Listing 1 - 5 of 5 |
Sort by
|
Choose an application
Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the ‘cyberworld’ of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS.
Technology: general issues --- AUTOSAR --- DAG --- runnable scheduling --- control-scheduling codesign --- lagrange multiplier --- Mobile Cyber-Physical Systems (MCPS) --- industry --- Mobile Sink Groups (MSG) --- group mobility --- real-time data delivery --- Intelligent Transportation System (ITS) --- deep neural network --- Red Light Runner (RLR) --- dynamic signal control --- intersection safety --- mixed-criticality --- power-aware --- real-time scheduling --- DVFS --- security taxonomies --- event-based systems --- mobile cyber physical systems --- security flaws --- searchable encryption --- PEKS --- forward privacy --- trusted execution environment --- SGX --- data quality --- large-scale --- high-dimensionality --- linear discriminant analysis --- random projection --- bootstrapping --- controller area network bus --- authentication --- authenticity --- resiliency --- sustainability --- formal verification --- model checking --- in-vehicle network --- model compression --- adversarial robustness --- weight pruning --- adversarial training --- distillation --- embedded system --- secure AI --- n/a
Choose an application
This book focuses on a variety of interdisciplinary perspectives concerning the theory and application of artificial intelligence (AI) in medicine, medically oriented human biology, and healthcare. The list of topics includes the application of AI in biomedicine and clinical medicine, machine learning-based decision support, robotic surgery, data analytics and mining, laboratory information systems, and usage of AI in medical education. Special attention is given to the practical aspect of a study. Hence, the inclusion of a clinical assessment of the usefulness and potential impact of the submitted work is strongly highlighted.
computational intelligence --- medical assistance --- instance-based learning --- healthcare --- clinical decision support systems --- deep neural networks --- medical imaging --- backdoor attacks --- security and privacy --- COVID-19 --- gastric cancer --- endoscopy --- deep learning --- convolutional neural network --- brain --- pituitary adenoma --- dysembryoplastic neuroepithelial tumor --- DNET --- ganglioglioma --- digital pathology --- computer vision --- machine learning --- CNN --- ATLAS --- HarDNet --- Swin transformer --- segmentation --- U-Net --- cerebral infarction --- CycleGAN --- advanced statistics --- schizophrenia --- aggression --- forensic psychiatry --- medical image segmentation --- CT image segmentation --- kernel density --- semi-automated labeling tool --- Bayesian learning --- neuroimaging --- feature selection --- kernel formulation --- mental disorders --- MRI --- visual acuity --- fundus images --- ophthalmology --- SVM --- n/a
Choose an application
Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the ‘cyberworld’ of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS.
AUTOSAR --- DAG --- runnable scheduling --- control-scheduling codesign --- lagrange multiplier --- Mobile Cyber-Physical Systems (MCPS) --- industry --- Mobile Sink Groups (MSG) --- group mobility --- real-time data delivery --- Intelligent Transportation System (ITS) --- deep neural network --- Red Light Runner (RLR) --- dynamic signal control --- intersection safety --- mixed-criticality --- power-aware --- real-time scheduling --- DVFS --- security taxonomies --- event-based systems --- mobile cyber physical systems --- security flaws --- searchable encryption --- PEKS --- forward privacy --- trusted execution environment --- SGX --- data quality --- large-scale --- high-dimensionality --- linear discriminant analysis --- random projection --- bootstrapping --- controller area network bus --- authentication --- authenticity --- resiliency --- sustainability --- formal verification --- model checking --- in-vehicle network --- model compression --- adversarial robustness --- weight pruning --- adversarial training --- distillation --- embedded system --- secure AI --- n/a
Choose an application
This book focuses on a variety of interdisciplinary perspectives concerning the theory and application of artificial intelligence (AI) in medicine, medically oriented human biology, and healthcare. The list of topics includes the application of AI in biomedicine and clinical medicine, machine learning-based decision support, robotic surgery, data analytics and mining, laboratory information systems, and usage of AI in medical education. Special attention is given to the practical aspect of a study. Hence, the inclusion of a clinical assessment of the usefulness and potential impact of the submitted work is strongly highlighted.
Technology: general issues --- History of engineering & technology --- computational intelligence --- medical assistance --- instance-based learning --- healthcare --- clinical decision support systems --- deep neural networks --- medical imaging --- backdoor attacks --- security and privacy --- COVID-19 --- gastric cancer --- endoscopy --- deep learning --- convolutional neural network --- brain --- pituitary adenoma --- dysembryoplastic neuroepithelial tumor --- DNET --- ganglioglioma --- digital pathology --- computer vision --- machine learning --- CNN --- ATLAS --- HarDNet --- Swin transformer --- segmentation --- U-Net --- cerebral infarction --- CycleGAN --- advanced statistics --- schizophrenia --- aggression --- forensic psychiatry --- medical image segmentation --- CT image segmentation --- kernel density --- semi-automated labeling tool --- Bayesian learning --- neuroimaging --- feature selection --- kernel formulation --- mental disorders --- MRI --- visual acuity --- fundus images --- ophthalmology --- SVM --- computational intelligence --- medical assistance --- instance-based learning --- healthcare --- clinical decision support systems --- deep neural networks --- medical imaging --- backdoor attacks --- security and privacy --- COVID-19 --- gastric cancer --- endoscopy --- deep learning --- convolutional neural network --- brain --- pituitary adenoma --- dysembryoplastic neuroepithelial tumor --- DNET --- ganglioglioma --- digital pathology --- computer vision --- machine learning --- CNN --- ATLAS --- HarDNet --- Swin transformer --- segmentation --- U-Net --- cerebral infarction --- CycleGAN --- advanced statistics --- schizophrenia --- aggression --- forensic psychiatry --- medical image segmentation --- CT image segmentation --- kernel density --- semi-automated labeling tool --- Bayesian learning --- neuroimaging --- feature selection --- kernel formulation --- mental disorders --- MRI --- visual acuity --- fundus images --- ophthalmology --- SVM
Choose an application
Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the ‘cyberworld’ of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS.
Technology: general issues --- AUTOSAR --- DAG --- runnable scheduling --- control-scheduling codesign --- lagrange multiplier --- Mobile Cyber-Physical Systems (MCPS) --- industry --- Mobile Sink Groups (MSG) --- group mobility --- real-time data delivery --- Intelligent Transportation System (ITS) --- deep neural network --- Red Light Runner (RLR) --- dynamic signal control --- intersection safety --- mixed-criticality --- power-aware --- real-time scheduling --- DVFS --- security taxonomies --- event-based systems --- mobile cyber physical systems --- security flaws --- searchable encryption --- PEKS --- forward privacy --- trusted execution environment --- SGX --- data quality --- large-scale --- high-dimensionality --- linear discriminant analysis --- random projection --- bootstrapping --- controller area network bus --- authentication --- authenticity --- resiliency --- sustainability --- formal verification --- model checking --- in-vehicle network --- model compression --- adversarial robustness --- weight pruning --- adversarial training --- distillation --- embedded system --- secure AI --- AUTOSAR --- DAG --- runnable scheduling --- control-scheduling codesign --- lagrange multiplier --- Mobile Cyber-Physical Systems (MCPS) --- industry --- Mobile Sink Groups (MSG) --- group mobility --- real-time data delivery --- Intelligent Transportation System (ITS) --- deep neural network --- Red Light Runner (RLR) --- dynamic signal control --- intersection safety --- mixed-criticality --- power-aware --- real-time scheduling --- DVFS --- security taxonomies --- event-based systems --- mobile cyber physical systems --- security flaws --- searchable encryption --- PEKS --- forward privacy --- trusted execution environment --- SGX --- data quality --- large-scale --- high-dimensionality --- linear discriminant analysis --- random projection --- bootstrapping --- controller area network bus --- authentication --- authenticity --- resiliency --- sustainability --- formal verification --- model checking --- in-vehicle network --- model compression --- adversarial robustness --- weight pruning --- adversarial training --- distillation --- embedded system --- secure AI
Listing 1 - 5 of 5 |
Sort by
|