Linked e-resources
Details
Table of Contents
Intro
Preface
Contents
Editors and Contributors
A Bandwidth-Efficient and Quick Response Traffic Congestion Control QoS Approach for VANET in 6G
1 Introduction
2 Types of Communication in VANET
3 Literature Survey
4 Traffic Congestion Control QoS (TCCQ) Approach for Better Bandwidth Utilization
4.1 Steps for Bandwidth Utilization and Quick Traffic Response
4.2 Flowchart of TCCQ
5 Simulation Parameters
6 Result Description
6.1 Throughput Analysis and Overhead Analysis
6.2 PDR Analysis and Overall Analysis
7 Conclusion and Future Work
References
A Comparative Study on Evolution of Natural Language Processing and Natural Language Understanding
1 Introduction
1.1 Natural Language Processing (NLP)
1.2 Natural Language Understanding (NLU)
1.3 Objective of the Study
2 System and Materials
2.1 Glance of Study
3 Analysis and Discussion
4 Conclusion
References
A Dynamic Online Shopping Website for Incorporating Different Business in a Single Platform
1 Introduction
2 Literature Survey
3 Proposed Work
4 Result and Discussion
5 Conclusion
References
A Greedy Load Balancing Strategy with Optimal Constraints for Edge Computing in Industrial Cloud Environment
1 Introduction
2 Hybrid Optimization Techniques in Cloud Load Balancing
3 Greedy Search Awareness Fuzzy Schedule
4 Results and Discussion
5 Conclusions
References
A Novel Approach for a Vision-Based Physical Distancing Monitoring System for COVID-19 Using Deep Learning Techniques
1 Introduction
2 Related Work
3 Proposed System
3.1 Algorithm
3.2 Proposed System Approach
4 Experimental Setup
5 Result
6 Conclusion and Future Work
References
A Review of Network Optimization on the Internet of Things
1 Introduction
1.1 Motivation
1.2 M2M, IoT, and IoE
2 Network Optimization
2.1 Network Optimization in IoT
3 Discussion on for IoT Network Optimization
3.1 Network Routing
3.2 Heterogeneity
3.3 Scalability
3.4 Quality of Service (QoS)
3.5 Security
4 Literature Survey
5 Conclusion
References
A Study on Social Engineering Attacks in Cybersecurity
1 Introduction
2 Social Engineering Attacks
2.1 Attacks Classification
3 Prevention Mechanisms
4 Mitigation Mechanisms
5 Comparison
6 Challenges
7 Conclusion
References
A Study on the Performance of the Faculty Members and Its Impact on Their Academic Rating during the Pandemic Wave One Period
1 Introduction
1.1 Review of Literature
1.2 Research Methodology
1.3 Findings
1.4 Limitations
1.5 Conclusion
1.6 Suggestions
References
A Survey on Various Techniques and Proposals for Improving the Cryptocurrency Protocol
1 Introduction
2 Literature Survey
3 Results Chart
4 Future Work
5 Conclusion
References
Preface
Contents
Editors and Contributors
A Bandwidth-Efficient and Quick Response Traffic Congestion Control QoS Approach for VANET in 6G
1 Introduction
2 Types of Communication in VANET
3 Literature Survey
4 Traffic Congestion Control QoS (TCCQ) Approach for Better Bandwidth Utilization
4.1 Steps for Bandwidth Utilization and Quick Traffic Response
4.2 Flowchart of TCCQ
5 Simulation Parameters
6 Result Description
6.1 Throughput Analysis and Overhead Analysis
6.2 PDR Analysis and Overall Analysis
7 Conclusion and Future Work
References
A Comparative Study on Evolution of Natural Language Processing and Natural Language Understanding
1 Introduction
1.1 Natural Language Processing (NLP)
1.2 Natural Language Understanding (NLU)
1.3 Objective of the Study
2 System and Materials
2.1 Glance of Study
3 Analysis and Discussion
4 Conclusion
References
A Dynamic Online Shopping Website for Incorporating Different Business in a Single Platform
1 Introduction
2 Literature Survey
3 Proposed Work
4 Result and Discussion
5 Conclusion
References
A Greedy Load Balancing Strategy with Optimal Constraints for Edge Computing in Industrial Cloud Environment
1 Introduction
2 Hybrid Optimization Techniques in Cloud Load Balancing
3 Greedy Search Awareness Fuzzy Schedule
4 Results and Discussion
5 Conclusions
References
A Novel Approach for a Vision-Based Physical Distancing Monitoring System for COVID-19 Using Deep Learning Techniques
1 Introduction
2 Related Work
3 Proposed System
3.1 Algorithm
3.2 Proposed System Approach
4 Experimental Setup
5 Result
6 Conclusion and Future Work
References
A Review of Network Optimization on the Internet of Things
1 Introduction
1.1 Motivation
1.2 M2M, IoT, and IoE
2 Network Optimization
2.1 Network Optimization in IoT
3 Discussion on for IoT Network Optimization
3.1 Network Routing
3.2 Heterogeneity
3.3 Scalability
3.4 Quality of Service (QoS)
3.5 Security
4 Literature Survey
5 Conclusion
References
A Study on Social Engineering Attacks in Cybersecurity
1 Introduction
2 Social Engineering Attacks
2.1 Attacks Classification
3 Prevention Mechanisms
4 Mitigation Mechanisms
5 Comparison
6 Challenges
7 Conclusion
References
A Study on the Performance of the Faculty Members and Its Impact on Their Academic Rating during the Pandemic Wave One Period
1 Introduction
1.1 Review of Literature
1.2 Research Methodology
1.3 Findings
1.4 Limitations
1.5 Conclusion
1.6 Suggestions
References
A Survey on Various Techniques and Proposals for Improving the Cryptocurrency Protocol
1 Introduction
2 Literature Survey
3 Results Chart
4 Future Work
5 Conclusion
References