Computing science, communication and security : second international conference, COMS2 2021, Gujarat, India, February 6-7, 2021 : revised selected papers / / Nirbhay Chaubey, Satyen Parikh, Kiran Amin (editors) |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XIV, 287 p. 178 illus., 132 illus. in color.) |
Disciplina | 004 |
Collana | Communications in computer and information science |
Soggetto topico | Computer science |
ISBN | 3-030-76776-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Artificial Intelligence and Machine Learning -- Data Balancing for Credit Card Fraud Detection Using Complementary Neural Networks and SMOTE Algorithm -- 1 Introduction -- 2 Literature Review -- 3 Dataset Description -- 4 Proposed Method -- 4.1 Data Balancing Network -- 4.2 Classification Algorithms -- 5 Results -- 5.1 Performance of CMTNN -- 5.2 Classification Results -- 6 Conclusions and Future Work -- References -- A Multi Class Classification for Detection of IoT Botnet Malware -- 1 Introduction -- 1.1 IoT Botnet -- 1.2 Briefing on IoT Botnet Attacks -- 2 Related Works -- 3 Data Collection and Preprocessing -- 3.1 Details About IoT-23 and MedBIoT DataSet -- 3.2 Log Extraction Using Zeek -- 3.3 Samples and Features Considered -- 3.4 KNN Imputation -- 4 Building a Classifier and Implementing GAN -- 4.1 Ensemble Approach -- 4.2 Applying Conditional Generative Adversarial Networks (CTGAN) -- 5 Results and Discussion -- 6 Conclusion and Future Work -- References -- An AI-Based Solution to Reduce Undesired Face-Touching as a Precautionary Measure for COVID-19 -- 1 Introduction -- 2 Proposed System -- 3 Methodology and Algorithmic Explanation -- 3.1 Introduction to BodyPix 2.0 -- 3.2 Working -- 4 Comparative Analysis of Existing Detection Methods -- 4.1 Available Models -- 4.2 Purpose of Choosing BodyPix 2.0 -- 5 Experimental Results -- 5.1 Accuracy Determination -- 5.2 Determining the Response Time -- 6 Conclusion -- References -- DDoS Attack Detection Using Artificial Neural Network -- 1 Introduction -- 2 Related Work -- 3 Data Set -- 3.1 Data Preparation -- 3.2 Sample Data Set -- 3.3 Feature Reduction -- 4 Normalization -- 4.1 Min-Max Algorithm -- 4.2 Label Encoding -- 4.3 Normalized Data Set -- 5 Back Propagation Neural Network -- 5.1 Algorithm -- 5.2 Back Propagation Neural Network (BPNN) Model.
6 Results -- 7 Conclusion -- References -- Click Ad Fraud Detection Using XGBoost Gradient Boosting Algorithm -- 1 Introduction -- 1.1 World of Internet Advertising -- 1.2 Online Advertising Fraud -- 1.3 Click Fraud -- 1.4 Sources of Click Fraud -- 1.5 Problems of Detecting Click Fraud -- 2 Related Work -- 3 Proposed Solution -- 3.1 Dataset -- 3.2 Exploratory Data Analysis -- 3.3 Feature Engineering -- 4 Modelling -- 5 Results and Analysis -- 5.1 Model Evaluation -- 5.2 Comparing Results -- 5.3 Evaluating the Features Selected for Models -- 6 Conclusion and Future Work -- References -- A Natural Language Processing Approach to Mine Online Reviews Using Topic Modelling -- 1 Introduction -- 1.1 Feedback of Products -- 1.2 Recovery of Information from Unstructured Text, Collection of Functions -- 1.3 Semi-supervised Topic Modelling in Tweets Based on Topic Modelling -- 1.4 Topic Modelling for Social Media in the Restaurant Based Industry -- 2 Related Work -- 3 Method -- 4 Conclusions -- References -- An Implementation and Combining of Hybrid and Content Based and Collaborative Filtering Algorithms for the Higher Performance of Recommended Sytems -- 1 Introduction -- 2 Literature Survey -- 2.1 Content Based Recommenders (CBR) -- 2.2 Collaborative Filtering (CF) -- 3 Hybrid Recommended Systems Concept -- 4 Categorization of Hybrid Recommended Systems -- 4.1 Monolithic Hybrids -- 4.2 Parallelized Hybrids -- 4.3 Pipelined Hybrids -- 5 Similarity Metrices -- 5.1 Cosine Metrices -- 5.2 Adjusted Cosine Metrices -- 6 Road Map for Hybrid Recommended Systems -- 7 Train/Test of Dataset -- 8 Building Customized Algorithm and Evaluation on the Top of SurpriseLib -- 9 Evaluation of Recommender Systems -- 10 Step by Step Implementation and Experimental Setup of Recommender Systems Algorithm -- 11 Result and Discussions -- 12 Conclusion -- References. Event-Related Potential Classification Based on EEG Data Using xDWAN with MDM and KNN -- 1 Introduction -- 2 Related Work -- 3 Data Description -- 4 Proposed Methodology -- 4.1 EEGNet Model: Compact Convolutional Neural Network (Compact-CNN) -- 4.2 xDAWN Spatial Filtering -- 4.3 xDAWAN with Riemannian Geometry -- 4.4 Classification -- 5 Result and Discussion -- 6 Conclusion and Future Work -- References -- Oil Spill Discrimination of SAR Satellite Images Using Deep Learning Based Semantic Segmentation -- 1 Introduction -- 2 Related Work -- 3 Problem Formulation -- 4 Image Datasets -- 5 Proposed Method -- 5.1 Image Preprocessing -- 5.2 Semantic Segmentation -- 6 Performance Measures -- 7 Results and Findings -- 7.1 Based on Filters -- 7.2 Based on Datasets -- 7.3 Based on Segmentation -- 8 Conclusion -- References -- Sentiment Analysis of Bangla Language Using Deep Learning Approaches -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Database Formation -- 3.2 Word Embedding -- 3.3 Convolutional Neural Network (CNN) -- 3.4 Long Short-Term Memory (LSTM) -- 3.5 CNN-LSTM -- 4 Result and Analysis -- 5 Conclusions -- References -- Networking and Communications -- Bit Error Rate Analysis of Optical Switch Buffer in Presence of Dispersion and Optical Amplifier Noise -- 1 Introduction -- 1.1 Novelty -- 1.2 Research Contributions -- 1.3 Layout -- 2 The Proposed Optical Switch Design -- 3 Performance Evaluation of the Proposed Switch -- 4 Conclusions and Future Work -- References -- Experimenting with Scalability of Software Defined Networks Using Pyretic and Frenetic -- 1 Introduction -- 2 Related Work -- 2.1 SDN - Software Defined Networks Architecture -- 2.2 Frenetic: A Network Programming Language -- 2.3 Modular SDN Programming with Pyretic -- 2.4 Research Gap and Motivation -- 3 FRENETIC and PYRETIC -- 3.1 Frenetic. 3.2 Pyretic (Python + Frenetic) -- 3.3 Pyretic Network Policies -- 3.4 Pyretic Features -- 4 Tools, Techniques and Simulation Environment -- 5 Experimental Procedure -- 5.1 Running Pyretic with Mininet -- 5.2 Generating Topologies -- 5.3 Traffic Generation and Logging Network Events -- 5.4 Graph Generation -- 6 Performance Metrics and Result Discussions -- 6.1 Throughput -- 6.2 Jitter -- 6.3 Latency -- 7 Conclusion -- 8 Future Work -- References -- Design and Implementation of Lightweight Dynamic Elliptic Curve Cryptography Using Schoof's Algorithm -- 1 Introduction -- 2 Design and Idea of Elliptic Curve Cryptography -- 2.1 Basic Idea Behind Elliptic Curve Cryptography -- 2.2 Limitation in Other Techniques -- 3 Preliminary Work -- 3.1 Elliptic Curves -- 3.2 Point Addition -- 3.3 Scalar Multiplication -- 3.4 Elliptic Curve Cryptography -- 3.5 Schoof's Algorithm -- 4 Proposed Dynamic Elliptic Curve Cryptography -- 4.1 Randomising the Constants -- 4.2 Counting the Points of Elliptic Curve -- 4.3 Randomly Choosing a Generator Point -- 4.4 Flowchart -- 5 Results -- 6 Conclusion -- References -- QRP: QPSO Based Routing Protocol for Energy Efficiency in Wireless Body Area Networks -- 1 Introduction -- 2 Related Work -- 2.1 Novelty -- 3 Preliminaries -- 3.1 Particle Swarm Optimization -- 3.2 Quantum-Inspired Particle Swarm Optimization -- 4 Materials and Methods -- 4.1 Networking Model -- 4.2 Energy Model -- 4.3 Path-Loss Model -- 4.4 Proposed Approach -- 5 Results and Discussions -- 5.1 Throughput -- 5.2 Residual Energy -- 5.3 Network Lifetime -- 5.4 Packets Sent to Sink -- 5.5 Packet Dropped -- 5.6 Path-Loss -- 6 Conclusion and Future Scope -- References -- Investigation of Alibaba Cloud Data Set for Resource Management in Cloud Computing -- 1 Introduction -- 2 Understanding Ali Baba Dataset -- 2.1 Resource Utilization Information. 2.2 Online Service (Container) -- 2.3 Online Request Table (Containerevent.csv) -- 2.4 Batch Workload -- 3 Data Analysis -- 3.1 Utilization and Summary of Data -- 3.2 Overall Utilization -- 3.3 Characterized Workload -- 3.4 Recent Research for the Dataset -- 4 Conclusion -- References -- A Hybrid Approach Based on ACO and Firefly Algorithm for Routing in FANETs -- 1 Introduction -- 2 Literature Review -- 3 Existing Algorithm -- 3.1 Ant Colony Optimization (ACO) -- 3.2 Firefly Algorithm -- 4 Proposed Algorithm -- 5 Parameters and Methods -- 5.1 Simulation Platform -- 5.2 Simulation Parameters -- 5.3 Performance Parameters -- 6 Results and Discussion -- 7 Conclusion -- References -- RC-Security Mechanism to Prevent Attacks on IoT Smart Switch -- 1 Introduction -- 1.1 Impacts of Attack -- 2 Review on IoT Security Solutions -- 2.1 Classification Hierarchy of DOS -- 3 Methodology -- 3.1 Experimental Setup for the IoT Smart Switch -- 3.2 Flow of the Experimental Setup -- 3.3 Request Capturing Security Mechanism (RCSM) -- 4 Results and Experiments -- 4.1 Attack Scenario -- 4.2 Mitigating Attacks -- 5 Conclusion and Future Work -- References -- Identifying the Impacts of Node Mobility on Network Layer Based Active and Passive Attacks in Mobile Ad Hoc Networks: A Simulation Perspective -- 1 Introduction -- 2 Literature Review -- 3 State of the Art -- 4 Methodology -- 5 Results and Discussion -- 6 Conclusion and Future Works -- References -- Simulated Analysis of Double-Gate MOSFET and FinFET Structure Using High-k Materials -- 1 Introduction -- 2 Short Channel Effects (SCEs) -- 3 Double-Gate MOSFET Device Structure -- 4 FinFET Device Structure -- 5 Performance Evaluation by High-k Materials -- 5.1 Concept of High-k Dielectrics -- 5.2 Choice of High-k Oxide -- 5.3 The Observed Design -- 6 Implementation -- 7 Simulation Results -- 8 Conclusion -- 9 Future Scope. References. |
Record Nr. | UNISA-996464525203316 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computing science, communication and security : second international conference, COMS2 2021, Gujarat, India, February 6-7, 2021 : revised selected papers / / Nirbhay Chaubey, Satyen Parikh, Kiran Amin (editors) |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XIV, 287 p. 178 illus., 132 illus. in color.) |
Disciplina | 004 |
Collana | Communications in computer and information science |
Soggetto topico | Computer science |
ISBN | 3-030-76776-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Artificial Intelligence and Machine Learning -- Data Balancing for Credit Card Fraud Detection Using Complementary Neural Networks and SMOTE Algorithm -- 1 Introduction -- 2 Literature Review -- 3 Dataset Description -- 4 Proposed Method -- 4.1 Data Balancing Network -- 4.2 Classification Algorithms -- 5 Results -- 5.1 Performance of CMTNN -- 5.2 Classification Results -- 6 Conclusions and Future Work -- References -- A Multi Class Classification for Detection of IoT Botnet Malware -- 1 Introduction -- 1.1 IoT Botnet -- 1.2 Briefing on IoT Botnet Attacks -- 2 Related Works -- 3 Data Collection and Preprocessing -- 3.1 Details About IoT-23 and MedBIoT DataSet -- 3.2 Log Extraction Using Zeek -- 3.3 Samples and Features Considered -- 3.4 KNN Imputation -- 4 Building a Classifier and Implementing GAN -- 4.1 Ensemble Approach -- 4.2 Applying Conditional Generative Adversarial Networks (CTGAN) -- 5 Results and Discussion -- 6 Conclusion and Future Work -- References -- An AI-Based Solution to Reduce Undesired Face-Touching as a Precautionary Measure for COVID-19 -- 1 Introduction -- 2 Proposed System -- 3 Methodology and Algorithmic Explanation -- 3.1 Introduction to BodyPix 2.0 -- 3.2 Working -- 4 Comparative Analysis of Existing Detection Methods -- 4.1 Available Models -- 4.2 Purpose of Choosing BodyPix 2.0 -- 5 Experimental Results -- 5.1 Accuracy Determination -- 5.2 Determining the Response Time -- 6 Conclusion -- References -- DDoS Attack Detection Using Artificial Neural Network -- 1 Introduction -- 2 Related Work -- 3 Data Set -- 3.1 Data Preparation -- 3.2 Sample Data Set -- 3.3 Feature Reduction -- 4 Normalization -- 4.1 Min-Max Algorithm -- 4.2 Label Encoding -- 4.3 Normalized Data Set -- 5 Back Propagation Neural Network -- 5.1 Algorithm -- 5.2 Back Propagation Neural Network (BPNN) Model.
6 Results -- 7 Conclusion -- References -- Click Ad Fraud Detection Using XGBoost Gradient Boosting Algorithm -- 1 Introduction -- 1.1 World of Internet Advertising -- 1.2 Online Advertising Fraud -- 1.3 Click Fraud -- 1.4 Sources of Click Fraud -- 1.5 Problems of Detecting Click Fraud -- 2 Related Work -- 3 Proposed Solution -- 3.1 Dataset -- 3.2 Exploratory Data Analysis -- 3.3 Feature Engineering -- 4 Modelling -- 5 Results and Analysis -- 5.1 Model Evaluation -- 5.2 Comparing Results -- 5.3 Evaluating the Features Selected for Models -- 6 Conclusion and Future Work -- References -- A Natural Language Processing Approach to Mine Online Reviews Using Topic Modelling -- 1 Introduction -- 1.1 Feedback of Products -- 1.2 Recovery of Information from Unstructured Text, Collection of Functions -- 1.3 Semi-supervised Topic Modelling in Tweets Based on Topic Modelling -- 1.4 Topic Modelling for Social Media in the Restaurant Based Industry -- 2 Related Work -- 3 Method -- 4 Conclusions -- References -- An Implementation and Combining of Hybrid and Content Based and Collaborative Filtering Algorithms for the Higher Performance of Recommended Sytems -- 1 Introduction -- 2 Literature Survey -- 2.1 Content Based Recommenders (CBR) -- 2.2 Collaborative Filtering (CF) -- 3 Hybrid Recommended Systems Concept -- 4 Categorization of Hybrid Recommended Systems -- 4.1 Monolithic Hybrids -- 4.2 Parallelized Hybrids -- 4.3 Pipelined Hybrids -- 5 Similarity Metrices -- 5.1 Cosine Metrices -- 5.2 Adjusted Cosine Metrices -- 6 Road Map for Hybrid Recommended Systems -- 7 Train/Test of Dataset -- 8 Building Customized Algorithm and Evaluation on the Top of SurpriseLib -- 9 Evaluation of Recommender Systems -- 10 Step by Step Implementation and Experimental Setup of Recommender Systems Algorithm -- 11 Result and Discussions -- 12 Conclusion -- References. Event-Related Potential Classification Based on EEG Data Using xDWAN with MDM and KNN -- 1 Introduction -- 2 Related Work -- 3 Data Description -- 4 Proposed Methodology -- 4.1 EEGNet Model: Compact Convolutional Neural Network (Compact-CNN) -- 4.2 xDAWN Spatial Filtering -- 4.3 xDAWAN with Riemannian Geometry -- 4.4 Classification -- 5 Result and Discussion -- 6 Conclusion and Future Work -- References -- Oil Spill Discrimination of SAR Satellite Images Using Deep Learning Based Semantic Segmentation -- 1 Introduction -- 2 Related Work -- 3 Problem Formulation -- 4 Image Datasets -- 5 Proposed Method -- 5.1 Image Preprocessing -- 5.2 Semantic Segmentation -- 6 Performance Measures -- 7 Results and Findings -- 7.1 Based on Filters -- 7.2 Based on Datasets -- 7.3 Based on Segmentation -- 8 Conclusion -- References -- Sentiment Analysis of Bangla Language Using Deep Learning Approaches -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Database Formation -- 3.2 Word Embedding -- 3.3 Convolutional Neural Network (CNN) -- 3.4 Long Short-Term Memory (LSTM) -- 3.5 CNN-LSTM -- 4 Result and Analysis -- 5 Conclusions -- References -- Networking and Communications -- Bit Error Rate Analysis of Optical Switch Buffer in Presence of Dispersion and Optical Amplifier Noise -- 1 Introduction -- 1.1 Novelty -- 1.2 Research Contributions -- 1.3 Layout -- 2 The Proposed Optical Switch Design -- 3 Performance Evaluation of the Proposed Switch -- 4 Conclusions and Future Work -- References -- Experimenting with Scalability of Software Defined Networks Using Pyretic and Frenetic -- 1 Introduction -- 2 Related Work -- 2.1 SDN - Software Defined Networks Architecture -- 2.2 Frenetic: A Network Programming Language -- 2.3 Modular SDN Programming with Pyretic -- 2.4 Research Gap and Motivation -- 3 FRENETIC and PYRETIC -- 3.1 Frenetic. 3.2 Pyretic (Python + Frenetic) -- 3.3 Pyretic Network Policies -- 3.4 Pyretic Features -- 4 Tools, Techniques and Simulation Environment -- 5 Experimental Procedure -- 5.1 Running Pyretic with Mininet -- 5.2 Generating Topologies -- 5.3 Traffic Generation and Logging Network Events -- 5.4 Graph Generation -- 6 Performance Metrics and Result Discussions -- 6.1 Throughput -- 6.2 Jitter -- 6.3 Latency -- 7 Conclusion -- 8 Future Work -- References -- Design and Implementation of Lightweight Dynamic Elliptic Curve Cryptography Using Schoof's Algorithm -- 1 Introduction -- 2 Design and Idea of Elliptic Curve Cryptography -- 2.1 Basic Idea Behind Elliptic Curve Cryptography -- 2.2 Limitation in Other Techniques -- 3 Preliminary Work -- 3.1 Elliptic Curves -- 3.2 Point Addition -- 3.3 Scalar Multiplication -- 3.4 Elliptic Curve Cryptography -- 3.5 Schoof's Algorithm -- 4 Proposed Dynamic Elliptic Curve Cryptography -- 4.1 Randomising the Constants -- 4.2 Counting the Points of Elliptic Curve -- 4.3 Randomly Choosing a Generator Point -- 4.4 Flowchart -- 5 Results -- 6 Conclusion -- References -- QRP: QPSO Based Routing Protocol for Energy Efficiency in Wireless Body Area Networks -- 1 Introduction -- 2 Related Work -- 2.1 Novelty -- 3 Preliminaries -- 3.1 Particle Swarm Optimization -- 3.2 Quantum-Inspired Particle Swarm Optimization -- 4 Materials and Methods -- 4.1 Networking Model -- 4.2 Energy Model -- 4.3 Path-Loss Model -- 4.4 Proposed Approach -- 5 Results and Discussions -- 5.1 Throughput -- 5.2 Residual Energy -- 5.3 Network Lifetime -- 5.4 Packets Sent to Sink -- 5.5 Packet Dropped -- 5.6 Path-Loss -- 6 Conclusion and Future Scope -- References -- Investigation of Alibaba Cloud Data Set for Resource Management in Cloud Computing -- 1 Introduction -- 2 Understanding Ali Baba Dataset -- 2.1 Resource Utilization Information. 2.2 Online Service (Container) -- 2.3 Online Request Table (Containerevent.csv) -- 2.4 Batch Workload -- 3 Data Analysis -- 3.1 Utilization and Summary of Data -- 3.2 Overall Utilization -- 3.3 Characterized Workload -- 3.4 Recent Research for the Dataset -- 4 Conclusion -- References -- A Hybrid Approach Based on ACO and Firefly Algorithm for Routing in FANETs -- 1 Introduction -- 2 Literature Review -- 3 Existing Algorithm -- 3.1 Ant Colony Optimization (ACO) -- 3.2 Firefly Algorithm -- 4 Proposed Algorithm -- 5 Parameters and Methods -- 5.1 Simulation Platform -- 5.2 Simulation Parameters -- 5.3 Performance Parameters -- 6 Results and Discussion -- 7 Conclusion -- References -- RC-Security Mechanism to Prevent Attacks on IoT Smart Switch -- 1 Introduction -- 1.1 Impacts of Attack -- 2 Review on IoT Security Solutions -- 2.1 Classification Hierarchy of DOS -- 3 Methodology -- 3.1 Experimental Setup for the IoT Smart Switch -- 3.2 Flow of the Experimental Setup -- 3.3 Request Capturing Security Mechanism (RCSM) -- 4 Results and Experiments -- 4.1 Attack Scenario -- 4.2 Mitigating Attacks -- 5 Conclusion and Future Work -- References -- Identifying the Impacts of Node Mobility on Network Layer Based Active and Passive Attacks in Mobile Ad Hoc Networks: A Simulation Perspective -- 1 Introduction -- 2 Literature Review -- 3 State of the Art -- 4 Methodology -- 5 Results and Discussion -- 6 Conclusion and Future Works -- References -- Simulated Analysis of Double-Gate MOSFET and FinFET Structure Using High-k Materials -- 1 Introduction -- 2 Short Channel Effects (SCEs) -- 3 Double-Gate MOSFET Device Structure -- 4 FinFET Device Structure -- 5 Performance Evaluation by High-k Materials -- 5.1 Concept of High-k Dielectrics -- 5.2 Choice of High-k Oxide -- 5.3 The Observed Design -- 6 Implementation -- 7 Simulation Results -- 8 Conclusion -- 9 Future Scope. References. |
Record Nr. | UNINA-9910483760803321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|