Page 309 - Artificial Intelligence for the Internet of Everything
P. 309
Index 287
Human warfighters, 49 adversarial learning in DNN, 38–40
HVAC system. See Heating, ventilation and background and motivation, 20–22
air conditioning (HVAC) system machine learning, 32–37
Hybrid convex-annealing approach, 31 optimization in machine learning,
Hyper-automation, 133 22–31
Hypergraphs, 259 “Internet of Big Things,”, 139–143
Internet of Intelligent Things (IoIT), 1–2
Internet of Medical Things (IoMT), 1–2
I
Internet of Things (IoT), 1, 3–7, 9, 11, 101,
ICT. See Information and communication 117, 119, 120f, 145–150, 166, 241,
technology (ICT) 271
IGSM. See Iterative gradient sign approach systems, 67
(IGSM) technologies, 20
ImageNet dataset, 54–55 vision of, 120–124
IMC principles of control theory. Interoperability advantages of blockchain
See Internal model control (IMC) technology, 228
principles of control theory INTERPOL, 96–97
Inductive datatypes, 251–256 Investigative Committee of the Russian
Industrial Revolution, 174 Federation, 191
Inference, 30–31 IoBT. See Internet of Battlefield Things
Infinite datatypes, 256–258 (IoBT)
Infinitesimal sense, 156 IoIT. See Internet of Intelligent Things
Influence messages, 78 (IoIT)
Information and communication IoMT. See Internet of Medical Things
technology (ICT), 173–175 (IoMT)
Information dominance, 19 IoT. See Internet of Things (IoT)
Information overload, 180–181 IoTCrawler, 280
Information processing subsystem, 180–181 Iterative gradient sign approach (IGSM),
Information-processing units, 182–183 38–39
Instantiate adaptive behaviors, 68
Insufficient funds fee, 209 J
Intelligent agents, 53–55, 60
Joint cognition, 246
Intelligent systems, 57
Intelligent technology, 106
Intelligent things, 61 K
Intense arguments dataset, 209 Keyless Infrastructure Security Solution,
Intentional disinformation, 187 229–230
Intentional/unintentional untruthful claims, Keyless signature infrastructure (KSI), 228
187 Knightscope robot, 101
Interagent communication, 278 KSI. See Keyless signature infrastructure
Interface, 248–249 (KSI)
Interlude, 122–124
Internal computational workload, 79–80 L
Internal model control (IMC) principles of Launch gradient-based attacks, 40
control theory, 69–70 Law-enforcement community, 98–99
Internet of Battlefield Things (IoBT), 1–5, Learning, architectures for, 263–266
47, 51 Leverage gradient-based optimization,
uncertainty quantification in, 19–20 38–39