The proceedings contain 44 papers. The special focus in this conference is on computing and networkcommunications. The topics include: Maximizing Efficiency: Unveiling the Potential of Kubernetes Metrics;re...
ISBN:
(纸本)9789819747108
The proceedings contain 44 papers. The special focus in this conference is on computing and networkcommunications. The topics include: Maximizing Efficiency: Unveiling the Potential of Kubernetes Metrics;resource-Aware Learning Automata for Low-Latency Task Scheduling in Fog computing;Design of High Gain Wideband Petal-Shaped Magneto-Electric Dipole Metal Antenna for 5G Sub-6 GHz and Wi-Fi Applications;A Novel Billhook-Shaped 2-Element MIMO Array for Sub-6 GHz Millimeter Wave Application;energy-Efficient Transmission in Wireless Sensor network Using Compressive Sensing;smart City Solutions for Traffic Management;an IoT-Assisted Real-Time Urban Air Pollution Data Collection System;real-Time Stock Price Prediction Using Apache Kafka;RSS-Based Localization Using GRU and BiGRU Deep Learning Models in LoRaWAN-IoT networks;locating and Routing for IoT-Based Fire Evacuation System;an Energy-Efficient Data Management Approach Using Sparse Compression in Future-Ready IoT networks;a Framework for Developing IoT and Edge computing-Based Smart Transportation Applications;a Mathematical Model for Data Traffic Management in Next-Generation IoT networks;crowdsourced Mobile Applications for Disaster Relief: A Case Study of Landslide Tracker and Amrita Kripa App Deployments in Sikkim Schools;design and Modeling of Modular Wheelchair for Therapeutic Exercises;analyzing Data Traffic in IoT networks: A Novel Graph-Based Architecture;A Lightweight Privacy-Preserving and Authentication Model (LiPAM-FSG) for Fog-Based Smart Grids;time Series Analysis and Rule Mining for Detecting Industrial Control System Data Injection Attacks;Radius-Based Authentication: UFrames’ Novel Approach to Prevent Account Sharing;deep Neural network-Based Secure Energy-Efficient Power Allocation in an Interference network;An Adaptive Time Quantum-Based Efficient Round-Robin Algorithm for CPU Scheduling;low-Cost Advanced Undetectable Hardware-Based Malicious Keyboard;constructing a Blind Digital Signature Scheme
The proceedings contain 44 papers. The special focus in this conference is on computing and networkcommunications. The topics include: Maximizing Efficiency: Unveiling the Potential of Kubernetes Metrics;re...
ISBN:
(纸本)9789819745395
The proceedings contain 44 papers. The special focus in this conference is on computing and networkcommunications. The topics include: Maximizing Efficiency: Unveiling the Potential of Kubernetes Metrics;resource-Aware Learning Automata for Low-Latency Task Scheduling in Fog computing;Design of High Gain Wideband Petal-Shaped Magneto-Electric Dipole Metal Antenna for 5G Sub-6 GHz and Wi-Fi Applications;A Novel Billhook-Shaped 2-Element MIMO Array for Sub-6 GHz Millimeter Wave Application;energy-Efficient Transmission in Wireless Sensor network Using Compressive Sensing;smart City Solutions for Traffic Management;an IoT-Assisted Real-Time Urban Air Pollution Data Collection System;real-Time Stock Price Prediction Using Apache Kafka;RSS-Based Localization Using GRU and BiGRU Deep Learning Models in LoRaWAN-IoT networks;locating and Routing for IoT-Based Fire Evacuation System;an Energy-Efficient Data Management Approach Using Sparse Compression in Future-Ready IoT networks;a Framework for Developing IoT and Edge computing-Based Smart Transportation Applications;a Mathematical Model for Data Traffic Management in Next-Generation IoT networks;crowdsourced Mobile Applications for Disaster Relief: A Case Study of Landslide Tracker and Amrita Kripa App Deployments in Sikkim Schools;design and Modeling of Modular Wheelchair for Therapeutic Exercises;analyzing Data Traffic in IoT networks: A Novel Graph-Based Architecture;A Lightweight Privacy-Preserving and Authentication Model (LiPAM-FSG) for Fog-Based Smart Grids;time Series Analysis and Rule Mining for Detecting Industrial Control System Data Injection Attacks;Radius-Based Authentication: UFrames’ Novel Approach to Prevent Account Sharing;deep Neural network-Based Secure Energy-Efficient Power Allocation in an Interference network;An Adaptive Time Quantum-Based Efficient Round-Robin Algorithm for CPU Scheduling;low-Cost Advanced Undetectable Hardware-Based Malicious Keyboard;constructing a Blind Digital Signature Scheme
The proceedings contain 149 papers. The topics discussed include: ubiquitous fall detection through wireless channel state information;policy-based monitoring and energy management for NFV data centers;GPGPU implement...
ISBN:
(纸本)9781467373098
The proceedings contain 149 papers. The topics discussed include: ubiquitous fall detection through wireless channel state information;policy-based monitoring and energy management for NFV data centers;GPGPU implementation of information theoretic algorithms for the analysis of granular layer neurons;deployment of wireless sensor network for radiation monitoring;oracle model to validate shoulder-surfing resistance of virtual keyboards;RiCoBiT - ring connected binary tree : a structured and scalable architecture for network on chip based systems;adaptation of multi-domain corpus learned seeds and polarity lexicon for sentiment analysis;brain-inspired method for constructing a robust virtual wireless sensor network;and modeling and implementation of two coupled Hodgkin-Huxley neuron model.
The proceedings contain 45 papers. The topics discussed include: NU smart shopping cart;perceptron linear activation function design with CMOS-memristive circuits;analysis of noise in current mirrors with memristive d...
ISBN:
(纸本)9781538659281
The proceedings contain 45 papers. The topics discussed include: NU smart shopping cart;perceptron linear activation function design with CMOS-memristive circuits;analysis of noise in current mirrors with memristive device;noise analysis of CMOS-memristive and CMOS-resistive current mirrors;comparison of parallel and successive interference cancellation for non-orthogonal multiple access;variability analysis of cascode current mirror designs with CMOS-memristive components;CMOS-memristive sigmoid activation function;variability analysis of memristor-based sigmoid function;and frequency analysis of memristor based low pass bessel filter.
This book constitutes thoroughly refereed post-conference proceedings of the 5th international conference on computing and network communications, CoCoNet'*** revised papers presented are carefully reviewed and se...
详细信息
ISBN:
(数字)9789819747115
ISBN:
(纸本)9789819747108;9789819747139
This book constitutes thoroughly refereed post-conference proceedings of the 5th international conference on computing and network communications, CoCoNet'*** revised papers presented are carefully reviewed and selected from several initial submissions. The scope of the Symposium includes network-on-chip architectures and applications, future internet architecture and protocols, intelligent networked systems, IoT and smart cities, communications systems integration and modeling, and wireless and mobile communications. The book is directed to researchers and scientists engaged in networkcommunications.
The proceedings contain 306 papers. The topics discussed include: creating a dynamic real time green corridor and assessing its impact on normal traffic flow;an end-to-end model for detection and assessment of depress...
The proceedings contain 306 papers. The topics discussed include: creating a dynamic real time green corridor and assessing its impact on normal traffic flow;an end-to-end model for detection and assessment of depression levels using speech;an unsupervised hierarchical rule based model for aspect term extraction augmented with pruning strategies;graph similarity-based hierarchical clustering of trajectory data;an upper bound for sorting permutations with a transposition tree;conceptual verification of distributed cyber physical systems using reference nets;automatic detection of naturally occurring epilepsy in dogs using intracranial electroencephalogram signals;elastic cloud logs traces, storing and replaying for deep machine learning;an efficient pairing-free certificateless signcryption without secure channel communication during secret key issuance;and a light weight convolutional neural network for single image super-resolution.
The proceedings contain 51 papers. The special focus in this conference is on computing and networkcommunications. The topics include: Speaker Identification Approach for the Post-pandemic Era of Internet of...
ISBN:
(纸本)9789813369863
The proceedings contain 51 papers. The special focus in this conference is on computing and networkcommunications. The topics include: Speaker Identification Approach for the Post-pandemic Era of Internet of Things;random Permutation-Based Linear Discriminant Analysis for Cancelable Biometric Recognition;a Deep Learning-Based Framework for Distributed Denial-of-Service Attacks Detection in Cloud Environment;automation for Furnace in Thermal Power Station Using Public Key Cryptography;Active Dictionary Attack on WPA3-SAE;Multiple Hashing Using SHA-256 and MD5;design and Analysis of a Secure Coded Communication System Using Chaotic Encryption and Turbo Product Code Decoder;Digital Image Transmission Using Combination of DWT-DCT Watermarking and AES Technique;generalized Symbolic Dynamics Approach for Characterization of Time Series;An HTTP DDoS Detection Model Using Machine Learning Techniques for the Cloud Environment;ioT Device Authentication and Access Control Through Hyperledger Fabric;smart Mirror-Based Personal Healthcare System;on–off Thinning in Linear Antenna Arrays Using Binary Dragonfly Algorithm;Reduction in Average Distance Cost by Optimizing Position of ONUs in FiWi Access network using Grey Wolf Optimization Algorithm;Performance Analysis of Individual Partial Relay Selection Protocol Using Decode and Forward Method for Underlay EH—CRN;preface;Cost-Effective Device for Autonomous Monitoring of the Vitals for COVID-19 Asymptomatic Patients in Home Isolation Treatment;Building a Cloud-Integrated WOBAN with Optimal Coverage and Deployment Cost;VR Classroom for Interactive and Immersive Learning with Assessment of Students Comprehension;localization of Self-driving Car Using Particle Filter;convex Combination of Maximum Versoria Criterion-Based Adaptive Filtering Algorithm for Impulsive Environment;Verifying Mixed Signal ASIC Using SVM;design of High-Speed Turbo Product Code Decoder.
The proceedings contain 51 papers. The special focus in this conference is on computing and networkcommunications. The topics include: Speaker Identification Approach for the Post-pandemic Era of Internet of...
ISBN:
(纸本)9789813369764
The proceedings contain 51 papers. The special focus in this conference is on computing and networkcommunications. The topics include: Speaker Identification Approach for the Post-pandemic Era of Internet of Things;random Permutation-Based Linear Discriminant Analysis for Cancelable Biometric Recognition;a Deep Learning-Based Framework for Distributed Denial-of-Service Attacks Detection in Cloud Environment;automation for Furnace in Thermal Power Station Using Public Key Cryptography;Active Dictionary Attack on WPA3-SAE;Multiple Hashing Using SHA-256 and MD5;design and Analysis of a Secure Coded Communication System Using Chaotic Encryption and Turbo Product Code Decoder;Digital Image Transmission Using Combination of DWT-DCT Watermarking and AES Technique;generalized Symbolic Dynamics Approach for Characterization of Time Series;An HTTP DDoS Detection Model Using Machine Learning Techniques for the Cloud Environment;ioT Device Authentication and Access Control Through Hyperledger Fabric;smart Mirror-Based Personal Healthcare System;on–off Thinning in Linear Antenna Arrays Using Binary Dragonfly Algorithm;Reduction in Average Distance Cost by Optimizing Position of ONUs in FiWi Access network using Grey Wolf Optimization Algorithm;Performance Analysis of Individual Partial Relay Selection Protocol Using Decode and Forward Method for Underlay EH—CRN;preface;Cost-Effective Device for Autonomous Monitoring of the Vitals for COVID-19 Asymptomatic Patients in Home Isolation Treatment;Building a Cloud-Integrated WOBAN with Optimal Coverage and Deployment Cost;VR Classroom for Interactive and Immersive Learning with Assessment of Students Comprehension;localization of Self-driving Car Using Particle Filter;convex Combination of Maximum Versoria Criterion-Based Adaptive Filtering Algorithm for Impulsive Environment;Verifying Mixed Signal ASIC Using SVM;design of High-Speed Turbo Product Code Decoder.
The proceedings contain 17 papers. The special focus in this conference is on Ubiquitous communications and networkcomputing. The topics include: Predictive Modeling of the Spread of COVID-19: The Case of India;...
ISBN:
(纸本)9783030792756
The proceedings contain 17 papers. The special focus in this conference is on Ubiquitous communications and networkcomputing. The topics include: Predictive Modeling of the Spread of COVID-19: The Case of India;ASIF: An Internal Representation Suitable for Program Transformation and Parallel Conversion;Performance Comparison of VM Allocation and Selection Policies in an Integrated Fog-Cloud Environment;Fraud Detection in Credit Card Transaction Using ANN and SVM;detection of Leukemia Using K-Means Clustering and Machine Learning;an Analysis and Implementation of a Deep Learning Model for Image Steganography;abstractive Text Summarization on Templatized Data;mobility Management Based Mode Selection for the Next Generation network;specification of a Framework, Fully Distributed, for the Management of All Types of Data and the Services Close to Users;A Leading Edge Detection Algorithm for UWB Based Indoor Positioning Systems;designing Multiband Millimeter Wave Antenna for 5G and Beyond;analog Beamforming mm-Wave Two User Non-Orthogonal Multiple Access;A Novel Multi-User Quantum Communication System Using CDMA and Quantum Fourier Transform;Qubit Share Multiple Access Scheme (QSMA);Design of CoAP Based Model for Monitoring and Controlling Physical Parameters.
暂无评论