Vai al contenuto principale della pagina

Proceedings of Fifth International Conference on Computing, Communications, and Cyber-Security : IC4S'05 Volume 1



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Tanwar Sudeep Visualizza persona
Titolo: Proceedings of Fifth International Conference on Computing, Communications, and Cyber-Security : IC4S'05 Volume 1 Visualizza cluster
Pubblicazione: Singapore : , : Springer, , 2024
©2024
Edizione: 1st ed.
Descrizione fisica: 1 online resource (965 pages)
Altri autori: SinghPradeep Kumar  
GanzhaMaria  
EpiphaniouGregory  
Nota di contenuto: Intro -- Preface -- Contents -- Editors and Contributors -- Communication and Network Technologies -- Compatibility Checking to Adopt MANET in LoRaWAN for Long-Range Connectivity -- 1 Introduction -- 2 Technical Details of LoRa and LoRaWAN -- 3 Technical Details of Wireless Ad Hoc Network/s -- 4 Technical Details of Routing Protocols -- 5 Integration of LoRaWAN and Wireless Ad Hoc Networks -- 6 Conclusion and Future Scope -- References -- A Novel FR4-Based Slot Antenna with Circular Metasurface for Aerospace CubeSats -- 1 Introduction -- 2 Antenna Design and Structure -- 3 Results and Discussion -- 4 Conclusions -- References -- Compact and High-Gain RFID Reader Antennas for Future Internet of Things Applications -- 1 Introduction -- 2 Antenna Structure -- 3 Result Synthesis -- 4 Conclusions -- References -- Enabling Modern IoT Solutions with RFID Devices via an Integrated Feeding Network-Fed Ultra-Wide HPBW Patch Antenna Array -- 1 Introduction -- 2 Antenna Architecture and Description -- 3 Results and Discussion -- 4 Conclusions and Perspectives -- References -- A Compact and Extremely Stiffness CPW-Fed Metal-Only Patch Antenna Array for Unlimited Lifetime 2U CubeSat Mission Capabilities -- 1 Introduction -- 2 Geometrical Analysis -- 3 Results and Discussion -- 4 Conclusions and Future Works -- References -- Jeans-Based UWB UHF Textile Patch Antenna for IoT Applications -- 1 Introduction -- 2 Overview on Textile Antennas -- 3 Antenna Configuration -- 4 Results and Discussion -- 5 Conclusions and Upcoming Projects -- References -- Design and Fabrication of PCB-Based Proximity Sensors for Application in Automatic Railway Crossing System -- 1 Introduction -- 2 Proposed System Working -- 2.1 PCB Fabrication of Proximity Sensors PCB Fabrication of Proximity Sensors -- 2.2 Traffic Light Control System -- 2.3 Alert System -- 2.4 Gate Closing Mechanism.
3 Conclusion -- References -- FeaTrim-ViT: Vision Transformer Trimming with One Shot Neural Architecture Search in Continuous Optimisation Space and Efficient Feature Selection -- 1 Introduction -- 2 Related Work -- 2.1 Overview of Compression Techniques -- 2.2 Literature Review -- 3 Background -- 3.1 Vision Transformers -- 3.2 Neural Architecture Search -- 3.3 Nature-Inspired Algorithms -- 4 Methodology -- 4.1 Overview -- 4.2 Search Space -- 4.3 Single-Shot Architecture Search -- 4.4 Nature-Inspired Optimisation Algorithm -- 5 Experiments -- 5.1 Training Process -- 5.2 Multidimensional Search -- 5.3 Feature Selection -- 5.4 Dataset -- 6 Results and Analysis -- 6.1 Model Training -- 6.2 Evaluation Metrics -- 6.3 Attention Maps Interpretability -- 6.4 Discussion -- 7 Conclusion -- References -- Detecting Depressive Symptoms on Social Media: A Comprehensive Review of Methodologies and Strategies for Suicide Prevention -- 1 Introduction -- 2 Literature Review -- 2.1 Data Acquisition -- 2.2 Techniques Used -- 3 Critical Evaluation -- 4 Discussion -- 5 Conclusion and Future Scope -- References -- Enhancing Video Content Accessibility Through YouTube Transcript Summarization -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Usage of BART and Its Benefits -- 3.2 Video Summarization Through Captions -- 3.3 Video Summarization Through Audio -- 3.4 Video Clipping for Customized Summary Extraction -- 3.5 Evaluation of Summaries Using ROGUE Scores -- 4 Result and Discussion -- 5 Conclusion -- References -- Advanced Computing Technologies -- Enhanced Rear-End Collision Detection and Localization Scheme Using LSTM, DRNN, and DNN in Fog-Based Internet of Vehicles -- 1 Introduction -- 2 Related Work -- 3 Rear-End Collision Detection Scheme -- 4 Experimental Setup, Performance Metrics, and Evaluation -- 5 Results and Discussion of Result -- 6 Conclusion.
References -- Security Threats and Data Protection Methods Used in Cloud Computing: A Review -- 1 Introduction -- 2 Cloud Computing -- 2.1 Cloud Deployment Models -- 3 Security Issues in Cloud -- 3.1 Identity and Access Management -- 3.2 Data Storage -- 3.3 Network -- 4 Cloud Security Threats -- 5 Research Methodology -- 5.1 Research Strategy -- 5.2 Inclusion and Exclusion Criteria -- 5.3 Research Questions -- 6 Result and Discussion -- 6.1 Ensuring Data Protection While It's Being Processed (RQ1) -- 6.2 Ensuring Data Protection While Searching and Filtering Through the Data (RQ2) -- 6.3 Ensuring Data Privacy Between Multiple Users (RQ3) -- 7 Conclusion -- References -- Load Balancing Algorithms for Cloud Computing Performance: A Review -- 1 Introduction -- 2 Load Balancing -- 3 Types of Load Balancing -- 3.1 Static Load Balancing Algorithms -- 3.2 Dynamic Load Balancing Algorithms -- 3.3 Comparison of Static and Dynamic Load Balancing Algorithms -- 3.4 Existing Load Balancing Techniques in Cloud Computing -- 4 Parameters -- 4.1 Parameter Impact -- 5 Research Methodology -- 5.1 Research Strategy -- 5.2 Inclusion and Exclusion Criteria -- 5.3 Research Questions -- 6 Result and Discussion -- 6.1 Load Balancing is Helpful in Optimizing the Overall Performance in Cloud Environment (RQ1) -- 6.2 Best Performing Load Balancing Algorithm (RQ2) -- 7 Conclusion -- References -- Seamless Mobility: Innovating the Digital Service Landscape in Telecom Industry -- 1 Introduction -- 2 Literature Review -- 3 Digital Payments -- 3.1 Mobile Banking (M-Banking) -- 3.2 UPI-Based Apps -- 3.3 Payments Bank -- 3.4 Mobile Blockchain -- 4 Governance -- 4.1 Mobile Governance -- 4.2 Biometric Technology -- 5 Conclusion -- References -- Data Analytics and Intelligent Learning -- Pandemic Pulse: Unveiling Insights with the Global Health Tracker Through AI and ML -- 1 Introduction.
2 Literature Review -- 3 Detailed Study -- 4 Proposed Work -- 5 Simulation Study -- 6 Discussion and Conclusion -- References -- CNN-Based Model for Real-Time Identification of Face Masks -- 1 Introduction -- 1.1 Face Recognition -- 1.2 Feature Extraction -- 2 Literature Survey -- 3 Proposed Approach -- 4 Performance Evaluation -- 4.1 Results -- 5 Conclusion -- References -- A Systematic Review of Deepfake Detection Using Learning Techniques and Vision Transformer -- 1 Introduction -- 1.1 Motivation -- 1.2 Organization of the Paper -- 1.3 Scope and Contributions of the Paper -- 2 Modalities of Deepfakes -- 2.1 Image Deepfake -- 2.2 Video Deepfake -- 2.3 Audio Deepfake -- 3 Deepfake Generation -- 3.1 Deepfake Tools -- 4 Deepfake Detection -- 4.1 Deep Learning/Machine Learning -- 4.2 Vision Transformer -- 5 Research Challenges -- 6 Evaluation of Proposed Study -- 7 Limitation of the Study -- 8 Conclusion and Future Scope -- References -- Probabilistic Forecasting Prediction Model for Anticipating Days with Elevated Air Pollution -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset Description -- 4 Implementation of Models -- 4.1 Naïve-Prediction-Model Development -- 4.2 Ensemble Tree Prediction Model Development -- 5 Evaluation of Models -- 6 Result and Discussions -- 7 Conclusion and Future Scope -- References -- Optimizing Graph Colorings: Unleashing the Power of Heuristic Algorithms for Enhanced Problem-Solving -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results -- 4.1 Using 10 Nodes -- 4.2 Using 25 Nodes -- 4.3 Using Nodes 50 -- 4.4 Using Nodes 75 -- 4.5 Using Nodes 100 -- 5 Conclusion -- References -- A Load Balancing Approach Using Binary Search -- 1 Introduction -- 1.1 Underutilization of Cloud Resources -- 2 Related Work -- 3 Proposed Methodology -- 4 Conclusion and Future Scope -- References.
Enhanced Detection of Alzheimer's and Mild Cognitive Impairment: Leveraging Advanced Preprocessing and Convolutional Neural Networks -- 1 Introduction -- 2 Literature Review -- 3 Material and Methods -- 3.1 Dataset -- 3.2 Preprocessing -- 3.3 CNN Architectures -- 3.4 Performance Metrics -- 4 Results and Discussion -- 5 Conclusion -- References -- Classification of Dry Beans into Genetic Varieties Using Deep Learning-Based Convolutional Neural Networks (CNNs) -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Capturing Sample Image -- 3.2 Formation of a Well-Balanced Dataset -- 3.3 Data Preprocessing -- 3.4 Applying Deep Learning Algorithms -- 4 Results and Discussion -- 5 Conclusion -- References -- Navigating the Realm of Generative Models: GANs, Diffusion, Limitations, and Future Prospects-A Review -- 1 Introduction -- 2 Background -- 2.1 Generative Adversarial Networks (GANs) -- 2.2 Diffusion Models -- 3 Text-to-Image Synthesis -- 4 Comparison Between Generative Models -- 4.1 Generative Models in Different Scenarios -- 5 Research Methodology -- 5.1 Research Strategy -- 5.2 Sources -- 5.3 Search Process -- 5.4 Segregation of Literature -- 6 Research Questions -- 7 Results and Discussion -- 7.1 Application and Comparison of Generative Models (RQ1) -- 7.2 Challenges in Generative Models (RQ 2) -- 7.3 Future Research Directions and Emerging Trends in Generative Models -- 8 Conclusion -- References -- Enhancing Software Reliability Through Hybrid Metaheuristic Optimization -- 1 Introduction -- 1.1 Why NACO -- 2 Background and Related Work -- 2.1 Background -- 2.2 Related Work -- 3 Software Metrics -- 4 Methodology -- 4.1 Problem Formulation -- 4.2 Objective Function -- 4.3 Framework -- 5 Result and Discussion -- 5.1 Implementation Details -- 5.2 Results -- 6 Conclusion and Future Scope -- References.
Anomaly Detection for Automated Cyber-attacks: Hybrid SVM ML-Based Approach.
Titolo autorizzato: Proceedings of Fifth International Conference on Computing, Communications, and Cyber-Security  Visualizza cluster
ISBN: 981-9725-50-X
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910878046603321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Networks and Systems Series