03502nam 22007335 450 991101564010332120250702130301.0981-9648-83-110.1007/978-981-96-4883-2(MiAaPQ)EBC32196074(Au-PeEL)EBL32196074(CKB)39578209300041(DE-He213)978-981-96-4883-2(OCoLC)1528356485(EXLCZ)993957820930004120250702d2025 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierData Science and Security Proceedings of IDSCS 2024, Volume 2 /edited by Samiksha Shukla, Hiroki Sayama, Kapil Tiwari, Joseph Varghese Kureethara1st ed. 2025.Singapore :Springer Nature Singapore :Imprint: Springer,2025.1 online resource (472 pages)Lecture Notes in Networks and Systems,2367-3389 ;1355981-9648-82-3 Microsatellite Magnetic Cleanliness Based on Geometric Inverse Magneto Static Problem Solution -- An Intelligent Spam Email Detection System using Machine Learning -- Design and Development of Sustainable Apiculture Monitoring System by using AI&ML -- Leveraging Agentic Rag to Improve Contextual Understanding and Reduce Hallucinations in Large Language Models -- American Sign Language Recognition Using Yolo-Nas.This book presents best-selected papers presented at the International Conference on Data Science for Computational Security (IDSCS 2024), hosted by Christ (Deemed to be University), India, and technically sponsored by The Tejas Scientific Researcher Foundation, India, from 08–09 November, 2024. The book targets the current research works in the areas of data science, data security, data analytics, artificial intelligence, machine learning, computer vision, algorithms design, computer networking, data mining, big data, text mining, knowledge representation, soft computing, and cloud computing.Lecture Notes in Networks and Systems,2367-3389 ;1355Computational intelligenceArtificial intelligenceData structures (Computer science)Information theoryData protectionComputer networksSecurity measuresComputational IntelligenceArtificial IntelligenceData Structures and Information TheoryData and Information SecurityMobile and Network SecurityComputational intelligence.Artificial intelligence.Data structures (Computer science)Information theory.Data protection.Computer networksSecurity measures.Computational Intelligence.Artificial Intelligence.Data Structures and Information Theory.Data and Information Security.Mobile and Network Security.006.3Shukla Samiksha909758Sayama Hiroki1833187Tivārī Kapila1860469Kureethara Joseph Varghese1833188MiAaPQMiAaPQMiAaPQBOOK9911015640103321Data Science and Security4528537UNINA