001453037 000__ 06016cam\a2200649\i\4500 001453037 001__ 1453037 001453037 003__ OCoLC 001453037 005__ 20230314003330.0 001453037 006__ m\\\\\o\\d\\\\\\\\ 001453037 007__ cr\cn\nnnunnun 001453037 008__ 221008s2023\\\\si\\\\\\o\\\\\101\0\eng\d 001453037 020__ $$a9789811928215$$q(electronic bk.) 001453037 020__ $$a9811928215$$q(electronic bk.) 001453037 020__ $$z9811925348 001453037 020__ $$z9789811925344 001453037 0247_ $$a10.1007/978-981-19-2821-5$$2doi 001453037 035__ $$aSP(OCoLC)1347024584 001453037 040__ $$aEBLCP$$beng$$erda$$cEBLCP$$dGW5XE$$dYDX$$dOCLCF$$dOCLCQ 001453037 049__ $$aISEA 001453037 050_4 $$aQA75.5$$b.I58 2022 001453037 08204 $$a004$$223/eng/20221011 001453037 1112_ $$aInternational Conference on Innovative Computing and Communications$$n(5th :$$d2022 :$$cDelhi, India) 001453037 24510 $$aInternational Conference on Innovative Computing and Communications :$$bproceedings of ICICC 2022.$$nVolume 1 /$$cDeepak Gupta, Ashish Khanna, Siddhartha Bhattacharyya, Aboul Ella Hassanien, Sameer Anand, Ajay Jaiswal, editors. 001453037 2463_ $$aICICC 2022 001453037 260__ $$aSingapore :$$bSpringer,$$c[2023] 001453037 300__ $$a1 online resource (793 p.). 001453037 336__ $$atext$$btxt$$2rdacontent 001453037 337__ $$acomputer$$bc$$2rdamedia 001453037 338__ $$aonline resource$$bcr$$2rdacarrier 001453037 4901_ $$aLecture Notes in Networks and Systems ;$$vv.473 001453037 500__ $$a4 Conclusion 001453037 500__ $$aIncludes author index. 001453037 5050_ $$aIntro -- ICICC-2022 Steering Committee Members -- Preface -- Contents -- Editors and Contributors -- Constructing Interval Type-2 Fuzzy Systems (IT2FS) with Memetic Algorithm: Elucidating Performance with Noisy Data -- 1 Introduction -- 2 Introduction to Type-2 Fuzzy Logic System -- 3 Memetic Algorithms -- 4 Mathematical Modeling -- 5 Experimental Study -- 6 Conclusions -- References -- Secure Environment Establishment for Multipath Routing -- 1 Introduction -- 1.1 Mobile Ad Hoc Networks -- 1.2 Attacks in MANET -- 1.3 Certificate Chaining Approach -- 1.4 Need for Certificate Revocation 001453037 5058_ $$a1.5 Advantages -- 1.6 Drawback -- 1.7 Problem Identification and Contribution -- 2 Related Works -- 3 Proposed Solution -- 3.1 Overview -- 3.2 Trust Management Mechanism -- 3.3 Detection of Misbehaving Nodes -- 4 Simulation Results -- 4.1 Simulation Model and Parameters -- 4.2 Performance Metrics -- 5 Conclusion -- References -- Comparative Analysis of Transfer Learning and Attention-driven Memory-based Learning for COVID-19 Fake News Detection -- 1 Introduction -- 2 Related Work -- 3 Learning Models Validated for COVID-19 Fake News Detection 001453037 5058_ $$a3.1 Bi-directional Encoder Representations from Transformers (BERT) -- 3.2 Attentional-based Bi-directional Long Short-term Memory Model -- 4 Experimental Setup and Model Performance Evaluation -- 4.1 Dataset Details -- 4.2 Experimental Outcome -- 4.3 Discussion -- 5 Conclusion and Future Scope -- References -- Review on Edge Computing-assisted d2d Networks -- 1 Introduction -- 2 Challenges in Existing Techniques -- 2.1 D2D Communication -- 2.2 Edge Computing -- 3 Edge-based Performance Enhancement in d2d Networks -- 3.1 Improvement of Computational Capacity -- 3.2 Resource Allocation 001453037 5058_ $$a3.3 Computational Offloading -- 3.4 Power Constraints -- 3.5 Device Discovery -- 3.6 Latency Reduction -- 4 Conclusions -- References -- OpenDaylight SDN and NFV Integration in OpenStack Cloud: OpenSource Approach for Improving Network Services -- 1 Introduction -- 2 Overview of the Cloud -- 3 SDN Enabled the Architecture of the Network -- 4 SDN Advantages in Cloud -- 5 Proposed Architecture, Implementation, and Discussion -- 5.1 Proposed Architecture -- 5.2 Deploying an SDN Solution on a High-Performing Cluster -- 5.3 OpenDaylight SDN Cluster Integration with OpenStack Cloud Platforms 001453037 5058_ $$a5.4 Discussion -- 6 Conclusion and Future Work -- References -- K-MNSOA: K-Anonymity Model for Privacy in the Presence of Multiple Numerical Sensitive Overlapped Attributes -- 1 Introduction -- 2 Literature Review -- 2.1 PPDPT: Need and Techniques -- 2.2 K-Anonymity: Need and Techniques -- 2.3 L-Diversity -- 2.4 Multiple Sensitive Attributes -- 2.5 Overlapped Attributes -- 3 Proposed Model K-MNSOA: K-Anonymity Model for Multiple Numerical Sensitive Overlapped Attributes -- 3.1 Methodology -- 3.2 Algorithm: K-MNSOA-K-Anonymity Model for Multiple Numerical Sensitive Overlapped Attributes 001453037 506__ $$aAccess limited to authorized users. 001453037 520__ $$aThis book includes high-quality research papers presented at the Fifth International Conference on Innovative Computing and Communication (ICICC 2022), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 1920, 2022. Introducing the innovative works of scientists, professors, research scholars, students and industrial experts in the field of computing and communication, the book promotes the transformation of fundamental research into institutional and industrialized research and the conversion of applied exploration into real-time applications. 001453037 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed October 11, 2022). 001453037 650_0 $$aComputer science$$vCongresses. 001453037 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001453037 655_0 $$aElectronic books. 001453037 7001_ $$aGupta, Deepak,$$cPh.D. 001453037 7001_ $$aKhanna, Ashish$$c(Of Guru Gobind Singh Indraprastha University) 001453037 7001_ $$aBhattacharyya, Siddhartha,$$d1975- 001453037 7001_ $$aHassanien, Aboul Ella. 001453037 7001_ $$aAnand, Sameer. 001453037 7001_ $$aJaiswal, Ajay. 001453037 77608 $$iPrint version:$$aGupta, Deepak$$tInternational Conference on Innovative Computing and Communications$$dSingapore : Springer,c2022$$z9789811928208 001453037 830_0 $$aLecture notes in networks and systems ;$$vv. 473. 001453037 852__ $$bebk 001453037 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-19-2821-5$$zOnline Access$$91397441.1 001453037 909CO $$ooai:library.usi.edu:1453037$$pGLOBAL_SET 001453037 980__ $$aBIB 001453037 980__ $$aEBOOK 001453037 982__ $$aEbook 001453037 983__ $$aOnline 001453037 994__ $$a92$$bISE