Linked e-resources

Details

Intro
Organizing Committee
Chief Patron
Patrons
Organizing Program Chairs
Program Co-chairs (IC-ICN 2020)
Convenor
Joint Convenor
Technical Program Committee
Overall Coordinator
Preface
Contents
Editors and Contributors
Exploiting Processor Variability for Efficient Application Mapping
1 Introduction
2 Literature Survey
2.1 Process Variation
2.2 Cherry-Picking: Process Variation Aware Core Selection
3 Proposed Work
4 Adaptive Application Mapping Architecture
5 Experimental Setup
6 Results and Analysis

7 Conclusions and Future Work
References
Genetic Algorithm for Feature Selection and Parameter Optimization to Enhance Learning on Framingham Heart Disease Dataset
1 Algorithms
1.1 Support Vector Machine
1.2 Neural Network
1.3 Genetic Algorithm
2 Literature Survey
3 Proposed Architecture
4 Results and Discussion
4.1 Dataset
4.2 GA for Hyperparameter Tuning SVM
4.3 GA for Hyperparameter Tuning NN
4.4 GA for Feature Selection
5 Conclusion and Future Scope
References
Secured Crowdfunding Platform Using Blockchain
1 Introduction

1.1 Benefits of Crowdfunding
1.2 Problem Statement
1.3 Objective
1.4 Scope
2 Review of Literature
2.1 Papers/Findings
3 Proposed Solution
3.1 Methodology
3.2 End User Diagram
3.3 Use Case Diagram
4 Implementation and Results
4.1 Rinkeby
4.2 MetaMask
4.3 Pages of application
4.4 Etherscan
4.5 MongoDB
5 Conclusion
References
Review of Wireless Sensor Network Security Schemes
1 Introduction
2 Related Work
3 WSN Architecture
3.1 Layered Architecture
3.2 Clustered Architecture
4 Issues/Attacks
4.1 Key Management

4.2 Node Capturing
4.3 Addition of Node
5 Analysis of Security Schemes
5.1 Key Management Scheme
5.2 Random Key Pre-distribution Schemes
5.3 Improved Pairwise Key Establishment Scheme for WSN
5.4 Scheme Based on RSA and ECC
5.5 Session Key Establishment Scheme
5.6 Mixed Public and Secret-Key Cryptography
6 Analysis of Schemes
7 Conclusion
References
Development of Agriculture Field Using Machine Learning
1 Introduction
2 Literature Survey
3 Summary and Discussion
4 Processing of Dataset
5 Conclusion
References

Security Issues in Cloud Computing
1 Introduction
2 Cloud Computing Model
2.1 Service Models
2.2 Deployment Models
2.3 Essential Characteristics
3 Cloud Security Issues
3.1 Software as a Service (SaaS) Security Issues
3.2 Platform as a Service (PaaS) Security Issues
3.3 Infrastructure as a Service (IaaS) Security Issues
4 Vulnerabilities Threats and Solutions for Cloud Security
4.1 Threats: Account or Service Hijacking
4.2 Threats: Data Leakage
4.3 Threat: Denial of Service
4.4 Threat: Customer Data Manipulation
4.5 Threat: VM Escape

Browse Subjects

Show more subjects...

Statistics

from
to
Export