LEADER 05854nam 22006495 450 001 9910878046603321 005 20240731125656.0 010 $a981-9725-50-X 024 7 $a10.1007/978-981-97-2550-2 035 $a(MiAaPQ)EBC31575144 035 $a(Au-PeEL)EBL31575144 035 $a(CKB)33566377600041 035 $a(DE-He213)978-981-97-2550-2 035 $a(EXLCZ)9933566377600041 100 $a20240731d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProceedings of Fifth International Conference on Computing, Communications, and Cyber-Security $eIC4S?05 Volume 1 /$fedited by Sudeep Tanwar, Pradeep Kumar Singh, Maria Ganzha, Gregory Epiphaniou 205 $a1st ed. 2024. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2024. 215 $a1 online resource (965 pages) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v991 311 $a981-9725-49-6 327 $aCompatibility Checking To Adopt MANET in LoRaWAN For Long Range Connectivity -- A Novel FR4-Based Slot Antenna with Circular Metasurface for Aerospace CubeSats -- Enabling Modern IoT Solutions with RFID Devices via an Integrated Feeding Network-fed Ultra-Wide HPBW Patch Antenna Array -- Design and Fabrication of PCB based Proximity Sensors for Application in Automatic Railway Crossing System -- Security Threats & Data Protection Methods Used in Cloud Computing: A Review -- Load Balancing Algorithms for Cloud Computing Performance: a Review -- Seamless Mobility: Innovating the Digital Service Landscape in Telecom Industry -- Pandemic Pulse: Unveiling Insights with the Global Health Tracker through AI & ML -- A Systematic Review of Deepfake Detection Using Learning Techniques And Vision Transformer -- Optimizing Graph Colorings: Unleashing the Power of Heuristic Algorithms for Enhanced Problem Solving -- Enhanced Detection of Alzheimer's and Mild Cognitive Impairment: Leveraging Advanced Preprocessing and Convolutional Neural Networks -- Classification of dry beans into Genetic Varieties using deep learning-based Convolutional Neural Networks (CNNs) -- Navigating the Realm of Generative Models: GANs, Diffusion, limitations, and Future Prospects- A review -- Enhancing Software Reliability Through Hybrid Metaheuristic Approaches -- Consumer Perspectives for Purchase Intentions of Online Pharmacy Products Using Generative Artificial Intelligence -- Intelligent Diagnosis of Autism Spectrum Disorder: Harnessing Machine Learning for Enhanced Early Detection -- A Comprehensive Review of Handwriting-Based ADHD Detection in Children with Autism Spectrum Disorder Using Machine Learning -- Bank Churn Prediction: A Holistic Churn Analysis on Imbalanced Data using ML Techniques -- Next-Gen Language Mastery: Exploring Advances in Natural Language Processing Post-Transformers -- Advancements in Machine Learning-Based Mental Health Prediction: A Comprehensive Review -- An economical, time-bound, scalable data platform designed for advanced analytics and AI -- A perspective to Disaster and Emerging technologies for Disaster management -- Machine Learning Innovations in Polycystic Ovarian Syndrome Diagnosis: A Comprehensive Review -- Personality Trait Classification from Online Text using Hybrid Deep Learning Techniques -- Improving Low-Light Images Using an Advanced Histogram Equalization Method and a Self-Calibrated Illumination Technique -- HsMM-based mobility aware cell association method for dynamic bandwidth management in 5G-FRANs -- Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions -- Adoption of Blockchain in Banking Industry: Challenges and Perspectives -- An Empirical Investigation into Quantum Algorithms -- Optimizing Real-Time Performance in ML-Based Application Layer Firewalls -- An empirical evaluation of design smells and code smells over multiple versions of software evolution. 330 $aThis book features selected research papers presented at the Fifth International Conference on Computing, Communications, and Cyber-Security (IC4S 2023), organized in Ghaziabad India, during December 1?2, 2023. The conference was hosted at KEC Ghaziabad and Lisbon, Portugal. It includes innovative work from researchers, leading innovators, and professionals in the areas of communication and network technologies, advanced computing technologies, data analytics and intelligent learning, the latest electrical and electronics trends, and security and privacy issues. The work is presented in two volumes. 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v991 606 $aTelecommunication 606 $aSignal processing 606 $aComputer networks$xSecurity measures 606 $aArtificial intelligence 606 $aCommunications Engineering, Networks 606 $aSignal, Speech and Image Processing 606 $aMobile and Network Security 606 $aArtificial Intelligence 615 0$aTelecommunication. 615 0$aSignal processing. 615 0$aComputer networks$xSecurity measures. 615 0$aArtificial intelligence. 615 14$aCommunications Engineering, Networks. 615 24$aSignal, Speech and Image Processing. 615 24$aMobile and Network Security. 615 24$aArtificial Intelligence. 676 $a621.382 700 $aTanwar$b Sudeep$0942571 701 $aSingh$b Pradeep Kumar$01356193 701 $aGanzha$b Maria$01373639 701 $aEpiphaniou$b Gregory$01373640 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910878046603321 996 $aProceedings of Fifth International Conference on Computing, Communications, and Cyber-Security$94189167 997 $aUNINA