Udvidet returret til d. 31. januar 2025

Bøger af Yulei Wu

Filter
Filter
Sorter efterSorter Populære
  • af Chintan Bhatt
    1.091,95 - 1.100,95 kr.

    The book provides an examination of how fog security is changing the information technology industry and will continue to in the next decade. The authors first discuss how fog enables key applications in wireless 5G, the Internet of Things, and big data. The book then presents an overview of fog/edge computing, focusing on its relationship with cloud technology, Internet of Things and the future with the use of secure 5G/6G communication. The book also presents a comprehensive overview of liabilities in fog/edge computing within multi-level architectures and the intelligent management. The last part of the book reviews applications of fog/edge computing in smart cities, including in Industrial IoT, edge-based augmented reality, data streaming, and blockchain-based.

  • af Abhishek Roy, Harpreet S. Dhillon, Yulei Wu, mfl.
    1.984,95 kr.

  • af Yulei Wu, Pradeep N & Amar Das
    1.453,95 kr.

    Unleashing the Potentials of Blockchain Technology for Healthcare Industries discusses blockchain and its adaptation in healthcare industries to provide a secured framework to safeguard healthcare data, both patient and hospital data. The book integrates key pillars of blockchain such as foundations, architecture, smart contracts, adoption, standards, service (BaaS), security, consensus algorithms, drug discovery process, among others, for fortifying the current practices in the healthcare industries. In addition, it offers solutions to the pressing issues currently being faced by the healthcare processes due to the COVD-19 pandemic. This will be a valuable resource for medical informaticians, researchers, healthcare professionals and members of the biomedical field who are interested in learning more about the potentials of blockchain in healthcare.

  • - 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part II
    af Xiang-He Sun
    620,95 kr.

    This two volume set LNCS 8630 and 8631 constitutes the proceedings of the 14th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2014, held in Dalian, China, in August 2014. The 70 revised papers presented in the two volumes were selected from 285 submissions. The first volume comprises selected papers of the main conference and papers of the 1st International Workshop on Emerging Topics in Wireless and Mobile Computing, ETWMC 2014, the 5th International Workshop on Intelligent Communication Networks, IntelNet 2014, and the 5th International Workshop on Wireless Networks and Multimedia, WNM 2014. The second volume comprises selected papers of the main conference and papers of the Workshop on Computing, Communication and Control Technologies in Intelligent Transportation System, 3C in ITS 2014, and the Workshop on Security and Privacy in Computer and Network Systems, SPCNS 2014.

  • af Yulei Wu
    1.114,95 kr.

    AI AND MACHINE LEARNING FOR NETWORK AND SECURITY MANAGEMENTExtensive Resource for Understanding Key Tasks of Network and Security ManagementAI and Machine Learning for Network and Security Management covers a range of key topics of network automation for network and security management, including resource allocation and scheduling, network planning and routing, encrypted traffic classification, anomaly detection, and security operations. In addition, the authors introduce their large-scale intelligent network management and operation system and elaborate on how the aforementioned areas can be integrated into this system, plus how the network service can benefit.Sample ideas covered in this thought-provoking work include:* How cognitive means, e.g., knowledge transfer, can help with network and security management* How different advanced AI and machine learning techniques can be useful and helpful to facilitate network automation* How the introduced techniques can be applied to many other related network and security management tasksNetwork engineers, content service providers, and cybersecurity service providers can use AI and Machine Learning for Network and Security Management to make better and more informed decisions in their areas of specialization. Students in a variety of related study programs will also derive value from the work by gaining a base understanding of historical foundational knowledge and seeing the key recent developments that have been made in the field.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.