Buch(elektronisch)2022

Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities

In: Studies in Computational Intelligence Series v.1030

init.form.title.accessOptions

init.form.helpText.accessOptions

Verfügbarkeit an Ihrem Standort wird überprüft

Abstract

Intro -- Preface -- Contents -- Deep Learning in Robotics for Strengthening Industry 4.0.: Opportunities, Challenges and Future Directions -- 1 Introduction -- 2 Introduction to Deep Learning -- 3 Deep Learning in Robotics -- 3.1 Object Detection -- 3.2 Object Grasping or Robotic Grasp -- 3.3 Acoustic Modeling -- 3.4 Motion Control -- 4 Challenges and Future Opportunities -- 5 Conclusion -- References -- The Design of a Pheromone-Based Robotic Varroa Trap for Beekeeping Applications -- 1 Introduction -- 2 Existing Solutions -- 2.1 Cultural or Biological Approaches -- 2.2 Mechanical Approaches -- 2.3 Chemical Approaches -- 3 Hardware -- 3.1 Power Supply -- 3.2 Microcontroller -- 3.3 Communication Interface -- 3.4 Switching Circuit -- 3.5 High Voltage Generation -- 3.6 Temperature Measurement -- 3.7 Miscellaneous Circuits -- 3.8 Vaporizer -- 3.9 Enclosure and High Voltage Grid -- 4 Software -- 4.1 The IDE Coocox and Standard Peripheral -- 4.2 The Main Function -- 4.3 The Initialization Functions -- 4.4 Communication with Computer -- 4.5 Temperature Control -- 4.6 The Complete System -- 5 Results -- 6 Conclusion -- References -- Walk Through Event Stream Processing Architecture, Use Cases and Frameworks Survey -- 1 Introduction -- 2 Data Architecture -- 3 Use Cases -- 4 Frameworks -- 5 Comparison -- 6 Conclusion -- References -- Artificial Intelligence for Cybersecurity: Recent Advancements, Challenges and Opportunities -- 1 Introduction -- 1.1 Motivation -- 2 Related Work -- 3 Framework of AI Based Cyber-Security System -- 4 Latest Trends of AI in Cyber-Security -- 4.1 User Access Authentication -- 4.2 Network Situation Awareness -- 4.3 Risk Monitoring -- 4.4 Abnormal Traffic Identification with the Help of Bots -- 4.5 Malware Identification -- 5 Challenges Faced by Researchers -- 5.1 Cyber-Security Datasets -- 5.2 Security Protocols.

Problem melden

Wenn Sie Probleme mit dem Zugriff auf einen gefundenen Titel haben, können Sie sich über dieses Formular gern an uns wenden. Schreiben Sie uns hierüber auch gern, wenn Ihnen Fehler in der Titelanzeige aufgefallen sind.