Linked e-resources

Details

Intro
ICICC-2022 Steering Committee Members
Preface
Contents
Editors and Contributors
Constructing Interval Type-2 Fuzzy Systems (IT2FS) with Memetic Algorithm: Elucidating Performance with Noisy Data
1 Introduction
2 Introduction to Type-2 Fuzzy Logic System
3 Memetic Algorithms
4 Mathematical Modeling
5 Experimental Study
6 Conclusions
References
Secure Environment Establishment for Multipath Routing
1 Introduction
1.1 Mobile Ad Hoc Networks
1.2 Attacks in MANET
1.3 Certificate Chaining Approach
1.4 Need for Certificate Revocation

1.5 Advantages
1.6 Drawback
1.7 Problem Identification and Contribution
2 Related Works
3 Proposed Solution
3.1 Overview
3.2 Trust Management Mechanism
3.3 Detection of Misbehaving Nodes
4 Simulation Results
4.1 Simulation Model and Parameters
4.2 Performance Metrics
5 Conclusion
References
Comparative Analysis of Transfer Learning and Attention-driven Memory-based Learning for COVID-19 Fake News Detection
1 Introduction
2 Related Work
3 Learning Models Validated for COVID-19 Fake News Detection

3.1 Bi-directional Encoder Representations from Transformers (BERT)
3.2 Attentional-based Bi-directional Long Short-term Memory Model
4 Experimental Setup and Model Performance Evaluation
4.1 Dataset Details
4.2 Experimental Outcome
4.3 Discussion
5 Conclusion and Future Scope
References
Review on Edge Computing-assisted d2d Networks
1 Introduction
2 Challenges in Existing Techniques
2.1 D2D Communication
2.2 Edge Computing
3 Edge-based Performance Enhancement in d2d Networks
3.1 Improvement of Computational Capacity
3.2 Resource Allocation

3.3 Computational Offloading
3.4 Power Constraints
3.5 Device Discovery
3.6 Latency Reduction
4 Conclusions
References
OpenDaylight SDN and NFV Integration in OpenStack Cloud: OpenSource Approach for Improving Network Services
1 Introduction
2 Overview of the Cloud
3 SDN Enabled the Architecture of the Network
4 SDN Advantages in Cloud
5 Proposed Architecture, Implementation, and Discussion
5.1 Proposed Architecture
5.2 Deploying an SDN Solution on a High-Performing Cluster
5.3 OpenDaylight SDN Cluster Integration with OpenStack Cloud Platforms

5.4 Discussion
6 Conclusion and Future Work
References
K-MNSOA: K-Anonymity Model for Privacy in the Presence of Multiple Numerical Sensitive Overlapped Attributes
1 Introduction
2 Literature Review
2.1 PPDPT: Need and Techniques
2.2 K-Anonymity: Need and Techniques
2.3 L-Diversity
2.4 Multiple Sensitive Attributes
2.5 Overlapped Attributes
3 Proposed Model K-MNSOA: K-Anonymity Model for Multiple Numerical Sensitive Overlapped Attributes
3.1 Methodology
3.2 Algorithm: K-MNSOA-K-Anonymity Model for Multiple Numerical Sensitive Overlapped Attributes

Browse Subjects

Show more subjects...

Statistics

from
to
Export