


default search action
COMS2 2024: Mehsana, Gujarat, India
- Nirbhay Chaubey
, Noor Zaman Jhanjhi
, Sabu M. Thampi
, Satyen Parikh
, Kiran Amin
:
Computing Science, Communication and Security - 5th International Conference, COMS2 2024, Mehsana, Gujarat, India, February 6-7, 2024, Proceedings. Communications in Computer and Information Science 2174, Springer 2025, ISBN 978-3-031-75169-1 - Amit Biswas
, Neha N. Chaubey
, Nirbhay Kumar Chaubey
:
Design and Performance Analysis of High Efficiency Propulsion System for VTOL Applications. 1-15 - Benazir Neha
, Sanjaya Kumar Panda
, Pradip Kumar Sahu
:
Osmotic Computing-Based Task Offloading: A Fuzzy Logic-Based Approach. 16-30 - Akhilesh Ladha
, Archana M. Nayak
, Nirbhay Kumar Chaubey
:
Traveler's Demand Reactive Dynamic Online Bus Routing [TraDeR-DOBR] to Improvize Comfort Perception in Intelligent Public Transport System. 31-47 - Dipti Sharma, Ashutosh Tripathi
, Meet Kumari
:
High-Speed FSO System for Future Generation Networks for Long Reach. 48-62 - Subrat Kumar Sethi
, Arunanshu Mahapatro
:
Mitigating PAPR Challenges in Massive MIMO Systems for CR-IoT Networks: A Graeco-Latin Square Approach. 63-77 - V. Sanvika, Indrasen Singh
, Madala Poorna Chandra, Joshith Reddy:
Performance Analysis of IoT Network over 5G Communication. 78-88 - Keyurbhai A. Jani
, Nirbhay Kumar Chaubey
, Esan Panchal
, Pramod Tripathi
, Shruti Yagnik
:
IoT-Based Convolutional Neural Networks in a Farm Pest Detection Using Transfer Learning. 89-101 - Hetal Shah
, Vinay Thumar:
Performance Comparison of NOMA Vehicular Communications Under Shadow Fading. 102-116 - Nishant Sanghani, Gunjani Vaghela, Bhavesh Borisaniya
:
Detecting Distributed Denial of Service (DDoS) Attacks in a Multi-controller SDN Environment Utilizing Machine Learning. 117-132 - Kripa Patel, Nisarg Vala, Mitesh Limachia
, Purvang Dalal
:
Comprehensive Study of Short Channel Effects (SCEs) in MOSFET and FinFET Devices. 133-144 - Veeramuthu Venkatesh
, Pethuru Raj
, Roshitha Nedium, Jahnavi Edara, Kalluru Amarnath Reddy, R. Anushiadevi
:
A Machine Learning (ML)-Inspired Method for Intrusion Detection in IoT Devices Networks. 145-160 - N. Nathiya, C. Rajan
, K. Geetha
, S. Dinesh, S. Aruna, B. M. Brinda:
An Anomaly - Misuse Hybrid System for Efficient Intrusion Detection in Clustered Wireless Sensor Network Using Neural Network. 161-175 - Dhananjay Yadav
, Nirbhay Kumar Chaubey
:
Detection and Prevention of Black Hole Attack and Sybil Attack in Vehicular Ad Hoc Networks. 176-189 - N. Neelima
, P. Syam Pratap, P. Satya Kiran:
Cognitive Ad Hoc Trust Routing for Enhanced Quality of Service. 190-204 - Divyanshi Goyal, Sonam
, Anjali Yadav, Manan Alfred, Rahul Johari
:
Routing in IoT Network Using NetSim Simulator. 205-215 - K. Janshi Lakshmi
, G. Sreenivasulu:
A Novel Approach of SHA-3-512bits Using Keccak Technique Based on Sponge Function Implementation on FPGA. 216-228 - D. Raghunatha Rao
, T. Jayachandra Prasad
, D. Satyanarayana
, Saritha Bai Gaddale, Kadiyala Raghavendra
, T. Hussaini:
Cooperative Spectrum Sensing in Cognitive Radio Network Using Adaptive Walruses Optimization Algorithm. 229-244 - D. Eben Angel Pauline
:
Catalan's Conjecture and Elliptic Curve Cryptography (CCECC) Algorithm for Enhancing Data Security During Data Transmission in MANET. 245-254 - Aditi Jain, Aditya Shenoy, Ananya Adiga, Anirudha Anekal, Saritha Prajwal
:
Monitoring the Concentration of Air Pollutants and Its Health Hazards Using Machine Learning Models. 255-269 - Anushka Gupta, Aayush Dubey, Abhay Hiremath, V. Anirruth, Jeny Jijo
:
Containment of Compromised Nodes in a Distributed Environment. 270-281 - Devasenathipathi N. Mudaliar, Nilesh Modi
, Jyotindra Dharwa:
A Novel Approach to Solve Network Security, Cryptography Problems Using Genetic Algorithm. 282-293 - Binaya Kumar Patra
, Sarojananda Mishra
, Sanjay Kumar Patra
, Ashutosh Mallik, Souveek Roy:
Intelligent Agent Based Clustering and Optimal Multipath Routing for Energy-Efficient Wireless Sensor Networks in Smart City Applications: A Distributed AI-Driven Approach. 294-307 - Prakash Kuppuswamy
, Sayeed Q. Al-Khalidi Al-Maliki
, Rajan John
, Mohan Mani:
A Novel Symmetric Key Based Authentication Scheme that Saves Energy for Edge Devices of the Internet of Things. 308-319 - Safia Gul
, Bilal Ahmad Malik
, M. Tariq Banday
:
Objective Functions in High-Density Internet of Things Networks - A Performance Evaluation. 320-333 - Dhaval Fichadia, Nikeeta Shah, Bhavesh Soni
:
Enhancing ASIC Design Efficiency: A Focus on RTL Verification with Spyglass. 334-344 - Misgana M. Iticha, Ketema Adere Gemeda
, Samuel S. Tadesse
:
Enhancement in AOMDV Routing Protocol to Overcome Congestion Problem in MANET. 345-358 - Dhaval Fichadia, Kishor Purohit, Bhavesh Soni
:
Performance Evaluation of Parallel Processing Adder Against Basic Adders on FPGAs. 359-372 - Hrishabh Joshi, Sharon Justine, Panchami V
, Beeraka Hrithik:
A Decentralised Application for Medical Insurance Claim System Using Blockchain Technology. 373-387 - Priyanka Patel
, Amrut Patel
, Manish Patel
:
Performance Analysis of Energy Efficient Routing Protocols in Wireless Sensor Networks. 388-400 - K. Sivanandam
, R. Sathana:
Design of Performance Enhanced Approximate Multiplier for Image Processing Applications. 401-410 - Rajat R. Sahu, Mitur Patel, Bhavesh Soni
, Jignesh J. Patoliya
:
Design and Optimization in SPI Master at the RTL Level. 411-422

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.