Listing 1 - 5 of 5 |
Sort by
|
Choose an application
Self-organizing approaches inspired from biological systems, such as social insects, genetic, molecular and cellular systems under morphogenesis, and human mental development, has enjoyed great success in advanced robotic systems that need to work in dynamic and changing environments. Compared with classical control methods for robotic systems, the major advantages of bio-inspired self-organizing robotic systems include robustness, self-repair and self-healing in the presence of system failures and/or malfunctions, high adaptability to environmental changes, and autonomous self-organization and self-reconfiguration without a centralized control. “Bio-inspired Self-organizing Robotic Systems” provides a valuable reference for scientists, practitioners and research students working on developing control algorithms for self-organizing engineered collective systems, such as swarm robotic systems, self-reconfigurable modular robots, smart material based robotic devices, unmanned aerial vehicles, and satellite constellations. .
Engineering & Applied Sciences --- Computer Science --- Robotics. --- Self-organizing systems. --- Learning systems (Automatic control) --- Self-optimizing systems --- Engineering. --- Artificial intelligence. --- Computational intelligence. --- Automation. --- Computational Intelligence. --- Robotics and Automation. --- Artificial Intelligence (incl. Robotics). --- Automation --- Machine theory --- Automatic factories --- Automatic production --- Computer control --- Engineering cybernetics --- Factories --- Industrial engineering --- Mechanization --- Assembly-line methods --- Automatic control --- Automatic machinery --- CAD/CAM systems --- Robotics --- Intelligence, Computational --- Artificial intelligence --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Construction --- Industrial arts --- Technology --- Soft computing --- Cybernetics --- Intellect --- Learning ability --- Synergetics --- Artificial Intelligence.
Choose an application
Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- neuronale netwerken --- fuzzy logic --- cybernetica --- automatisering --- KI (kunstmatige intelligentie) --- robots
Choose an application
Self-organizing approaches inspired from biological systems, such as social insects, genetic, molecular and cellular systems under morphogenesis, and human mental development, has enjoyed great success in advanced robotic systems that need to work in dynamic and changing environments. Compared with classical control methods for robotic systems, the major advantages of bio-inspired self-organizing robotic systems include robustness, self-repair and self-healing in the presence of system failures and/or malfunctions, high adaptability to environmental changes, and autonomous self-organization and self-reconfiguration without a centralized control. Bio-inspired Self-organizing Robotic Systems provides a valuable reference for scientists, practitioners and research students working on developing control algorithms for self-organizing engineered collective systems, such as swarm robotic systems, self-reconfigurable modular robots, smart material based robotic devices, unmanned aerial vehicles, and satellite constellations.
Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- neuronale netwerken --- fuzzy logic --- cybernetica --- automatisering --- KI (kunstmatige intelligentie) --- robots
Choose an application
This book presents the security and privacy challenges of the smart home following the logic of “terminal device – voice interface – application platform”. For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network. Discusses securing IoT-driven smart home networks on the mobile device, user interface, and application platform. Provides thorough security analysis, existing countermeasures, and proposed novel solutions for each component. Includes a comprehensive full-stack sight view of smart home’s security and privacy issues.
Telecommunication. --- Computer networks. --- Data protection. --- Computational intelligence. --- Communications Engineering, Networks. --- Computer Communication Networks. --- Data and Information Security. --- Computational Intelligence. --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Distributed processing
Choose an application
This book presents the security and privacy challenges of the smart home following the logic of "terminal device - voice interface - application platform". For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network. Discusses securing IoT-driven smart home networks on the mobile device, user interface, and application platform. Provides thorough security analysis, existing countermeasures, and proposed novel solutions for each component. Includes a comprehensive full-stack sight view of smart home's security and privacy issues.
Telecommunication technology --- Mass communications --- Computer architecture. Operating systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- neuronale netwerken --- fuzzy logic --- cybernetica --- tekstverwerking --- computerbeveiliging --- KI (kunstmatige intelligentie) --- computernetwerken --- communicatietechnologie
Listing 1 - 5 of 5 |
Sort by
|