Advanced Network Technologies and Intelligent Computing
Third International Conference, ANTIC 2023, Varanasi, India, December 20-22, 2023, Proceedings, Part I
Herausgegeben:Verma, Anshul; Verma, Pradeepika; Pattanaik, Kiran Kumar; Dhurandher, Sanjay Kumar; Woungang, Isaac
Advanced Network Technologies and Intelligent Computing
Third International Conference, ANTIC 2023, Varanasi, India, December 20-22, 2023, Proceedings, Part I
Herausgegeben:Verma, Anshul; Verma, Pradeepika; Pattanaik, Kiran Kumar; Dhurandher, Sanjay Kumar; Woungang, Isaac
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
The 4-volume proceedings set CCIS 2090, 2091,2092 and 2093 constitute the refereed post-conference proceedings of the Third International Conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2023, held in Varanasi, India, during December 20-22, 2023.
The 87 full papers and 11 short papers included in this book were carefully reviewed and selected from 487 submissions. The conference papers are organized in topical sections on:
Part I - Advanced Network Technologies.
Part II - Advanced Network Technologies; Intelligent Computing.
Part III-IV - Intelligent Computing. …mehr
Andere Kunden interessierten sich auch für
- Advanced Network Technologies and Intelligent Computing55,99 €
- Advanced Network Technologies and Intelligent Computing55,99 €
- Advanced Network Technologies and Intelligent Computing55,99 €
- International Conference on Applied Technologies95,99 €
- International Conference on Applied Technologies88,99 €
- International Conference on Applied Technologies88,99 €
- Next Generation Data Science52,99 €
-
-
-
The 4-volume proceedings set CCIS 2090, 2091,2092 and 2093 constitute the refereed post-conference proceedings of the Third International Conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2023, held in Varanasi, India, during December 20-22, 2023.
The 87 full papers and 11 short papers included in this book were carefully reviewed and selected from 487 submissions. The conference papers are organized in topical sections on:
Part I - Advanced Network Technologies.
Part II - Advanced Network Technologies; Intelligent Computing.
Part III-IV - Intelligent Computing.
The 87 full papers and 11 short papers included in this book were carefully reviewed and selected from 487 submissions. The conference papers are organized in topical sections on:
Part I - Advanced Network Technologies.
Part II - Advanced Network Technologies; Intelligent Computing.
Part III-IV - Intelligent Computing.
Produktdetails
- Produktdetails
- Communications in Computer and Information Science 2090
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-64075-9
- 2024
- Seitenzahl: 424
- Erscheinungstermin: 26. Juli 2024
- Englisch
- Abmessung: 235mm x 155mm x 23mm
- Gewicht: 640g
- ISBN-13: 9783031640759
- ISBN-10: 3031640756
- Artikelnr.: 70731437
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Communications in Computer and Information Science 2090
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-64075-9
- 2024
- Seitenzahl: 424
- Erscheinungstermin: 26. Juli 2024
- Englisch
- Abmessung: 235mm x 155mm x 23mm
- Gewicht: 640g
- ISBN-13: 9783031640759
- ISBN-10: 3031640756
- Artikelnr.: 70731437
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
.- Advanced Network Technologies.
.- Performance Improvement for Energy-Efficient CSS with Optimized Cognitive Users over Fading Channels.
.- Optimizing WiMAX Network Performance with IP Security: An Evaluation of TCP and UDP Applications.
.- Enhancement of Security in Opportunistic Networks.
.- Design and Implementation of Smart Meter for Bilateral Transaction of Solar Energy.
.- Optimizing Task Completion Rate in Multi-User Edge Intelligence Networks through Neural Network-based Energy Management with Partitioning and Offloading.
.- Efficient Task Offloading in IoV using DDPG and MEC with RIS Support.
.- Vacation Recommendation System Using New York Times Articles.
.- Analysis of Different Measures of Centrality to Identify Vital Nodes in Social Networks.
.- Performance Analysis of Software-Defined Network (SDN) via POX Controller Simulation in Mininet.
.- Simulation and Comparison of BB84 and SSP99 QKD Protocols.
.- IoT and Machine Learning-based Monitoring of the Growth of Crops Using Blockchain Technology.
.- Determining the Impact of Metallic Obstacles on Blue-tooth Transmission to enhance Indoor Location Determination.
.- Optimizing Crop Yield through IoT-Based Smart Irrigation with Fuzzy Control.
.- Fusion of Chi-square and Z-test statistics for Feature Selection with Machine Learning Techniques in Intrusion Detection.
.- Smart Bakery: Technology and Automation.
.- An experimental study on Estimation of Reliability of a Computer Network for the network of Delhi Development Authority: A Study on Challenges, Experiment and its results, Potential Future Avenues and Significance of Ongoing Research.
.- An Effective Virtual Machine Allocation in Federated Cloud by PARAMR-DNN Technique.
.- Intrusion Watchdog: Enhancing Intrusion Detection System with Machine Learning using 3-way Feature Selection Technique.
.- Phishing URLs Detection Method using Hybrid Feature and Convolutional Neural Networks with Attention Mechanisms.
.- Exploring Multi-Attribute Selection Strategies for Effective Phishing Detection with Machine Learning.
.- Zero-day exploits framework of supply chain networks.
.- SMASK: Parallel Probabilistic Privacy-Preserving Frequent Pattern Mining Technique for Big Data.
.- SMAKMS_FC: Secure Mutual Authentication and Key Management Scheme for Fog Computing.
.- Comparative Analysis on Network Attack Prediction Used Deep Learning Approaches on Software Security Testing.
.- DNA-Based Elliptic Curve Cryptography for Data Security in IoT.
.- Performance Improvement for Energy-Efficient CSS with Optimized Cognitive Users over Fading Channels.
.- Optimizing WiMAX Network Performance with IP Security: An Evaluation of TCP and UDP Applications.
.- Enhancement of Security in Opportunistic Networks.
.- Design and Implementation of Smart Meter for Bilateral Transaction of Solar Energy.
.- Optimizing Task Completion Rate in Multi-User Edge Intelligence Networks through Neural Network-based Energy Management with Partitioning and Offloading.
.- Efficient Task Offloading in IoV using DDPG and MEC with RIS Support.
.- Vacation Recommendation System Using New York Times Articles.
.- Analysis of Different Measures of Centrality to Identify Vital Nodes in Social Networks.
.- Performance Analysis of Software-Defined Network (SDN) via POX Controller Simulation in Mininet.
.- Simulation and Comparison of BB84 and SSP99 QKD Protocols.
.- IoT and Machine Learning-based Monitoring of the Growth of Crops Using Blockchain Technology.
.- Determining the Impact of Metallic Obstacles on Blue-tooth Transmission to enhance Indoor Location Determination.
.- Optimizing Crop Yield through IoT-Based Smart Irrigation with Fuzzy Control.
.- Fusion of Chi-square and Z-test statistics for Feature Selection with Machine Learning Techniques in Intrusion Detection.
.- Smart Bakery: Technology and Automation.
.- An experimental study on Estimation of Reliability of a Computer Network for the network of Delhi Development Authority: A Study on Challenges, Experiment and its results, Potential Future Avenues and Significance of Ongoing Research.
.- An Effective Virtual Machine Allocation in Federated Cloud by PARAMR-DNN Technique.
.- Intrusion Watchdog: Enhancing Intrusion Detection System with Machine Learning using 3-way Feature Selection Technique.
.- Phishing URLs Detection Method using Hybrid Feature and Convolutional Neural Networks with Attention Mechanisms.
.- Exploring Multi-Attribute Selection Strategies for Effective Phishing Detection with Machine Learning.
.- Zero-day exploits framework of supply chain networks.
.- SMASK: Parallel Probabilistic Privacy-Preserving Frequent Pattern Mining Technique for Big Data.
.- SMAKMS_FC: Secure Mutual Authentication and Key Management Scheme for Fog Computing.
.- Comparative Analysis on Network Attack Prediction Used Deep Learning Approaches on Software Security Testing.
.- DNA-Based Elliptic Curve Cryptography for Data Security in IoT.
.- Advanced Network Technologies.
.- Performance Improvement for Energy-Efficient CSS with Optimized Cognitive Users over Fading Channels.
.- Optimizing WiMAX Network Performance with IP Security: An Evaluation of TCP and UDP Applications.
.- Enhancement of Security in Opportunistic Networks.
.- Design and Implementation of Smart Meter for Bilateral Transaction of Solar Energy.
.- Optimizing Task Completion Rate in Multi-User Edge Intelligence Networks through Neural Network-based Energy Management with Partitioning and Offloading.
.- Efficient Task Offloading in IoV using DDPG and MEC with RIS Support.
.- Vacation Recommendation System Using New York Times Articles.
.- Analysis of Different Measures of Centrality to Identify Vital Nodes in Social Networks.
.- Performance Analysis of Software-Defined Network (SDN) via POX Controller Simulation in Mininet.
.- Simulation and Comparison of BB84 and SSP99 QKD Protocols.
.- IoT and Machine Learning-based Monitoring of the Growth of Crops Using Blockchain Technology.
.- Determining the Impact of Metallic Obstacles on Blue-tooth Transmission to enhance Indoor Location Determination.
.- Optimizing Crop Yield through IoT-Based Smart Irrigation with Fuzzy Control.
.- Fusion of Chi-square and Z-test statistics for Feature Selection with Machine Learning Techniques in Intrusion Detection.
.- Smart Bakery: Technology and Automation.
.- An experimental study on Estimation of Reliability of a Computer Network for the network of Delhi Development Authority: A Study on Challenges, Experiment and its results, Potential Future Avenues and Significance of Ongoing Research.
.- An Effective Virtual Machine Allocation in Federated Cloud by PARAMR-DNN Technique.
.- Intrusion Watchdog: Enhancing Intrusion Detection System with Machine Learning using 3-way Feature Selection Technique.
.- Phishing URLs Detection Method using Hybrid Feature and Convolutional Neural Networks with Attention Mechanisms.
.- Exploring Multi-Attribute Selection Strategies for Effective Phishing Detection with Machine Learning.
.- Zero-day exploits framework of supply chain networks.
.- SMASK: Parallel Probabilistic Privacy-Preserving Frequent Pattern Mining Technique for Big Data.
.- SMAKMS_FC: Secure Mutual Authentication and Key Management Scheme for Fog Computing.
.- Comparative Analysis on Network Attack Prediction Used Deep Learning Approaches on Software Security Testing.
.- DNA-Based Elliptic Curve Cryptography for Data Security in IoT.
.- Performance Improvement for Energy-Efficient CSS with Optimized Cognitive Users over Fading Channels.
.- Optimizing WiMAX Network Performance with IP Security: An Evaluation of TCP and UDP Applications.
.- Enhancement of Security in Opportunistic Networks.
.- Design and Implementation of Smart Meter for Bilateral Transaction of Solar Energy.
.- Optimizing Task Completion Rate in Multi-User Edge Intelligence Networks through Neural Network-based Energy Management with Partitioning and Offloading.
.- Efficient Task Offloading in IoV using DDPG and MEC with RIS Support.
.- Vacation Recommendation System Using New York Times Articles.
.- Analysis of Different Measures of Centrality to Identify Vital Nodes in Social Networks.
.- Performance Analysis of Software-Defined Network (SDN) via POX Controller Simulation in Mininet.
.- Simulation and Comparison of BB84 and SSP99 QKD Protocols.
.- IoT and Machine Learning-based Monitoring of the Growth of Crops Using Blockchain Technology.
.- Determining the Impact of Metallic Obstacles on Blue-tooth Transmission to enhance Indoor Location Determination.
.- Optimizing Crop Yield through IoT-Based Smart Irrigation with Fuzzy Control.
.- Fusion of Chi-square and Z-test statistics for Feature Selection with Machine Learning Techniques in Intrusion Detection.
.- Smart Bakery: Technology and Automation.
.- An experimental study on Estimation of Reliability of a Computer Network for the network of Delhi Development Authority: A Study on Challenges, Experiment and its results, Potential Future Avenues and Significance of Ongoing Research.
.- An Effective Virtual Machine Allocation in Federated Cloud by PARAMR-DNN Technique.
.- Intrusion Watchdog: Enhancing Intrusion Detection System with Machine Learning using 3-way Feature Selection Technique.
.- Phishing URLs Detection Method using Hybrid Feature and Convolutional Neural Networks with Attention Mechanisms.
.- Exploring Multi-Attribute Selection Strategies for Effective Phishing Detection with Machine Learning.
.- Zero-day exploits framework of supply chain networks.
.- SMASK: Parallel Probabilistic Privacy-Preserving Frequent Pattern Mining Technique for Big Data.
.- SMAKMS_FC: Secure Mutual Authentication and Key Management Scheme for Fog Computing.
.- Comparative Analysis on Network Attack Prediction Used Deep Learning Approaches on Software Security Testing.
.- DNA-Based Elliptic Curve Cryptography for Data Security in IoT.