دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Nirbhay Chaubey, Sabu M. Thampi, Noor Zaman Jhanjhi سری: Communications in Computer and Information Science, 1604 ISBN (شابک) : 3031105508, 9783031105500 ناشر: Springer سال نشر: 2022 تعداد صفحات: 327 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 35 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Computing Science, Communication and Security: Third International Conference, COMS2 2022, Gujarat, India, February 6–7, 2022, Revised Selected Papers به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب علوم محاسباتی، ارتباطات و امنیت: سومین کنفرانس بین المللی، COMS2 2022، گجرات، هند، 6 تا 7 فوریه 2022، مقالات منتخب اصلاح شده نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب شامل مقالات منتخب بازبینی شده سومین کنفرانس
بینالمللی علوم محاسباتی، ارتباطات و امنیت، COMS2 2022 است که
در گاندیناگار، هند، در فوریه 2022 برگزار شد. به دلیل همهگیری
COVID-19، کنفرانس به صورت مجازی برگزار شد.
22 مقاله کامل به طور کامل بازبینی و از بین 143 مقاله ارسالی
انتخاب شدند. این مقالات ایدهها و نتایج تحقیقاتی را در مورد
جنبههای علم محاسبات، ارتباطات شبکه و امنیت ارائه
میکنند.
This book constitutes revised selected papers of the
Third International Conference on Computing Science,
Communication and Security, COMS2 2022, held in Gandhinagar,
India, in February 2022. Due to the COVID-19 pandemic the
conference was held virtually.
The 22 full papers were thoroughly reveiwed and selected from
143 submissions. The papers present ideas, and research
results on the aspects of computing science, network
communication, and security.
Preface Organization Contents Development of Smart Sensor for IoT Based Environmental Data Analysis Through Edge Computing 1 Introduction 2 Edge Computing 3 System Implementation 4 Experimental Setup 5 Results and Discussion 5.1 Conclusion and Future Direction References Application of Forensic Audio-Video Steganography Technique to Improve Security, Robustness, and Authentication of Secret Data 1 Introduction 2 Related Work 3 Proposed Methodology of Information Security 3.1 The Process to Embed Secret Data into Video 3.2 Video Encoding Process 3.3 The FEMD Process 3.4 Process to Embed the Image Into Video with an Example 3.5 Process to Embed the Audio into Video with an Example 4 Transmitter and Receiver Section Result 4.1 At Transmitter Section 4.2 At Receiver Section 5 System Security and Its Performance Discussion 6 Authentication and Security Analysis 6.1 Blurring and Poisson Noise 6.2 Frame Cropping, Frame Swapping, Frame Replacement, and Frame Exchange 6.3 Visual Attack 6.4 Histogram and Spectrograph 6.5 Chi-Squared Attack, Gaussian and Speckle Noise 6.6 Salt and Pepper Noise and Median Filter 6.7 Frame Clockwise and Anti-clockwise, Rotation Attack 6.8 Concealed Rate (CR) and Concealed Capacity (CC) 6.9 Normalized Correlation Factor (NCF) 6.10 MSE, and PSNR 7 Simulation Result and Discussion 8 Conclusion References An Efficient Cluster Based Energy Routing Protocol (E-CBERP) for Wireless Body Area Networks Using Soft Computing Technique 1 Introduction 2 Classification of Routing Protocols for WBAN 3 Related Work 4 Motivation 5 Proposed Model - Route Discovery 5.1 Route Maintenance 5.2 Route Failure 6 Methodology of Evaluation 6.1 Simulation Environment 6.2 Simulation Parameters 7 Result and Analysis 8 Conclusion and Future Work References Ortho Image Mosaicing and Object Identification of UAV Data 1 Introduction 2 Literature Survey 2.1 Discussion on Image Stitching Methods 2.2 Discussion on Object Detection Methods 3 Methodology 3.1 Image Stitching 3.2 Object Identification 4 Results And Analysis 5 Conclusion References The Novel Approach of Down-Link Spectral Efficiency Enhancement Using Massive MIMO in Correlated Rician Fading Scenario 1 Introduction 2 Literature Review 3 Core Contribution 4 Channel and System Modeling 5 Estimation Methods 5.1 MMSE Channel Estimator 5.2 Element-Wise MMSE Channel Estimator 5.3 LS Channel Estimator 6 DL Spectral Effiency Using MR Precoding 7 Basic Setup and Configuration 8 Output Results 9 Conclusion References Blocking Estimation Using Optimal Guard Channel Policy in GSM 900 System 1 Introduction 2 The OCR Policy 2.1 Estimation of NCBP and HCDP 2.2 Theoretical Estimation of Optimal Number of Reserved Channels 3 Application of OCR Policy to GSM 900 System 3.1 GSM Architecture 3.2 GSM 900 System 3.3 Results and Discussion 4 Conclusion References Systematic Review on Various Techniques of Android Malware Detection 1 Introduction 2 Literature Review Protocol 2.1 Research Questions 2.2 Search Strategy 2.3 Study Selection Criteria 2.4 Data Extraction of Study 3 Results 3.1 Description of Study 3.2 RQ1 How Does the Empirical Experiments of Android Malware Detection Have Been Conducted as a Part of Pilot Study? 3.3 RQ2 What is the Overall Performance of the Techniques in Malware Detection Based on Empirical Evidence? 4 Discussion 5 Limitation 6 Conclusion Future Work References Adaptive Rider Grey Wolf Optimization Enabled Pilot-Design for Channel Estimation in Cognitive Radio 1 Introduction 2 Motivation 2.1 Literature Survey 2.2 Major Challenges 3 System Model of OFDM-Based CR for Channel Estimation 3.1 Mathematical Model of the System 4 Proposed Adaptive RGWO-Based Pilot Design for Channel Estimation 4.1 Solution Encoding 4.2 Fitness Function 4.3 Algorithmic Steps of Proposed Adaptive RGWO for Pilot Design 5 Results and Discussion 5.1 Experimental Setup 5.2 Evaluation Metrics 5.3 Comparative Methods 5.4 Comparative Analysis 5.5 Comparative Discussion 6 Conclusion References To Identify Malware Using Machine Learning Algorithms 1 Introduction 2 Related Work 3 Proposed Methods 3.1 Feature Extraction 4 Experiment 4.1 Dataset 4.2 Cuckoo Sandbox 4.3 Classification 4.4 Weka 5 Result 5.1 Naïve Bayes Classifier 5.2 Regression Classifier 5.3 J48 5.4 Random Forest Classifier 5.5 Bagging 6 Conclusion References Motor Imagery EEG Signal Classification Using Deep Neural Networks 1 Introduction 2 EEG Preliminaries 3 Proposed Work 3.1 Channel Selection 3.2 Band Pass Filtering 3.3 Anisotropic Diffusion Filtering 3.4 Data Segmentation 3.5 Feature Extraction 3.6 Feature Selection 3.7 Classification Using DNN 4 Results 5 Conclusions References Extending WSN Life-Time Using Energy Efficient Based on K-means Clustering Method 1 Introduction 2 Proposed Method 2.1 Network Setup and Deployment 2.2 Choice Optimal Number of Clusters: 2.3 Network Clustering Algorithms 2.4 Data Collecting and Sending to CH 2.5 Energy Update 3 Experiment Result 3.1 Data Sets Transmitted 3.2 Energy Consumption 3.3 Life Time 4 Conclusion References One-to-One Matching for Cooperative Resource Sharing and Communication in CRNs 1 Introduction 2 System Model and Assumptions 2.1 Utility of PUs and SUs 2.2 Optimal Allocation of and 3 Matching Game Based Proposed Partner Assignment Scheme 3.1 Basic Definitions of Matching Theory 3.2 Proposed Algorithm 4 Simulations Results and Discussion 5 Conclusion References Sandbox Environment for Real Time Malware Analysis of IoT Devices 1 Introduction 1.1 Problem Statement and Contributions 2 Related Work 3 Background 3.1 IoT Attacks 3.2 Sandbox Environment 3.3 Detection Methods 4 Proposed Solution 5 Discussions 6 Conclusion and Future Work References Machine Learning for Classification of DOS Attack in Smart Healthcare Networks 1 Introduction 2 Literature Review 3 Data Security Privacy Approaches Using Machine Learning Techniques in 5G Healthcare Services 3.1 Supervised Learning 3.2 Regression 3.3 Classification 3.4 Unsupervised Learning 3.5 Reinforcement Learning 3.6 Support Vector Machines 3.7 Decision Tree 3.8 Clustering 3.9 Dimensionality Reduction 4 Case Study: Detecting the Intensity of DDOS Attack Using Decision Tree Algorithm on Healthcare Application Network Data 5 Conclusion References Traffic Flow Prediction Using Deep Learning Techniques 1 Introduction 2 Related Works 3 Proposed Work 3.1 Stacked Auto-Encoders (SAE) 3.2 Convolutional Neural Network (CNN) 3.3 Long- and Short-Term Memory (LSTM) Neural Network 4 Experimental Results and Analysis 4.1 Traffic Flow Data Description 4.2 Evaluation Metrics 4.3 Results 5 Conclusion References Meta Heuristic Backtracking Algorithm for Virtual Machine Placement in Cloud Computing Migration 1 Introduction 1.1 Cloud Computing and VM Migration 1.2 Backtracking 2 Related Work 3 The Proposed Method 3.1 Meta Heuristic Backtracking Algorithm 4 Experimental Setup 5 Results 6 Conclusion and Future Scope References Achieving Energy Efficiency in Life-Logging Applications of Internet of Things Using Data Compression Through Incorporation of Machine Learning and Edge-Cloud Architecture 1 Introduction 2 Related Work 3 Proposed Architecture 3.1 Dataset 3.2 Lossy Compression 3.3 Dataset Preprocessing 3.4 Stress Prediction 4 Results and Discussion 4.1 Energy Consumption 4.2 Prediction Accuracy 5 Conclusion References Cab Fare Prediction Using Machine Learning 1 Introduction 2 Literature Review 3 Advantages of Proposed System 4 Methodology 4.1 Data 4.2 Pre-processing (Missing Value and Outlier Analysis) 4.3 Feature Selection 4.4 Model Development 5 Model Evaluation and Results 6 Limitations 7 Conclusion 8 Future Work References Device to Device Communication over 5G 1 Introduction 1.1 5thGeneration 1.2 5thGeneration Advantages 1.3 5thGeneration Disadvantages 2 Literature Review 3 Methodology 3.1 Stochastic Geometry 3.2 Deterministic vs. Stochastic Geometry 3.3 Different Stochastic Probability Distribution 3.4 Queuing Theory 4 Result 4.1 New Routing Scheme 5 Conclusion References Energy Efficient Allocation of Resources in NOMA Based (MU-HCRN) with Perfect Spectrum Sensing 1 Introduction 2 System Outline 2.1 System Outline for Spectrum Sensing (SS) and NOMA-Enhanced HetNets System 2.2 NOMA Model 3 Power and SINR Constraints 4 Optimization Problem Formulations 5 Simulation Scenario 6 Conclusion References CV Based Person Detection System for Smart Transportation 1 Introduction 1.1 Need of the Hour 1.2 Literature Survey 1.3 Impact on People’s Life 2 Method 2.1 Computer Vision Model 2.2 Database Configuration 3 Result 4 Conclusion and Future Work References A Performance of Low-Cost NVIDIA Jetson Nano Embedded System in the Real-Time Siamese Single Object Tracking: A Comparison Study 1 Introduction 2 Siamese Network 3 Siamese SOT Algorithms 4 Evaluation 4.1 VOT Benchmark 4.2 GOT-10K Benchmark 4.3 UAV123 Benchmark 5 Results and Discussion 6 Conclusion References Author Index