ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Computing Science, Communication and Security: Third International Conference, COMS2 2022, Gujarat, India, February 6–7, 2022, Revised Selected Papers

دانلود کتاب علوم محاسباتی، ارتباطات و امنیت: سومین کنفرانس بین المللی، COMS2 2022، گجرات، هند، 6 تا 7 فوریه 2022، مقالات منتخب اصلاح شده

Computing Science, Communication and Security: Third International Conference, COMS2 2022, Gujarat, India, February 6–7, 2022, Revised Selected Papers

مشخصات کتاب

Computing Science, Communication and Security: Third International Conference, COMS2 2022, Gujarat, India, February 6–7, 2022, Revised Selected Papers

ویرایش:  
نویسندگان: , ,   
سری: Communications in Computer and Information Science, 1604 
ISBN (شابک) : 3031105508, 9783031105500 
ناشر: Springer 
سال نشر: 2022 
تعداد صفحات: 327 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 35 مگابایت 

قیمت کتاب (تومان) : 38,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 12


در صورت تبدیل فایل کتاب Computing Science, Communication and Security: Third International Conference, COMS2 2022, Gujarat, India, February 6–7, 2022, Revised Selected Papers به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب علوم محاسباتی، ارتباطات و امنیت: سومین کنفرانس بین المللی، COMS2 2022، گجرات، هند، 6 تا 7 فوریه 2022، مقالات منتخب اصلاح شده نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب علوم محاسباتی، ارتباطات و امنیت: سومین کنفرانس بین المللی، COMS2 2022، گجرات، هند، 6 تا 7 فوریه 2022، مقالات منتخب اصلاح شده

این کتاب شامل مقالات منتخب بازبینی شده سومین کنفرانس بین‌المللی علوم محاسباتی، ارتباطات و امنیت، COMS2 2022 است که در گاندیناگار، هند، در فوریه 2022 برگزار شد. به دلیل همه‌گیری COVID-19، کنفرانس به صورت مجازی برگزار شد.
22 مقاله کامل به طور کامل بازبینی و از بین 143 مقاله ارسالی انتخاب شدند. این مقالات ایده‌ها و نتایج تحقیقاتی را در مورد جنبه‌های علم محاسبات، ارتباطات شبکه و امنیت ارائه می‌کنند.


توضیحاتی درمورد کتاب به خارجی

This book constitutes revised selected papers of the Third International Conference on Computing Science, Communication and Security, COMS2 2022, held in Gandhinagar, India, in February 2022. Due to the COVID-19 pandemic the conference was held virtually. 
The 22 full papers were thoroughly reveiwed and selected from 143 submissions. The papers present ideas, and research results on the aspects of computing science, network communication, and security.



فهرست مطالب

Preface
Organization
Contents
Development of Smart Sensor for IoT Based Environmental Data Analysis Through Edge Computing
	1 Introduction
	2 Edge Computing
	3 System Implementation
	4 Experimental Setup
	5 Results and Discussion
		5.1 Conclusion and Future Direction
	References
Application of Forensic Audio-Video Steganography Technique to Improve Security, Robustness, and Authentication of Secret Data
	1 Introduction
	2 Related Work
	3 Proposed Methodology of Information Security
		3.1 The Process to Embed Secret Data into Video
		3.2 Video Encoding Process
		3.3 The FEMD Process
		3.4 Process to Embed the Image Into Video with an Example
		3.5 Process to Embed the Audio into Video with an Example
	4 Transmitter and Receiver Section Result
		4.1 At Transmitter Section
		4.2 At Receiver Section
	5 System Security and Its Performance Discussion
	6 Authentication and Security Analysis
		6.1 Blurring and Poisson Noise
		6.2 Frame Cropping, Frame Swapping, Frame Replacement, and Frame Exchange
		6.3 Visual Attack
		6.4 Histogram and Spectrograph
		6.5 Chi-Squared Attack, Gaussian and Speckle Noise
		6.6 Salt and Pepper Noise and Median Filter
		6.7 Frame Clockwise and Anti-clockwise, Rotation Attack
		6.8 Concealed Rate (CR) and Concealed Capacity (CC)
		6.9 Normalized Correlation Factor (NCF)
		6.10 MSE, and PSNR
	7 Simulation Result and Discussion
	8 Conclusion
	References
An Efficient Cluster Based Energy Routing Protocol (E-CBERP) for Wireless Body Area Networks Using Soft Computing Technique
	1 Introduction
	2 Classification of Routing Protocols for WBAN
	3 Related Work
	4 Motivation
	5 Proposed Model - Route Discovery
		5.1 Route Maintenance
		5.2 Route Failure
	6 Methodology of Evaluation
		6.1 Simulation Environment
		6.2 Simulation Parameters
	7 Result and Analysis
	8 Conclusion and Future Work
	References
Ortho Image Mosaicing and Object Identification of UAV Data
	1 Introduction
	2 Literature Survey
		2.1 Discussion on Image Stitching Methods
		2.2 Discussion on Object Detection Methods
	3 Methodology
		3.1 Image Stitching
		3.2 Object Identification
	4 Results And Analysis
	5 Conclusion
	References
The Novel Approach of Down-Link Spectral Efficiency Enhancement Using Massive MIMO in Correlated Rician Fading Scenario
	1 Introduction
	2 Literature Review
	3 Core Contribution
	4 Channel and System Modeling
	5 Estimation Methods
		5.1 MMSE Channel Estimator
		5.2 Element-Wise MMSE Channel Estimator
		5.3 LS Channel Estimator
	6 DL Spectral Effiency Using MR Precoding
	7 Basic Setup and Configuration
	8 Output Results
	9 Conclusion
	References
Blocking Estimation Using Optimal Guard Channel Policy in GSM 900 System
	1 Introduction
	2 The OCR Policy
		2.1 Estimation of NCBP and HCDP
		2.2 Theoretical Estimation of Optimal Number of Reserved Channels
	3 Application of OCR Policy to GSM 900 System
		3.1 GSM Architecture
		3.2 GSM 900 System
		3.3 Results and Discussion
	4 Conclusion
	References
Systematic Review on Various Techniques of Android Malware Detection
	1 Introduction
	2 Literature Review Protocol
		2.1 Research Questions
		2.2 Search Strategy
		2.3 Study Selection Criteria
		2.4 Data Extraction of Study
	3 Results
		3.1 Description of Study
		3.2 RQ1 How Does the Empirical Experiments of Android Malware Detection Have Been Conducted as a Part of Pilot Study?
		3.3 RQ2 What is the Overall Performance of the Techniques in Malware Detection Based on Empirical Evidence?
	4 Discussion
	5 Limitation
	6 Conclusion Future Work
	References
Adaptive Rider Grey Wolf Optimization Enabled Pilot-Design for Channel Estimation in Cognitive Radio
	1 Introduction
	2 Motivation
		2.1 Literature Survey
		2.2 Major Challenges
	3 System Model of OFDM-Based CR for Channel Estimation
		3.1 Mathematical Model of the System
	4 Proposed Adaptive RGWO-Based Pilot Design for Channel Estimation
		4.1 Solution Encoding
		4.2 Fitness Function
		4.3 Algorithmic Steps of Proposed Adaptive RGWO for Pilot Design
	5 Results and Discussion
		5.1 Experimental Setup
		5.2 Evaluation Metrics
		5.3 Comparative Methods
		5.4 Comparative Analysis
		5.5 Comparative Discussion
	6 Conclusion
	References
To Identify Malware Using Machine Learning Algorithms
	1 Introduction
	2 Related Work
	3 Proposed Methods
		3.1 Feature Extraction
	4 Experiment
		4.1 Dataset
		4.2 Cuckoo Sandbox
		4.3 Classification
		4.4 Weka
	5 Result
		5.1 Naïve Bayes Classifier
		5.2 Regression Classifier
		5.3 J48
		5.4 Random Forest Classifier
		5.5 Bagging
	6 Conclusion
	References
Motor Imagery EEG Signal Classification Using Deep Neural Networks
	1 Introduction
	2 EEG Preliminaries
	3 Proposed Work
		3.1 Channel Selection
		3.2 Band Pass Filtering
		3.3 Anisotropic Diffusion Filtering
		3.4 Data Segmentation
		3.5 Feature Extraction
		3.6 Feature Selection
		3.7 Classification Using DNN
	4 Results
	5 Conclusions
	References
Extending WSN Life-Time Using Energy Efficient Based on K-means Clustering Method
	1 Introduction
	2 Proposed Method
		2.1 Network Setup and Deployment
		2.2 Choice Optimal Number of Clusters:
		2.3 Network Clustering Algorithms
		2.4 Data Collecting and Sending to CH
		2.5 Energy Update
	3 Experiment Result
		3.1 Data Sets Transmitted
		3.2 Energy Consumption
		3.3 Life Time
	4 Conclusion
	References
One-to-One Matching for Cooperative Resource Sharing and Communication in CRNs
	1 Introduction
	2 System Model and Assumptions
		2.1 Utility of PUs and SUs
		2.2 Optimal Allocation of  and
	3 Matching Game Based Proposed Partner Assignment Scheme
		3.1 Basic Definitions of Matching Theory
		3.2 Proposed Algorithm
	4 Simulations Results and Discussion
	5 Conclusion
	References
Sandbox Environment for Real Time Malware Analysis of IoT Devices
	1 Introduction
		1.1 Problem Statement and Contributions
	2 Related Work
	3 Background
		3.1 IoT Attacks
		3.2 Sandbox Environment
		3.3 Detection Methods
	4 Proposed Solution
	5 Discussions
	6 Conclusion and Future Work
	References
Machine Learning for Classification of DOS Attack in Smart Healthcare Networks
	1 Introduction
	2 Literature Review
	3 Data Security Privacy Approaches Using Machine Learning Techniques in 5G Healthcare Services
		3.1 Supervised Learning
		3.2 Regression
		3.3 Classification
		3.4 Unsupervised Learning
		3.5 Reinforcement Learning
		3.6 Support Vector Machines
		3.7 Decision Tree
		3.8 Clustering
		3.9 Dimensionality Reduction
	4 Case Study: Detecting the Intensity of DDOS Attack Using Decision Tree Algorithm on Healthcare Application Network Data
	5 Conclusion
	References
Traffic Flow Prediction Using Deep Learning Techniques
	1 Introduction
	2 Related Works
	3 Proposed Work
		3.1 Stacked Auto-Encoders (SAE)
		3.2 Convolutional Neural Network (CNN)
		3.3 Long- and Short-Term Memory (LSTM) Neural Network
	4 Experimental Results and Analysis
		4.1 Traffic Flow Data Description
		4.2 Evaluation Metrics
		4.3 Results
	5 Conclusion
	References
Meta Heuristic Backtracking Algorithm for Virtual Machine Placement in Cloud Computing Migration
	1 Introduction
		1.1 Cloud Computing and VM Migration
		1.2 Backtracking
	2 Related Work
	3 The Proposed Method
		3.1 Meta Heuristic Backtracking Algorithm
	4 Experimental Setup
	5 Results
	6 Conclusion and Future Scope
	References
Achieving Energy Efficiency in Life-Logging Applications of Internet of Things Using Data Compression Through Incorporation of Machine Learning and Edge-Cloud Architecture
	1 Introduction
	2 Related Work
	3 Proposed Architecture
		3.1 Dataset
		3.2 Lossy Compression
		3.3 Dataset Preprocessing
		3.4 Stress Prediction
	4 Results and Discussion
		4.1 Energy Consumption
		4.2 Prediction Accuracy
	5 Conclusion
	References
Cab Fare Prediction Using Machine Learning
	1 Introduction
	2 Literature Review
	3 Advantages of Proposed System
	4 Methodology
		4.1 Data
		4.2 Pre-processing (Missing Value and Outlier Analysis)
		4.3 Feature Selection
		4.4 Model Development
	5 Model Evaluation and Results
	6 Limitations
	7 Conclusion
	8 Future Work
	References
Device to Device Communication over 5G
	1 Introduction
		1.1 5thGeneration
		1.2 5thGeneration Advantages
		1.3 5thGeneration Disadvantages
	2 Literature Review
	3 Methodology
		3.1 Stochastic Geometry
		3.2 Deterministic vs. Stochastic Geometry
		3.3 Different Stochastic Probability Distribution
		3.4 Queuing Theory
	4 Result
		4.1 New Routing Scheme
	5 Conclusion
	References
Energy Efficient Allocation of Resources in NOMA Based (MU-HCRN) with Perfect Spectrum Sensing
	1 Introduction
	2 System Outline
		2.1 System Outline for Spectrum Sensing (SS) and NOMA-Enhanced HetNets System
		2.2 NOMA Model
	3 Power and SINR Constraints
	4 Optimization Problem Formulations
	5 Simulation Scenario
	6 Conclusion
	References
CV Based Person Detection System for Smart Transportation
	1 Introduction
		1.1 Need of the Hour
		1.2 Literature Survey
		1.3 Impact on People’s Life
	2 Method
		2.1 Computer Vision Model
		2.2 Database Configuration
	3 Result
	4 Conclusion and Future Work
	References
A Performance of Low-Cost NVIDIA Jetson Nano Embedded System in the Real-Time Siamese Single Object Tracking: A Comparison Study
	1 Introduction
	2 Siamese Network
	3 Siamese SOT Algorithms
	4 Evaluation
		4.1 VOT Benchmark
		4.2 GOT-10K Benchmark
		4.3 UAV123 Benchmark
	5 Results and Discussion
	6 Conclusion
	References
Author Index




نظرات کاربران