Advanced Network Technologies and Intelligent Computing
4th International Conference, ANTIC 2024, Varanasi, India, December 19-21, 2024, Proceedings, Part I
Herausgegeben:Verma, Anshul; Verma, Pradeepika; Pattanaik, Kiran Kumar; Buyya, Rajkumar; Dasgupta, Dipankar
Advanced Network Technologies and Intelligent Computing
4th International Conference, ANTIC 2024, Varanasi, India, December 19-21, 2024, Proceedings, Part I
Herausgegeben:Verma, Anshul; Verma, Pradeepika; Pattanaik, Kiran Kumar; Buyya, Rajkumar; Dasgupta, Dipankar
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the refereed proceedings of the 4th International Conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2024, held in Varanasi, India, during December 19-21, 2024.
The 95 full papers and 15 short papers included in this book were carefully reviewed and selected from 507 submissions. They were organized in topical sections as follows: Advance Network Technologies; and Intelligent Computing.
Andere Kunden interessierten sich auch für
- Advanced Network Technologies and Intelligent Computing58,99 €
- Advanced Network Technologies and Intelligent Computing69,99 €
- Advanced Network Technologies and Intelligent Computing65,99 €
- Advanced Network Technologies and Intelligent Computing56,99 €
- Advanced Network Technologies and Intelligent Computing56,99 €
- Advanced Network Technologies and Intelligent Computing56,99 €
- Advanced Network Technologies and Intelligent Computing56,99 €
-
-
-
This book constitutes the refereed proceedings of the 4th International Conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2024, held in Varanasi, India, during December 19-21, 2024.
The 95 full papers and 15 short papers included in this book were carefully reviewed and selected from 507 submissions. They were organized in topical sections as follows: Advance Network Technologies; and Intelligent Computing.
The 95 full papers and 15 short papers included in this book were carefully reviewed and selected from 507 submissions. They were organized in topical sections as follows: Advance Network Technologies; and Intelligent Computing.
Produktdetails
- Produktdetails
- Communications in Computer and Information Science 2333
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-83782-1
- Seitenzahl: 500
- Erscheinungstermin: 8. März 2025
- Englisch
- Abmessung: 235mm x 155mm x 27mm
- Gewicht: 750g
- ISBN-13: 9783031837821
- ISBN-10: 3031837827
- Artikelnr.: 72617357
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
- Communications in Computer and Information Science 2333
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-83782-1
- Seitenzahl: 500
- Erscheinungstermin: 8. März 2025
- Englisch
- Abmessung: 235mm x 155mm x 27mm
- Gewicht: 750g
- ISBN-13: 9783031837821
- ISBN-10: 3031837827
- Artikelnr.: 72617357
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
.- Advance Network Technologies.
.- Ensuring Advanced ATM Security: A Formal Verification Approach With Event-B.
.- Secure Communication in Fog Nodes through Quantum Key Distribution.
.- Exploring Efficacy of Cryptographic Hash Functions SHA-256 and Blake2s against HashBoost.
.- Deep Reinforcement Learning-Driven Path Optimization in Multi-UAV Edge Computing Systems.
.- Decentralized Authentication and Data Security Scheme for IoMT devices and Patients using Blockchain, PUF and IPFS.
.- Detection and Mitigation of IoT based DDoS Attack using Extended MUD enabled Device Profiling Techniques.
.- Load Balanced Transaction Scheduling using Gaussian mixture model-ant colony optimization.
.- Botnet-Based DDoS Attack: Automatic Detection, Mitigation, and Real-Time Traffic Filtering in Cloud Environments.
.- Optimizing Cost Overhead in Low TPS Microservices with frequent Writes to Storage with Small Data Size.
.- Designing A Smart Healthcare IoT System for Precise Fall Detection in Older Adults Using Multi-Sensor Data Fusion.
.- Securing Pharmaceutical Supply Chains with Ethereum Blockchain: A Model for Counterfeit Prevention and Transparency of Drugs.
.- A Hybrid Algorithm with Fuzzy Logic for Population Diversity Maintenance of Genetic Algorithm.
.- IoT - enabled Tool for Static and Dynamic Analysis of Hand Strength.
.- Decentralized Defences from Federated Learning for Ethereum Phishing Detection.
.- Maximum Independent Set using Hummingbird Optimization.
.- Machine Learning Based Voltage Prediction with Various Levels of pH in IoT Environment.
.- Deep Multi-time Visualization and Analytics for E-commerce Platform.
.- Lightweight Distributed Ledger Technology and Consensus Algorithms for D2D Communication.
.- Evaluating the Effectiveness of Machine Learning Algorithms for Network Intrusion Detection.
.- IoT System intrusion detection with XGBoost optimized by modified metaheuristics.
.- Spammer Groups Detection in Online Reviews: A Novel Approach Using FP-Growth and Behavioral Features.
.- Encoder - Based Trusted Routing Algorithm for Underwater Wireless Sensor Networks.
.- Development of Blockchain Integrated Agricultural Land Lease Framework with a Voting-Based Consensus Protocol Using Event-B.
.- A Post Quantum Key Policy Attribute Based Encryption Scheme from Code Based Cryptographic Assumptions.
.- Edge AI to Edge Robotics: Enhancing Human Pose Estimation with High-Performance TPU Computing.
.- Task scheduling in distributed real-time systems using hybrid model based on ACO-GA.
.- Enhancing Box Type Solar Cooker Performance with Optimal Reflecting Sidewall Angles using Genetic Algorithm.
.- Ensuring Advanced ATM Security: A Formal Verification Approach With Event-B.
.- Secure Communication in Fog Nodes through Quantum Key Distribution.
.- Exploring Efficacy of Cryptographic Hash Functions SHA-256 and Blake2s against HashBoost.
.- Deep Reinforcement Learning-Driven Path Optimization in Multi-UAV Edge Computing Systems.
.- Decentralized Authentication and Data Security Scheme for IoMT devices and Patients using Blockchain, PUF and IPFS.
.- Detection and Mitigation of IoT based DDoS Attack using Extended MUD enabled Device Profiling Techniques.
.- Load Balanced Transaction Scheduling using Gaussian mixture model-ant colony optimization.
.- Botnet-Based DDoS Attack: Automatic Detection, Mitigation, and Real-Time Traffic Filtering in Cloud Environments.
.- Optimizing Cost Overhead in Low TPS Microservices with frequent Writes to Storage with Small Data Size.
.- Designing A Smart Healthcare IoT System for Precise Fall Detection in Older Adults Using Multi-Sensor Data Fusion.
.- Securing Pharmaceutical Supply Chains with Ethereum Blockchain: A Model for Counterfeit Prevention and Transparency of Drugs.
.- A Hybrid Algorithm with Fuzzy Logic for Population Diversity Maintenance of Genetic Algorithm.
.- IoT - enabled Tool for Static and Dynamic Analysis of Hand Strength.
.- Decentralized Defences from Federated Learning for Ethereum Phishing Detection.
.- Maximum Independent Set using Hummingbird Optimization.
.- Machine Learning Based Voltage Prediction with Various Levels of pH in IoT Environment.
.- Deep Multi-time Visualization and Analytics for E-commerce Platform.
.- Lightweight Distributed Ledger Technology and Consensus Algorithms for D2D Communication.
.- Evaluating the Effectiveness of Machine Learning Algorithms for Network Intrusion Detection.
.- IoT System intrusion detection with XGBoost optimized by modified metaheuristics.
.- Spammer Groups Detection in Online Reviews: A Novel Approach Using FP-Growth and Behavioral Features.
.- Encoder - Based Trusted Routing Algorithm for Underwater Wireless Sensor Networks.
.- Development of Blockchain Integrated Agricultural Land Lease Framework with a Voting-Based Consensus Protocol Using Event-B.
.- A Post Quantum Key Policy Attribute Based Encryption Scheme from Code Based Cryptographic Assumptions.
.- Edge AI to Edge Robotics: Enhancing Human Pose Estimation with High-Performance TPU Computing.
.- Task scheduling in distributed real-time systems using hybrid model based on ACO-GA.
.- Enhancing Box Type Solar Cooker Performance with Optimal Reflecting Sidewall Angles using Genetic Algorithm.
.- Advance Network Technologies.
.- Ensuring Advanced ATM Security: A Formal Verification Approach With Event-B.
.- Secure Communication in Fog Nodes through Quantum Key Distribution.
.- Exploring Efficacy of Cryptographic Hash Functions SHA-256 and Blake2s against HashBoost.
.- Deep Reinforcement Learning-Driven Path Optimization in Multi-UAV Edge Computing Systems.
.- Decentralized Authentication and Data Security Scheme for IoMT devices and Patients using Blockchain, PUF and IPFS.
.- Detection and Mitigation of IoT based DDoS Attack using Extended MUD enabled Device Profiling Techniques.
.- Load Balanced Transaction Scheduling using Gaussian mixture model-ant colony optimization.
.- Botnet-Based DDoS Attack: Automatic Detection, Mitigation, and Real-Time Traffic Filtering in Cloud Environments.
.- Optimizing Cost Overhead in Low TPS Microservices with frequent Writes to Storage with Small Data Size.
.- Designing A Smart Healthcare IoT System for Precise Fall Detection in Older Adults Using Multi-Sensor Data Fusion.
.- Securing Pharmaceutical Supply Chains with Ethereum Blockchain: A Model for Counterfeit Prevention and Transparency of Drugs.
.- A Hybrid Algorithm with Fuzzy Logic for Population Diversity Maintenance of Genetic Algorithm.
.- IoT - enabled Tool for Static and Dynamic Analysis of Hand Strength.
.- Decentralized Defences from Federated Learning for Ethereum Phishing Detection.
.- Maximum Independent Set using Hummingbird Optimization.
.- Machine Learning Based Voltage Prediction with Various Levels of pH in IoT Environment.
.- Deep Multi-time Visualization and Analytics for E-commerce Platform.
.- Lightweight Distributed Ledger Technology and Consensus Algorithms for D2D Communication.
.- Evaluating the Effectiveness of Machine Learning Algorithms for Network Intrusion Detection.
.- IoT System intrusion detection with XGBoost optimized by modified metaheuristics.
.- Spammer Groups Detection in Online Reviews: A Novel Approach Using FP-Growth and Behavioral Features.
.- Encoder - Based Trusted Routing Algorithm for Underwater Wireless Sensor Networks.
.- Development of Blockchain Integrated Agricultural Land Lease Framework with a Voting-Based Consensus Protocol Using Event-B.
.- A Post Quantum Key Policy Attribute Based Encryption Scheme from Code Based Cryptographic Assumptions.
.- Edge AI to Edge Robotics: Enhancing Human Pose Estimation with High-Performance TPU Computing.
.- Task scheduling in distributed real-time systems using hybrid model based on ACO-GA.
.- Enhancing Box Type Solar Cooker Performance with Optimal Reflecting Sidewall Angles using Genetic Algorithm.
.- Ensuring Advanced ATM Security: A Formal Verification Approach With Event-B.
.- Secure Communication in Fog Nodes through Quantum Key Distribution.
.- Exploring Efficacy of Cryptographic Hash Functions SHA-256 and Blake2s against HashBoost.
.- Deep Reinforcement Learning-Driven Path Optimization in Multi-UAV Edge Computing Systems.
.- Decentralized Authentication and Data Security Scheme for IoMT devices and Patients using Blockchain, PUF and IPFS.
.- Detection and Mitigation of IoT based DDoS Attack using Extended MUD enabled Device Profiling Techniques.
.- Load Balanced Transaction Scheduling using Gaussian mixture model-ant colony optimization.
.- Botnet-Based DDoS Attack: Automatic Detection, Mitigation, and Real-Time Traffic Filtering in Cloud Environments.
.- Optimizing Cost Overhead in Low TPS Microservices with frequent Writes to Storage with Small Data Size.
.- Designing A Smart Healthcare IoT System for Precise Fall Detection in Older Adults Using Multi-Sensor Data Fusion.
.- Securing Pharmaceutical Supply Chains with Ethereum Blockchain: A Model for Counterfeit Prevention and Transparency of Drugs.
.- A Hybrid Algorithm with Fuzzy Logic for Population Diversity Maintenance of Genetic Algorithm.
.- IoT - enabled Tool for Static and Dynamic Analysis of Hand Strength.
.- Decentralized Defences from Federated Learning for Ethereum Phishing Detection.
.- Maximum Independent Set using Hummingbird Optimization.
.- Machine Learning Based Voltage Prediction with Various Levels of pH in IoT Environment.
.- Deep Multi-time Visualization and Analytics for E-commerce Platform.
.- Lightweight Distributed Ledger Technology and Consensus Algorithms for D2D Communication.
.- Evaluating the Effectiveness of Machine Learning Algorithms for Network Intrusion Detection.
.- IoT System intrusion detection with XGBoost optimized by modified metaheuristics.
.- Spammer Groups Detection in Online Reviews: A Novel Approach Using FP-Growth and Behavioral Features.
.- Encoder - Based Trusted Routing Algorithm for Underwater Wireless Sensor Networks.
.- Development of Blockchain Integrated Agricultural Land Lease Framework with a Voting-Based Consensus Protocol Using Event-B.
.- A Post Quantum Key Policy Attribute Based Encryption Scheme from Code Based Cryptographic Assumptions.
.- Edge AI to Edge Robotics: Enhancing Human Pose Estimation with High-Performance TPU Computing.
.- Task scheduling in distributed real-time systems using hybrid model based on ACO-GA.
.- Enhancing Box Type Solar Cooker Performance with Optimal Reflecting Sidewall Angles using Genetic Algorithm.