|
|
Showing 1 - 7 of
7 matches in All Departments
Hardware Accelerator Systems for Artificial Intelligence and
Machine Learning, Volume 122 delves into arti?cial Intelligence and
the growth it has seen with the advent of Deep Neural Networks
(DNNs) and Machine Learning. Updates in this release include
chapters on Hardware accelerator systems for artificial
intelligence and machine learning, Introduction to Hardware
Accelerator Systems for Artificial Intelligence and Machine
Learning, Deep Learning with GPUs, Edge Computing Optimization of
Deep Learning Models for Specialized Tensor Processing
Architectures, Architecture of NPU for DNN, Hardware Architecture
for Convolutional Neural Network for Image Processing, FPGA based
Neural Network Accelerators, and much more.
This book explores new methods, architectures, tools, and
algorithms for Artificial Intelligence Hardware Accelerators. The
authors have structured the material to simplify readers’ journey
toward understanding the aspects of designing hardware
accelerators, complex AI algorithms, and their computational
requirements, along with the multifaceted applications. Coverage
focuses broadly on the hardware aspects of training, inference,
mobile devices, and autonomous vehicles (AVs) based AI accelerators
This contributed volume discusses diverse topics to demystify the
rapidly emerging and evolving blockchain technology, the emergence
of integrated platforms and hosted third-party tools, and the
development of decentralized applications for various business
domains. It presents various applications that are helpful for
research scholars and scientists who are working toward identifying
and pinpointing the potential of as well as the hindrances to this
technology.
Role of Blockchain Technology in IoT Applications, Volume 115 in
the Advances in Computers series, reviews the latest information on
this topic that promises many applications in human life. According
to forecasts made by various market research/survey agencies, there
will be around 50 Billion connected devices (IoT) by 2020. Updates
in this new release include chapters on the Technical Aspects of
Blockchain and IoT, Integrated Platforms for Blockchain-Enablement,
Intersections Between IoT and Distributed Ledger, Blockchain and
Artificial Intelligence: How and Why Combining These Two
Groundbreaking Technologies, Blockchain Applications in Health Care
and Opportunities and Advancements Due to New Information
Technology Frameworks, and more.
This book outlines the development of safety and cybersecurity,
threats and activities in automotive vehicles. This book discusses
the automotive vehicle applications and technological aspects
considering its cybersecurity issues. Each chapter offers a
suitable context for understanding the complexities of the
connectivity and cybersecurity of intelligent and autonomous
vehicles. A top-down strategy was adopted to introduce the
vehicles' intelligent features and functionality. The area of
vehicle-to-everything (V2X) communications aims to exploit the
power of ubiquitous connectivity for the traffic safety and
transport efficiency. The chapters discuss in detail about the
different levels of autonomous vehicles, different types of
cybersecurity issues, future trends and challenges in autonomous
vehicles. Security must be thought as an important aspect during
designing and implementation of the autonomous vehicles to prevent
from numerous security threats and attacks. The book thus provides
important information on the cybersecurity challenges faced by the
autonomous vehicles and it seeks to address the mobility
requirements of users, comfort, safety and security. This book aims
to provide an outline of most aspects of cybersecurity in
intelligent and autonomous vehicles. It is very helpful for
automotive engineers, graduate students and technological
administrators who want to know more about security technology as
well as to readers with a security background and experience who
want to know more about cybersecurity concerns in modern and future
automotive applications and cybersecurity. In particular, this book
helps people who need to make better decisions about automotive
security and safety approaches. Moreover, it is beneficial to
people who are involved in research and development in this
exciting area. As seen from the table of contents, automotive
security covers a wide variety of topics. In addition to being
distributed through various technological fields, automotive
cybersecurity is a recent and rapidly moving field, such that the
selection of topics in this book is regarded as tentative solutions
rather than a final word on what exactly constitutes automotive
security. All of the authors have worked for many years in the area
of embedded security and for a few years in the field of different
aspects of automotive safety and security, both from a research and
industry point of view.
This book outlines the development of safety and cybersecurity,
threats and activities in automotive vehicles. This book discusses
the automotive vehicle applications and technological aspects
considering its cybersecurity issues. Each chapter offers a
suitable context for understanding the complexities of the
connectivity and cybersecurity of intelligent and autonomous
vehicles. A top-down strategy was adopted to introduce the
vehicles' intelligent features and functionality. The area of
vehicle-to-everything (V2X) communications aims to exploit the
power of ubiquitous connectivity for the traffic safety and
transport efficiency. The chapters discuss in detail about the
different levels of autonomous vehicles, different types of
cybersecurity issues, future trends and challenges in autonomous
vehicles. Security must be thought as an important aspect during
designing and implementation of the autonomous vehicles to prevent
from numerous security threats and attacks. The book thus provides
important information on the cybersecurity challenges faced by the
autonomous vehicles and it seeks to address the mobility
requirements of users, comfort, safety and security. This book aims
to provide an outline of most aspects of cybersecurity in
intelligent and autonomous vehicles. It is very helpful for
automotive engineers, graduate students and technological
administrators who want to know more about security technology as
well as to readers with a security background and experience who
want to know more about cybersecurity concerns in modern and future
automotive applications and cybersecurity. In particular, this book
helps people who need to make better decisions about automotive
security and safety approaches. Moreover, it is beneficial to
people who are involved in research and development in this
exciting area. As seen from the table of contents, automotive
security covers a wide variety of topics. In addition to being
distributed through various technological fields, automotive
cybersecurity is a recent and rapidly moving field, such that the
selection of topics in this book is regarded as tentative solutions
rather than a final word on what exactly constitutes automotive
security. All of the authors have worked for many years in the area
of embedded security and for a few years in the field of different
aspects of automotive safety and security, both from a research and
industry point of view.
This contributed volume discusses diverse topics to demystify the
rapidly emerging and evolving blockchain technology, the emergence
of integrated platforms and hosted third-party tools, and the
development of decentralized applications for various business
domains. It presents various applications that are helpful for
research scholars and scientists who are working toward identifying
and pinpointing the potential of as well as the hindrances to this
technology.
|
You may like...
You Made Me
Erin Minta Maxfield-Steele
Hardcover
R530
R489
Discovery Miles 4 890
|