Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
In: Studies in Computational Intelligence Series v.1030
Intro -- Preface -- Contents -- Deep Learning in Robotics for Strengthening Industry 4.0.: Opportunities, Challenges and Future Directions -- 1 Introduction -- 2 Introduction to Deep Learning -- 3 Deep Learning in Robotics -- 3.1 Object Detection -- 3.2 Object Grasping or Robotic Grasp -- 3.3 Acoustic Modeling -- 3.4 Motion Control -- 4 Challenges and Future Opportunities -- 5 Conclusion -- References -- The Design of a Pheromone-Based Robotic Varroa Trap for Beekeeping Applications -- 1 Introduction -- 2 Existing Solutions -- 2.1 Cultural or Biological Approaches -- 2.2 Mechanical Approaches -- 2.3 Chemical Approaches -- 3 Hardware -- 3.1 Power Supply -- 3.2 Microcontroller -- 3.3 Communication Interface -- 3.4 Switching Circuit -- 3.5 High Voltage Generation -- 3.6 Temperature Measurement -- 3.7 Miscellaneous Circuits -- 3.8 Vaporizer -- 3.9 Enclosure and High Voltage Grid -- 4 Software -- 4.1 The IDE Coocox and Standard Peripheral -- 4.2 The Main Function -- 4.3 The Initialization Functions -- 4.4 Communication with Computer -- 4.5 Temperature Control -- 4.6 The Complete System -- 5 Results -- 6 Conclusion -- References -- Walk Through Event Stream Processing Architecture, Use Cases and Frameworks Survey -- 1 Introduction -- 2 Data Architecture -- 3 Use Cases -- 4 Frameworks -- 5 Comparison -- 6 Conclusion -- References -- Artificial Intelligence for Cybersecurity: Recent Advancements, Challenges and Opportunities -- 1 Introduction -- 1.1 Motivation -- 2 Related Work -- 3 Framework of AI Based Cyber-Security System -- 4 Latest Trends of AI in Cyber-Security -- 4.1 User Access Authentication -- 4.2 Network Situation Awareness -- 4.3 Risk Monitoring -- 4.4 Abnormal Traffic Identification with the Help of Bots -- 4.5 Malware Identification -- 5 Challenges Faced by Researchers -- 5.1 Cyber-Security Datasets -- 5.2 Security Protocols.
Problem melden