Advanced Network Technologies and Intelligent Computing
Third International Conference, ANTIC 2023, Varanasi, India, December 20-22, 2023, Proceedings, Part I
Herausgegeben:Verma, Anshul; Verma, Pradeepika; Pattanaik, Kiran Kumar; Dhurandher, Sanjay Kumar; Woungang, Isaac
Advanced Network Technologies and Intelligent Computing
Third International Conference, ANTIC 2023, Varanasi, India, December 20-22, 2023, Proceedings, Part I
Herausgegeben:Verma, Anshul; Verma, Pradeepika; Pattanaik, Kiran Kumar; Dhurandher, Sanjay Kumar; Woungang, Isaac
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
The 4-volume proceedings set CCIS 2090, 2091,2092 and 2093 constitute the refereed post-conference proceedings of the Third International Conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2023, held in Varanasi, India, during December 20-22, 2023.
The 87 full papers and 11 short papers included in this book were carefully reviewed and selected from 487 submissions. The conference papers are organized in topical sections on:
Part I - Advanced Network Technologies.
Part II - Advanced Network Technologies; Intelligent Computing.
Part III-IV - Intelligent Computing. …mehr
- Advanced Network Technologies and Intelligent Computing55,99 €
- Advanced Network Technologies and Intelligent Computing55,99 €
- Advanced Network Technologies and Intelligent Computing55,99 €
- International Conference on Applied Technologies95,99 €
- International Conference on Applied Technologies88,99 €
- International Conference on Applied Technologies88,99 €
- Next Generation Data Science52,99 €
-
-
-
The 87 full papers and 11 short papers included in this book were carefully reviewed and selected from 487 submissions. The conference papers are organized in topical sections on:
Part I - Advanced Network Technologies.
Part II - Advanced Network Technologies; Intelligent Computing.
Part III-IV - Intelligent Computing.
- Produktdetails
- Communications in Computer and Information Science 2090
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-64075-9
- 2024
- Seitenzahl: 424
- Erscheinungstermin: 26. Juli 2024
- Englisch
- Abmessung: 235mm x 155mm x 23mm
- Gewicht: 640g
- ISBN-13: 9783031640759
- ISBN-10: 3031640756
- Artikelnr.: 70731437
- Herstellerkennzeichnung
- Books on Demand GmbH
- In de Tarpen 42
- 22848 Norderstedt
- info@bod.de
- 040 53433511
- Communications in Computer and Information Science 2090
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-64075-9
- 2024
- Seitenzahl: 424
- Erscheinungstermin: 26. Juli 2024
- Englisch
- Abmessung: 235mm x 155mm x 23mm
- Gewicht: 640g
- ISBN-13: 9783031640759
- ISBN-10: 3031640756
- Artikelnr.: 70731437
- Herstellerkennzeichnung
- Books on Demand GmbH
- In de Tarpen 42
- 22848 Norderstedt
- info@bod.de
- 040 53433511
.- Performance Improvement for Energy-Efficient CSS with Optimized Cognitive Users over Fading Channels.
.- Optimizing WiMAX Network Performance with IP Security: An Evaluation of TCP and UDP Applications.
.- Enhancement of Security in Opportunistic Networks.
.- Design and Implementation of Smart Meter for Bilateral Transaction of Solar Energy.
.- Optimizing Task Completion Rate in Multi-User Edge Intelligence Networks through Neural Network-based Energy Management with Partitioning and Offloading.
.- Efficient Task Offloading in IoV using DDPG and MEC with RIS Support.
.- Vacation Recommendation System Using New York Times Articles.
.- Analysis of Different Measures of Centrality to Identify Vital Nodes in Social Networks.
.- Performance Analysis of Software-Defined Network (SDN) via POX Controller Simulation in Mininet.
.- Simulation and Comparison of BB84 and SSP99 QKD Protocols.
.- IoT and Machine Learning-based Monitoring of the Growth of Crops Using Blockchain Technology.
.- Determining the Impact of Metallic Obstacles on Blue-tooth Transmission to enhance Indoor Location Determination.
.- Optimizing Crop Yield through IoT-Based Smart Irrigation with Fuzzy Control.
.- Fusion of Chi-square and Z-test statistics for Feature Selection with Machine Learning Techniques in Intrusion Detection.
.- Smart Bakery: Technology and Automation.
.- An experimental study on Estimation of Reliability of a Computer Network for the network of Delhi Development Authority: A Study on Challenges, Experiment and its results, Potential Future Avenues and Significance of Ongoing Research.
.- An Effective Virtual Machine Allocation in Federated Cloud by PARAMR-DNN Technique.
.- Intrusion Watchdog: Enhancing Intrusion Detection System with Machine Learning using 3-way Feature Selection Technique.
.- Phishing URLs Detection Method using Hybrid Feature and Convolutional Neural Networks with Attention Mechanisms.
.- Exploring Multi-Attribute Selection Strategies for Effective Phishing Detection with Machine Learning.
.- Zero-day exploits framework of supply chain networks.
.- SMASK: Parallel Probabilistic Privacy-Preserving Frequent Pattern Mining Technique for Big Data.
.- SMAKMS_FC: Secure Mutual Authentication and Key Management Scheme for Fog Computing.
.- Comparative Analysis on Network Attack Prediction Used Deep Learning Approaches on Software Security Testing.
.- DNA-Based Elliptic Curve Cryptography for Data Security in IoT.
.- Performance Improvement for Energy-Efficient CSS with Optimized Cognitive Users over Fading Channels.
.- Optimizing WiMAX Network Performance with IP Security: An Evaluation of TCP and UDP Applications.
.- Enhancement of Security in Opportunistic Networks.
.- Design and Implementation of Smart Meter for Bilateral Transaction of Solar Energy.
.- Optimizing Task Completion Rate in Multi-User Edge Intelligence Networks through Neural Network-based Energy Management with Partitioning and Offloading.
.- Efficient Task Offloading in IoV using DDPG and MEC with RIS Support.
.- Vacation Recommendation System Using New York Times Articles.
.- Analysis of Different Measures of Centrality to Identify Vital Nodes in Social Networks.
.- Performance Analysis of Software-Defined Network (SDN) via POX Controller Simulation in Mininet.
.- Simulation and Comparison of BB84 and SSP99 QKD Protocols.
.- IoT and Machine Learning-based Monitoring of the Growth of Crops Using Blockchain Technology.
.- Determining the Impact of Metallic Obstacles on Blue-tooth Transmission to enhance Indoor Location Determination.
.- Optimizing Crop Yield through IoT-Based Smart Irrigation with Fuzzy Control.
.- Fusion of Chi-square and Z-test statistics for Feature Selection with Machine Learning Techniques in Intrusion Detection.
.- Smart Bakery: Technology and Automation.
.- An experimental study on Estimation of Reliability of a Computer Network for the network of Delhi Development Authority: A Study on Challenges, Experiment and its results, Potential Future Avenues and Significance of Ongoing Research.
.- An Effective Virtual Machine Allocation in Federated Cloud by PARAMR-DNN Technique.
.- Intrusion Watchdog: Enhancing Intrusion Detection System with Machine Learning using 3-way Feature Selection Technique.
.- Phishing URLs Detection Method using Hybrid Feature and Convolutional Neural Networks with Attention Mechanisms.
.- Exploring Multi-Attribute Selection Strategies for Effective Phishing Detection with Machine Learning.
.- Zero-day exploits framework of supply chain networks.
.- SMASK: Parallel Probabilistic Privacy-Preserving Frequent Pattern Mining Technique for Big Data.
.- SMAKMS_FC: Secure Mutual Authentication and Key Management Scheme for Fog Computing.
.- Comparative Analysis on Network Attack Prediction Used Deep Learning Approaches on Software Security Testing.
.- DNA-Based Elliptic Curve Cryptography for Data Security in IoT.