


default search action
COMS2 2024: Mehsana, Gujarat, India
- Nirbhay Chaubey

, Noor Zaman Jhanjhi
, Sabu M. Thampi
, Satyen Parikh
, Kiran Amin
:
Computing Science, Communication and Security - 5th International Conference, COMS2 2024, Mehsana, Gujarat, India, February 6-7, 2024, Proceedings. Communications in Computer and Information Science 2174, Springer 2025, ISBN 978-3-031-75169-1 - Amit Biswas

, Neha N. Chaubey
, Nirbhay Kumar Chaubey
:
Design and Performance Analysis of High Efficiency Propulsion System for VTOL Applications. 1-15 - Benazir Neha

, Sanjaya Kumar Panda
, Pradip Kumar Sahu
:
Osmotic Computing-Based Task Offloading: A Fuzzy Logic-Based Approach. 16-30 - Akhilesh Ladha

, Archana M. Nayak
, Nirbhay Kumar Chaubey
:
Traveler's Demand Reactive Dynamic Online Bus Routing [TraDeR-DOBR] to Improvize Comfort Perception in Intelligent Public Transport System. 31-47 - Dipti Sharma

, Ashutosh Tripathi
, Meet Kumari
:
High-Speed FSO System for Future Generation Networks for Long Reach. 48-62 - Subrat Kumar Sethi

, Arunanshu Mahapatro
:
Mitigating PAPR Challenges in Massive MIMO Systems for CR-IoT Networks: A Graeco-Latin Square Approach. 63-77 - V. Sanvika, Indrasen Singh

, Madala Poorna Chandra, Joshith Reddy:
Performance Analysis of IoT Network over 5G Communication. 78-88 - Keyurbhai A. Jani

, Nirbhay Kumar Chaubey
, Esan Panchal
, Pramod Tripathi
, Shruti Yagnik
:
IoT-Based Convolutional Neural Networks in a Farm Pest Detection Using Transfer Learning. 89-101 - Hetal Shah

, Vinay Thumar:
Performance Comparison of NOMA Vehicular Communications Under Shadow Fading. 102-116 - Nishant Sanghani, Gunjani Vaghela, Bhavesh Borisaniya

:
Detecting Distributed Denial of Service (DDoS) Attacks in a Multi-controller SDN Environment Utilizing Machine Learning. 117-132 - Kripa Patel

, Nisarg Vala, Mitesh Limachia
, Purvang Dalal
:
Comprehensive Study of Short Channel Effects (SCEs) in MOSFET and FinFET Devices. 133-144 - Veeramuthu Venkatesh

, Pethuru Raj
, Roshitha Nedium, Jahnavi Edara, Kalluru Amarnath Reddy, R. Anushiadevi
:
A Machine Learning (ML)-Inspired Method for Intrusion Detection in IoT Devices Networks. 145-160 - N. Nathiya

, C. Rajan
, K. Geetha
, S. Dinesh
, S. Aruna
, B. M. Brinda
:
An Anomaly - Misuse Hybrid System for Efficient Intrusion Detection in Clustered Wireless Sensor Network Using Neural Network. 161-175 - Dhananjay Yadav

, Nirbhay Kumar Chaubey
:
Detection and Prevention of Black Hole Attack and Sybil Attack in Vehicular Ad Hoc Networks. 176-189 - N. Neelima

, P. Syam Pratap, P. Satya Kiran:
Cognitive Ad Hoc Trust Routing for Enhanced Quality of Service. 190-204 - Divyanshi Goyal

, Sonam
, Anjali Yadav, Manan Alfred, Rahul Johari
:
Routing in IoT Network Using NetSim Simulator. 205-215 - K. Janshi Lakshmi

, G. Sreenivasulu
:
A Novel Approach of SHA-3-512bits Using Keccak Technique Based on Sponge Function Implementation on FPGA. 216-228 - D. Raghunatha Rao

, T. Jayachandra Prasad
, D. Satyanarayana
, Saritha Bai Gaddale, Kadiyala Raghavendra
, T. Hussaini:
Cooperative Spectrum Sensing in Cognitive Radio Network Using Adaptive Walruses Optimization Algorithm. 229-244 - D. Eben Angel Pauline

:
Catalan's Conjecture and Elliptic Curve Cryptography (CCECC) Algorithm for Enhancing Data Security During Data Transmission in MANET. 245-254 - Aditi Jain

, Aditya Shenoy, Ananya Adiga, Anirudha Anekal
, Saritha Prajwal
:
Monitoring the Concentration of Air Pollutants and Its Health Hazards Using Machine Learning Models. 255-269 - Anushka Gupta

, Aayush Dubey, Abhay Hiremath
, V. Anirruth
, Jeny Jijo
:
Containment of Compromised Nodes in a Distributed Environment. 270-281 - Devasenathipathi N. Mudaliar

, Nilesh Modi
, Jyotindra Dharwa
:
A Novel Approach to Solve Network Security, Cryptography Problems Using Genetic Algorithm. 282-293 - Binaya Kumar Patra

, Sarojananda Mishra
, Sanjay Kumar Patra
, Ashutosh Mallik
, Souveek Roy
:
Intelligent Agent Based Clustering and Optimal Multipath Routing for Energy-Efficient Wireless Sensor Networks in Smart City Applications: A Distributed AI-Driven Approach. 294-307 - Prakash Kuppuswamy

, Saeed Q. Al-Khalidi Al-Maliki
, Rajan John
, Mohan Mani:
A Novel Symmetric Key Based Authentication Scheme that Saves Energy for Edge Devices of the Internet of Things. 308-319 - Safia Gul

, Bilal Ahmad Malik
, M. Tariq Banday
:
Objective Functions in High-Density Internet of Things Networks - A Performance Evaluation. 320-333 - Dhaval Fichadia, Nikeeta Shah, Bhavesh Soni

:
Enhancing ASIC Design Efficiency: A Focus on RTL Verification with Spyglass. 334-344 - Misgana M. Iticha

, Ketema Adere Gemeda
, Samuel S. Tadesse
:
Enhancement in AOMDV Routing Protocol to Overcome Congestion Problem in MANET. 345-358 - Dhaval Fichadia, Kishor Purohit, Bhavesh Soni

:
Performance Evaluation of Parallel Processing Adder Against Basic Adders on FPGAs. 359-372 - Hrishabh Joshi

, Sharon Justine
, Panchami V
, Beeraka Hrithik:
A Decentralised Application for Medical Insurance Claim System Using Blockchain Technology. 373-387 - Priyanka Patel

, Amrut Patel
, Manish Patel
:
Performance Analysis of Energy Efficient Routing Protocols in Wireless Sensor Networks. 388-400 - Kaliannan Sivanandam

, R. Sathana:
Design of Performance Enhanced Approximate Multiplier for Image Processing Applications. 401-410 - Rajat R. Sahu, Mitur Patel, Bhavesh Soni

, Jignesh J. Patoliya
:
Design and Optimization in SPI Master at the RTL Level. 411-422

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














