Computing Science, Communication and Security: 4th International Conference, COMS2 2023, Mehsana, Gujarat, India, February 6–7, 2023, Revised Selected ... in Computer and Information Science)
✍ Scribed by Nirbhay Chaubey (editor), Sabu M. Thampi (editor), Noor Zaman Jhanjhi (editor), Satyen Parikh (editor), Kiran Amin (editor)
- Publisher
- Springer
- Year
- 2023
- Tongue
- English
- Leaves
- 294
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book constitutes the refereed proceedings of the 4th International Conference on Computing Science, Communication and Security, COMS2 2023, held in Gandhinagar, India, during February 6–7, 2023.
The 20 full papers included in this book were carefully reviewed and selected from 190 submissions. They were organized in topical sections on artificial intelligence and machine learning; networking and communications.
✦ Table of Contents
Preface
Organization
Contents
An Efficient Signal Detection Technique for STBC-OFDM in Fast Fading Channel
1 Introductions
2 System Model
3 Conventional Signal Detection Method
3.1 DZFD Method
3.2 SIC Method
3.3 DFD Method
3.4 List-SIC Method
3.5 ML Method
4 Proposed OIDF Method
5 Computational Complexity
6 Simulation Results
7 Conclusions
References
Achieving Accurate Trajectory Control While Training Legged Robots Using Machine Learning
1 Introduction
2 Related Work
3 Using Machine Learning to Train Locomotion Policies
3.1 Learning in Cartesian Space
4 Using Augmented Random Search for Training
5 Accurate Trajectory Control
5.1 Using Positional Lead in Trajectory Control
6 Experimental Setup
6.1 Simulation Environment Setup
7 Results
8 Conclusion
References
Relational Model and Improvised DSR Assisted Framework for Secure Wireless Communication
1 Introduction
2 Related Work
3 Problem Description
4 Proposed Methodology
4.1 Novel Retaliation Model for Identifying Routing Mis-Behavior
4.2 Reason for Adopting DSR in Proposed Scheme
4.3 Strategy Implementation
4.4 Novel Group Architecture for Promoting Selfish Node Cooperation
4.5 Threat Detection Technique
4.6 Threat Prevention Technique
5 Results Discussion
5.1 Experimental: Novel Retaliation Model
5.2 Experimental: Group Architecture for Selfish Node Cooperation
6 Conclusion
References
DEEC Protocol with ACO Based Cluster Head Selection in Wireless Sensor Network
1 Introduction
1.1 ACO
1.2 DEEC
1.3 ACO-DEEC
2 Literature Review
3 Proposed Algorithm (ACO-DEEC)
4 Flowchart of Proposed Algorithm
5 Experimental Result
6 Conclusion
References
Performance Analysis of Recovery Methods for Loss of Target in Wireless Sensor Network Following TDNN Prediction Algorithm
1 Introduction
2 Literature Survey
3 Different Recovery Algorithms Following TDNN Based Prediction Algorithm in Target Tracking
3.1 Circlefixed
3.2 Contourfixed
3.3 Circlevelocity
3.4 Contourvelocity
4 Simulation Scenario
5 Conclusion
References
A Comparative Study of DWT and DCT Along with AES Techniques for Safety Transmission of Digital Bank Cheque Image
1 Introduction
2 Frequency Domain Watermarking Techniques
2.1 Discrete Cosine Transform
2.2 Discrete Wavelet Transform
2.3 Digital Watermarking Process
3 Advanced Encryption Standard
4 Outcomes and Its Analysis
5 Conclusion
References
Advancement of Non-coherent Spectrum Sensing Technique in Cognitive Radio Networks - A Simulation-Based Analysis
1 Introduction
2 Non-cooperative Spectrum Sensing Techniques and Related Works
3 Proposal for Modified Threshold (MT)
4 Simulations
5 Conclusion
References
Improvement of Network Protocol and Analysis of Security Using Aspect of Cryptography
1 Introduction
2 Related Works
3 Quantum Key Distribution Protocols
4 Proposed Protocol
5 Conclusion and Future Work
References
Gaussian Mixture Model-Based Clustering for Energy Saving in WSN
1 Introduction
2 Related Works
3 Preliminaries
3.1 Network Model
3.2 Energy Model
4 The Proposed Method
4.1 Optimal Number of Clusters in a Gaussian Mixture
4.2 Gaussian Mixture Models Clustering
5 Transmission of Data
6 Simulation and Performance Evaluation
7 Comparison with Other Protocols
7.1 Lifetime Evaluation
7.2 Energy Consumption
7.3 Throughput Evaluation
8 Conclusions
References
Physical Layer Security Optimisation for NOMA Based UAV Communication for Optimal Resource Allocation
1 Introduction
2 Related Work
3 System Model and Optimisation
4 Simulaton Result and Discussion
5 Conclusion
References
DBFEH: Design of a Deep-Learning-Based Bioinspired Model to Improve Feature Extraction Capabilities of Healthcare Device Sets
1 Introduction
2 Literature Survey
3 Design of the Proposed Deep-Learning-Based Bioinspired Model to Improve Feature Extraction Capabilities of Healthcare Device Sets
4 Result Analysis and Comparison
5 Conclusion
References
Protecting OT Hosts with Intelligent Model-Based Defense System Against Malware Families
1 Introduction
2 Literature Review
3 Dataset
4 Methodology
5 Results and Discussion
5.1 The Analysis of a K-neighborhood Performed Over a Large Dataset
5.2 The Findings After Running the Logistic Regression Method on the Provided Data:
5.3 The Findings from Running the Random Forest Classifier Algorithm on the Provided Data Set:
6 Conclusions
References
Design and Analysis of Wide-Band Planar Antenna Using Meta-material for S-Band Applications
1 Introduction
2 Meta Material Applications
2.1 Antenna Miniaturisation
2.2 Isolation
2.3 Reduction of Coupling Effects
2.4 Aperture Field Shaping– Directivity and Gain Enhancement
2.5 Scanning of Main Beam Direction
3 Survey of Various Microstrip Antennae Using MTM
4 Design of Meta surface Antena
4.1 Design of Meta-Surface Cell Units
4.2 Design of Antenna in Presence and Absence of Meta-Surface
4.3 Antenna Fabricated with Meta-Surface
5 Results of Antenna Simulation Including and Excluding Metasurface
5.1 Results of Meta-surface-Loaded Antenna’s Simulation
6 Conclusion
References
Performance Comparison of IEEE 802.11ax, 802.11ac and 802.11n Using Network Simulator NS3
1 Introduction
2 Literature Review
2.1 802.11n
2.2 802.11ac
2.3 802.11ax
3 Simulation and Analysis
3.1 Simulation Model
3.2 Simulation Results
4 Conclusion
References
Web Browser Forensics: A Comparative Integrated Approach on Artefacts Acquisition, Evidence Collections and Analysis of Google Chrome, Firefox and Brave Browser
1 Introduction
2 Literature Survey
3 Methodology
4 Data Modeling
5 Laboratory Set-Up
6 Results
6.1 Google Chrome Browser Forensics
6.2 Mozilla Firefox Browser Forensics
6.3 Brave Browser Forensics
7 Result Discussion
8 Conclusion
References
An Innovative AI Architecture for Detecting the Primary User in the Spectrum
1 Introduction
2 Literature Survey
3 Related Works
4 Methodology
5 Results and Discussion
6 Conclusions
References
Power Optimization for Millimeter Wave MIMO System
1 Introduction
1.1 The Main Contribution of this Article is:
2 Literature Review
3 Methodology
4 Proposed Work
4.1 Decomposition of MIMO Wireless Channel
4.2 SVD Receiver
4.3 Optimally MIMO Power Allocation
4.4 Water Filling Algorithm
5 Result and Discussion
6 Conclusion
References
Performance Evaluation of VBF, DBR and Modified CARP for Underwater Acoustic Sensor Network
1 Introduction
2 Background
2.1 Vector Based Forwarding (VBF) [1]
2.2 Depth-Based Routing Protocol (DBR) [2]
2.3 Channel Aware Routing Protocol (CARP) [4]
3 Simulation Setup
4 Experimental Result
5 Proposed Model
5.1 Network Initialization Phase
5.2 Data Forwarding Phase
6 Conclusion
References
Performance Analysis of Smart Antenna in Wireless Communication System
1 Introduction
2 Smart Antenna Systems (SAS)
2.1 Switched Beam
2.2 Adaptive Array
3 Normalized Least Mean Square Algorithm
3.1 Modified Form of LMS [25]
4 Detection of Active Tap
5 Simulation and Results
6 Conclusions
References
Low-Light Video Enhancement on a Mobile Device Using Illumination-Reflection Model Based Retinex Envelope
1 Introduction
2 Related Work
3 Proposed Illumination-Reflection Based Retinex Envelope Model
3.1 Motivation
3.2 Illumination Estimation on a Mobile Video for Low Light Enhancement
3.3 Reflectance Estimation and Video Enhancement
4 Experimental Results
4.1 Database
4.2 Results
4.3 Performance Evaluation
4.4 Comparative Analysis
5 Conclusion
References
Author Index
📜 SIMILAR VOLUMES
<span>This book constitutes revised selected papers of the Third International Conference on Computing Science, Communication and Security, COMS2 2022, held in Gandhinagar, India, in February 2022. Due to the COVID-19 pandemic the conference was held virtually. <br>The 22 full papers were thoroughly
This book constitutes revised selected papers of the First International Conference on Computing Science, Communication and Security, COMS2 2020, held in March 2020. Due to the COVID-19 pandemic the conference was held virtually. <div><br></div><div>The 26 full papers and 1 short paper were thorough
<span>This book constitutes proceedings of the 7th International Conference on Information, Communication and Computing Technology, ICICCT 2022, held in New Delhi, India, in July 2022.<br>The 11 papers presented in this volume were carefully reviewed and selected from 65 submissions. The papers cove
This book constitutes the refereed proceedings of the 6th International Conference on Information, Communication and Computing Technology, ICICCT 2021, held in New Delhi, India, in May 2021.<p>The 16 full papers and 4 short paper presented in this volume were carefully reviewed and selected from 83