LEADER 05757nam 22007695 450 001 9910879585003321 005 20240808130233.0 010 $a3-031-64076-4 024 7 $a10.1007/978-3-031-64076-6 035 $a(MiAaPQ)EBC31591914 035 $a(Au-PeEL)EBL31591914 035 $a(CKB)33769532100041 035 $a(DE-He213)978-3-031-64076-6 035 $a(EXLCZ)9933769532100041 100 $a20240808d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvanced Network Technologies and Intelligent Computing $eThird International Conference, ANTIC 2023, Varanasi, India, December 20-22, 2023, Proceedings, Part I /$fedited by Anshul Verma, Pradeepika Verma, Kiran Kumar Pattanaik, Sanjay Kumar Dhurandher, Isaac Woungang 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (421 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v2090 311 $a3-031-64075-6 327 $a -- Advanced Network Technologies. -- Performance Improvement for Energy-Efficient CSS with Optimized Cognitive Users over Fading Channels. -- Optimizing WiMAX Network Performance with IP Security: An Evaluation of TCP and UDP Applications. -- Enhancement of Security in Opportunistic Networks. -- Design and Implementation of Smart Meter for Bilateral Transaction of Solar Energy. -- Optimizing Task Completion Rate in Multi-User Edge Intelligence Networks through Neural Network-based Energy Management with Partitioning and Offloading. -- Efficient Task Offloading in IoV using DDPG and MEC with RIS Support. -- Vacation Recommendation System Using New York Times Articles. -- Analysis of Different Measures of Centrality to Identify Vital Nodes in Social Networks. -- Performance Analysis of Software-Defined Network (SDN) via POX Controller Simulation in Mininet. -- Simulation and Comparison of BB84 and SSP99 QKD Protocols. -- IoT and Machine Learning-based Monitoring of the Growth of Crops Using Blockchain Technology. -- Determining the Impact of Metallic Obstacles on Blue-tooth Transmission to enhance Indoor Location Determination. -- Optimizing Crop Yield through IoT-Based Smart Irrigation with Fuzzy Control. -- Fusion of Chi-square and Z-test statistics for Feature Selection with Machine Learning Techniques in Intrusion Detection. -- Smart Bakery: Technology and Automation. -- An experimental study on Estimation of Reliability of a Computer Network for the network of Delhi Development Authority: A Study on Challenges, Experiment and its results, Potential Future Avenues and Significance of Ongoing Research. -- An Effective Virtual Machine Allocation in Federated Cloud by PARAMR-DNN Technique. -- Intrusion Watchdog: Enhancing Intrusion Detection System with Machine Learning using 3-way Feature Selection Technique. -- Phishing URLs Detection Method using Hybrid Feature and Convolutional Neural Networks with Attention Mechanisms. -- Exploring Multi-Attribute Selection Strategies for Effective Phishing Detection with Machine Learning. -- Zero-day exploits framework of supply chain networks. -- SMASK: Parallel Probabilistic Privacy-Preserving Frequent Pattern Mining Technique for Big Data. -- SMAKMS_FC: Secure Mutual Authentication and Key Management Scheme for Fog Computing. -- Comparative Analysis on Network Attack Prediction Used Deep Learning Approaches on Software Security Testing. -- DNA-Based Elliptic Curve Cryptography for Data Security in IoT. 330 $aThe 4-volume proceedings set CCIS 2090, 2091,2092 and 2093 constitute the refereed post-conference proceedings of the Third International Conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2023, held in Varanasi, India, during December 20-22, 2023. The 87 full papers and 11 short papers included in this book were carefully reviewed and selected from 487 submissions. The conference papers are organized in topical sections on: Part I - Advanced Network Technologies. Part II - Advanced Network Technologies; Intelligent Computing. Part III-IV - Intelligent Computing. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v2090 606 $aComputer engineering 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aSoftware engineering 606 $aCoding theory 606 $aInformation theory 606 $aComputer Engineering and Networks 606 $aCryptology 606 $aSoftware Engineering 606 $aCoding and Information Theory 606 $aComputer Communication Networks 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aSoftware engineering. 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aComputer Engineering and Networks. 615 24$aCryptology. 615 24$aSoftware Engineering. 615 24$aCoding and Information Theory. 615 24$aComputer Communication Networks. 676 $a621.39 676 $a004.6 700 $aVerma$b Anshul$01592011 701 $aVerma$b Pradeepika$01765132 701 $aPattanaik$b Kiran Kumar$01765133 701 $aDhurandher$b Sanjay Kumar$01380384 701 $aWoungang$b Isaac$0846886 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910879585003321 996 $aAdvanced Network Technologies and Intelligent Computing$94206367 997 $aUNINA