دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Kiran Amin (editor), Nirbhay Kumar Chaubey (editor), Satyen Parikh (editor) سری: Communications in computer and information science, ISBN (شابک) : 9783030767761, 3030767760 ناشر: سال نشر: 2021 تعداد صفحات: 300 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 33 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Computing science, communication and security : second international conference, COMS2 2021, Gujarat, India, February 6-7, 2021 : revised selected papers به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب علوم محاسباتی، ارتباطات و امنیت: دومین کنفرانس بین المللی، COMS2 2021، گجرات، هند، 6-7 فوریه 2021: مقالات منتخب اصلاح شده نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Preface Organization Contents Artificial Intelligence and Machine Learning Data Balancing for Credit Card Fraud Detection Using Complementary Neural Networks and SMOTE Algorithm 1 Introduction 2 Literature Review 3 Dataset Description 4 Proposed Method 4.1 Data Balancing Network 4.2 Classification Algorithms 5 Results 5.1 Performance of CMTNN 5.2 Classification Results 6 Conclusions and Future Work References A Multi Class Classification for Detection of IoT Botnet Malware 1 Introduction 1.1 IoT Botnet 1.2 Briefing on IoT Botnet Attacks 2 Related Works 3 Data Collection and Preprocessing 3.1 Details About IoT-23 and MedBIoT DataSet 3.2 Log Extraction Using Zeek 3.3 Samples and Features Considered 3.4 KNN Imputation 4 Building a Classifier and Implementing GAN 4.1 Ensemble Approach 4.2 Applying Conditional Generative Adversarial Networks (CTGAN) 5 Results and Discussion 6 Conclusion and Future Work References An AI-Based Solution to Reduce Undesired Face-Touching as a Precautionary Measure for COVID-19 1 Introduction 2 Proposed System 3 Methodology and Algorithmic Explanation 3.1 Introduction to BodyPix 2.0 3.2 Working 4 Comparative Analysis of Existing Detection Methods 4.1 Available Models 4.2 Purpose of Choosing BodyPix 2.0 5 Experimental Results 5.1 Accuracy Determination 5.2 Determining the Response Time 6 Conclusion References DDoS Attack Detection Using Artificial Neural Network 1 Introduction 2 Related Work 3 Data Set 3.1 Data Preparation 3.2 Sample Data Set 3.3 Feature Reduction 4 Normalization 4.1 Min-Max Algorithm 4.2 Label Encoding 4.3 Normalized Data Set 5 Back Propagation Neural Network 5.1 Algorithm 5.2 Back Propagation Neural Network (BPNN) Model 6 Results 7 Conclusion References Click Ad Fraud Detection Using XGBoost Gradient Boosting Algorithm 1 Introduction 1.1 World of Internet Advertising 1.2 Online Advertising Fraud 1.3 Click Fraud 1.4 Sources of Click Fraud 1.5 Problems of Detecting Click Fraud 2 Related Work 3 Proposed Solution 3.1 Dataset 3.2 Exploratory Data Analysis 3.3 Feature Engineering 4 Modelling 5 Results and Analysis 5.1 Model Evaluation 5.2 Comparing Results 5.3 Evaluating the Features Selected for Models 6 Conclusion and Future Work References A Natural Language Processing Approach to Mine Online Reviews Using Topic Modelling 1 Introduction 1.1 Feedback of Products 1.2 Recovery of Information from Unstructured Text, Collection of Functions 1.3 Semi-supervised Topic Modelling in Tweets Based on Topic Modelling 1.4 Topic Modelling for Social Media in the Restaurant Based Industry 2 Related Work 3 Method 4 Conclusions References An Implementation and Combining of Hybrid and Content Based and Collaborative Filtering Algorithms for the Higher Performance of Recommended Sytems 1 Introduction 2 Literature Survey 2.1 Content Based Recommenders (CBR) 2.2 Collaborative Filtering (CF) 3 Hybrid Recommended Systems Concept 4 Categorization of Hybrid Recommended Systems 4.1 Monolithic Hybrids 4.2 Parallelized Hybrids 4.3 Pipelined Hybrids 5 Similarity Metrices 5.1 Cosine Metrices 5.2 Adjusted Cosine Metrices 6 Road Map for Hybrid Recommended Systems 7 Train/Test of Dataset 8 Building Customized Algorithm and Evaluation on the Top of SurpriseLib 9 Evaluation of Recommender Systems 10 Step by Step Implementation and Experimental Setup of Recommender Systems Algorithm 11 Result and Discussions 12 Conclusion References Event-Related Potential Classification Based on EEG Data Using xDWAN with MDM and KNN 1 Introduction 2 Related Work 3 Data Description 4 Proposed Methodology 4.1 EEGNet Model: Compact Convolutional Neural Network (Compact-CNN) 4.2 xDAWN Spatial Filtering 4.3 xDAWAN with Riemannian Geometry 4.4 Classification 5 Result and Discussion 6 Conclusion and Future Work References Oil Spill Discrimination of SAR Satellite Images Using Deep Learning Based Semantic Segmentation 1 Introduction 2 Related Work 3 Problem Formulation 4 Image Datasets 5 Proposed Method 5.1 Image Preprocessing 5.2 Semantic Segmentation 6 Performance Measures 7 Results and Findings 7.1 Based on Filters 7.2 Based on Datasets 7.3 Based on Segmentation 8 Conclusion References Sentiment Analysis of Bangla Language Using Deep Learning Approaches 1 Introduction 2 Related Work 3 Methodology 3.1 Database Formation 3.2 Word Embedding 3.3 Convolutional Neural Network (CNN) 3.4 Long Short-Term Memory (LSTM) 3.5 CNN-LSTM 4 Result and Analysis 5 Conclusions References Networking and Communications Bit Error Rate Analysis of Optical Switch Buffer in Presence of Dispersion and Optical Amplifier Noise 1 Introduction 1.1 Novelty 1.2 Research Contributions 1.3 Layout 2 The Proposed Optical Switch Design 3 Performance Evaluation of the Proposed Switch 4 Conclusions and Future Work References Experimenting with Scalability of Software Defined Networks Using Pyretic and Frenetic 1 Introduction 2 Related Work 2.1 SDN – Software Defined Networks Architecture 2.2 Frenetic: A Network Programming Language 2.3 Modular SDN Programming with Pyretic 2.4 Research Gap and Motivation 3 FRENETIC and PYRETIC 3.1 Frenetic 3.2 Pyretic (Python + Frenetic) 3.3 Pyretic Network Policies 3.4 Pyretic Features 4 Tools, Techniques and Simulation Environment 5 Experimental Procedure 5.1 Running Pyretic with Mininet 5.2 Generating Topologies 5.3 Traffic Generation and Logging Network Events 5.4 Graph Generation 6 Performance Metrics and Result Discussions 6.1 Throughput 6.2 Jitter 6.3 Latency 7 Conclusion 8 Future Work References Design and Implementation of Lightweight Dynamic Elliptic Curve Cryptography Using Schoof’s Algorithm 1 Introduction 2 Design and Idea of Elliptic Curve Cryptography 2.1 Basic Idea Behind Elliptic Curve Cryptography 2.2 Limitation in Other Techniques 3 Preliminary Work 3.1 Elliptic Curves 3.2 Point Addition 3.3 Scalar Multiplication 3.4 Elliptic Curve Cryptography 3.5 Schoof’s Algorithm 4 Proposed Dynamic Elliptic Curve Cryptography 4.1 Randomising the Constants 4.2 Counting the Points of Elliptic Curve 4.3 Randomly Choosing a Generator Point 4.4 Flowchart 5 Results 6 Conclusion References QRP: QPSO Based Routing Protocol for Energy Efficiency in Wireless Body Area Networks 1 Introduction 2 Related Work 2.1 Novelty 3 Preliminaries 3.1 Particle Swarm Optimization 3.2 Quantum-Inspired Particle Swarm Optimization 4 Materials and Methods 4.1 Networking Model 4.2 Energy Model 4.3 Path-Loss Model 4.4 Proposed Approach 5 Results and Discussions 5.1 Throughput 5.2 Residual Energy 5.3 Network Lifetime 5.4 Packets Sent to Sink 5.5 Packet Dropped 5.6 Path-Loss 6 Conclusion and Future Scope References Investigation of Alibaba Cloud Data Set for Resource Management in Cloud Computing 1 Introduction 2 Understanding Ali Baba Dataset 2.1 Resource Utilization Information 2.2 Online Service (Container) 2.3 Online Request Table (Containerevent.csv) 2.4 Batch Workload 3 Data Analysis 3.1 Utilization and Summary of Data 3.2 Overall Utilization 3.3 Characterized Workload 3.4 Recent Research for the Dataset 4 Conclusion References A Hybrid Approach Based on ACO and Firefly Algorithm for Routing in FANETs 1 Introduction 2 Literature Review 3 Existing Algorithm 3.1 Ant Colony Optimization (ACO) 3.2 Firefly Algorithm 4 Proposed Algorithm 5 Parameters and Methods 5.1 Simulation Platform 5.2 Simulation Parameters 5.3 Performance Parameters 6 Results and Discussion 7 Conclusion References RC-Security Mechanism to Prevent Attacks on IoT Smart Switch 1 Introduction 1.1 Impacts of Attack 2 Review on IoT Security Solutions 2.1 Classification Hierarchy of DOS 3 Methodology 3.1 Experimental Setup for the IoT Smart Switch 3.2 Flow of the Experimental Setup 3.3 Request Capturing Security Mechanism (RCSM) 4 Results and Experiments 4.1 Attack Scenario 4.2 Mitigating Attacks 5 Conclusion and Future Work References Identifying the Impacts of Node Mobility on Network Layer Based Active and Passive Attacks in Mobile Ad Hoc Networks: A Simulation Perspective 1 Introduction 2 Literature Review 3 State of the Art 4 Methodology 5 Results and Discussion 6 Conclusion and Future Works References Simulated Analysis of Double-Gate MOSFET and FinFET Structure Using High-k Materials 1 Introduction 2 Short Channel Effects (SCEs) 3 Double-Gate MOSFET Device Structure 4 FinFET Device Structure 5 Performance Evaluation by High-k Materials 5.1 Concept of High-k Dielectrics 5.2 Choice of High-k Oxide 5.3 The Observed Design 6 Implementation 7 Simulation Results 8 Conclusion 9 Future Scope References Correction to: RC-Security Mechanism to Prevent Attacks on IoT Smart Switch Correction to: Chapter “RC-Security Mechanism to Prevent Attacks on IoT Smart Switch” in: N. Chaubey et al. (Eds.): Computing Science, Communication and Security, CCIS 1416, https://doi.org/10.1007/978-3-030-76776-1_17 Author Index