Chaubey / Jhanjhi / Thampi | Computing Science, Communication and Security | Buch | 978-3-031-75169-1 | www.sack.de

Buch, Englisch, 424 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 668 g

Reihe: Communications in Computer and Information Science

Chaubey / Jhanjhi / Thampi

Computing Science, Communication and Security

5th International Conference, COMS2 2024, Mehsana, Gujarat, India, February 6-7, 2024, Proceedings
2024
ISBN: 978-3-031-75169-1
Verlag: Springer

5th International Conference, COMS2 2024, Mehsana, Gujarat, India, February 6-7, 2024, Proceedings

Buch, Englisch, 424 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 668 g

Reihe: Communications in Computer and Information Science

ISBN: 978-3-031-75169-1
Verlag: Springer


This book constitutes the refereed proceedings of the 5th International Conference on Computing Science, Communication and Security, COMS2 2024, held in Mehsana, Gujarat, India, during February 6–7, 2024. 

The 28 full papers and 03 short papers presented in this volume were carefully reviewed and selected from 290 submissions. 

They are grouped into the following topics: experiences, ideas, and research results on aspects of Computing Science, Network Communication, and Security.

Chaubey / Jhanjhi / Thampi Computing Science, Communication and Security jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


.- Design and Performance Analysis Of High Efficiency Propulsion System for VTOL Applications.

.- Osmotic Computing-Based Task Offloading: A Fuzzy Logic-Based Approach.

.- Traveler’s Demand Reactive Dynamic Online Bus Routing [TraDeR-DOBR] to Improvize Comfort Perception in Intelligent Public Transport System.

.- High-Speed FSO System for Future Generation Networks for Long Reach.

.- Mitigating PAPR Challenges in Massive MIMO Systems for CR-IoT Networks: A Graeco-Latin Square Approach.

.- Performance Analysis of IoT Network over 5G Communication.

.- IoT-Based Convolutional Neural Networks in a Farm Pest Detection Using Transfer Learning.

.- Performance Comparison of NOMA Vehicular Communications under Shadow Fading.

.- Detecting Distributed Denial of Service (DDoS) Attacks in a Multi-controller SDN Environment Utilizing Machine Learning.

.- Comprehensive Study Of Short Channel Effects (SCEs) in MOSFET and FinFET Devices.

.- A Machine Learning (ML)-Inspired Method for Intrusion Detection in IoT Devices Networks.

.- An Anomaly-Misuse Hybrid System for Efficient Intrusion Detection In Clustered Wireless Sensor Network Using Neural Network.

.- Detection and Prevention of Black hole and Sybil attack in Vehicular  Ad Hoc Networks.

.- Cognitive Ad hoc Trust Routing for Enhanced Quality of Service.

.- Routing in IoT network using NetSim Simulator.

.- A Novel Approach of SHA-3-512bits using Keccak Technique Based on Sponge Function Implementation on FPGA".

.- Cooperative Spectrum Sensing in Cognitive Radio Network using Adaptive Walruses Optimization Algorithm.

.- Catalan’s Conjecture and Elliptic Curve Cryptography (CCECC) algorithm for Enhancing Data Security during Data Transmission in MANET.

.- Monitoring the concentration of air pollutants and its health hazards using Machine Learning models.

.- Containment of Compromised Nodes in a Distributed Environment.

.- A Novel Approach To Solve Network Security, Cryptography Problems Using Genetic Algorithm.

.- Intelligent Agent based Clustering and Optimal Multi-path Routing for Energy-Efficient Wireless Sensor Net-works in Smart City Applications: A Distributed AI-Driven Approach.

.- A novel symmetric key based authentication scheme that saves energy for edge devices of the Internet of Things.

.- Objective Functions in High-Density Internet of Things Networks - A Performance Evaluation.

.- Enhancing ASIC Design Efficiency: A Focus on RTL Verification with Spyglass.

.- Enhancement in AOMDV Routing Protocol to Overcome Congestion Problem in MANET.

.- Performance Evaluation of Parallel Processing Adder against Basic Adders on FPGAs.

.- A Decentralised Application for Medical Insurance Claim System using Blockchain Technology.

.- Performance Analysis of Energy Efficient Routing Protocols in Wireless Sensor Networks.

.- Design of Performance Enhanced Approximate Multiplier for Image Processing Applications.

.- Design and optimization in SPI master at the RTL level.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.