000 04728nam a22005895i 4500
001 978-3-031-10551-7
003 DE-He213
005 20240423125344.0
007 cr nn 008mamaa
008 220701s2022 sz | s |||| 0|eng d
020 _a9783031105517
_9978-3-031-10551-7
024 7 _a10.1007/978-3-031-10551-7
_2doi
050 4 _aQ334-342
050 4 _aTA347.A78
072 7 _aUYQ
_2bicssc
072 7 _aCOM004000
_2bisacsh
072 7 _aUYQ
_2thema
082 0 4 _a006.3
_223
245 1 0 _aComputing Science, Communication and Security
_h[electronic resource] :
_bThird International Conference, COMS2 2022, Gujarat, India, February 6–7, 2022, Revised Selected Papers /
_cedited by Nirbhay Chaubey, Sabu M. Thampi, Noor Zaman Jhanjhi.
250 _a1st ed. 2022.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2022.
300 _aXVI, 311 p. 187 illus., 139 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aCommunications in Computer and Information Science,
_x1865-0937 ;
_v1604
505 0 _aDevelopment of Smart Sensor for IoT Based Environmental Data Analysis Through Edge Computing -- Application of Forensic Audio-Video Steganography Technique to Improve Security, Robustness, and Authentication of Secret Data -- An Efficient Cluster Based Energy Routing Protocol (E-CBERP) for Wireless Body Area Networks Using Soft Computing Technique -- Ortho Image Mosaicing and Object Detection of UAV Data -- The Novel Approach of Down-Link Spectral Efficiency Enhancement using Massive MIMO in Correlated Rician Fading Scenario -- Blocking Estimation using Optimal Guard Channel Policy in GSM 900 System -- Systematic Review on Various Techniques of Android Malware Detection -- Adaptive Rider Grey Wolf Optimization enabled Pilot-design for Channel Estimation in Cognitive Radio -- To Identify Malwares using Machine Learning Algorithms -- Motor Imagery EEG Signal Classification using Deep Neural Networks -- Extending WSN life-time using Energy Efficient based on K-means clustering method -- One-to-One Matching for Cooperative Resource Sharing and Communication in CRNs -- Sandbox Environment for Real Time Malware Analysis of IoT Devices -- Machine Learning Based DDOS Attack Detection in Design of 5G Smart Healthcare Networks -- Traffic Flow Prediction using Deep Learning Techniques -- Meta Heuristic Backtracking Algorithm for Virtual Machine Placement in Cloud Computing Migration -- Achieving Energy Efficiency in Life-logging Applications of Internet of Things using Data Compression through incorporation of Machine Learning & Edge-Cloud Architecture -- Cab Fare Prediction Using Machine Learning -- Device to Device Communication Over 5G -- Energy efficient Allocation of Resources in NOMA Based (MU-HCRN) with Perfect Spectrum Sensing -- CV based person detection system for smart transportation -- A Performance of Low-Cost NVIDIA Jetson Nano Embedded System in the Real-Time Siamese Single Object Tracking.
520 _aThis book constitutes revised selected papers of the Third International Conference on Computing Science, Communication and Security, COMS2 2022, held in Gandhinagar, India, in February 2022. Due to the COVID-19 pandemic the conference was held virtually. The 22 full papers were thoroughly reveiwed and selected from 143 submissions. The papers present ideas, and research results on the aspects of computing science, network communication, and security.
650 0 _aArtificial intelligence.
650 0 _aSoftware engineering.
650 0 _aComputer engineering.
650 0 _aComputer networks .
650 1 4 _aArtificial Intelligence.
650 2 4 _aSoftware Engineering.
650 2 4 _aComputer Engineering and Networks.
650 2 4 _aComputer Engineering and Networks.
700 1 _aChaubey, Nirbhay.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aThampi, Sabu M.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aJhanjhi, Noor Zaman.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031105500
776 0 8 _iPrinted edition:
_z9783031105524
830 0 _aCommunications in Computer and Information Science,
_x1865-0937 ;
_v1604
856 4 0 _uhttps://doi.org/10.1007/978-3-031-10551-7
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c177039
_d177039