Press, 2021) Gupta, Brij B.; Sahoo, Somya RanjanIn recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs). These help users to build both social and professional links on a worldwide scale. The sharing of information and opinions are important features of OSNs. Users can describe recent activities and interests, share photos, videos, applications, and much more. The use of OSNs has increased at a rapid rate. Google+, Facebook, Twitter, LinkedIn, Sina Weibo, VKontakte, and Mixi are all OSNs that have become the preferred way of communication for a vast number of daily active users. Users spend substantial amounts of time updating their information, communicating with other users, and browsing one another's accounts. OSNs obliterate geographical distance and can breach economic barrier.
- PublicationProbabilistic Graphical Models for Computer Vision(Academic Press, 2020) Qiang, JiProbabilistic Graphical Models for Computer Vision introduces probabilistic graphical models (PGMs) for computer vision problems and teaches how to develop the PGM model from training data. This book discusses PGMs and their significance in the context of solving computer vision problems, giving the basic concepts, definitions and properties. It also provides a comprehensive introduction to well-established theories for different types of PGMs, including both directed and undirected PGMs, such as Bayesian Networks, Markov Networks and their variants. - Discusses PGM theories and techniques with computer vision examples - Focuses on well-established PGM theories that are accompanied by corresponding pseudocode for computer vision - Includes an extensive list of references, online resources and a list of publicly available and commercial software - Covers computer vision tasks, including feature extraction and image segmentation, object and facial recognition, human activity recognition, object tracking and 3D reconstruction
- PublicationSpeeding-Up Radio-Frequency Integrated Circuit Sizing with Neural Networks(Springer, 2023) Domingues, João L. C. P.; Vaz, Pedro J. C. D. C.; Gusmão, António P. L.; Horta, Nuno C. G.In this book, innovative research using artificial neural networks (ANNs) is conducted to automate the sizing task of RF IC design, which is used in two different steps of the automatic design process. The advances in telecommunications, such as the 5th generation broadband or 5G for short, open doors to advances in areas such as health care, education, resource management, transportation, agriculture and many other areas. Consequently, there is high pressure in today's market for significant communication rates, extensive bandwidths and ultralow-power consumption. This is where radiofrequency (RF) integrated circuits (ICs) come in hand, playing a crucial role. This demand stresses out the problem which resides in the remarkable difficulty of RF IC design in deep nanometric integration technologies due to their high complexity and stringent performances.
- PublicationThe IoT Architect's Guide to Attainable Security and Privacy(Auerbach Publications, 2020) Fagbemi, Damilare D.; Wheeler, David M.; Wheeler, JCThis book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining.'Filled with practical and relevant examples based on years of experience... with lively discussions and storytelling related to loT security design flaws and architectural issues.'— Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community.