The proceedings contain 31 papers. The special focus in this conference is on computing Science, communication and security. The topics include: Osmotic computing-Based Task Offloading: A Fuzzy Logic-Based Approach;Tr...
ISBN:
(纸本)9783031751691
The proceedings contain 31 papers. The special focus in this conference is on computing Science, communication and security. The topics include: Osmotic computing-Based Task Offloading: A Fuzzy Logic-Based Approach;Traveler’s Demand Reactive Dynamic Online Bus Routing [TraDeR-DOBR] to Improvize Comfort Perception in Intelligent Public Transport System;High-Speed FSO System for Future Generation Networks for Long Reach;Mitigating PAPR Challenges in Massive MIMO Systems for CR-IoT Networks: A Graeco-Latin Square Approach;performance Analysis of IoT Network over 5G communication;ioT-Based Convolutional Neural Networks in a Farm Pest Detection Using Transfer Learning;Performance Comparison of NOMA Vehicular communications Under Shadow Fading;Detecting Distributed Denial of Service (DDoS) Attacks in a Multi-controller SDN Environment Utilizing Machine Learning;Comprehensive Study of Short Channel Effects (SCEs) in MOSFET and FinFET Devices;A Machine Learning (ML)-Inspired Method for Intrusion Detection in IoT Devices Networks;an Anomaly—Misuse Hybrid System for Efficient Intrusion Detection in Clustered Wireless Sensor Network Using Neural Network;detection and Prevention of Black Hole Attack and Sybil Attack in Vehicular Ad Hoc Networks;cognitive Ad Hoc Trust Routing for Enhanced Quality of Service;routing in IoT Network Using NetSim Simulator;A Novel Approach of SHA-3-512bits Using Keccak Technique Based on Sponge Function Implementation on FPGA;cooperative Spectrum Sensing in Cognitive Radio Network Using Adaptive Walruses Optimization Algorithm;Catalan’s Conjecture and Elliptic Curve Cryptography (CCECC) Algorithm for Enhancing Data security During Data Transmission in MANET;monitoring the Concentration of Air Pollutants and Its Health Hazards Using Machine Learning Models;containment of Compromised Nodes in a Distributed Environment;a Novel Approach to Solve Network security, Cryptography Problems Using Genetic Algorithm.
The proceedings contain 94 papers. The topics discussed include: physical layer secrecy solution for passive wireless sensor networks;visualizing and analyzing online social networks;an efficient key management scheme...
ISBN:
(纸本)9781467393546
The proceedings contain 94 papers. The topics discussed include: physical layer secrecy solution for passive wireless sensor networks;visualizing and analyzing online social networks;an efficient key management scheme in hierarchical wireless sensor networks;experiential analysis of the effectiveness of buck and boost DC-DC converters in a basic off grid PV system;identifying ideal values of parameters for software performance testing;reducing structured big data benchmark cycle time using query performance prediction model;robust blind watermarking technique for color images using online sequential extreme learning machine;a detection mechanism of DoS attack using adaptive NSA algorithm in cloud environment;and vehicle security and forensics in Mauritius and abroad.
The proceedings contain 123 papers. The topics discussed include: design of beam steering antenna for 5G at 28GHz using butler matrix;pilot-assisted maximum-likelihood estimation for underwater acoustic communication;...
ISBN:
(纸本)9781728191805
The proceedings contain 123 papers. The topics discussed include: design of beam steering antenna for 5G at 28GHz using butler matrix;pilot-assisted maximum-likelihood estimation for underwater acoustic communication;multi-fold scheduling algorithm for multi-core multi-processor systems;prediction of COVID-19 cases using CNN with X-rays;enhancing safety and security in a dynamic rideshare service;unique identification for monitoring of COVID-19 using the Internet of Things (IoT);cluster-primarily based on multi-hop cooperative relaying based spectrum sensing in cognitive radio network;deep learning techniques for early detection of diabetic retinopathy: recent developments and techniques;handwriting based text steganography using universal languages;COVID prediction from X-ray images;and contingency analysis of power system using big data analytic techniques.
The proceedings contain 44 papers. The topics discussed include: benchmarking datasets for anomaly-based network intrusion detection: KDD CUP 99 alternatives;comparison of algorithm in foreign exchange rate prediction...
ISBN:
(纸本)9781538662274
The proceedings contain 44 papers. The topics discussed include: benchmarking datasets for anomaly-based network intrusion detection: KDD CUP 99 alternatives;comparison of algorithm in foreign exchange rate prediction;big data forex analysis using GPU computing;multipurpose unmanned rover in Bluetooth wireless sensor network;a novel technique to remove marked dynamic object from video based on re-weighted low rank tensor completion;educators teaching strategies in elearning environments;wireless sensor networks with Zigbee and WiFi for environment monitoring, traffic management and vehicle monitoring in smart cities;automobile safety and automatic parking system using sensors and conventional wireless networks;and sparse regularization based fusion technique for hyperspectral and multispectral images using nonlinear mixing model.
The proceedings contain 32 papers. The topics discussed include: a study on exploit development;mining of microsatellites in genomic data using a hybrid approach with range tree applications;empirical evaluation of in...
ISBN:
(纸本)9798350309904
The proceedings contain 32 papers. The topics discussed include: a study on exploit development;mining of microsatellites in genomic data using a hybrid approach with range tree applications;empirical evaluation of in silico microsatellites mining tools designed using NextGen technology in crops;comparative study of ransomwares;a comparative analysis of stock price prediction techniques;a comparative study of different convolution neural network architectures for hyperspectral image classification;uses of social media and computer technologies for guest satisfaction and recommendation analysis using machine learning in hotels industries;acceptance of the nanotechnology in the food industry for customer satisfaction;a novel scheme for feature selection using filter approach;machine learning approaches for crop yield prediction: a review;and significant impact of 5G technology worldwide: with special reference to specific industries and countries.
The proceedings contain 19 papers. The topics discussed include: fake news detection using machine learning with feature selection;simulation and analysis of an improved quality multilevel inverter for linear types of...
ISBN:
(纸本)9781665440394
The proceedings contain 19 papers. The topics discussed include: fake news detection using machine learning with feature selection;simulation and analysis of an improved quality multilevel inverter for linear types of load;recommendation engines: traditional vs deep learning approaches;climate change and covid-19 metaphors: environmental consciousness in social media;personalized engineering education model based on artificial intelligence for learning programming;ensemble transfer learning approach for breast cancer classification using thermograms;an efficient approach for load balancing in software-defined networks;diffusive nanoparticles and generation of repulsive effects by artificial electrical currents;understanding the global data of infections cases by covid-19 through gaussian and trapezoid models;and probabilities of risk due to random aerosol displacement and aleatory social distancing.
This book presents the best-selected research papers presented at the Second international conference on computing, communication, security & Intelligent Systems (IC3SIS 2023), organized by SCMS School of Engineer...
详细信息
ISBN:
(数字)9789819983988
ISBN:
(纸本)9789819985753;9789819983971
This book presents the best-selected research papers presented at the Second international conference on computing, communication, security & Intelligent Systems (IC3SIS 2023), organized by SCMS School of Engineering and Technology, Kochi, on July 06–07, 2023. It discusses the latest technologies in communication and intelligent systems, covering various areas of computing, such as advanced computing, communication and networking, intelligent systems and analytics, 5G and IoT, soft computing, and cybersecurity in general. Featuring work by leading researchers and technocrats, the book serves as a valuable reference resource for young researchers, academics, and industry practitioners.
The proceedings contain 20 papers. The special focus in this conference is on computing Science, communication and security. The topics include: Sentiment Analysis of Bangla Language Using Deep Learning Approaches;bit...
ISBN:
(纸本)9783030767754
The proceedings contain 20 papers. The special focus in this conference is on computing Science, communication and security. The topics include: Sentiment Analysis of Bangla Language Using Deep Learning Approaches;bit Error Rate Analysis of Optical Switch Buffer in Presence of Dispersion and Optical Amplifier Noise;experimenting with Scalability of Software Defined Networks Using Pyretic and Frenetic;design and Implementation of Lightweight Dynamic Elliptic Curve Cryptography Using Schoof’s Algorithm;QRP: QPSO Based Routing Protocol for Energy Efficiency in Wireless Body Area Networks;investigation of Alibaba Cloud Data Set for Resource Management in Cloud computing;A Hybrid Approach Based on ACO and Firefly Algorithm for Routing in FANETs;RC-security Mechanism to Prevent Attacks on IoT Smart Switch;identifying the Impacts of Node Mobility on Network Layer Based Active and Passive Attacks in Mobile Ad Hoc Networks: A Simulation Perspective;Simulated Analysis of Double-Gate MOSFET and FinFET Structure Using High-k Materials;a Multi Class Classification for Detection of IoT Botnet Malware;Correction to: Rc-security mechanism to prevent attacks on iot smart switch (computing Science, communication and security, CCIS 1416, 10.1007/978-3-030-76776-1_17);DDoS Attack Detection Using Artificial Neural Network;Click Ad Fraud Detection Using XGBoost Gradient Boosting Algorithm;a Natural Language Processing Approach to Mine Online Reviews Using Topic Modelling;an Implementation and Combining of Hybrid and Content Based and Collaborative Filtering Algorithms for the Higher Performance of Recommended Sytems;Event-Related Potential Classification Based on EEG Data Using xDWAN with MDM and KNN.
The proceedings contain 22 papers. The special focus in this conference is on computing Science, communication and security. The topics include: Energy Efficient Allocation of Resources in NOMA Based (MU-HCRN) with Pe...
ISBN:
(纸本)9783031105500
The proceedings contain 22 papers. The special focus in this conference is on computing Science, communication and security. The topics include: Energy Efficient Allocation of Resources in NOMA Based (MU-HCRN) with Perfect Spectrum Sensing;application of Forensic Audio-Video Steganography Technique to Improve security, Robustness, and Authentication of Secret Data;device to Device communication over 5G;achieving Energy Efficiency in Life-Logging Applications of Internet of Things Using Data Compression Through Incorporation of Machine Learning and Edge-Cloud Architecture;meta Heuristic Backtracking Algorithm for Virtual Machine Placement in Cloud computing Migration;Motor Imagery EEG Signal Classification Using Deep Neural Networks;development of Smart Sensor for IoT Based Environmental Data Analysis Through Edge computing;to Identify Malware Using Machine Learning Algorithms;adaptive Rider Grey Wolf Optimization Enabled Pilot-Design for Channel Estimation in Cognitive Radio;cab Fare Prediction Using Machine Learning;traffic Flow Prediction Using Deep Learning Techniques;Machine Learning for Classification of DOS Attack in Smart Healthcare Networks;sandbox Environment for Real Time Malware Analysis of IoT Devices;One-to-One Matching for Cooperative Resource Sharing and communication in CRNs;preface;systematic Review on Various Techniques of Android Malware Detection;Extending WSN Life-Time Using Energy Efficient Based on K-means Clustering Method;Blocking Estimation Using Optimal Guard Channel Policy in GSM 900 System;The Novel Approach of Down-Link Spectral Efficiency Enhancement Using Massive MIMO in Correlated Rician Fading Scenario;Ortho Image Mosaicing and Object Identification of UAV Data.
The proceedings contain 113 papers. The topics discussed include: malware detection using machine learning on edge devices;sentence similarity - a state of art approaches;speech emotion recognition using bagged suppor...
ISBN:
(纸本)9781665468831
The proceedings contain 113 papers. The topics discussed include: malware detection using machine learning on edge devices;sentence similarity - a state of art approaches;speech emotion recognition using bagged support vector machines;dynamic service deployment strategy using reinforcement learning in edge networks;blockchain adaptation of remote patient monitoring with Internet of medical things;adaptive control of machines: a data driven model based design;enabling granular exploration of sequence diagrams with activity diagrams;spoken language identification of Indian languages in adversarial synthetic and noisy attacking environments;veterinary medication prescription analysis: a machine learning approach;optimized and secured utilization of infrastructure resources using VMware stretched cluster multi-site solutions;technological advancements in automated crop pest and disease detection: a review & ongoing research;personality prediction using machine learning;an efficient approach for sustainable agricultural trading using blockchain technology;detection, analysis and countermeasures for container based misconfiguration using docker and Kubernetes;combinatorial optimization for travelling salesman and vehicle routing problem;and here you go: an intelligent mobile application featuring immediate assistance for the people of Bangladesh.
暂无评论