توضیحاتی در مورد کتاب Computing Science, Communication and Security: 4th International Conference, COMS2 2023, Mehsana, Gujarat, India, February 6–7, 2023, Revised Selected ... in Computer and Information Science)
نام کتاب : Computing Science, Communication and Security: 4th International Conference, COMS2 2023, Mehsana, Gujarat, India, February 6–7, 2023, Revised Selected ... in Computer and Information Science)
عنوان ترجمه شده به فارسی : علوم محاسباتی، ارتباطات و امنیت: چهارمین کنفرانس بین المللی، COMS2 2023، مهسانا، گجرات، هند، 6–7 فوریه 2023، منتخب اصلاح شده ... در علوم کامپیوتر و اطلاعات)
سری :
نویسندگان : Nirbhay Chaubey (editor), Sabu M. Thampi (editor), Noor Zaman Jhanjhi (editor), Satyen Parikh (editor), Kiran Amin (editor)
ناشر : Springer
سال نشر : 2023
تعداد صفحات : 294
ISBN (شابک) : 3031405633 , 9783031405631
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 35 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Preface
Organization
Contents
An Efficient Signal Detection Technique for STBC-OFDM in Fast Fading Channel
1 Introductions
2 System Model
3 Conventional Signal Detection Method
3.1 DZFD Method
3.2 SIC Method
3.3 DFD Method
3.4 List-SIC Method
3.5 ML Method
4 Proposed OIDF Method
5 Computational Complexity
6 Simulation Results
7 Conclusions
References
Achieving Accurate Trajectory Control While Training Legged Robots Using Machine Learning
1 Introduction
2 Related Work
3 Using Machine Learning to Train Locomotion Policies
3.1 Learning in Cartesian Space
4 Using Augmented Random Search for Training
5 Accurate Trajectory Control
5.1 Using Positional Lead in Trajectory Control
6 Experimental Setup
6.1 Simulation Environment Setup
7 Results
8 Conclusion
References
Relational Model and Improvised DSR Assisted Framework for Secure Wireless Communication
1 Introduction
2 Related Work
3 Problem Description
4 Proposed Methodology
4.1 Novel Retaliation Model for Identifying Routing Mis-Behavior
4.2 Reason for Adopting DSR in Proposed Scheme
4.3 Strategy Implementation
4.4 Novel Group Architecture for Promoting Selfish Node Cooperation
4.5 Threat Detection Technique
4.6 Threat Prevention Technique
5 Results Discussion
5.1 Experimental: Novel Retaliation Model
5.2 Experimental: Group Architecture for Selfish Node Cooperation
6 Conclusion
References
DEEC Protocol with ACO Based Cluster Head Selection in Wireless Sensor Network
1 Introduction
1.1 ACO
1.2 DEEC
1.3 ACO-DEEC
2 Literature Review
3 Proposed Algorithm (ACO-DEEC)
4 Flowchart of Proposed Algorithm
5 Experimental Result
6 Conclusion
References
Performance Analysis of Recovery Methods for Loss of Target in Wireless Sensor Network Following TDNN Prediction Algorithm
1 Introduction
2 Literature Survey
3 Different Recovery Algorithms Following TDNN Based Prediction Algorithm in Target Tracking
3.1 Circlefixed
3.2 Contourfixed
3.3 Circlevelocity
3.4 Contourvelocity
4 Simulation Scenario
5 Conclusion
References
A Comparative Study of DWT and DCT Along with AES Techniques for Safety Transmission of Digital Bank Cheque Image
1 Introduction
2 Frequency Domain Watermarking Techniques
2.1 Discrete Cosine Transform
2.2 Discrete Wavelet Transform
2.3 Digital Watermarking Process
3 Advanced Encryption Standard
4 Outcomes and Its Analysis
5 Conclusion
References
Advancement of Non-coherent Spectrum Sensing Technique in Cognitive Radio Networks - A Simulation-Based Analysis
1 Introduction
2 Non-cooperative Spectrum Sensing Techniques and Related Works
3 Proposal for Modified Threshold (MT)
4 Simulations
5 Conclusion
References
Improvement of Network Protocol and Analysis of Security Using Aspect of Cryptography
1 Introduction
2 Related Works
3 Quantum Key Distribution Protocols
4 Proposed Protocol
5 Conclusion and Future Work
References
Gaussian Mixture Model-Based Clustering for Energy Saving in WSN
1 Introduction
2 Related Works
3 Preliminaries
3.1 Network Model
3.2 Energy Model
4 The Proposed Method
4.1 Optimal Number of Clusters in a Gaussian Mixture
4.2 Gaussian Mixture Models Clustering
5 Transmission of Data
6 Simulation and Performance Evaluation
7 Comparison with Other Protocols
7.1 Lifetime Evaluation
7.2 Energy Consumption
7.3 Throughput Evaluation
8 Conclusions
References
Physical Layer Security Optimisation for NOMA Based UAV Communication for Optimal Resource Allocation
1 Introduction
2 Related Work
3 System Model and Optimisation
4 Simulaton Result and Discussion
5 Conclusion
References
DBFEH: Design of a Deep-Learning-Based Bioinspired Model to Improve Feature Extraction Capabilities of Healthcare Device Sets
1 Introduction
2 Literature Survey
3 Design of the Proposed Deep-Learning-Based Bioinspired Model to Improve Feature Extraction Capabilities of Healthcare Device Sets
4 Result Analysis and Comparison
5 Conclusion
References
Protecting OT Hosts with Intelligent Model-Based Defense System Against Malware Families
1 Introduction
2 Literature Review
3 Dataset
4 Methodology
5 Results and Discussion
5.1 The Analysis of a K-neighborhood Performed Over a Large Dataset
5.2 The Findings After Running the Logistic Regression Method on the Provided Data:
5.3 The Findings from Running the Random Forest Classifier Algorithm on the Provided Data Set:
6 Conclusions
References
Design and Analysis of Wide-Band Planar Antenna Using Meta-material for S-Band Applications
1 Introduction
2 Meta Material Applications
2.1 Antenna Miniaturisation
2.2 Isolation
2.3 Reduction of Coupling Effects
2.4 Aperture Field Shaping– Directivity and Gain Enhancement
2.5 Scanning of Main Beam Direction
3 Survey of Various Microstrip Antennae Using MTM
4 Design of Meta surface Antena
4.1 Design of Meta-Surface Cell Units
4.2 Design of Antenna in Presence and Absence of Meta-Surface
4.3 Antenna Fabricated with Meta-Surface
5 Results of Antenna Simulation Including and Excluding Metasurface
5.1 Results of Meta-surface-Loaded Antenna’s Simulation
6 Conclusion
References
Performance Comparison of IEEE 802.11ax, 802.11ac and 802.11n Using Network Simulator NS3
1 Introduction
2 Literature Review
2.1 802.11n
2.2 802.11ac
2.3 802.11ax
3 Simulation and Analysis
3.1 Simulation Model
3.2 Simulation Results
4 Conclusion
References
Web Browser Forensics: A Comparative Integrated Approach on Artefacts Acquisition, Evidence Collections and Analysis of Google Chrome, Firefox and Brave Browser
1 Introduction
2 Literature Survey
3 Methodology
4 Data Modeling
5 Laboratory Set-Up
6 Results
6.1 Google Chrome Browser Forensics
6.2 Mozilla Firefox Browser Forensics
6.3 Brave Browser Forensics
7 Result Discussion
8 Conclusion
References
An Innovative AI Architecture for Detecting the Primary User in the Spectrum
1 Introduction
2 Literature Survey
3 Related Works
4 Methodology
5 Results and Discussion
6 Conclusions
References
Power Optimization for Millimeter Wave MIMO System
1 Introduction
1.1 The Main Contribution of this Article is:
2 Literature Review
3 Methodology
4 Proposed Work
4.1 Decomposition of MIMO Wireless Channel
4.2 SVD Receiver
4.3 Optimally MIMO Power Allocation
4.4 Water Filling Algorithm
5 Result and Discussion
6 Conclusion
References
Performance Evaluation of VBF, DBR and Modified CARP for Underwater Acoustic Sensor Network
1 Introduction
2 Background
2.1 Vector Based Forwarding (VBF) [1]
2.2 Depth-Based Routing Protocol (DBR) [2]
2.3 Channel Aware Routing Protocol (CARP) [4]
3 Simulation Setup
4 Experimental Result
5 Proposed Model
5.1 Network Initialization Phase
5.2 Data Forwarding Phase
6 Conclusion
References
Performance Analysis of Smart Antenna in Wireless Communication System
1 Introduction
2 Smart Antenna Systems (SAS)
2.1 Switched Beam
2.2 Adaptive Array
3 Normalized Least Mean Square Algorithm
3.1 Modified Form of LMS [25]
4 Detection of Active Tap
5 Simulation and Results
6 Conclusions
References
Low-Light Video Enhancement on a Mobile Device Using Illumination-Reflection Model Based Retinex Envelope
1 Introduction
2 Related Work
3 Proposed Illumination-Reflection Based Retinex Envelope Model
3.1 Motivation
3.2 Illumination Estimation on a Mobile Video for Low Light Enhancement
3.3 Reflectance Estimation and Video Enhancement
4 Experimental Results
4.1 Database
4.2 Results
4.3 Performance Evaluation
4.4 Comparative Analysis
5 Conclusion
References
Author Index