Integrating Edge Intelligence and Blockchain


Book Description

This book examines whether the integration of edge intelligence (EI) and blockchain (BC) can open up new horizons for providing ubiquitous intelligent services. Accordingly, the authors conduct a summarization of the recent research efforts on the existing works for EI and BC, further painting a comprehensive picture of the limitation of EI and why BC could benefit EI. To examine how to integrate EI and BC, the authors discuss the BC-driven EI and tailoring BC to EI, including an overview, motivations, and integrated frameworks. Finally, some challenges and future directions are explored. The book explores the technologies associated with the integrated system between EI and BC, and further bridges the gap between immature BC and EI-amicable BC. Explores the integration of edge intelligence (EI) and blockchain (BC), including their integrated motivations, frameworks and challenges; Presents how BC-driven EI can realize computing-power management, data administration, and model optimization; Describes how to tailor BC to better support EI, including flexible consensus protocol, effective incentive mechanism, intellectuality smart contract, and scalable BC system tailoring; Presents some key research challenges and future directions for the integrated system.




Mobile Edge Computing


Book Description

This is an open access book. It offers comprehensive, self-contained knowledge on Mobile Edge Computing (MEC), which is a very promising technology for achieving intelligence in the next-generation wireless communications and computing networks.The book starts with the basic concepts, key techniques and network architectures of MEC. Then, we present the wide applications of MEC, including edge caching, 6G networks, Internet of Vehicles, and UAVs. In the last part, we present new opportunities when MEC meets blockchain, Artificial Intelligence, and distributed machine learning (e.g., federated learning). We also identify the emerging applications of MEC in pandemic, industrial Internet of Things and disaster management.The book allows an easy cross-reference owing to the broad coverage on both the principle and applications of MEC. The book is written for people interested in communications and computer networks at all levels. The primary audience includes senior undergraduates, postgraduates, educators, scientists, researchers, developers, engineers, innovators and research strategists.




Blockchain Technologies for Sustainable Development in Smart Cities


Book Description

Blockchain technology has great potential to radically change our socio-economic systems by guaranteeing secure transactions between untrusted entities, reducing costs, and simplifying many processes. However, employing blockchain techniques in sustainable applications development for smart cities still has some technical challenges and limitations. Blockchain Technologies for Sustainable Development in Smart Cities investigates blockchain-enabled technology for smart city developments and big data applications. This book provides relevant theoretical frameworks and the latest empirical research findings in the area. Covering topics such as digital finance, smart city technology, and data processing architecture, this book is an essential reference for electricians, policymakers, local governments, city committees, computer scientists, IT professionals, professors and students of higher education, researchers, and academicians.




Convergence Of Artificial Intelligence And Blockchain Technologies, The: Challenges And Opportunities


Book Description

This book covers the growing convergence between Blockchain and Artificial Intelligence for Big Data, Multi-Agent systems, the Internet of Things and 5G technologies. Using real case studies and project outcomes, it illustrates the intricate details of blockchain in these real-life scenarios. The contributions from this volume bring a state-of-the-art assessment of these rapidly evolving trends in a creative way and provide a key resource for all those involved in the study and practice of AI and Blockchain.




Practical Artificial Intelligence and Blockchain


Book Description

Learn how to use AI and blockchain to build decentralized intelligent applications (DIApps) that overcome real-world challenges Key FeaturesUnderstand the fundamental concepts for converging artificial intelligence and blockchainApply your learnings to build apps using machine learning with Ethereum, IPFS, and MoiBitGet well-versed with the AI-blockchain ecosystem to develop your own DIAppsBook Description AI and blockchain are two emerging technologies catalyzing the pace of enterprise innovation. With this book, you’ll understand both technologies and converge them to solve real-world challenges. This AI blockchain book is divided into three sections. The first section covers the fundamentals of blockchain, AI, and affiliated technologies, where you’ll learn to differentiate between the various implementations of blockchains and AI with the help of examples. The second section takes you through domain-specific applications of AI and blockchain. You’ll understand the basics of decentralized databases and file systems and connect the dots between AI and blockchain before exploring products and solutions that use them together. You’ll then discover applications of AI techniques in crypto trading. In the third section, you’ll be introduced to the DIApp design pattern and compare it with the DApp design pattern. The book also highlights unique aspects of SDLC (software development lifecycle) when building a DIApp, shows you how to implement a sample contact tracing application, and delves into the future of AI with blockchain. By the end of this book, you’ll have developed the skills you need to converge AI and blockchain technologies to build smart solutions using the DIApp design pattern. What you will learnGet well-versed in blockchain basics and AI methodologiesUnderstand the significance of data collection and cleaning in AI modelingDiscover the application of analytics in cryptocurrency tradingGet to grips with open, permissioned, and private blockchainsExplore the DIApp design pattern and its merit in digital solutionsFind out how LSTM and ARIMA can be applied in crypto tradingUse the DIApp design pattern to build a sample contact tracing applicationGet started with building your own DIApps across various domainsWho this book is for This book is for blockchain and AI architects, developers, data scientists, data engineers, and evangelists who want to harness the power of artificial intelligence in blockchain applications. If you are looking for a blend of theoretical and practical use cases to understand how to implement smart cognitive insights into blockchain solutions, this book is what you need! Knowledge of machine learning and blockchain concepts is required.




OECD Digital Education Outlook 2021 Pushing the Frontiers with Artificial Intelligence, Blockchain and Robots


Book Description

How might digital technology and notably smart technologies based on artificial intelligence (AI), learning analytics, robotics, and others transform education? This book explores such question. It focuses on how smart technologies currently change education in the classroom and the management of educational organisations and systems.




Advanced Network Technologies and Intelligent Computing


Book Description

This book constitutes the refereed proceedings of the Second International Conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2022, held in Varanasi, India, during December 22–24, 2022. The 68 full papers and 11 short papers included in this book were carefully reviewed and selected from 443 submissions. They were organized in two topical sections as follows: Advanced Network Technologies and Intelligent Computing.




Big Data and Edge Intelligence for Enhanced Cyber Defense


Book Description

An unfortunate outcome of the growth of the Internet and mobile technologies has been the challenge of countering cybercrime. This book introduces and explains the latest trends and techniques of edge artificial intelligence (EdgeAI) intended to help cyber security experts design robust cyber defense systems (CDS), including host-based and network-based intrusion detection system and digital forensic intelligence. This book discusses the direct confluence of EdgeAI with big data, as well as demonstrating detailed reviews of recent cyber threats and their countermeasure. It provides computational intelligence techniques and automated reasoning models capable of fast training and timely data processing of cyber security big data, in addition to other basic information related to network security. In addition, it provides a brief overview of modern cyber security threats and outlines the advantages of using EdgeAI to counter these threats, as well as exploring various cyber defense mechanisms (CDM) based on detection type and approaches. Specific challenging areas pertaining to cyber defense through EdgeAI, such as improving digital forensic intelligence, proactive and adaptive defense of network infrastructure, and bio-inspired CDM, are also discussed. This book is intended as a reference for academics and students in the field of network and cybersecurity, particularly on the topics of intrusion detection systems, smart grid, EdgeAI, and bio-inspired cyber defense principles. The front-line EdgeAI techniques discussed will also be of use to cybersecurity engineers in their work enhancing cyber defense systems.




Edge Intelligence in the Making


Book Description

With the explosive growth of mobile computing and Internet of Things (IoT) applications, as exemplified by AR/VR, smart city, and video/audio surveillance, billions of mobile and IoT devices are being connected to the Internet, generating zillions of bytes of data at the network edge. Driven by this trend, there is an urgent need to push the frontiers of artificial intelligence (AI) to the network edge to fully unleash the potential of IoT big data. Indeed, the marriage of edge computing and AI has resulted in innovative solutions, namely edge intelligence or edge AI. Nevertheless, research and practice on this emerging inter-disciplinary field is still in its infancy stage. To facilitate the dissemination of the recent advances in edge intelligence in both academia and industry, this book conducts a comprehensive and detailed survey of the recent research efforts and also showcases the authors' own research progress on edge intelligence. Specifically, the book first reviews the background and present motivation for AI running at the network edge. Next, it provides an overview of the overarching architectures, frameworks, and emerging key technologies for deep learning models toward training/inference at the network edge. To illustrate the research problems for edge intelligence, the book also showcases four of the authors' own research projects on edge intelligence, ranging from rigorous theoretical analysis to studies based on realistic implementation. Finally, it discusses the applications, marketplace, and future research opportunities of edge intelligence. This emerging interdisciplinary field offers many open problems and yet also tremendous opportunities, and this book only touches the tip of iceberg. Hopefully, this book will elicit escalating attention, stimulate fruitful discussions, and open new directions on edge intelligence.




Examining Multimedia Forensics and Content Integrity


Book Description

Due to the ubiquity of social media and digital information, the use of digital images in today’s digitized marketplace is continuously rising throughout enterprises. Organizations that want to offer their content through the internet confront plenty of security concerns, including copyright violation. Advanced solutions for the security and privacy of digital data are continually being developed, yet there is a lack of current research in this area. Examining Multimedia Forensics and Content Integrity features a collection of innovative research on the approaches and applications of current techniques for the privacy and security of multimedia and their secure transportation. It provides relevant theoretical frameworks and the latest empirical research findings in the area of multimedia forensics and content integrity. Covering topics such as 3D data security, copyright protection, and watermarking, this major reference work is a comprehensive resource for security analysts, programmers, technology developers, IT professionals, students and educators of higher education, librarians, researchers, and academicians.