000 06235nam a22006735i 4500
001 978-3-031-28180-8
003 DE-He213
005 20240423125428.0
007 cr nn 008mamaa
008 230321s2023 sz | s |||| 0|eng d
020 _a9783031281808
_9978-3-031-28180-8
024 7 _a10.1007/978-3-031-28180-8
_2doi
050 4 _aTK7885-7895
050 4 _aTK5105.5-5105.9
072 7 _aUK
_2bicssc
072 7 _aCOM067000
_2bisacsh
072 7 _aUK
_2thema
082 0 4 _a621.39
_223
082 0 4 _a004.6
_223
245 1 0 _aAdvanced Network Technologies and Intelligent Computing
_h[electronic resource] :
_bSecond International Conference, ANTIC 2022, Varanasi, India, December 22–24, 2022, Proceedings, Part I /
_cedited by Isaac Woungang, Sanjay Kumar Dhurandher, Kiran Kumar Pattanaik, Anshul Verma, Pradeepika Verma.
250 _a1st ed. 2023.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2023.
300 _aXXV, 514 p. 272 illus., 200 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aCommunications in Computer and Information Science,
_x1865-0937 ;
_v1797
505 0 _aAdvanced Network Technologies -- Vehicle Routing Problem with Value Iteration Network -- Design of an energy aware cluster-based routing scheme to minimize energy consumption in wireless sensor networks -- Email Spam detection using Multi-Head CNN-BiGRU network -- Validation of nonlinear PID controllers on a lab scale batch reactor -- Automation with blockchain: Creating a marketplace for IoT based irrigation system -- An Intelligent Behavior-Based System to Recognize and Detect the Malware Variants based on their Characteristics using Machine Learning Techniques -- Constraint Based Clustering Technique for Web Services -- MODIFIED K-NEIGHBOR OUTPERFORMS LOGISTIC REGRESSION AND RANDOM FOREST IN IDENTIFYING HOST MALWARE ACROSS LIMITED DATA SETS -- Performance Analysis of a Hybrid Algorithm for Lost Target Recovery in Wireless Sensor Network -- Power Aware Non-Orthogonal Multiple Access for IEEE 802.11ah based IoT Networks -- Effective Link Prediction in Complex Networks using Differential Evolution based Extreme Gradient Boosting Algorithm -- Hybrid Partitioning for Embedded and Distributed CNNs Inference on Edge Devices -- Application of Abelian Mechanism on UFS-ACM for Risk Analysis -- Support systems and technological capabilities in digital transformation according to the nature of the company -- An Improved Approach of Image Steganography Based on Least Significant Bit Technique for Secure Communication in Cloud -- Enhanced Horse Optimization Algorithm based Intelligent Query Optimization in Crowdsourcing Systems using Location Based Services -- Design of Energy Efficient IoT-based Smart Street Light System -- An optimized Low-Cost 4X4 Multiplier circuit design using Reversible logic gates -- An Improved Resource Allocation process using Modified Max-Min Algorithm for Dynamic Cloud -- A load threshold allocation approach: Tackling blackouts through brownout -- PREDICTIVEANALYSIS OF AMBIENT ENVIRONMENT FOR URBAN CULTIVATION USING IOT BASED HYDROPHONIC SYSTEM -- Blockchain-aided Keyword Search over Encrypted Data in Cloud -- Impact of Selfish Nodes on the Performance of AODV and DSR Routing Protocols -- A deadlock-free and adaptive prime perspective turn model for 3D-mesh based network on Chips -- Effect of channel slot time on performance of IEEE 802.15.6-based Medical Body Area Network -- CoviBand - Wearable Social Distancing and Contact Tracing Device using Signal Strength Indicator Metrics -- Average Time Based PRoPHET Routing Protocol for Opportunistic Networks -- Analysis and Implementation of Microservices using Docker -- Automated Energy Modeling Framework for Microcontroller-based Edge Computing Nodes -- An Intelligent Safety Stock Computing Agent for Safety Inventory Maintenance in the Supply Chain Environment -- Designing A Secure E Voting System using Blockchain with Efficient Smart Contract and Consensus Mechanism -- Systemic Review of AI reshaped Blockchain Applications -- Distributed Secure Data Aggregation for Smart Grid using Partial Homomorphic Encryption.
520 _aThis book constitutes the refereed proceedings of the Second International Conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2022, held in Varanasi, India, during December 22–24, 2022. The 68 full papers and 11 short papers included in this book were carefully reviewed and selected from 443 submissions. They were organized in two topical sections as follows: Advanced Network Technologies and Intelligent Computing.
650 0 _aComputer engineering.
650 0 _aComputer networks .
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aSoftware engineering.
650 0 _aCoding theory.
650 0 _aInformation theory.
650 1 4 _aComputer Engineering and Networks.
650 2 4 _aCryptology.
650 2 4 _aSoftware Engineering.
650 2 4 _aComputer Communication Networks.
650 2 4 _aCoding and Information Theory.
700 1 _aWoungang, Isaac.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aDhurandher, Sanjay Kumar.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aPattanaik, Kiran Kumar.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aVerma, Anshul.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aVerma, Pradeepika.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031281792
776 0 8 _iPrinted edition:
_z9783031281815
830 0 _aCommunications in Computer and Information Science,
_x1865-0937 ;
_v1797
856 4 0 _uhttps://doi.org/10.1007/978-3-031-28180-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c177831
_d177831