<span>This book constitutes revised selected papers of the Third International Conference on Computing Science, Communication and Security, COMS2 2022, held in Gandhinagar, India, in February 2022. Due to the COVID-19 pandemic the conference was held virtually. <br>The 22 full papers were thoroughly
Computing science, communication and security : second international conference, COMS2 2021, Gujarat, India, February 6-7, 2021 : revised selected papers
â Scribed by Kiran Amin (editor); Nirbhay Kumar Chaubey (editor); Satyen Parikh (editor)
- Year
- 2021
- Tongue
- English
- Leaves
- 300
- Series
- Communications in computer and information science,
- Category
- Library
No coin nor oath required. For personal study only.
⊠Table of Contents
Preface
Organization
Contents
Artificial Intelligence and Machine Learning
Data Balancing for Credit Card Fraud Detection Using Complementary Neural Networks and SMOTE Algorithm
1 Introduction
2 Literature Review
3 Dataset Description
4 Proposed Method
4.1 Data Balancing Network
4.2 Classification Algorithms
5 Results
5.1 Performance of CMTNN
5.2 Classification Results
6 Conclusions and Future Work
References
A Multi Class Classification for Detection of IoT Botnet Malware
1 Introduction
1.1 IoT Botnet
1.2 Briefing on IoT Botnet Attacks
2 Related Works
3 Data Collection and Preprocessing
3.1 Details About IoT-23 and MedBIoT DataSet
3.2 Log Extraction Using Zeek
3.3 Samples and Features Considered
3.4 KNN Imputation
4 Building a Classifier and Implementing GAN
4.1 Ensemble Approach
4.2 Applying Conditional Generative Adversarial Networks (CTGAN)
5 Results and Discussion
6 Conclusion and Future Work
References
An AI-Based Solution to Reduce Undesired Face-Touching as a Precautionary Measure for COVID-19
1 Introduction
2 Proposed System
3 Methodology and Algorithmic Explanation
3.1 Introduction to BodyPix 2.0
3.2 Working
4 Comparative Analysis of Existing Detection Methods
4.1 Available Models
4.2 Purpose of Choosing BodyPix 2.0
5 Experimental Results
5.1 Accuracy Determination
5.2 Determining the Response Time
6 Conclusion
References
DDoS Attack Detection Using Artificial Neural Network
1 Introduction
2 Related Work
3 Data Set
3.1 Data Preparation
3.2 Sample Data Set
3.3 Feature Reduction
4 Normalization
4.1 Min-Max Algorithm
4.2 Label Encoding
4.3 Normalized Data Set
5 Back Propagation Neural Network
5.1 Algorithm
5.2 Back Propagation Neural Network (BPNN) Model
6 Results
7 Conclusion
References
Click Ad Fraud Detection Using XGBoost Gradient Boosting Algorithm
1 Introduction
1.1 World of Internet Advertising
1.2 Online Advertising Fraud
1.3 Click Fraud
1.4 Sources of Click Fraud
1.5 Problems of Detecting Click Fraud
2 Related Work
3 Proposed Solution
3.1 Dataset
3.2 Exploratory Data Analysis
3.3 Feature Engineering
4 Modelling
5 Results and Analysis
5.1 Model Evaluation
5.2 Comparing Results
5.3 Evaluating the Features Selected for Models
6 Conclusion and Future Work
References
A Natural Language Processing Approach to Mine Online Reviews Using Topic Modelling
1 Introduction
1.1 Feedback of Products
1.2 Recovery of Information from Unstructured Text, Collection of Functions
1.3 Semi-supervised Topic Modelling in Tweets Based on Topic Modelling
1.4 Topic Modelling for Social Media in the Restaurant Based Industry
2 Related Work
3 Method
4 Conclusions
References
An Implementation and Combining of Hybrid and Content Based and Collaborative Filtering Algorithms for the Higher Performance of Recommended Sytems
1 Introduction
2 Literature Survey
2.1 Content Based Recommenders (CBR)
2.2 Collaborative Filtering (CF)
3 Hybrid Recommended Systems Concept
4 Categorization of Hybrid Recommended Systems
4.1 Monolithic Hybrids
4.2 Parallelized Hybrids
4.3 Pipelined Hybrids
5 Similarity Metrices
5.1 Cosine Metrices
5.2 Adjusted Cosine Metrices
6 Road Map for Hybrid Recommended Systems
7 Train/Test of Dataset
8 Building Customized Algorithm and Evaluation on the Top of SurpriseLib
9 Evaluation of Recommender Systems
10 Step by Step Implementation and Experimental Setup of Recommender Systems Algorithm
11 Result and Discussions
12 Conclusion
References
Event-Related Potential Classification Based on EEG Data Using xDWAN with MDM and KNN
1 Introduction
2 Related Work
3 Data Description
4 Proposed Methodology
4.1 EEGNet Model: Compact Convolutional Neural Network (Compact-CNN)
4.2 xDAWN Spatial Filtering
4.3 xDAWAN with Riemannian Geometry
4.4 Classification
5 Result and Discussion
6 Conclusion and Future Work
References
Oil Spill Discrimination of SAR Satellite Images Using Deep Learning Based Semantic Segmentation
1 Introduction
2 Related Work
3 Problem Formulation
4 Image Datasets
5 Proposed Method
5.1 Image Preprocessing
5.2 Semantic Segmentation
6 Performance Measures
7 Results and Findings
7.1 Based on Filters
7.2 Based on Datasets
7.3 Based on Segmentation
8 Conclusion
References
Sentiment Analysis of Bangla Language Using Deep Learning Approaches
1 Introduction
2 Related Work
3 Methodology
3.1 Database Formation
3.2 Word Embedding
3.3 Convolutional Neural Network (CNN)
3.4 Long Short-Term Memory (LSTM)
3.5 CNN-LSTM
4 Result and Analysis
5 Conclusions
References
Networking and Communications
Bit Error Rate Analysis of Optical Switch Buffer in Presence of Dispersion and Optical Amplifier Noise
1 Introduction
1.1 Novelty
1.2 Research Contributions
1.3 Layout
2 The Proposed Optical Switch Design
3 Performance Evaluation of the Proposed Switch
4 Conclusions and Future Work
References
Experimenting with Scalability of Software Defined Networks Using Pyretic and Frenetic
1 Introduction
2 Related Work
2.1 SDN â Software Defined Networks Architecture
2.2 Frenetic: A Network Programming Language
2.3 Modular SDN Programming with Pyretic
2.4 Research Gap and Motivation
3 FRENETIC and PYRETIC
3.1 Frenetic
3.2 Pyretic (Python + Frenetic)
3.3 Pyretic Network Policies
3.4 Pyretic Features
4 Tools, Techniques and Simulation Environment
5 Experimental Procedure
5.1 Running Pyretic with Mininet
5.2 Generating Topologies
5.3 Traffic Generation and Logging Network Events
5.4 Graph Generation
6 Performance Metrics and Result Discussions
6.1 Throughput
6.2 Jitter
6.3 Latency
7 Conclusion
8 Future Work
References
Design and Implementation of Lightweight Dynamic Elliptic Curve Cryptography Using Schoofâs Algorithm
1 Introduction
2 Design and Idea of Elliptic Curve Cryptography
2.1 Basic Idea Behind Elliptic Curve Cryptography
2.2 Limitation in Other Techniques
3 Preliminary Work
3.1 Elliptic Curves
3.2 Point Addition
3.3 Scalar Multiplication
3.4 Elliptic Curve Cryptography
3.5 Schoofâs Algorithm
4 Proposed Dynamic Elliptic Curve Cryptography
4.1 Randomising the Constants
4.2 Counting the Points of Elliptic Curve
4.3 Randomly Choosing a Generator Point
4.4 Flowchart
5 Results
6 Conclusion
References
QRP: QPSO Based Routing Protocol for Energy Efficiency in Wireless Body Area Networks
1 Introduction
2 Related Work
2.1 Novelty
3 Preliminaries
3.1 Particle Swarm Optimization
3.2 Quantum-Inspired Particle Swarm Optimization
4 Materials and Methods
4.1 Networking Model
4.2 Energy Model
4.3 Path-Loss Model
4.4 Proposed Approach
5 Results and Discussions
5.1 Throughput
5.2 Residual Energy
5.3 Network Lifetime
5.4 Packets Sent to Sink
5.5 Packet Dropped
5.6 Path-Loss
6 Conclusion and Future Scope
References
Investigation of Alibaba Cloud Data Set for Resource Management in Cloud Computing
1 Introduction
2 Understanding Ali Baba Dataset
2.1 Resource Utilization Information
2.2 Online Service (Container)
2.3 Online Request Table (Containerevent.csv)
2.4 Batch Workload
3 Data Analysis
3.1 Utilization and Summary of Data
3.2 Overall Utilization
3.3 Characterized Workload
3.4 Recent Research for the Dataset
4 Conclusion
References
A Hybrid Approach Based on ACO and Firefly Algorithm for Routing in FANETs
1 Introduction
2 Literature Review
3 Existing Algorithm
3.1 Ant Colony Optimization (ACO)
3.2 Firefly Algorithm
4 Proposed Algorithm
5 Parameters and Methods
5.1 Simulation Platform
5.2 Simulation Parameters
5.3 Performance Parameters
6 Results and Discussion
7 Conclusion
References
RC-Security Mechanism to Prevent Attacks on IoT Smart Switch
1 Introduction
1.1 Impacts of Attack
2 Review on IoT Security Solutions
2.1 Classification Hierarchy of DOS
3 Methodology
3.1 Experimental Setup for the IoT Smart Switch
3.2 Flow of the Experimental Setup
3.3 Request Capturing Security Mechanism (RCSM)
4 Results and Experiments
4.1 Attack Scenario
4.2 Mitigating Attacks
5 Conclusion and Future Work
References
Identifying the Impacts of Node Mobility on Network Layer Based Active and Passive Attacks in Mobile Ad Hoc Networks: A Simulation Perspective
1 Introduction
2 Literature Review
3 State of the Art
4 Methodology
5 Results and Discussion
6 Conclusion and Future Works
References
Simulated Analysis of Double-Gate MOSFET and FinFET Structure Using High-k Materials
1 Introduction
2 Short Channel Effects (SCEs)
3 Double-Gate MOSFET Device Structure
4 FinFET Device Structure
5 Performance Evaluation by High-k Materials
5.1 Concept of High-k Dielectrics
5.2 Choice of High-k Oxide
5.3 The Observed Design
6 Implementation
7 Simulation Results
8 Conclusion
9 Future Scope
References
Correction to: RC-Security Mechanism to Prevent Attacks on IoT Smart Switch
Correction to: Chapter âRC-Security Mechanism to Prevent Attacks on IoT Smart Switchâ in: N. Chaubey et al. (Eds.): Computing Science, Communication and Security, CCIS 1416, https://doi.org/10.1007/978-3-030-76776-1_17
Author Index
đ SIMILAR VOLUMES
<span>This book constitutes the refereed proceedings of the 4th International Conference on Computing Science, Communication and Security, COMS2 2023, held in Gandhinagar, India, during February 6â7, 2023. <br>The 20 full papers included in this book were carefully reviewed and selected from 190 sub
This book constitutes revised selected papers of the First International Conference on Computing Science, Communication and Security, COMS2 2020, held in March 2020. Due to the COVID-19 pandemic the conference was held virtually. <div><br></div><div>The 26 full papers and 1 short paper were thorough
<span>This book constitutes selected and revised papers presented at the Second International Conference on Communication, Networks and Computing, CNC 2020, held in Gwalior, India, in December 2020. <br>The 23 full papers and 7 short papers were thoroughly reviewed and selected from the 102 submissi
<span>This volume constitutes selected papers from the Second International Conference on Information Systems and Design, ICID 2021, held as virtual event in September 2021. <br>The 24 full papers and 4 short papers presented were thoroughly reviewed and selected from 51 submissions. They are organi