Green Machine Learning Protocols for Future Communication Networks


Book Description

Machine learning has shown tremendous benefits in solving complex network problems and providing situation and parameter prediction. However, heavy resources are required to process and analyze the data, which can be done either offline or using edge computing but also requires heavy transmission resources to provide a timely response. The need here is to provide lightweight machine learning protocols that can process and analyze the data at run time and provide a timely and efficient response. These algorithms have grown in terms of computation and memory requirements due to the availability of large data sets. These models/algorithms also require high levels of resources such as computing, memory, communication, and storage. The focus so far was on producing highly accurate models for these communication networks without considering the energy consumption of these machine learning algorithms. For future scalable and sustainable network applications, efforts are required toward designing new machine learning protocols and modifying the existing ones, which consume less energy, i.e., green machine learning protocols. In other words, novel and lightweight green machine learning algorithms/protocols are required to reduce energy consumption which can also reduce the carbon footprint. To realize the green machine learning protocols, this book presents different aspects of green machine learning for future communication networks. This book highlights mainly the green machine learning protocols for cellular communication, federated learning-based models, and protocols for Beyond Fifth Generation networks, approaches for cloud-based communications, and Internet-of-Things. This book also highlights the design considerations and challenges for green machine learning protocols for different future applications.




AI, Machine Learning and Deep Learning


Book Description

Today, Artificial Intelligence (AI) and Machine Learning/ Deep Learning (ML/DL) have become the hottest areas in information technology. In our society, many intelligent devices rely on AI/ML/DL algorithms/tools for smart operations. Although AI/ML/DL algorithms and tools have been used in many internet applications and electronic devices, they are also vulnerable to various attacks and threats. AI parameters may be distorted by the internal attacker; the DL input samples may be polluted by adversaries; the ML model may be misled by changing the classification boundary, among many other attacks and threats. Such attacks can make AI products dangerous to use. While this discussion focuses on security issues in AI/ML/DL-based systems (i.e., securing the intelligent systems themselves), AI/ML/DL models and algorithms can actually also be used for cyber security (i.e., the use of AI to achieve security). Since AI/ML/DL security is a newly emergent field, many researchers and industry professionals cannot yet obtain a detailed, comprehensive understanding of this area. This book aims to provide a complete picture of the challenges and solutions to related security issues in various applications. It explains how different attacks can occur in advanced AI tools and the challenges of overcoming those attacks. Then, the book describes many sets of promising solutions to achieve AI security and privacy. The features of this book have seven aspects: This is the first book to explain various practical attacks and countermeasures to AI systems Both quantitative math models and practical security implementations are provided It covers both "securing the AI system itself" and "using AI to achieve security" It covers all the advanced AI attacks and threats with detailed attack models It provides multiple solution spaces to the security and privacy issues in AI tools The differences among ML and DL security and privacy issues are explained Many practical security applications are covered




Advanced Information Networking and Applications


Book Description

This book covers the theory, design and applications of computer networks, distributed computing and information systems. Networks of today are going through a rapid evolution, and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low-power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations is emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low-cost and high-volume applications. Several of such applications have been difficult to realize because of many interconnections problems. To fulfill their large range of applications, different kinds of networks need to collaborate, and wired and next generation wireless systems should be integrated in order to develop high-performance computing solutions to problems arising from the complexities of these networks. The aim of the book “Advanced Information Networking and Applications” is to provide the latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications.




Mobile and Ubiquitous Systems: Computing, Networking and Services


Book Description

This book constitutes the refereed post-conference proceedings of the 19th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2022, which was held in Pittsburgh, November 14-17, 2022. The conference was held virtually due to the COVID-19 pandemic. The 26 full and 2 short papers were carefully reviewed and selected from 95 submissions and present discussions, They were organized in topical sections as follows: Internet of Things (IoT), Security and Privacy, Human-centric sensing, Drone applications and edge computing, Wireless networks, Mobile and human computer interactions, Poster and demo sessions, Technology for health




Ubiquitous Networking


Book Description




Principles and Applications of Adaptive Artificial Intelligence


Book Description

The rapid adoption of deep learning models has resulted in many business services becoming model services, yet most AI systems lack the necessary automation and industrialization capabilities. This leads to heavy reliance on manual operation and maintenance, which not only consumes power but also causes resource wastage and stability issues during system mutations. The inadequate self-adaptation of AI systems poses significant challenges in terms of cost-effectiveness and operational stability. Principles and Applications of Adaptive Artificial Intelligence, edited by Zhihan Lv from Uppsala University, Sweden, offers a comprehensive solution to the self-adaptation problem in AI systems. It explores the latest concepts, technologies, and applications of Adaptive AI, equipping academic scholars and professionals with the necessary knowledge to overcome the challenges faced by traditional business logic transformed into model services. With its problem-solving approach, real-world case studies, and thorough analysis, the Handbook provides practitioners with practical ideas and solutions, while also serving as a valuable teaching material and reference guide for students and educators in AI-related disciplines. By emphasizing self-adaptation, continuous model iteration, and dynamic learning based on real-time feedback, the book empowers readers to significantly enhance the cost-effectiveness and operational stability of AI systems, making it an indispensable resource for researchers, professionals, and students seeking to revolutionize their research and applications in the field of Adaptive AI.




Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security


Book Description

This book features selected research papers presented at the Fourth International Conference on Computing, Communications, and Cyber-Security (IC4S 2022), organized in Ghaziabad India, during October 21–22, 2022. The conference was hosted at KEC Ghaziabad in collaboration with WSG Poland, SFU Russia, & CSRL India. It includes innovative work from researchers, leading innovators, and professionals in the area of communication and network technologies, advanced computing technologies, data analytics and intelligent learning, the latest electrical and electronics trends, and security and privacy issues.




Web and Big Data


Book Description

This three-volume set, LNCS 13421, 13422 and 13423, constitutes the thoroughly refereed proceedings of the 6th International Joint Conference, APWeb-WAIM 2022, held in Nanjing, China, in August 2022. The 75 full papers presented together with 45 short papers, and 5 demonstration papers were carefully reviewed and selected from 297 submissions. The papers are organized around the following topics: Big Data Analytic and Management, Advanced database and web applications, Cloud Computing and Crowdsourcing, Data Mining, Graph Data and Social Networks, Information Extraction and Retrieval, Knowledge Graph, Machine Learning, Query processing and optimization, Recommender Systems, Security, privacy, and trust and Blockchain data management and applications, and Spatial and multi-media data.