Convergence of Deep Learning in Cyber-IoT Systems and Security

Автор: literator от 7-11-2022, 05:39, Коментариев: 0

Категория: КНИГИ » ПРОГРАММИРОВАНИЕ

Convergence of Deep Learning in Cyber-IoT Systems and SecurityНазвание: Convergence of Deep Learning in Cyber-IoT Systems and Security
Автор: Rajdeep Chakraborty, Anupam Ghosh, Jyotsna Kumar Mandal
Издательство: Wiley-Scrivener
Серия: Artificial Intelligence and Soft Computing for Industrial Transformation
Год: 2023
Страниц: 472
Язык: английский
Формат: pdf (true)
Размер: 50.5 MB

Deep Learning (also known as deep structured learning) is part of a broader family of Machine Learning methods based on artificial neural networks with representation learning. Learning can be supervised, semi- supervised or unsupervised. Deep Learning architectures such as deep neural networks, deep belief networks, deep reinforcement learning, recurrent neural networks and convolutional neural networks have been applied to fields including computer vision, speech recognition, natural language processing (NLP), machine translation, bioinformatics, drug design, medical image analysis, material inspection and board game programs, where they have produced results comparable to and in some cases surpassing human expert performance. Artificial neural networks (ANNs) were inspired by information processing and distributed communication nodes in biological systems. ANNs have various differences from biological brains. Deep Learning approaches are now used in every aspect of cyber systems and IoT systems. The main goal of this book is to bring to the fore unconventional cryptographic methods to provide cyber security, including cyber-physical system security and IoT security through Deep Learning techniques and analytics with the study of all these systems.
 

Modern Typescript

Автор: literator от 7-11-2022, 05:19, Коментариев: 0

Категория: КНИГИ » ПРОГРАММИРОВАНИЕ

Modern TypescriptНазвание: Modern Typescript
Автор: Ben Beattie-Hood
Издательство: Leanpub
Год: 2021-12-23
Страниц: 104
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

Covering from basic building of interfaces to advanced use of unions, partials, intersections, and mapped types. Join me for this deep-dive from fundamentals to advanced aspects of Typescript, and how you can leverage its static testing system to accelerate your development velocity. For newcomers and advanced users, this deep-dive covers the fundamentals as well as a huge range of the advanced aspects of Typescript, and how you can leverage its static testing system to accelerate your development velocity. The last and only book you'll need to learn Typescript inside out.
 

Machine Learning and Deep Learning in Efficacy Improvement of Healthcare Systems

Автор: literator от 7-11-2022, 05:05, Коментариев: 0

Категория: КНИГИ » ПРОГРАММИРОВАНИЕ

Machine Learning and Deep Learning in Efficacy Improvement of Healthcare SystemsНазвание: Machine Learning and Deep Learning in Efficacy Improvement of Healthcare Systems
Автор: Om Prakash Jena, Bharat Bhushan, Nitin Rakesh
Издательство: CRC Press
Год: 2022
Страниц: 397
Язык: английский
Формат: pdf (true)
Размер: 27.4 MB

Rapid population growth coupled with the evolution of numerous diseases is a matter of concern worldwide. Due to this, the healthcare industry has emerged as an essential service sector. The generation of a large amount of healthcare data and the lack of insight from that data are significant problems in the healthcare sector. Therefore, there is a need for a fully effective and automated system that can help medical stakeholders to take prompt action at the right time. Artificial intelligence (AI) and machine learning (ML) have a very long association with the healthcare sector dating back to 1980s. It gained momentum with the emergence of rule-based systems, hierarchical clustering, and various regression models. ML is an important utility of AI that provides systems with the capacity to automatically examine and enhance action without being specially programmed. However, neither the computers nor the algorithms were efficient enough to enable effective ML based systems. The last five years had seen tremendous rise in the adoption of ML techniques mainly due to emergence of neural network that enhanced the overall computational power. Deep Learning (DL) is a subset of ML where innovations have led to the construction of several novel deep neural network architectures that can be used for the classification of large data sets. AI, ML, and DL techniques can be employed for efficient knowledge discovery from healthcare data.
 

Историк №6 2022

Автор: Malinka от 7-11-2022, 05:01, Коментариев: 0

Категория: ЖУРНАЛЫ » ИСТОРИЧЕСКИЕ

Название: Историк. Журнал об актуальном прошлом
Издательство: Историк
Год / месяц: 2022 / Июнь
Номер: 6 (90)
Формат: PDF
Страниц: 84
Размер: 136 Мб
Язык: русский

Российский популярный исторический журнал консервативной направленности. Позиционируется как «журнал об актуальном прошлом», что указано на обложке каждого номера, и адресован тем, кто «испытывает потребность в консервативном знании о прошлом и настоящем». Мы пишем для тех, кто считает себя патриотом.
 

Hybrid Quantum Metaheuristics: Theory and Applications

Автор: literator от 7-11-2022, 04:50, Коментариев: 0

Категория: КНИГИ » ПРОГРАММИРОВАНИЕ

Hybrid Quantum Metaheuristics: Theory and ApplicationsНазвание: Hybrid Quantum Metaheuristics: Theory and Applications
Автор: Siddhartha Bhattacharyya, Mario Koppen, Elizabeth Behrman, Ivan Cruz-Aceves
Издательство: CRC Press
Серия: Quantum Machine Intelligence
Год: 2022
Страниц: 276
Язык: английский
Формат: pdf (true)
Размер: 15.3 MB

A metaheuristic is a heuristic (partial search) algorithm that is more or less an efficient optimization algorithm to real-world problems. Hybrid metaheuristics refer to a proper and judicious combination of several other metaheuristics and Machine Learning algorithms. The hybrid metaheuristics have been found to be more robust and failsafe owing to the complementary character of the individual metaheuristics in the resultant combination. This is primarily due to the fact that the vision of hybridization is to combine different metaheuristics such that each of the combination supplements the other in order to achieve the desired performance. Typical examples use fuzzy-evolutionary, neuro-evolutionary, neuro-fuzzy evolutionary, rough-evolutionary approaches to name a few. Recently, chaos theory has also found wide applications in evolving efficient hybrid metaheuristics. Quantum computer, as the name suggests, principally works on several quantum physical features. These could be used as an immense alternative to today’s apposite computers since they possess faster processing capability (even exponentially) than classical computers. The term quantum computing stems from the synergistic combination of quantum mechanical principles and classical information theory conjoined with principles of Computer Science.
 

Gettysburg in Color Volume 1: Brandy Station to the Peach Orchard

Автор: Dimas от 7-11-2022, 04:38, Коментариев: 0

Категория: КНИГИ » ВОЕННАЯ ТЕМАТИКА


Название: Gettysburg in Color Volume 1: Brandy Station to the Peach Orchard
Издательство: Savas Beatie
Год: 2022
Формат: True PDF
Страниц: 226
Размер: 59 Mb
Язык: English

Gettysburg in Color Volume 1: Brandy Station to the Peach Orchard
 

Ostfront 1942/1943 (Clausewitz Spezial)

Автор: Dimas от 7-11-2022, 04:32, Коментариев: 0

Категория: ЖУРНАЛЫ » ВОЕННЫЕ


Название: Ostfront 1942/1943 (Clausewitz Spezial)
Издательство: GeraMond Verlag GmbH
Год: 2022
Формат: PDF
Страниц: 100
Размер: 105 Mb
Язык: German

Ostfront 1942/1943 (Clausewitz Spezial)
 

High-Speed and High-Performance Direct Digital Frequency Synthesizer Design

Автор: literator от 7-11-2022, 04:07, Коментариев: 0

Категория: КНИГИ » АППАРАТУРА

High-Speed and High-Performance Direct Digital Frequency Synthesizer DesignНазвание: High-Speed and High-Performance Direct Digital Frequency Synthesizer Design
Автор: Jun-an Zhang, Ruitao Zhang, Guangjun Li
Издательство: Springer
Год: 2022
Страниц: 150
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

The design technology of high-speed and high-performance direct digital frequency synthesizer (DDS) chip is an important research topic in the field of modern communication and radar. The research work of DDS design technology has important theoretical and application value. High-performance direct frequency synthesizer chip design technology involves high-performance phase to amplitude converter design, high-speed D/A converter design, high-speed phase accumulator design, multi-chip synchronization circuit design, etc. In this book, all the design technologies mentioned above are introduced in different chapters. In each chapter, the concept of the technology is explained first, and then the features of different implementation schemes are introduced through the real design cases.
 

Complex-Valued Neural Networks Systems With Time Delay: Stability Analysis and Anti-Synchronization Control

Автор: literator от 7-11-2022, 03:43, Коментариев: 0

Категория: КНИГИ » УЧЕБНАЯ ЛИТЕРАТУРА

Complex-Valued Neural Networks Systems With Time Delay: Stability Analysis and Anti-Synchronization ControlНазвание: Complex-Valued Neural Networks Systems With Time Delay: Stability Analysis and Anti-Synchronization Control
Автор: Ziye Zhang, Zhen Wang, Jian Chen, Chong Lin
Издательство: Springer
Год: 2022
Страниц: 236
Язык: английский
Формат: pdf (true)
Размер: 10.19 MB

In recent years, with the emergence of new scientific and technological methods, complex signals have appeared in radar, imaging and other fields, which makes the state variables of the controlled system extended from the real number domain to the complex number one. As a result, the complex-valued neural networks (CVNNs) model has entered scholars’ vision. It is a kind of network that processes information with complex parameters and variables in a complex field. Compared with real-valued neural networks, on one hand, the neuron state, activation function and weight of complex-valued ones are complex-valued, which can directly process two-dimensional data. On the other hand, CVNNs model is more efficient, faster and has better generalization ability. In particular, it can deal with many problems that cannot be solved by real-valued neural networks. So far, CVNNs have been widely used in many biological and engineering fields, such as image processing, optoelectronics, pattern recognition, signal processing and so on. Moreover, time delay is inevitable in the actual system, which has a very significant impact on the system. It often leads to the delay in information transmission, affects the performance of the system and even causes instability in the system. Therefore, it is of great significance to make a profound study of CVNNs model with time delay.
 

Cryptography and Network Security: Demystifying the ideas of Network Security, Cryptographic Algorithms (2022)

Автор: literator от 7-11-2022, 03:15, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Cryptography and Network Security: Demystifying the ideas of Network Security, Cryptographic Algorithms (2022)Название: Cryptography and Network Security: Demystifying the ideas of Network Security, Cryptographic Algorithms, Wireless Security, IP Security, System Security, and Email Security
Автор: Bhushan Trivedi, Savita Gandhi, Dhiren Pandit
Издательство: BPB Publications
Год: 2022
Страниц: 716
Язык: английский
Формат: epub (true)
Размер: 10.2 MB

Cryptography and Network Security teaches you everything about cryptography and how to make its best use for both, network and internet security. To begin with, you will learn to explore security goals, the architecture, its complete mechanisms, and the standard operational model. You will learn some of the most commonly used terminologies in cryptography such as substitution, and transposition. While you learn the key concepts, you will also explore the difference between symmetric and asymmetric ciphers, block and stream ciphers, and monoalphabetic and polyalphabetic ciphers. This book also focuses on digital signatures and digital signing methods, AES encryption processing, public key algorithms, and how to encrypt and generate MACs. You will also learn about the most important real-world protocol called Kerberos and see how public key certificates are deployed to solve public key-related problems. Real-world protocols such as PGP, SMIME, TLS, and IPsec Rand 802.11i are also covered in detail.