ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Artificial Intelligence and Cybersecurity: Advances and Innovations (Green Engineering and Technology)

دانلود کتاب هوش مصنوعی و امنیت سایبری: پیشرفت‌ها و نوآوری‌ها (مهندسی و فناوری سبز)

Artificial Intelligence and Cybersecurity: Advances and Innovations (Green Engineering and Technology)

مشخصات کتاب

Artificial Intelligence and Cybersecurity: Advances and Innovations (Green Engineering and Technology)

ویرایش: [1 ed.] 
نویسندگان:   
سری:  
ISBN (شابک) : 036746666X, 9780367466664 
ناشر: CRC Press 
سال نشر: 2022 
تعداد صفحات: 320
[223] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 17 Mb 

قیمت کتاب (تومان) : 46,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 3


در صورت تبدیل فایل کتاب Artificial Intelligence and Cybersecurity: Advances and Innovations (Green Engineering and Technology) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب هوش مصنوعی و امنیت سایبری: پیشرفت‌ها و نوآوری‌ها (مهندسی و فناوری سبز) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب هوش مصنوعی و امنیت سایبری: پیشرفت‌ها و نوآوری‌ها (مهندسی و فناوری سبز)



هوش مصنوعی و امنیت سایبری دو حوزه نوظهور هستند که سهم خارق‌العاده‌ای در پیشرفت فناوری دارند. با افزایش حملات سایبری، نیاز به شناسایی تهدیدها و خنثی کردن حملات وجود دارد. این کتاب شامل پیشرفت‌های اخیری است که هوش مصنوعی به دنیای امنیت سایبری می‌آورد.

هوش مصنوعی و امنیت سایبری: پیشرفت‌ها و نوآوری‌ها پیاده‌سازی سیستم پیشرفته‌ای را برای شهرهای هوشمند با استفاده از هوش مصنوعی فراهم می‌کند. این به گردش کار چارچوب عملکردی کامل می‌پردازد و مفاهیم پایه و سطح بالا را بررسی می‌کند. این کتاب بر اساس آخرین فناوری‌ها است که چالش‌ها، مسائل و پیشرفت‌های عمده را پوشش می‌دهد و مدیریت هوشمند داده‌ها و سیستم‌های خودکار را مورد بحث قرار می‌دهد.

این کتاب ویرایش‌شده یک پلت فرم بین‌رشته‌ای برتر برای محققان، پزشکان و مربیان فراهم می‌کند. این مقاله جدیدترین نوآوری ها، روندها و نگرانی ها و همچنین چالش ها و راه حل های عملی اتخاذ شده در زمینه های هوش مصنوعی و امنیت سایبری را ارائه و مورد بحث قرار می دهد.


توضیحاتی درمورد کتاب به خارجی

Artificial Intelligence and Cybersecurity are two emerging fields that have phenomenal contributions towards technological advancement. As cyber-attacks increase, there is a need to identify threats and thwart attacks. This book will incorporate the recent developments that artificial intelligence brings to the cybersecurity world.

Artificial Intelligence and Cybersecurity: Advances and Innovations provides advanced system implementation for Smart Cities using Artificial Intelligence. It addresses the complete functional framework workflow and explores basic and high-level concepts. The book is based on the latest technologies covering major challenges, issues, and advances, and discusses intelligent data management and automated systems.

This edited book provides a premier interdisciplinary platform for researchers, practitioners, and educators. It presents and discusses the most recent innovations, trends, and concerns as well as practical challenges and solutions adopted in the fields of Artificial Intelligence and Cybersecurity.



فهرست مطالب

Cover
Half Title
Series Page
Title Page
Copyright Page
Table of Contents
Preface
About the Editors
Contributors
Chapter 1 Heart Disease Prediction: A Comparative Study Based on a Machine-Learning Approach
	Introduction
	Literature Survey
	AI Diagnosis Process
		Datasets and Attributes
		Data Cleaning
		Feature Selection
	Machine Learning
		XGBoost
	Result Analysis
		Confusion Matrix
		Receiver Operating Curve (ROC
	Conclusion and Future Scope
	Acknowledgements
	Bibliography
Chapter 2 AI Impacts on Photonic Crystal Sensing for the Detection of Tumors
	Introduction
		Biological Sensing
	Tumors and Their Classification
	Projected PCF-Based Refractive Index Sensor
	Artificial Intelligence Algorithm Helps to Detect Tumors
	Result and Discussion
	Conclusion
	Acknowledgement
	Declaration
	Conflict of Interest
	References
Chapter 3 Cybersecurity Solutions and Communication Technologies for Internet of Things Applications
	Introduction
	Cybersecurity in IoT Architecture
		Cybersecurity at the Perception Layer
		Cybersecurity at the Network Layer
		Cybersecurity at the Processing Layer
		Cybersecurity at the Application Layer
		Cybersecurity at the Service Management Layer
	Security Mechanisms for IoT Services
		Encryption
		Standard Encryption Mechanism
		Lightweight Cryptography
		Random Number Generator
		Secure Hardware
		Intrusion Detection System
	Major IoT Communication Technologies
		Zigbee
		Bluetooth Low Energy
		6LoWPAN
		CoAP
		LoRaWAN
	Computational Intelligence-Enabled Cybersecurity for IoT
	Conclusion
	References
Chapter 4 Cyberattacks and Risk Management Strategy in Internet of Things Architecture
	Introduction
	Cybersecurity-Oriented IoT Architecture
		Sensing Layer
		Network Layer
		Middleware Layer
		Application Layer
	Attacks on IoT Devices
		Initial Reconnaissance
		Physical Attacks
		Man-in-the-Middle Attack
		Ransomware
		Brute Force Attacks
		Botnets
		Denial-of-Service (DoS) Attack
	Cybersecurity Risk Management
		Qualitative Approach
		Quantitative Approach
	Artificial Intelligence (AI) in Cybersecurity
		Machine Learning
		Decision Trees
		K-Nearest Neighbors
		Support Vector Machines
		Artificial Neural Networks
	Quantum-Resistant Cybersecurity Technologies
		Multivariate Cryptography
		Code-Based Signatures
		Hash-Based Signatures
		Lattice-Based Cryptography
	Conclusion
	References
Chapter 5 Blockchain-Based Cybersecurity Solutions for Industry 4.0 Applications
	Introduction
	Four-Layered Cybersecurity-Oriented IoT Architecture
		Sensing Layer
		Network Layer
		Middleware Layer
		Application Layer
	Security Threats in Industry 4.0
		Cyberespionage
		Denial-of-Service
		Supply Chain and Extended Systems
		Smart Security and Smart Factory
		Advanced Persistent Threat
		Logistics
		Active Supervision
	Cybersecurity Solutions for Factories
		Controlled Industrial Environment Research
		Software Defined Networking (SDN
		Direct-to-Machine Approach in CPS
		Ensemble Intelligence in Advanced Manufacturing
		Behavioral Models and Critical State Distance
	Blockchain for Industry 4.0 Applications
		Need for Blockchain
		Smart Contracts for Industry 4.0
	Blockchain-Based Industry 4.0 Applications
		IIoT
		ICPS
		Autonomous Robots and Vehicles
		Cybersecurity
		Simulation Software
	Conclusion
	References
Chapter 6 A Review of Precision Agriculture Based on Embedded System Applications
	Introduction
		Benefits of the Platform for Smart Agriculture
	Literature Survey
	Remote Sensing
	Intelligent Systems
	Internet of Things (IoT
	Proposed System
	Smart Precision Agri-Farm Using Proposed IoT Method
		Comparison of Various Methods in the Precision Agriculture (PA) Field
		Discussion
		Performance Standard Is Too Accurate
		Shortage of Scientific Identification
		Techniques Are Too Specific
	Conclusion
	References
Chapter 7 Facial Feature-Based Human Emotion Detection Using Machine Learning: An Overview
	Introduction
		Making Car Passengers Safe
		Facial Expression Detection in Interviews
		Correct Passengers Are Picked Up by Taxi Drivers
		Video Games Testing
		Unlocking Phones
		Investigation
		Class Attendance
		Airport Security
		Hotels, Casinos and Bars
	Literature Review
	Methodology
		a) Feature-based approach
			(i) Geometric feature-matching technology
			(ii) Elastic bunch graph
		b) Holistic-based approach
			(i) Statistical approach
			(ii) Artificial intelligence methods
		c) Hybrid approach
	Discussion and Conclusion
	References
Chapter 8 A Comprehensive Study of Security in Electronic Commerce Frameworks in the Modern Era of Technology
	Background Study
		Significance of Electronic Commerce
		A Comparative Study of Traditional Commerce versus E-Commerce
		Prerequisite to E-Commerce Security
		Security Systems in E-Commerce
	Security Measures in E-commerce
	Role of E-Commerce in Daily Life
		Role of E-Commerce in Trade Facilitation
		Role of E-Commerce in Cross-Border Transfer Services
		Role of E-Commerce in Cybersecurity
		Role of E-Commerce in Daily Customer Interaction
		Role of E-Commerce in International Internet Connectivity
	Internet Security in E-Commerce
		Secure Sockets Layer (SSL
			SSL Certificate Encompassing E-Commerce
 Transaction Security
			SSL Certificate Requirements
			Securing SSL Certificate
			Digital Certificates
			Importance of Security in Online Transactions
			Ways to Secure Online Transactions
	Secure Hypertext Transfer Protocol (SHTTP
		Working of HTTP
		SHTTP Certificate Overview
	SEO Edges
	Secure Digital Transactions
		Various Methodologies to Protect E-Commerce Sites from Hacking
		Major Strategies Employed to Curtail Fraud in E-Commerce
	Payment Systems in E-Commerce
	Conclusion
	References
Chapter 9 Identification of Paddy Diseases by Various Algorithms–A Review
	Introduction
	Literature Review
		Detection
		Image Processing Methods
		Artificial Neural Networks
		Knowledge Based
		Fuzzy Logic
		Classification
		Remote Sensing
		Membership Function
		Feature-Based Rules
		Neural Networks
	Support Vector Machine (SVM
	Remote Sensing
		Quantification
		Fuzzy Logic
		Neural Networks
		Expert System
		SVM
	Discussion
		Methods Are Too Precise
		Operations Quality Is Too Exact
		Lack of Scientific Recognition
	Conclusion
	References
Chapter 10 A Multimodal Biosignal Compression Technique for Monitoring Health in Wearable Devices
	Introduction
	Methodology
		Transfer Learning (TL
		Multimodal Autoencoder (M-AE
	Proposed Methodology
	Performance Assessment
		Performance Assessment Measures
		Experimental Data
		Experimental Results
	Discussion
	Conclusion
	References
Chapter 11 A Comprehensive Study on Metaheuristics, Big Data and Deep Neural Network Strategies
	Introduction
		Metaheuristics and Big Data
		Deep Neural Network (DNN
			A Brief History of DL
		Feed Forward Neural Network (FNN
	Application of Metaheuristics Algorithms
		Application of Metaheuristic Algorithm in NN Training
		Genetic Algorithm (GA) and NN
		PSO and NN
	Key Concepts of DNN
		Gradient Descent (GD
		Optimisation Algorithms (OAs
	Activation Functions
	Logistic Regression (LR
	Conventional Optimisation Approaches
	Conclusions
	References
Chapter 12 Communication Strategies for Interaction in Social Networks: A Multilingual Perspective
	Introduction
	Communication Strategies
	Politeness in Multilingual and Multicultural Communication
	Politeness in Social Network Communications
	The Framework of Politeness
	Multilingualism and Multiculturalism
	Multilingualism and Language Education
	Conclusion
	References
Index




نظرات کاربران