Theory and Applications in Fog Computing, Beyond 5G Networks, and Information Security Herausgeber: Hussain, Md Muzakkir; Reddy, V. Dinesh; Singh, Priyanka
Theory and Applications in Fog Computing, Beyond 5G Networks, and Information Security Herausgeber: Hussain, Md Muzakkir; Reddy, V. Dinesh; Singh, Priyanka
This book provides an overview of the theory and practical applications of swarm intelligence in fog computing, beyond 5G networks, and information security.
This book provides an overview of the theory and practical applications of swarm intelligence in fog computing, beyond 5G networks, and information security.
V. Dinesh Reddy has about 10 years of experience in academia and industrial research as an AI consultant. His research interests lie in Cloud/ Edge Computing, Quantum computing, AI&ML. Md. Muzakkir Hussain is an Assistant Professor at SRM University, AP. He has made significant contributions in the field of Artificial Intelligence, Blockchain, IoT/IoV, and Cloud-Fog Computing. Priyanka Singh is an Associate professor at SRM University, AP, India. Her research interests include Image Processing, Watermarking, Image Forensics, IoT, Artificial Intelligence and Machine Learning.
Inhaltsangabe
Preface. Resource Management in Fog Computing: Overview and Mathematical Foundation. Swarm Intelligence in IoT and Edge Computing. Optimal Deployment of Multiple IoT Applications on the Fog Computing: A Metaheuristic-Based Approach. Machine Learning and Deep Learning with Swarm Algorithms. Search and Rescue Using UAV SWARM in Disaster Management: A Survey. Trust Based Access Control in IoT Network. Safeguarding User Privacy at the Edge of Fog Computing Networks in Decentralized Distributed Computing. Attack Resilient Authentication Scheme for Fog-centric IoT Device Systems. Navigating Ethical Challenges. A Robust DIW Approach for UAV Image Transmission Using PSMD Encryption. References. Index.
Preface. Resource Management in Fog Computing: Overview and Mathematical Foundation. Swarm Intelligence in IoT and Edge Computing. Optimal Deployment of Multiple IoT Applications on the Fog Computing: A Metaheuristic-Based Approach. Machine Learning and Deep Learning with Swarm Algorithms. Search and Rescue Using UAV SWARM in Disaster Management: A Survey. Trust Based Access Control in IoT Network. Safeguarding User Privacy at the Edge of Fog Computing Networks in Decentralized Distributed Computing. Attack Resilient Authentication Scheme for Fog-centric IoT Device Systems. Navigating Ethical Challenges. A Robust DIW Approach for UAV Image Transmission Using PSMD Encryption. References. Index.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826