


default search action
COMS2 2022: Gujarat, India
- Nirbhay Chaubey
, Sabu M. Thampi
, Noor Zaman Jhanjhi
:
Computing Science, Communication and Security - Third International Conference, COMS2 2022, Gujarat, India, February 6-7, 2022, Revised Selected Papers. Communications in Computer and Information Science 1604, Springer 2022, ISBN 978-3-031-10550-0 - Abhijit Chatterjee:
Development of Smart Sensor for IoT Based Environmental Data Analysis Through Edge Computing. 1-10 - Sunil K. Moon:
Application of Forensic Audio-Video Steganography Technique to Improve Security, Robustness, and Authentication of Secret Data. 11-25 - Neha N. Chaubey
, Lindon Falconer, Rakhee
:
An Efficient Cluster Based Energy Routing Protocol (E-CBERP) for Wireless Body Area Networks Using Soft Computing Technique. 26-39 - Ruchi Dhall, Rohan Kishore, Sarang Dhongdi:
Ortho Image Mosaicing and Object Identification of UAV Data. 40-53 - Niravkumar D. Patel
, Vijay K. Patel
:
The Novel Approach of Down-Link Spectral Efficiency Enhancement Using Massive MIMO in Correlated Rician Fading Scenario. 54-68 - Promod Kumar Sahu
, Hemanta Kumar Pati
, Sateesh Kumar Pradhan:
Blocking Estimation Using Optimal Guard Channel Policy in GSM 900 System. 69-81 - Dharmesh D. Dave
, Digvijaysinh Rathod
:
Systematic Review on Various Techniques of Android Malware Detection. 82-99 - D. Raghunatharao
, T. Jayachandra Prasad, M. N. Giri Prasad:
Adaptive Rider Grey Wolf Optimization Enabled Pilot-Design for Channel Estimation in Cognitive Radio. 100-116 - Shivam Pujari, H. L. Mandoria
, R. P. Shrivastava, Rajesh Singh:
To Identify Malware Using Machine Learning Algorithms. 117-127 - Abhilasha Nakra, Manoj Duhan:
Motor Imagery EEG Signal Classification Using Deep Neural Networks. 128-140 - Dhulfiqar Talib Abbas AL-Janabi, Dalal Abdulmohsin Hammood, Seham Ahmed Hashem:
Extending WSN Life-Time Using Energy Efficient Based on K-means Clustering Method. 141-154 - Meenakshi Sharma
, Nityananda Sarma
:
One-to-One Matching for Cooperative Resource Sharing and Communication in CRNs. 155-168 - Gaurav Pramod Kachare, Gaurav Choudhary
, Shishir Kumar Shandilya, Vikas Sihag:
Sandbox Environment for Real Time Malware Analysis of IoT Devices. 169-183 - Sweta Dargad, Pooja Thakkar, Sangeeta Giri:
Machine Learning for Classification of DOS Attack in Smart Healthcare Networks. 184-197 - Shubhashish Goswami
, Abhimanyu Kumar:
Traffic Flow Prediction Using Deep Learning Techniques. 198-213 - T. Lavanya Suja
, B. Booba
:
Meta Heuristic Backtracking Algorithm for Virtual Machine Placement in Cloud Computing Migration. 214-225 - Vishal Barot
, Ritesh Patel
:
Achieving Energy Efficiency in Life-Logging Applications of Internet of Things Using Data Compression Through Incorporation of Machine Learning and Edge-Cloud Architecture. 226-243 - Kevan Mehta, Aashil Shah, Samir Patel
:
Cab Fare Prediction Using Machine Learning. 244-254 - Md. Tabrej Khan
, Ashish Adholiya
:
Device to Device Communication over 5G. 255-273 - S. Prabhavathi
, V. Saminadan:
Energy Efficient Allocation of Resources in NOMA Based (MU-HCRN) with Perfect Spectrum Sensing. 274-285 - Shreedhar Bhatt, Neev Shah, Samir Patel
:
CV Based Person Detection System for Smart Transportation. 286-295 - Abbas Aqeel Kareem
, Dalal Abdulmohsin Hammood, Ahmed A. Alchalaby
, Ruaa Ali Khamees:
A Performance of Low-Cost NVIDIA Jetson Nano Embedded System in the Real-Time Siamese Single Object Tracking: A Comparison Study. 296-310

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.