Muutke küpsiste eelistusi

Advanced Network Technologies and Intelligent Computing: 4th International Conference, ANTIC 2024, Varanasi, India, December 1921, 2024, Proceedings, Part I [Pehme köide]

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 478 pages, kõrgus x laius: 235x155 mm, 160 Illustrations, color; 62 Illustrations, black and white; XIX, 478 p. 222 illus., 160 illus. in color., 1 Paperback / softback
  • Sari: Communications in Computer and Information Science 2333
  • Ilmumisaeg: 08-Mar-2025
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3031837827
  • ISBN-13: 9783031837821
  • Pehme köide
  • Hind: 81,12 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 95,44 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 478 pages, kõrgus x laius: 235x155 mm, 160 Illustrations, color; 62 Illustrations, black and white; XIX, 478 p. 222 illus., 160 illus. in color., 1 Paperback / softback
  • Sari: Communications in Computer and Information Science 2333
  • Ilmumisaeg: 08-Mar-2025
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3031837827
  • ISBN-13: 9783031837821
This book constitutes the refereed proceedings of the 4th International Conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2024, held in Varanasi, India, during December 1921, 2024.





The 95 full papers and 15 short papers included in this book were carefully reviewed and selected from 507 submissions. They were organized in topical sections as follows: Advance Network Technologies; and Intelligent Computing.
.- Advance Network Technologies.



.- Ensuring Advanced ATM Security: A Formal Verification Approach With
Event-B.



.- Secure Communication in Fog Nodes through Quantum Key Distribution.



.- Exploring Efficacy of Cryptographic Hash Functions SHA-256 and Blake2s
against HashBoost.



.- Deep Reinforcement Learning-Driven Path Optimization in Multi-UAV Edge
Computing Systems.



.- Decentralized Authentication and Data Security Scheme for IoMT devices and
Patients using Blockchain, PUF and IPFS.



.- Detection and Mitigation of IoT based DDoS Attack using Extended MUD
enabled Device Profiling Techniques.



.- Load Balanced Transaction Scheduling using Gaussian mixture model-ant
colony optimization.



.- Botnet-Based DDoS Attack: Automatic Detection, Mitigation, and Real-Time
Traffic Filtering in Cloud Environments.



.- Optimizing Cost Overhead in Low TPS Microservices with frequent Writes to
Storage with Small Data Size.



.- Designing A Smart Healthcare IoT System for Precise Fall Detection in
Older Adults Using Multi-Sensor Data Fusion.



.- Securing Pharmaceutical Supply Chains with Ethereum Blockchain: A Model
for Counterfeit Prevention and Transparency of Drugs.



.- A Hybrid Algorithm with Fuzzy Logic for Population Diversity Maintenance
of Genetic Algorithm.



.- IoT - enabled Tool for Static and Dynamic Analysis of Hand Strength.



.- Decentralized Defences from Federated Learning for Ethereum Phishing
Detection.



.- Maximum Independent Set using Hummingbird Optimization.



.- Machine Learning Based Voltage Prediction with Various Levels of pH in IoT
Environment.



.- Deep Multi-time Visualization and Analytics for E-commerce Platform.



.- Lightweight Distributed Ledger Technology and Consensus Algorithms for D2D
Communication.



.- Evaluating the Effectiveness of Machine Learning Algorithms for Network
Intrusion Detection.



.- IoT System intrusion detection with XGBoost optimized by modified
metaheuristics.



.- Spammer Groups Detection in Online Reviews: A Novel Approach Using
FP-Growth and Behavioral Features.



.- Encoder - Based Trusted Routing Algorithm for Underwater Wireless Sensor
Networks.



.- Development of Blockchain Integrated Agricultural Land Lease Framework
with a Voting-Based Consensus Protocol Using Event-B.



.- A Post Quantum Key Policy Attribute Based Encryption Scheme from Code
Based Cryptographic Assumptions.



.- Edge AI to Edge Robotics: Enhancing Human Pose Estimation with
High-Performance TPU Computing.



.- Task scheduling in distributed real-time systems using hybrid model based
on ACO-GA.



.- Enhancing Box Type Solar Cooker Performance with Optimal Reflecting
Sidewall Angles using Genetic Algorithm.