Simulation and Analysis of Mathematical Methods in Real-Time Engineering Applications. Группа авторов

Чтение книги онлайн.

Читать онлайн книгу Simulation and Analysis of Mathematical Methods in Real-Time Engineering Applications - Группа авторов страница

Simulation and Analysis of Mathematical Methods in Real-Time Engineering Applications - Группа авторов

Скачать книгу

id="u9b97cd53-d0ff-5de6-b9d9-481bb5361a0e">

      

      1  Cover

      2  Title page

      3  Copyright

      4  Preface

      5  Acknowledgments

      6  1 Certain Investigations on Different Mathematical Models in Machine Learning and Artificial Intelligence 1.1 Introduction 1.2 Mathematical Models of Classification Algorithm of Machine Learning 1.3 Mathematical Models and Covid-19 1.4 Conclusion References

      7  2 Edge Computing Optimization Using Mathematical Modeling, Deep Learning Models, and Evolutionary Algorithms 2.1 Introduction to Edge Computing and Research Challenges 2.2 Introduction for Computational Offloading in Edge Computing 2.3 Mathematical Model for Offloading 2.4 QoS and Optimization in Edge Computing 2.5 Deep Learning Mathematical Models for Edge Computing 2.6 Evolutionary Algorithm and Edge Computing 2.7 Conclusion References

      8  3 Mathematical Modelling of Cryptographic Approaches in Cloud Computing Scenario 3.1 Introduction to IoT 3.2 Data Computation Process 3.3 Data Partition Process 3.4 Data Encryption Process 3.5 Results and Discussions 3.6 Overview and Conclusion References

      9  4 An Exploration of Networking and Communication Methodologies for Security and Privacy Preservation in Edge Computing Platforms Introduction 4.1 State-of-the-Art Edge Security and Privacy Preservation Protocols 4.2 Authentication and Trust Management in Edge Computing Paradigms 4.3 Key Management in Edge Computing Platforms 4.4 Secure Edge Computing in IoT Platforms 4.5 Secure Edge Computing Architectures Using Block Chain Technologies 4.6 Machine Learning Perspectives on Edge Security 4.7 Privacy Preservation in Edge Computing 4.8 Advances of On-Device Intelligence for Secured Data Transmission 4.9 Security and Privacy Preservation for Edge Intelligence in Beyond 5G Networks 4.10 Providing Cyber Security Using Network and Communication Protocols for Edge Computing Devices 4.11 Conclusion References

      10  5 Nature Inspired Algorithm for Placing Sensors in Structural Health Monitoring System - Mouth Brooding Fish Approach 5.1 Introduction 5.2 Structural Health Monitoring 5.3 Machine Learning 5.4 Approaches of ML in SHM 5.5 Mouth Brooding Fish Algorithm 5.6 Case Studies On OSP Using Mouth Brooding Fish Algorithms 5.7 Conclusions References

      11  6 Heat Source/Sink Effects on Convective Flow of a Newtonian Fluid Past an Inclined Vertical Plate in Conducting Field 6.1 Introduction 6.2 Mathematic Formulation and Physical Design 6.3 Discusion of Findings 6.4 Conclusion References

      12  7 Application of Fuzzy Differential Equations in Digital Images Via Fixed Point Techniques 7.1 Introduction 7.2 Preliminaries 7.3 Applications of Fixed-Point Techniques 7.4 An Application 7.5

Скачать книгу