Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almafu_9960809528202883
    Format: 1 online resource (712 pages)
    ISBN: 981-19-1018-9
    Series Statement: Lecture notes in networks and systems ; 427
    Note: Intro -- Organizing Committee -- Keynotes -- Preface -- Contents -- Editors and Contributors -- Fog Computing Paradigm for Internet of Things: Architectures, Issues, Challenges, and Applications -- 1 Introduction -- 2 Challenges in Cloud-IoT Computing Paradigm -- 3 Fog Computing Architecture for IoT -- 4 Related Work -- 5 Fog Computing Challenges -- 6 Fog-Supported IoT Applications -- 7 Conclusions -- References -- Security and Challenges for Blockchain Integrated Fog-Enabled IoT Applications -- 1 Introduction -- 2 Literature Review -- 3 Analyses of the Area of Fog-IoT Applications -- 3.1 Industrial IoT (IIoT) -- 3.2 Surveillance in the Smart Cities -- 3.3 Smart Power Grid -- 3.4 Intelligent Transport System -- 3.5 Intelligent Health Services -- 4 Blockchain Integrated Fog-IoT Architecture -- 4.1 IoT Device with Blockchain Layer -- 4.2 Edge with Blockchain Layer -- 4.3 Cloud with Blockchain Layer -- 5 Challenges in the Blockchain Integrated Fog-IoT Applications -- 5.1 Adaptability -- 5.2 Complexity -- 5.3 Dynamicity -- 5.4 Latency -- 5.5 Safety -- 6 Discussion and Future Scope -- 7 Conclusions -- References -- MLP Deep Learning-based DDoS Attack Detection Framework for Fog Computing -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Network Model -- 3.2 Attack Model -- 3.3 Attack Detection Framework -- 4 Overview of Dataset -- 5 Results and Discussion -- 5.1 Simulation Setup -- 5.2 Results -- 6 Conclusion -- References -- Active VM Placement Approach Based on Energy Efficiency in Cloud Environment -- 1 Introduction and Motivation -- 1.1 Contribution -- 2 Problem Statement -- 3 Proposed Algorithm for Multi-objective VM Placement -- 4 Performance Evaluation -- 5 Conclusion and Future Scope -- References -- Security Enhancement in Cloud Environment Using Modified Key-based Crypto Method -- 1 Introduction -- 2 Related Work. , 3 Proposed Method -- 3.1 Block Diagram of MKBCM -- 4 Experimental Evaluation and Results -- 4.1 Analysis of Computation Time of MKBCM -- 4.2 Analysis of Throughput of MKBCM -- 5 Comparative Analysis -- 5.1 Comparative Study of Execution Times -- 5.2 Comparative Study of Throughput -- 6 Conclusion and Future Work -- References -- RFID-Based Authentication Scheme for Secure Access of Medical Data in IoT-Enabled Health Environments -- 1 Introduction -- 2 System Architecture -- 3 Proposed Scheme -- 3.1 System Initialization -- 3.2 User Registration -- 3.3 Login and Authentication Phase -- 4 Informal Security Analysis -- 5 Performance Comparison -- 6 Conclusion -- References -- FML Framework: Function-Triggered ML-as-a-Service for IoT Cloud Applications -- 1 Introduction -- 2 Related Work -- 3 FML Framework -- 4 ML-as-a-Service-Hosted Services and Processes -- 4.1 ML-Algorithms -- 4.2 Processing Stages -- 4.3 Hosting ML-as-a-Service -- 5 Experimental Results -- 5.1 Experimental Setup -- 5.2 FML-Time Efficiency -- 5.3 FML-Cost Efficiency -- 6 Conclusion and Outlooks -- References -- A New Approach for Processing Raster Geospatial Big Data in Distributed Environment -- 1 Introduction -- 1.1 Issues and Challenges -- 2 Related Works -- 3 Proposed Architecture -- 3.1 Experimental Analysis -- 3.2 A New Approach for Processing Raster Geospatial Data in Distributed Environment -- 4 Result and Discussion -- 5 Conclusion and Future Work -- References -- An Efficient Service Selection Algorithm for Cloud Computing -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Proposed Algorithm and Illustration -- 4.1 Proposed Algorithm -- 4.2 Illustration -- 5 Datasets, Performance Metrics, Comparison Results, and Analysis -- 6 Conclusion -- References. , Transaction and QoS-Driven Composition of Web Services Using Modified Grey Wolf Optimization with TOPSIS and AHP -- 1 Introduction -- 2 Background -- 2.1 Transactional Properties of Composite Service -- 2.2 QoS Computation of Composite Service -- 2.3 Weight Calculation of QoS Attributes Using AHP -- 2.4 Technique of Order Preference by Similarity to Ideal Solution (TOPSIS) -- 2.5 Grey Wolf Optimization -- 3 Related Work -- 4 Web Services Composition Using Modified Grey Wolf Optimization -- 5 Performance Evaluation -- 6 Conclusion -- References -- Wireless Sensor Network Based Miner Localization in Underground Coal Mines -- 1 Introduction -- 1.1 Background -- 1.2 Motivation -- 2 Related Work -- 2.1 Localization in Traditional WSN -- 2.2 Localization in Underground Coal Mine WSN -- 3 Preliminaries -- 3.1 System Model -- 3.2 Problem Statement -- 4 Proposed Method -- 4.1 Localization Error -- 5 Simulation Results -- 6 Conclusions and Future Work -- References -- Bacterial Forging Optimization-Based Clustering Protocol for Wireless Sensor Networks -- 1 Introduction -- 2 Review of Related Literature -- 2.1 Brute Force Approaches -- 2.2 Nature-Inspired Approaches -- 3 Proposed Approach -- 3.1 Bacteria Foraging Optimization (BFO) -- 3.2 Energy Model -- 3.3 Network Model -- 4 Performance Evaluation -- 4.1 Simulation Environment -- 4.2 Simulation Result -- 5 Conclusion -- References -- Deer Hunting Optimization-Enabled Multi-objective Range-Free Anchor-Based Localization in WSN -- 1 Introduction -- 2 Literature Survey -- 2.1 Related Works -- 2.2 Review -- 3 Range-Free Anchor-Based Node Localization Strategy in WSN -- 3.1 3D DV-Hop Localization Model -- 3.2 DHOA -- 4 DHOA-DV-HOP Range-Free Anchor-Based Localization -- 4.1 Multi-objective Model -- 5 Results and Discussions -- 5.1 Convergence Analysis -- 5.2 Average Localization Error Analysis. , 5.3 Localization Error Variance Analysis -- 6 Conclusion -- References -- A Fuzzy Logic-Based Trust Management Scheme for Wireless Sensor Network -- 1 Introduction -- 2 Related Work -- 3 Proposed Trust Evaluation Model -- 3.1 Trust Factors -- 3.2 Algorithm for Proposed FLTM Scheme -- 3.3 Proposed Fuzzy Inference System -- 4 Results of Simulation -- 4.1 Simulation Domain -- 4.2 Simulation Results and Analysis -- 4.3 Performance Metrics -- 4.4 Comparison Between FLTM and GTMS -- 5 Conclusion -- References -- A Fuzzy Logic-Based Congestion Detection Technique for Vehicular Ad Hoc Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Fuzzy Logic-Based Congestion Detection and IoT-Based Emergency Routing -- 3.1 "Fuzzy Logic-Based Inference System for Congestion Detection" -- 4 Simulation Results -- 5 Conclusion -- References -- Reinforcement Learning Based Routing in Software Defined Network -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Data Plane -- 3.2 Control Plane -- 3.3 Knowledge Plane -- 3.4 Management Plane -- 4 Implementation -- 4.1 Training Phase -- 4.2 Testing Phase -- 5 Result Analysis -- 6 Conclusion -- References -- Load Balancing for Network Resource Management in Software-Defined Networks -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 3.1 Load Balancing Algorithms -- 3.2 To Collect the Data from the Log Files -- 3.3 ANN Load Balancing Between Multiple Servers -- 3.4 Comparison of Algorithms -- 3.5 To Perform a Health Check on the Servers -- 3.6 RL Based Load Balancing Between Multiple Paths -- 4 Results and Discussions -- 5 Conclusion -- References -- A Survey on Layer 2 Solutions to Achieve Scalability in Blockchain -- 1 Introduction -- 2 Blockchain: The Challenge Involved -- 3 The Scalability Trilemma -- 4 Layer 2 Solutions -- 4.1 Payment Channels -- 4.2 Sidechains -- 4.3 Cross-Chain Techniques. , 4.4 Off-Chain Computations -- 5 Discussion and Conclusion -- References -- Swift and Secure Medical Data Transaction -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 4 Experimental Results and Analysis -- 5 Conclusion -- References -- Things-Aware Business Process Model -- 1 Introduction -- 2 Related Work -- 3 Integration of BPMN with IoT -- 4 Decomposition of Business Processes -- 4.1 A Case Study -- 5 Comparative Analysis of PMS -- 6 Conclusion -- References -- An Uncertainty-Aware Cloud Service Selection Model Using CRITIC and MAUT -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 4 Case Study -- 4.1 Calculation of Criteria Weight Using CRITIC -- 4.2 Calculation of Alternative Rank Using MAUT -- 4.3 Analysis of Results -- 5 Conclusion -- References -- A Graphical User Interface (GUI) Based Speech Recognition System Using Deep Learning Models -- 1 Introduction -- 2 Literature Survey -- 3 Method -- 4 Result and Discussion -- 4.1 Test Sample/Segment -- 4.2 Experiments -- 4.3 Implementation -- 5 Conclusion -- References -- Deep Learning Based Document Layout Analysis on Historical Documents -- 1 Introduction -- 2 Related Work -- 3 Document Layout Analysis Using YOLOv3 -- 3.1 YOLOv3 -- 3.2 Visual Document Layout Analysis -- 4 Datasets -- 4.1 OHG -- 4.2 BOZEN -- 5 Experimental Setup and Results -- 5.1 Implementation -- 5.2 Results -- 6 Conclusion -- References -- Comparative Study of Deep Learning Approaches for Classification of Flares in Images -- 1 Introduction -- 2 Related Work -- 2.1 AlexNet -- 2.2 MobileNetv2 -- 2.3 ResNet18 -- 2.4 VGGNet -- 2.5 SqueezeNet -- 3 Datasets -- 4 Experimental Setup -- 5 Result Discussion and Analysis -- 6 Conclusion -- References -- Exploring SVM for Federated Machine Learning Applications -- 1 Introduction -- 2 Literature Review -- 3 The Proposed Federated SVM Model -- 4 Validation -- 4.1 Dataset. , 4.2 Experiments and Results.
    Additional Edition: Print version: Rout, Rashmi Ranjan Advances in Distributed Computing and Machine Learning Singapore : Springer,c2022 ISBN 9789811910173
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages