


default search action
COMS2 2022: Gujarat, India
- Nirbhay Chaubey

, Sabu M. Thampi
, Noor Zaman Jhanjhi
:
Computing Science, Communication and Security - Third International Conference, COMS2 2022, Gujarat, India, February 6-7, 2022, Revised Selected Papers. Communications in Computer and Information Science 1604, Springer 2022, ISBN 978-3-031-10550-0 - Abhijit Chatterjee:

Development of Smart Sensor for IoT Based Environmental Data Analysis Through Edge Computing. 1-10 - Sunil K. Moon:

Application of Forensic Audio-Video Steganography Technique to Improve Security, Robustness, and Authentication of Secret Data. 11-25 - Neha N. Chaubey

, Lindon Falconer, Rakhee
:
An Efficient Cluster Based Energy Routing Protocol (E-CBERP) for Wireless Body Area Networks Using Soft Computing Technique. 26-39 - Ruchi Dhall, Rohan Kishore, Sarang Dhongdi:

Ortho Image Mosaicing and Object Identification of UAV Data. 40-53 - Niravkumar D. Patel

, Vijay K. Patel
:
The Novel Approach of Down-Link Spectral Efficiency Enhancement Using Massive MIMO in Correlated Rician Fading Scenario. 54-68 - Promod Kumar Sahu

, Hemanta Kumar Pati
, Sateesh Kumar Pradhan:
Blocking Estimation Using Optimal Guard Channel Policy in GSM 900 System. 69-81 - Dharmesh D. Dave

, Digvijaysinh Rathod
:
Systematic Review on Various Techniques of Android Malware Detection. 82-99 - D. Raghunatharao

, T. Jayachandra Prasad, M. N. Giri Prasad:
Adaptive Rider Grey Wolf Optimization Enabled Pilot-Design for Channel Estimation in Cognitive Radio. 100-116 - Shivam Pujari, Hardwari Lal Mandoria

, R. P. Shrivastava, Rajesh Singh:
To Identify Malware Using Machine Learning Algorithms. 117-127 - Abhilasha Nakra, Manoj Duhan:

Motor Imagery EEG Signal Classification Using Deep Neural Networks. 128-140 - Dhulfiqar Talib Abbas AL-Janabi, Dalal Abdulmohsin Hammood, Seham Ahmed Hashem:

Extending WSN Life-Time Using Energy Efficient Based on K-means Clustering Method. 141-154 - Meenakshi Sharma

, Nityananda Sarma
:
One-to-One Matching for Cooperative Resource Sharing and Communication in CRNs. 155-168 - Gaurav Pramod Kachare, Gaurav Choudhary

, Shishir Kumar Shandilya, Vikas Sihag:
Sandbox Environment for Real Time Malware Analysis of IoT Devices. 169-183 - Sweta Dargad, Pooja Thakkar, Sangeeta Giri:

Machine Learning for Classification of DOS Attack in Smart Healthcare Networks. 184-197 - Shubhashish Goswami

, Abhimanyu Kumar:
Traffic Flow Prediction Using Deep Learning Techniques. 198-213 - T. Lavanya Suja

, B. Booba
:
Meta Heuristic Backtracking Algorithm for Virtual Machine Placement in Cloud Computing Migration. 214-225 - Vishal Barot

, Ritesh Patel
:
Achieving Energy Efficiency in Life-Logging Applications of Internet of Things Using Data Compression Through Incorporation of Machine Learning and Edge-Cloud Architecture. 226-243 - Kevan Mehta, Aashil Shah, Samir Patel

:
Cab Fare Prediction Using Machine Learning. 244-254 - Md. Tabrej Khan

, Ashish Adholiya
:
Device to Device Communication over 5G. 255-273 - S. Prabhavathi

, V. Saminadan:
Energy Efficient Allocation of Resources in NOMA Based (MU-HCRN) with Perfect Spectrum Sensing. 274-285 - Shreedhar Bhatt, Neev Shah, Samir Patel

:
CV Based Person Detection System for Smart Transportation. 286-295 - Abbas Aqeel Kareem

, Dalal Abdulmohsin Hammood, Ahmed A. Alchalaby
, Ruaa Ali Khamees:
A Performance of Low-Cost NVIDIA Jetson Nano Embedded System in the Real-Time Siamese Single Object Tracking: A Comparison Study. 296-310

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














