Computing Science, Communication and Security: Third International Conference, COMS2 2022, Gujarat, India, February 6–7, 2022, Revised Selected Papers
✍ Scribed by Nirbhay Chaubey, Sabu M. Thampi, Noor Zaman Jhanjhi
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 327
- Series
- Communications in Computer and Information Science, 1604
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book constitutes revised selected papers of the Third International Conference on Computing Science, Communication and Security, COMS2 2022, held in Gandhinagar, India, in February 2022. Due to the COVID-19 pandemic the conference was held virtually.
The 22 full papers were thoroughly reveiwed and selected from 143 submissions. The papers present ideas, and research results on the aspects of computing science, network communication, and security.
✦ Table of Contents
Preface
Organization
Contents
Development of Smart Sensor for IoT Based Environmental Data Analysis Through Edge Computing
1 Introduction
2 Edge Computing
3 System Implementation
4 Experimental Setup
5 Results and Discussion
5.1 Conclusion and Future Direction
References
Application of Forensic Audio-Video Steganography Technique to Improve Security, Robustness, and Authentication of Secret Data
1 Introduction
2 Related Work
3 Proposed Methodology of Information Security
3.1 The Process to Embed Secret Data into Video
3.2 Video Encoding Process
3.3 The FEMD Process
3.4 Process to Embed the Image Into Video with an Example
3.5 Process to Embed the Audio into Video with an Example
4 Transmitter and Receiver Section Result
4.1 At Transmitter Section
4.2 At Receiver Section
5 System Security and Its Performance Discussion
6 Authentication and Security Analysis
6.1 Blurring and Poisson Noise
6.2 Frame Cropping, Frame Swapping, Frame Replacement, and Frame Exchange
6.3 Visual Attack
6.4 Histogram and Spectrograph
6.5 Chi-Squared Attack, Gaussian and Speckle Noise
6.6 Salt and Pepper Noise and Median Filter
6.7 Frame Clockwise and Anti-clockwise, Rotation Attack
6.8 Concealed Rate (CR) and Concealed Capacity (CC)
6.9 Normalized Correlation Factor (NCF)
6.10 MSE, and PSNR
7 Simulation Result and Discussion
8 Conclusion
References
An Efficient Cluster Based Energy Routing Protocol (E-CBERP) for Wireless Body Area Networks Using Soft Computing Technique
1 Introduction
2 Classification of Routing Protocols for WBAN
3 Related Work
4 Motivation
5 Proposed Model - Route Discovery
5.1 Route Maintenance
5.2 Route Failure
6 Methodology of Evaluation
6.1 Simulation Environment
6.2 Simulation Parameters
7 Result and Analysis
8 Conclusion and Future Work
References
Ortho Image Mosaicing and Object Identification of UAV Data
1 Introduction
2 Literature Survey
2.1 Discussion on Image Stitching Methods
2.2 Discussion on Object Detection Methods
3 Methodology
3.1 Image Stitching
3.2 Object Identification
4 Results And Analysis
5 Conclusion
References
The Novel Approach of Down-Link Spectral Efficiency Enhancement Using Massive MIMO in Correlated Rician Fading Scenario
1 Introduction
2 Literature Review
3 Core Contribution
4 Channel and System Modeling
5 Estimation Methods
5.1 MMSE Channel Estimator
5.2 Element-Wise MMSE Channel Estimator
5.3 LS Channel Estimator
6 DL Spectral Effiency Using MR Precoding
7 Basic Setup and Configuration
8 Output Results
9 Conclusion
References
Blocking Estimation Using Optimal Guard Channel Policy in GSM 900 System
1 Introduction
2 The OCR Policy
2.1 Estimation of NCBP and HCDP
2.2 Theoretical Estimation of Optimal Number of Reserved Channels
3 Application of OCR Policy to GSM 900 System
3.1 GSM Architecture
3.2 GSM 900 System
3.3 Results and Discussion
4 Conclusion
References
Systematic Review on Various Techniques of Android Malware Detection
1 Introduction
2 Literature Review Protocol
2.1 Research Questions
2.2 Search Strategy
2.3 Study Selection Criteria
2.4 Data Extraction of Study
3 Results
3.1 Description of Study
3.2 RQ1 How Does the Empirical Experiments of Android Malware Detection Have Been Conducted as a Part of Pilot Study?
3.3 RQ2 What is the Overall Performance of the Techniques in Malware Detection Based on Empirical Evidence?
4 Discussion
5 Limitation
6 Conclusion Future Work
References
Adaptive Rider Grey Wolf Optimization Enabled Pilot-Design for Channel Estimation in Cognitive Radio
1 Introduction
2 Motivation
2.1 Literature Survey
2.2 Major Challenges
3 System Model of OFDM-Based CR for Channel Estimation
3.1 Mathematical Model of the System
4 Proposed Adaptive RGWO-Based Pilot Design for Channel Estimation
4.1 Solution Encoding
4.2 Fitness Function
4.3 Algorithmic Steps of Proposed Adaptive RGWO for Pilot Design
5 Results and Discussion
5.1 Experimental Setup
5.2 Evaluation Metrics
5.3 Comparative Methods
5.4 Comparative Analysis
5.5 Comparative Discussion
6 Conclusion
References
To Identify Malware Using Machine Learning Algorithms
1 Introduction
2 Related Work
3 Proposed Methods
3.1 Feature Extraction
4 Experiment
4.1 Dataset
4.2 Cuckoo Sandbox
4.3 Classification
4.4 Weka
5 Result
5.1 Naïve Bayes Classifier
5.2 Regression Classifier
5.3 J48
5.4 Random Forest Classifier
5.5 Bagging
6 Conclusion
References
Motor Imagery EEG Signal Classification Using Deep Neural Networks
1 Introduction
2 EEG Preliminaries
3 Proposed Work
3.1 Channel Selection
3.2 Band Pass Filtering
3.3 Anisotropic Diffusion Filtering
3.4 Data Segmentation
3.5 Feature Extraction
3.6 Feature Selection
3.7 Classification Using DNN
4 Results
5 Conclusions
References
Extending WSN Life-Time Using Energy Efficient Based on K-means Clustering Method
1 Introduction
2 Proposed Method
2.1 Network Setup and Deployment
2.2 Choice Optimal Number of Clusters:
2.3 Network Clustering Algorithms
2.4 Data Collecting and Sending to CH
2.5 Energy Update
3 Experiment Result
3.1 Data Sets Transmitted
3.2 Energy Consumption
3.3 Life Time
4 Conclusion
References
One-to-One Matching for Cooperative Resource Sharing and Communication in CRNs
1 Introduction
2 System Model and Assumptions
2.1 Utility of PUs and SUs
2.2 Optimal Allocation of and
3 Matching Game Based Proposed Partner Assignment Scheme
3.1 Basic Definitions of Matching Theory
3.2 Proposed Algorithm
4 Simulations Results and Discussion
5 Conclusion
References
Sandbox Environment for Real Time Malware Analysis of IoT Devices
1 Introduction
1.1 Problem Statement and Contributions
2 Related Work
3 Background
3.1 IoT Attacks
3.2 Sandbox Environment
3.3 Detection Methods
4 Proposed Solution
5 Discussions
6 Conclusion and Future Work
References
Machine Learning for Classification of DOS Attack in Smart Healthcare Networks
1 Introduction
2 Literature Review
3 Data Security Privacy Approaches Using Machine Learning Techniques in 5G Healthcare Services
3.1 Supervised Learning
3.2 Regression
3.3 Classification
3.4 Unsupervised Learning
3.5 Reinforcement Learning
3.6 Support Vector Machines
3.7 Decision Tree
3.8 Clustering
3.9 Dimensionality Reduction
4 Case Study: Detecting the Intensity of DDOS Attack Using Decision Tree Algorithm on Healthcare Application Network Data
5 Conclusion
References
Traffic Flow Prediction Using Deep Learning Techniques
1 Introduction
2 Related Works
3 Proposed Work
3.1 Stacked Auto-Encoders (SAE)
3.2 Convolutional Neural Network (CNN)
3.3 Long- and Short-Term Memory (LSTM) Neural Network
4 Experimental Results and Analysis
4.1 Traffic Flow Data Description
4.2 Evaluation Metrics
4.3 Results
5 Conclusion
References
Meta Heuristic Backtracking Algorithm for Virtual Machine Placement in Cloud Computing Migration
1 Introduction
1.1 Cloud Computing and VM Migration
1.2 Backtracking
2 Related Work
3 The Proposed Method
3.1 Meta Heuristic Backtracking Algorithm
4 Experimental Setup
5 Results
6 Conclusion and Future Scope
References
Achieving Energy Efficiency in Life-Logging Applications of Internet of Things Using Data Compression Through Incorporation of Machine Learning and Edge-Cloud Architecture
1 Introduction
2 Related Work
3 Proposed Architecture
3.1 Dataset
3.2 Lossy Compression
3.3 Dataset Preprocessing
3.4 Stress Prediction
4 Results and Discussion
4.1 Energy Consumption
4.2 Prediction Accuracy
5 Conclusion
References
Cab Fare Prediction Using Machine Learning
1 Introduction
2 Literature Review
3 Advantages of Proposed System
4 Methodology
4.1 Data
4.2 Pre-processing (Missing Value and Outlier Analysis)
4.3 Feature Selection
4.4 Model Development
5 Model Evaluation and Results
6 Limitations
7 Conclusion
8 Future Work
References
Device to Device Communication over 5G
1 Introduction
1.1 5thGeneration
1.2 5thGeneration Advantages
1.3 5thGeneration Disadvantages
2 Literature Review
3 Methodology
3.1 Stochastic Geometry
3.2 Deterministic vs. Stochastic Geometry
3.3 Different Stochastic Probability Distribution
3.4 Queuing Theory
4 Result
4.1 New Routing Scheme
5 Conclusion
References
Energy Efficient Allocation of Resources in NOMA Based (MU-HCRN) with Perfect Spectrum Sensing
1 Introduction
2 System Outline
2.1 System Outline for Spectrum Sensing (SS) and NOMA-Enhanced HetNets System
2.2 NOMA Model
3 Power and SINR Constraints
4 Optimization Problem Formulations
5 Simulation Scenario
6 Conclusion
References
CV Based Person Detection System for Smart Transportation
1 Introduction
1.1 Need of the Hour
1.2 Literature Survey
1.3 Impact on People’s Life
2 Method
2.1 Computer Vision Model
2.2 Database Configuration
3 Result
4 Conclusion and Future Work
References
A Performance of Low-Cost NVIDIA Jetson Nano Embedded System in the Real-Time Siamese Single Object Tracking: A Comparison Study
1 Introduction
2 Siamese Network
3 Siamese SOT Algorithms
4 Evaluation
4.1 VOT Benchmark
4.2 GOT-10K Benchmark
4.3 UAV123 Benchmark
5 Results and Discussion
6 Conclusion
References
Author Index
📜 SIMILAR VOLUMES
<span>This book constitutes the refereed proceedings of the 4th International Conference on Computing Science, Communication and Security, COMS2 2023, held in Gandhinagar, India, during February 6–7, 2023. <br>The 20 full papers included in this book were carefully reviewed and selected from 190 sub
This book constitutes revised selected papers of the First International Conference on Computing Science, Communication and Security, COMS2 2020, held in March 2020. Due to the COVID-19 pandemic the conference was held virtually. <div><br></div><div>The 26 full papers and 1 short paper were thorough
<p>This book constitutes the thoroughly refereed proceedings of the Third International Conference on Advances in Communication, Network, and Computing, CNC 2012, held in Chennai, India, February 24-25, 2012. The 41 revised full papers presented together with 29 short papers and 14 poster papers wer
<span>This book constitutes selected papers presented during the First International Conference on Deep Sciences for Computing and Communications, IconDeepCom 2022, held in Chennai, India, in March 2022.<br>The 27 papers presented were thoroughly reviewed and selected from 97 submissions. They are o