Listing 1 - 10 of 69 | << page >> |
Sort by
|
Choose an application
This book is meant for readers who want to understand GANs without the need for a strong mathematical background. Moreover, it covers the practical applications of GANs, making it an excellent resource for beginners. A Primer on Generative Adversarial Networks is suitable for researchers, developers, students, and anyone who wishes to learn about GANs. It is assumed that the reader has a basic understanding of machine learning and neural networks. The book comes with ready-to-run scripts that readers can use for further research. Python is used as the primary programming language, so readers should be familiar with its basics. The book starts by providing an overview of GAN architecture, explaining the concept of generative models. It then introduces the most straightforward GAN architecture, which explains how GANs work and covers the concepts of generator and discriminator. The book then goes into the more advanced real-world applications of GANs, such as human face generation, deep fake, CycleGANs, and more. By the end of the book, readers will have an essential understanding of GANs and be able to write their own GAN code. They can apply this knowledge to their projects, regardless of whether they are beginners or experienced machine learning practitioners.
Machine learning. --- Signal processing. --- Computer simulation. --- Machine Learning. --- Signal, Speech and Image Processing . --- Computer Modelling. --- Processing, Signal --- Information measurement --- Signal theory (Telecommunication) --- Learning, Machine --- Artificial intelligence --- Machine theory --- Computer modeling --- Computer models --- Modeling, Computer --- Models, Computer --- Simulation, Computer --- Electromechanical analogies --- Mathematical models --- Simulation methods --- Model-integrated computing
Choose an application
Choose an application
Choose an application
This book is meant for readers who want to understand GANs without the need for a strong mathematical background. Moreover, it covers the practical applications of GANs, making it an excellent resource for beginners. A Primer on Generative Adversarial Networks is suitable for researchers, developers, students, and anyone who wishes to learn about GANs. It is assumed that the reader has a basic understanding of machine learning and neural networks. The book comes with ready-to-run scripts that readers can use for further research. Python is used as the primary programming language, so readers should be familiar with its basics. The book starts by providing an overview of GAN architecture, explaining the concept of generative models. It then introduces the most straightforward GAN architecture, which explains how GANs work and covers the concepts of generator and discriminator. The book then goes into the more advanced real-world applications of GANs, such as human face generation, deep fake, CycleGANs, and more. By the end of the book, readers will have an essential understanding of GANs and be able to write their own GAN code. They can apply this knowledge to their projects, regardless of whether they are beginners or experienced machine learning practitioners.
Electronics --- Programming --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- signal processing --- mineralen (chemie) --- programmeren (informatica) --- mijnbouw --- signaalprocessoren --- signaalverwerking
Choose an application
Calcareous soils --- Nitrogen --- soil fertility --- Tunisia
Choose an application
This brief presents the challenges and solutions for VANETs’ security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO). The authors give an overview of the concept of the vehicular IP-address configurations as the prerequisite step to achieve mobility management for VANETs, and review the current security and privacy schemes applied in the three mobility management protocols. Throughout the brief, the authors propose new schemes and protocols to increase the security of IP addresses within VANETs including an anonymous and location privacy-preserving scheme for the MIPv6 protocol, a mutual authentication scheme that thwarts authentication attacks, and a fake point-cluster based scheme to prevent attackers from localizing users inside NEMO-based VANET hotspots. The brief concludes with future research directions. Professionals and researchers will find the analysis and new privacy schemes outlined in this brief a valuable addition to the literature on VANET management.
Engineering & Applied Sciences --- Computer Science --- Mobile computing. --- Wireless communication systems. --- Mobile communication systems. --- Vehicles --- Vehicular communication systems --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Communication systems --- Computer science. --- Computer communication systems. --- Computer security. --- Electrical engineering. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Communications Engineering, Networks. --- Radio --- Wireless communication systems --- Telecommunication systems --- Electronic data processing --- Context-aware computing --- Portable computers --- Telecommunication. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Application software. --- Electric engineering --- Engineering --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing --- Vehicular ad hoc networks (Computer networks) --- Computer networks --- Multicasting (Computer networks) --- Security measures.
Choose an application
Hepatitis C --- Hepatitis, Non-A, non-B --- Non-A, non-B hepatitis, Parenterally-transmitted --- Parenterally-transmitted non-A, non-B hepatitis --- Flaviviral diseases --- Hepatitis, Viral --- Developing countries. --- Emerging nations --- Fourth World --- Global South --- LDC's --- Least developed countries --- Less developed countries --- Newly industrialized countries --- Newly industrializing countries --- NICs --- Third World --- Underdeveloped areas --- Underdeveloped countries
Choose an application
Choose an application
French literature (outside France) --- Regional documentation --- Brussels
Choose an application
This brief presents the challenges and solutions for VANETs’ security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO). The authors give an overview of the concept of the vehicular IP-address configurations as the prerequisite step to achieve mobility management for VANETs, and review the current security and privacy schemes applied in the three mobility management protocols. Throughout the brief, the authors propose new schemes and protocols to increase the security of IP addresses within VANETs including an anonymous and location privacy-preserving scheme for the MIPv6 protocol, a mutual authentication scheme that thwarts authentication attacks, and a fake point-cluster based scheme to prevent attackers from localizing users inside NEMO-based VANET hotspots. The brief concludes with future research directions. Professionals and researchers will find the analysis and new privacy schemes outlined in this brief a valuable addition to the literature on VANET management.
Telecommunication technology --- Mass communications --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- iPad --- mobiele netwerken --- computers --- informatica --- informatiesystemen --- tekstverwerking --- computerbeveiliging --- computernetwerken --- computerkunde --- communicatietechnologie
Listing 1 - 10 of 69 | << page >> |
Sort by
|