distributed ai
Recently Published Documents


TOTAL DOCUMENTS

58
(FIVE YEARS 18)

H-INDEX

6
(FIVE YEARS 1)

2022 ◽  
Vol 355 ◽  
pp. 03036
Author(s):  
Wei Li ◽  
Zhiyuan Han ◽  
Jian Shen ◽  
Dandan Luo ◽  
Bo Gao ◽  
...  

Herein, on the basis of a distributed AI cluster, a real-time video analysis system is proposed for edge computing. With ARM cluster server as the hardware platform, a distributed software platform is constructed. The system is characterized by flexible expansion, flexible deployment, data security, and network bandwidth efficiency, which makes it suited to edge computing scenarios. According to the measurement data, the system is effective in increasing the speed of AI calculation by over 20 times in comparison with the embedded single board and achieving the calculation effect that matches GPU. Therefore, it is considered suited to the application in heavy computing power such as real-time AI computing.


Author(s):  
Binny Naik ◽  
Ashir Mehta ◽  
Hiteshri Yagnik ◽  
Manan Shah

AbstractGiven the prevailing state of cybersecurity, it is reasonable to understand why cybersecurity experts are seriously considering artificial intelligence as a potential field that can aid improvements in conventional cybersecurity techniques. Various progressions in the field of technology have helped to mitigate some of the issues relating to cybersecurity. These advancements can be manifested by Big Data, Blockchain technology, Behavioral Analytics, to name but a few. The paper overviews the effects of applications of these technologies in cybersecurity. The central purpose of the paper is to review the application of AI techniques in analyzing, detecting, and fighting various cyberattacks. The effects of the implementation of conditionally classified “distributed” AI methods and conveniently classified “compact” AI methods on different cyber threats have been reviewed. Furthermore, the future scope and challenges of using such techniques in cybersecurity, are discussed. Finally, conclusions have been drawn in terms of evaluating the employment of different AI advancements in improving cybersecurity.


Author(s):  
Iacovos Ioannou ◽  
Christophoros Christophorou ◽  
Vasos Vassiliou ◽  
Andreas Pitsillides

2021 ◽  
Author(s):  
Yinghan Long ◽  
Indranil Chakraborty ◽  
Gopalakrishnan Srinivasan ◽  
Kaushik Roy

2021 ◽  
Vol 09 (12) ◽  
pp. 99-105
Author(s):  
Xuezhu Xin ◽  
Yang Bai ◽  
Haixin Wang ◽  
Yunzhen Mou ◽  
Jian Tan
Keyword(s):  

Author(s):  
Subhi Alrubei ◽  
Edward Ball ◽  
Jonathan Rigelsford
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document