Search

Search Results

Results 1-10 of 11 (Search time: 0.044 seconds).
Item hits:
  • Sách/Book


  • Authors: Shastri, Apoorva S (2023)

  • This book examines the latest developments in Artificial Intelligence (AI)-based metaheuristics algorithms with applications in information security for digital media. It highlights the importance of several security parameters, their analysis, and validations for different practical applications.

  • Sách/Book


  • Authors: Fersman, Elena (2023)

  • The book is written as a first person narrative, from an AI perspective, having the AI brain tell the story.

  • Sách/Book


  • Authors: Hall, Patrick (2023)

  • This book describes approaches to responsible AI—a holistic framework for improving AI/ML technology, business processes, and cultural competencies that builds on best practices in risk management, cybersecurity, data privacy, and applied social science. Authors Patrick Hall, James Curtis, and Parul Pandey created this guide for data scientists who want to improve real-world AI/ML system outcomes for organizations, consumers, and the public.

  • Sách/Book


  • Authors: Yarali, Abdulrahman (2023)

  • The transition from the fifth generation of wireless communication (5G) to the coming sixth generation (6G) promises to be one of the most significant phases in the history of telecommunications. The technological, social, and logistical challenges promise to be significant, and meeting these challenges will determine the future of wireless communication. Experts and professionals across dozens of fields and industries are beginning to reckon seriously with these challenges as the 6G revolution approaches. From 5G to 6G provides an overview of this transition, offering a snapshot of a moment in which 5G is establishing itself and 6G draws ever nearer. It focuses on recent advances in wireless technology that bring 6G closer to reality, as well as the near-term challenges that still ...

  • Sách/Book


  • Authors: Glisic, Savo G (2022)

  • By increasing the density and number of different functionalities in wireless networks there is more and more need for the use of artificial intelligence for planning network deployment, running their optimization and dynamically controlling their operation. For example, machine learning algorithms are used for the prediction of traffic and network state in order to timely reserve resources for smooth communication with high reliability and low latency; Big data mining is used to predict customer behaviour and pre-distribute the information content across the network so that it can be efficiently delivered as soon as requested; Intelligent agents can search the internet on behalf of the customer in order to find the best options when it comes to buying any product online

  • Sách/Book


  • Authors: Wu, Yulei (2023)

  • AI and Machine Learning for Network and Security Management covers a range of key topics of network automation for network and security management, including resource allocation and scheduling, network planning and routing, encrypted traffic classification, anomaly detection, and security operations. In addition, the authors introduce their large-scale intelligent network management and operation system and elaborate on how the aforementioned areas can be integrated into this system, plus how the network service can benefit.

  • Sách/Book


  • Authors: Roberts, Terisa (2022)

  • This book provides an overview and introduction to the application of artificial intelligence and machine learning in risk management. It will cover practical application of newer modelling techniques in risk management and explore what the opportunities are of using artificial intelligence and machine learning, as well as the risks and challenges associated with the innovation. In addition, it will explain the options to extend the model governance framework for artificial intelligence and machine learning