feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_9949335375502882
    Format: XXX, 719 p. 297 illus., 252 illus. in color. , online resource.
    Edition: 1st ed. 2022.
    ISBN: 9789811910180
    Series Statement: Lecture Notes in Networks and Systems, 427
    Content: This book includes a collection of peer-reviewed best selected research papers presented at the Third International Conference on Advances in Distributed Computing and Machine Learning (ICADCML 2022), organized by Department of Computer Science and Engineering, National Institute of Technology, Warangal, Telangana, India, during 15-16 January 2022. This book presents recent innovations in the field of scalable distributed systems in addition to cutting edge research in the field of Internet of Things (IoT) and blockchain in distributed environments.
    Note: Fog Computing Paradigm for Internet of Things: Architectures, Issues, Challenges and Applications -- Security and Challenges for Blockchain Integrated Fog Enabled IoT Applications -- MLP Deep Learning Based DDoS Attack Detection Framework for Fog Computing -- Active VM Placement Approach Based on Energy Efficiency in Cloud Environment -- Security Enhancement in Cloud Environment using Modified Key Based Crypto Method -- RFID-Based Authentication Scheme for Secure Access of Medical Data in IoT-Enabled Health Environments -- FML Framework: Function Triggered ML-as-a-Service for IoT Cloud Applications -- A New Approach for Processing Raster Geospatial Big Data in Distributed Environment -- An Efficient Service Selection Algorithm for Cloud Computing -- Transaction and QoS-Driven Composition of Web Services using Modified Grey Wolf Optimization with TOPSIS and AHP.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9789811910173
    Additional Edition: Printed edition: ISBN 9789811910197
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV049640418
    Format: 1 Online-Ressource (XV, 310 p. 138 illus., 96 illus. in color)
    Edition: 1st ed. 2024
    ISBN: 9783031569982
    Series Statement: Communications in Computer and Information Science 1892
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-56997-5
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-56999-9
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    b3kat_BV048637854
    Format: 1 Online-Ressource (XV, 311 p. 144 illus., 101 illus. in color)
    Edition: 1st ed. 2022
    ISBN: 9783031217500
    Series Statement: Communications in Computer and Information Science 1729
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-21749-4
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-21751-7
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    edoccha_9960809528202883
    Format: 1 online resource (712 pages)
    ISBN: 981-19-1018-9
    Series Statement: Lecture notes in networks and systems ; 427
    Note: Intro -- Organizing Committee -- Keynotes -- Preface -- Contents -- Editors and Contributors -- Fog Computing Paradigm for Internet of Things: Architectures, Issues, Challenges, and Applications -- 1 Introduction -- 2 Challenges in Cloud-IoT Computing Paradigm -- 3 Fog Computing Architecture for IoT -- 4 Related Work -- 5 Fog Computing Challenges -- 6 Fog-Supported IoT Applications -- 7 Conclusions -- References -- Security and Challenges for Blockchain Integrated Fog-Enabled IoT Applications -- 1 Introduction -- 2 Literature Review -- 3 Analyses of the Area of Fog-IoT Applications -- 3.1 Industrial IoT (IIoT) -- 3.2 Surveillance in the Smart Cities -- 3.3 Smart Power Grid -- 3.4 Intelligent Transport System -- 3.5 Intelligent Health Services -- 4 Blockchain Integrated Fog-IoT Architecture -- 4.1 IoT Device with Blockchain Layer -- 4.2 Edge with Blockchain Layer -- 4.3 Cloud with Blockchain Layer -- 5 Challenges in the Blockchain Integrated Fog-IoT Applications -- 5.1 Adaptability -- 5.2 Complexity -- 5.3 Dynamicity -- 5.4 Latency -- 5.5 Safety -- 6 Discussion and Future Scope -- 7 Conclusions -- References -- MLP Deep Learning-based DDoS Attack Detection Framework for Fog Computing -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Network Model -- 3.2 Attack Model -- 3.3 Attack Detection Framework -- 4 Overview of Dataset -- 5 Results and Discussion -- 5.1 Simulation Setup -- 5.2 Results -- 6 Conclusion -- References -- Active VM Placement Approach Based on Energy Efficiency in Cloud Environment -- 1 Introduction and Motivation -- 1.1 Contribution -- 2 Problem Statement -- 3 Proposed Algorithm for Multi-objective VM Placement -- 4 Performance Evaluation -- 5 Conclusion and Future Scope -- References -- Security Enhancement in Cloud Environment Using Modified Key-based Crypto Method -- 1 Introduction -- 2 Related Work. , 3 Proposed Method -- 3.1 Block Diagram of MKBCM -- 4 Experimental Evaluation and Results -- 4.1 Analysis of Computation Time of MKBCM -- 4.2 Analysis of Throughput of MKBCM -- 5 Comparative Analysis -- 5.1 Comparative Study of Execution Times -- 5.2 Comparative Study of Throughput -- 6 Conclusion and Future Work -- References -- RFID-Based Authentication Scheme for Secure Access of Medical Data in IoT-Enabled Health Environments -- 1 Introduction -- 2 System Architecture -- 3 Proposed Scheme -- 3.1 System Initialization -- 3.2 User Registration -- 3.3 Login and Authentication Phase -- 4 Informal Security Analysis -- 5 Performance Comparison -- 6 Conclusion -- References -- FML Framework: Function-Triggered ML-as-a-Service for IoT Cloud Applications -- 1 Introduction -- 2 Related Work -- 3 FML Framework -- 4 ML-as-a-Service-Hosted Services and Processes -- 4.1 ML-Algorithms -- 4.2 Processing Stages -- 4.3 Hosting ML-as-a-Service -- 5 Experimental Results -- 5.1 Experimental Setup -- 5.2 FML-Time Efficiency -- 5.3 FML-Cost Efficiency -- 6 Conclusion and Outlooks -- References -- A New Approach for Processing Raster Geospatial Big Data in Distributed Environment -- 1 Introduction -- 1.1 Issues and Challenges -- 2 Related Works -- 3 Proposed Architecture -- 3.1 Experimental Analysis -- 3.2 A New Approach for Processing Raster Geospatial Data in Distributed Environment -- 4 Result and Discussion -- 5 Conclusion and Future Work -- References -- An Efficient Service Selection Algorithm for Cloud Computing -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Proposed Algorithm and Illustration -- 4.1 Proposed Algorithm -- 4.2 Illustration -- 5 Datasets, Performance Metrics, Comparison Results, and Analysis -- 6 Conclusion -- References. , Transaction and QoS-Driven Composition of Web Services Using Modified Grey Wolf Optimization with TOPSIS and AHP -- 1 Introduction -- 2 Background -- 2.1 Transactional Properties of Composite Service -- 2.2 QoS Computation of Composite Service -- 2.3 Weight Calculation of QoS Attributes Using AHP -- 2.4 Technique of Order Preference by Similarity to Ideal Solution (TOPSIS) -- 2.5 Grey Wolf Optimization -- 3 Related Work -- 4 Web Services Composition Using Modified Grey Wolf Optimization -- 5 Performance Evaluation -- 6 Conclusion -- References -- Wireless Sensor Network Based Miner Localization in Underground Coal Mines -- 1 Introduction -- 1.1 Background -- 1.2 Motivation -- 2 Related Work -- 2.1 Localization in Traditional WSN -- 2.2 Localization in Underground Coal Mine WSN -- 3 Preliminaries -- 3.1 System Model -- 3.2 Problem Statement -- 4 Proposed Method -- 4.1 Localization Error -- 5 Simulation Results -- 6 Conclusions and Future Work -- References -- Bacterial Forging Optimization-Based Clustering Protocol for Wireless Sensor Networks -- 1 Introduction -- 2 Review of Related Literature -- 2.1 Brute Force Approaches -- 2.2 Nature-Inspired Approaches -- 3 Proposed Approach -- 3.1 Bacteria Foraging Optimization (BFO) -- 3.2 Energy Model -- 3.3 Network Model -- 4 Performance Evaluation -- 4.1 Simulation Environment -- 4.2 Simulation Result -- 5 Conclusion -- References -- Deer Hunting Optimization-Enabled Multi-objective Range-Free Anchor-Based Localization in WSN -- 1 Introduction -- 2 Literature Survey -- 2.1 Related Works -- 2.2 Review -- 3 Range-Free Anchor-Based Node Localization Strategy in WSN -- 3.1 3D DV-Hop Localization Model -- 3.2 DHOA -- 4 DHOA-DV-HOP Range-Free Anchor-Based Localization -- 4.1 Multi-objective Model -- 5 Results and Discussions -- 5.1 Convergence Analysis -- 5.2 Average Localization Error Analysis. , 5.3 Localization Error Variance Analysis -- 6 Conclusion -- References -- A Fuzzy Logic-Based Trust Management Scheme for Wireless Sensor Network -- 1 Introduction -- 2 Related Work -- 3 Proposed Trust Evaluation Model -- 3.1 Trust Factors -- 3.2 Algorithm for Proposed FLTM Scheme -- 3.3 Proposed Fuzzy Inference System -- 4 Results of Simulation -- 4.1 Simulation Domain -- 4.2 Simulation Results and Analysis -- 4.3 Performance Metrics -- 4.4 Comparison Between FLTM and GTMS -- 5 Conclusion -- References -- A Fuzzy Logic-Based Congestion Detection Technique for Vehicular Ad Hoc Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Fuzzy Logic-Based Congestion Detection and IoT-Based Emergency Routing -- 3.1 "Fuzzy Logic-Based Inference System for Congestion Detection" -- 4 Simulation Results -- 5 Conclusion -- References -- Reinforcement Learning Based Routing in Software Defined Network -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Data Plane -- 3.2 Control Plane -- 3.3 Knowledge Plane -- 3.4 Management Plane -- 4 Implementation -- 4.1 Training Phase -- 4.2 Testing Phase -- 5 Result Analysis -- 6 Conclusion -- References -- Load Balancing for Network Resource Management in Software-Defined Networks -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 3.1 Load Balancing Algorithms -- 3.2 To Collect the Data from the Log Files -- 3.3 ANN Load Balancing Between Multiple Servers -- 3.4 Comparison of Algorithms -- 3.5 To Perform a Health Check on the Servers -- 3.6 RL Based Load Balancing Between Multiple Paths -- 4 Results and Discussions -- 5 Conclusion -- References -- A Survey on Layer 2 Solutions to Achieve Scalability in Blockchain -- 1 Introduction -- 2 Blockchain: The Challenge Involved -- 3 The Scalability Trilemma -- 4 Layer 2 Solutions -- 4.1 Payment Channels -- 4.2 Sidechains -- 4.3 Cross-Chain Techniques. , 4.4 Off-Chain Computations -- 5 Discussion and Conclusion -- References -- Swift and Secure Medical Data Transaction -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 4 Experimental Results and Analysis -- 5 Conclusion -- References -- Things-Aware Business Process Model -- 1 Introduction -- 2 Related Work -- 3 Integration of BPMN with IoT -- 4 Decomposition of Business Processes -- 4.1 A Case Study -- 5 Comparative Analysis of PMS -- 6 Conclusion -- References -- An Uncertainty-Aware Cloud Service Selection Model Using CRITIC and MAUT -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 4 Case Study -- 4.1 Calculation of Criteria Weight Using CRITIC -- 4.2 Calculation of Alternative Rank Using MAUT -- 4.3 Analysis of Results -- 5 Conclusion -- References -- A Graphical User Interface (GUI) Based Speech Recognition System Using Deep Learning Models -- 1 Introduction -- 2 Literature Survey -- 3 Method -- 4 Result and Discussion -- 4.1 Test Sample/Segment -- 4.2 Experiments -- 4.3 Implementation -- 5 Conclusion -- References -- Deep Learning Based Document Layout Analysis on Historical Documents -- 1 Introduction -- 2 Related Work -- 3 Document Layout Analysis Using YOLOv3 -- 3.1 YOLOv3 -- 3.2 Visual Document Layout Analysis -- 4 Datasets -- 4.1 OHG -- 4.2 BOZEN -- 5 Experimental Setup and Results -- 5.1 Implementation -- 5.2 Results -- 6 Conclusion -- References -- Comparative Study of Deep Learning Approaches for Classification of Flares in Images -- 1 Introduction -- 2 Related Work -- 2.1 AlexNet -- 2.2 MobileNetv2 -- 2.3 ResNet18 -- 2.4 VGGNet -- 2.5 SqueezeNet -- 3 Datasets -- 4 Experimental Setup -- 5 Result Discussion and Analysis -- 6 Conclusion -- References -- Exploring SVM for Federated Machine Learning Applications -- 1 Introduction -- 2 Literature Review -- 3 The Proposed Federated SVM Model -- 4 Validation -- 4.1 Dataset. , 4.2 Experiments and Results.
    Additional Edition: Print version: Rout, Rashmi Ranjan Advances in Distributed Computing and Machine Learning Singapore : Springer,c2022 ISBN 9789811910173
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    edocfu_BV048637854
    Format: 1 Online-Ressource (XV, 311 p. 144 illus., 101 illus. in color).
    Edition: 1st ed. 2022
    ISBN: 978-3-031-21750-0
    Series Statement: Communications in Computer and Information Science 1729
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-21749-4
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-21751-7
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    edoccha_BV048637854
    Format: 1 Online-Ressource (XV, 311 p. 144 illus., 101 illus. in color).
    Edition: 1st ed. 2022
    ISBN: 978-3-031-21750-0
    Series Statement: Communications in Computer and Information Science 1729
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-21749-4
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-21751-7
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages