𝔖 Scriptorium
✩   LIBER   ✩

📁

Computing science, communication and security : second international conference, COMS2 2021, Gujarat, India, February 6-7, 2021 : revised selected papers

✍ Scribed by Kiran Amin (editor); Nirbhay Kumar Chaubey (editor); Satyen Parikh (editor)


Year
2021
Tongue
English
Leaves
300
Series
Communications in computer and information science,
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✩ Table of Contents


Preface
Organization
Contents
Artificial Intelligence and Machine Learning
Data Balancing for Credit Card Fraud Detection Using Complementary Neural Networks and SMOTE Algorithm
1 Introduction
2 Literature Review
3 Dataset Description
4 Proposed Method
4.1 Data Balancing Network
4.2 Classification Algorithms
5 Results
5.1 Performance of CMTNN
5.2 Classification Results
6 Conclusions and Future Work
References
A Multi Class Classification for Detection of IoT Botnet Malware
1 Introduction
1.1 IoT Botnet
1.2 Briefing on IoT Botnet Attacks
2 Related Works
3 Data Collection and Preprocessing
3.1 Details About IoT-23 and MedBIoT DataSet
3.2 Log Extraction Using Zeek
3.3 Samples and Features Considered
3.4 KNN Imputation
4 Building a Classifier and Implementing GAN
4.1 Ensemble Approach
4.2 Applying Conditional Generative Adversarial Networks (CTGAN)
5 Results and Discussion
6 Conclusion and Future Work
References
An AI-Based Solution to Reduce Undesired Face-Touching as a Precautionary Measure for COVID-19
1 Introduction
2 Proposed System
3 Methodology and Algorithmic Explanation
3.1 Introduction to BodyPix 2.0
3.2 Working
4 Comparative Analysis of Existing Detection Methods
4.1 Available Models
4.2 Purpose of Choosing BodyPix 2.0
5 Experimental Results
5.1 Accuracy Determination
5.2 Determining the Response Time
6 Conclusion
References
DDoS Attack Detection Using Artificial Neural Network
1 Introduction
2 Related Work
3 Data Set
3.1 Data Preparation
3.2 Sample Data Set
3.3 Feature Reduction
4 Normalization
4.1 Min-Max Algorithm
4.2 Label Encoding
4.3 Normalized Data Set
5 Back Propagation Neural Network
5.1 Algorithm
5.2 Back Propagation Neural Network (BPNN) Model
6 Results
7 Conclusion
References
Click Ad Fraud Detection Using XGBoost Gradient Boosting Algorithm
1 Introduction
1.1 World of Internet Advertising
1.2 Online Advertising Fraud
1.3 Click Fraud
1.4 Sources of Click Fraud
1.5 Problems of Detecting Click Fraud
2 Related Work
3 Proposed Solution
3.1 Dataset
3.2 Exploratory Data Analysis
3.3 Feature Engineering
4 Modelling
5 Results and Analysis
5.1 Model Evaluation
5.2 Comparing Results
5.3 Evaluating the Features Selected for Models
6 Conclusion and Future Work
References
A Natural Language Processing Approach to Mine Online Reviews Using Topic Modelling
1 Introduction
1.1 Feedback of Products
1.2 Recovery of Information from Unstructured Text, Collection of Functions
1.3 Semi-supervised Topic Modelling in Tweets Based on Topic Modelling
1.4 Topic Modelling for Social Media in the Restaurant Based Industry
2 Related Work
3 Method
4 Conclusions
References
An Implementation and Combining of Hybrid and Content Based and Collaborative Filtering Algorithms for the Higher Performance of Recommended Sytems
1 Introduction
2 Literature Survey
2.1 Content Based Recommenders (CBR)
2.2 Collaborative Filtering (CF)
3 Hybrid Recommended Systems Concept
4 Categorization of Hybrid Recommended Systems
4.1 Monolithic Hybrids
4.2 Parallelized Hybrids
4.3 Pipelined Hybrids
5 Similarity Metrices
5.1 Cosine Metrices
5.2 Adjusted Cosine Metrices
6 Road Map for Hybrid Recommended Systems
7 Train/Test of Dataset
8 Building Customized Algorithm and Evaluation on the Top of SurpriseLib
9 Evaluation of Recommender Systems
10 Step by Step Implementation and Experimental Setup of Recommender Systems Algorithm
11 Result and Discussions
12 Conclusion
References
Event-Related Potential Classification Based on EEG Data Using xDWAN with MDM and KNN
1 Introduction
2 Related Work
3 Data Description
4 Proposed Methodology
4.1 EEGNet Model: Compact Convolutional Neural Network (Compact-CNN)
4.2 xDAWN Spatial Filtering
4.3 xDAWAN with Riemannian Geometry
4.4 Classification
5 Result and Discussion
6 Conclusion and Future Work
References
Oil Spill Discrimination of SAR Satellite Images Using Deep Learning Based Semantic Segmentation
1 Introduction
2 Related Work
3 Problem Formulation
4 Image Datasets
5 Proposed Method
5.1 Image Preprocessing
5.2 Semantic Segmentation
6 Performance Measures
7 Results and Findings
7.1 Based on Filters
7.2 Based on Datasets
7.3 Based on Segmentation
8 Conclusion
References
Sentiment Analysis of Bangla Language Using Deep Learning Approaches
1 Introduction
2 Related Work
3 Methodology
3.1 Database Formation
3.2 Word Embedding
3.3 Convolutional Neural Network (CNN)
3.4 Long Short-Term Memory (LSTM)
3.5 CNN-LSTM
4 Result and Analysis
5 Conclusions
References
Networking and Communications
Bit Error Rate Analysis of Optical Switch Buffer in Presence of Dispersion and Optical Amplifier Noise
1 Introduction
1.1 Novelty
1.2 Research Contributions
1.3 Layout
2 The Proposed Optical Switch Design
3 Performance Evaluation of the Proposed Switch
4 Conclusions and Future Work
References
Experimenting with Scalability of Software Defined Networks Using Pyretic and Frenetic
1 Introduction
2 Related Work
2.1 SDN – Software Defined Networks Architecture
2.2 Frenetic: A Network Programming Language
2.3 Modular SDN Programming with Pyretic
2.4 Research Gap and Motivation
3 FRENETIC and PYRETIC
3.1 Frenetic
3.2 Pyretic (Python + Frenetic)
3.3 Pyretic Network Policies
3.4 Pyretic Features
4 Tools, Techniques and Simulation Environment
5 Experimental Procedure
5.1 Running Pyretic with Mininet
5.2 Generating Topologies
5.3 Traffic Generation and Logging Network Events
5.4 Graph Generation
6 Performance Metrics and Result Discussions
6.1 Throughput
6.2 Jitter
6.3 Latency
7 Conclusion
8 Future Work
References
Design and Implementation of Lightweight Dynamic Elliptic Curve Cryptography Using Schoof’s Algorithm
1 Introduction
2 Design and Idea of Elliptic Curve Cryptography
2.1 Basic Idea Behind Elliptic Curve Cryptography
2.2 Limitation in Other Techniques
3 Preliminary Work
3.1 Elliptic Curves
3.2 Point Addition
3.3 Scalar Multiplication
3.4 Elliptic Curve Cryptography
3.5 Schoof’s Algorithm
4 Proposed Dynamic Elliptic Curve Cryptography
4.1 Randomising the Constants
4.2 Counting the Points of Elliptic Curve
4.3 Randomly Choosing a Generator Point
4.4 Flowchart
5 Results
6 Conclusion
References
QRP: QPSO Based Routing Protocol for Energy Efficiency in Wireless Body Area Networks
1 Introduction
2 Related Work
2.1 Novelty
3 Preliminaries
3.1 Particle Swarm Optimization
3.2 Quantum-Inspired Particle Swarm Optimization
4 Materials and Methods
4.1 Networking Model
4.2 Energy Model
4.3 Path-Loss Model
4.4 Proposed Approach
5 Results and Discussions
5.1 Throughput
5.2 Residual Energy
5.3 Network Lifetime
5.4 Packets Sent to Sink
5.5 Packet Dropped
5.6 Path-Loss
6 Conclusion and Future Scope
References
Investigation of Alibaba Cloud Data Set for Resource Management in Cloud Computing
1 Introduction
2 Understanding Ali Baba Dataset
2.1 Resource Utilization Information
2.2 Online Service (Container)
2.3 Online Request Table (Containerevent.csv)
2.4 Batch Workload
3 Data Analysis
3.1 Utilization and Summary of Data
3.2 Overall Utilization
3.3 Characterized Workload
3.4 Recent Research for the Dataset
4 Conclusion
References
A Hybrid Approach Based on ACO and Firefly Algorithm for Routing in FANETs
1 Introduction
2 Literature Review
3 Existing Algorithm
3.1 Ant Colony Optimization (ACO)
3.2 Firefly Algorithm
4 Proposed Algorithm
5 Parameters and Methods
5.1 Simulation Platform
5.2 Simulation Parameters
5.3 Performance Parameters
6 Results and Discussion
7 Conclusion
References
RC-Security Mechanism to Prevent Attacks on IoT Smart Switch
1 Introduction
1.1 Impacts of Attack
2 Review on IoT Security Solutions
2.1 Classification Hierarchy of DOS
3 Methodology
3.1 Experimental Setup for the IoT Smart Switch
3.2 Flow of the Experimental Setup
3.3 Request Capturing Security Mechanism (RCSM)
4 Results and Experiments
4.1 Attack Scenario
4.2 Mitigating Attacks
5 Conclusion and Future Work
References
Identifying the Impacts of Node Mobility on Network Layer Based Active and Passive Attacks in Mobile Ad Hoc Networks: A Simulation Perspective
1 Introduction
2 Literature Review
3 State of the Art
4 Methodology
5 Results and Discussion
6 Conclusion and Future Works
References
Simulated Analysis of Double-Gate MOSFET and FinFET Structure Using High-k Materials
1 Introduction
2 Short Channel Effects (SCEs)
3 Double-Gate MOSFET Device Structure
4 FinFET Device Structure
5 Performance Evaluation by High-k Materials
5.1 Concept of High-k Dielectrics
5.2 Choice of High-k Oxide
5.3 The Observed Design
6 Implementation
7 Simulation Results
8 Conclusion
9 Future Scope
References
Correction to: RC-Security Mechanism to Prevent Attacks on IoT Smart Switch
Correction to: Chapter “RC-Security Mechanism to Prevent Attacks on IoT Smart Switch” in: N. Chaubey et al. (Eds.): Computing Science, Communication and Security, CCIS 1416, https://doi.org/10.1007/978-3-030-76776-1_17
Author Index


📜 SIMILAR VOLUMES


Computing Science, Communication and Sec
✍ Nirbhay Chaubey, Sabu M. Thampi, Noor Zaman Jhanjhi 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>This book constitutes revised selected papers of the Third International Conference on Computing Science, Communication and Security, COMS2 2022, held in Gandhinagar, India, in February 2022. Due to the COVID-19 pandemic the conference was held virtually. <br>The 22 full papers were thoroughly

Computing Science, Communication and Sec
✍ Nirbhay Chaubey (editor), Sabu M. Thampi (editor), Noor Zaman Jhanjhi (editor), 📂 Library 📅 2023 🏛 Springer 🌐 English

<span>This book constitutes the refereed proceedings of the 4th International Conference on Computing Science, Communication and Security, COMS2 2023, held in Gandhinagar, India, during February 6–7, 2023. <br>The 20 full papers included in this book were carefully reviewed and selected from 190 sub

Computing Science, Communication and Sec
✍ Nirbhay Chaubey (editor), Satyen Parikh (editor), Kiran Amin (editor) 📂 Library 📅 2020 🏛 Springer 🌐 English

This book constitutes revised selected papers of the First International Conference on Computing Science, Communication and Security, COMS2 2020, held in March 2020. Due to the COVID-19 pandemic the conference was held virtually. <div><br></div><div>The 26 full papers and 1 short paper were thorough

Communication, Networks and Computing: S
✍ Ranjeet Singh Tomar (editor), Shekhar Verma (editor), Brijesh Kumar Chaurasia (e 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book constitutes selected and revised papers presented at the Second International Conference on Communication, Networks and Computing, CNC 2020, held in Gwalior, India, in December 2020. <br>The 23 full papers and 7 short papers were thoroughly reviewed and selected from the 102 submissi

Information Systems and Design: Second I
✍ Victor Taratukhin (editor), Mikhail Matveev (editor), Jörg Becker (editor), Yury 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>This volume constitutes selected papers from the Second International Conference on Information Systems and Design, ICID 2021, held as virtual event in September 2021. <br>The 24 full papers and 4 short papers presented were thoroughly reviewed and selected from 51 submissions. They are organi