LEADER 05754nam 22006735 450 001 9910983297303321 005 20251229072259.0 010 $a9783031751707 010 $a3031751701 024 7 $a10.1007/978-3-031-75170-7 035 $a(CKB)37054839700041 035 $a(MiAaPQ)EBC31851926 035 $a(Au-PeEL)EBL31851926 035 $a(OCoLC)1493001968 035 $a(DE-He213)978-3-031-75170-7 035 $a(EXLCZ)9937054839700041 100 $a20241219d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputing Science, Communication and Security $e5th International Conference, COMS2 2024, Mehsana, Gujarat, India, February 6?7, 2024, Proceedings /$fedited by Nirbhay Chaubey, Noor Zaman Jhanjhi, Sabu M. Thampi, Satyen Parikh, Kiran Amin 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (441 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v2174 311 08$a9783031751691 311 08$a3031751698 327 $a -- Design and Performance Analysis Of High Efficiency Propulsion System for VTOL Applications. -- Osmotic Computing-Based Task Offloading: A Fuzzy Logic-Based Approach. -- Traveler?s Demand Reactive Dynamic Online Bus Routing [TraDeR-DOBR] to Improvize Comfort Perception in Intelligent Public Transport System. -- High-Speed FSO System for Future Generation Networks for Long Reach. -- Mitigating PAPR Challenges in Massive MIMO Systems for CR-IoT Networks: A Graeco-Latin Square Approach. -- Performance Analysis of IoT Network over 5G Communication. -- IoT-Based Convolutional Neural Networks in a Farm Pest Detection Using Transfer Learning. -- Performance Comparison of NOMA Vehicular Communications under Shadow Fading. -- Detecting Distributed Denial of Service (DDoS) Attacks in a Multi-controller SDN Environment Utilizing Machine Learning. -- Comprehensive Study Of Short Channel Effects (SCEs) in MOSFET and FinFET Devices. -- A Machine Learning (ML)-Inspired Method for Intrusion Detection in IoT Devices Networks. -- An Anomaly-Misuse Hybrid System for Efficient Intrusion Detection In Clustered Wireless Sensor Network Using Neural Network. -- Detection and Prevention of Black hole and Sybil attack in Vehicular Ad Hoc Networks. -- Cognitive Ad hoc Trust Routing for Enhanced Quality of Service. -- Routing in IoT network using NetSim Simulator. -- A Novel Approach of SHA-3-512bits using Keccak Technique Based on Sponge Function Implementation on FPGA". -- Cooperative Spectrum Sensing in Cognitive Radio Network using Adaptive Walruses Optimization Algorithm. -- Catalan?s Conjecture and Elliptic Curve Cryptography (CCECC) algorithm for Enhancing Data Security during Data Transmission in MANET. -- Monitoring the concentration of air pollutants and its health hazards using Machine Learning models. -- Containment of Compromised Nodes in a Distributed Environment. -- A Novel Approach To Solve Network Security, Cryptography Problems Using Genetic Algorithm. -- Intelligent Agent based Clustering and Optimal Multi-path Routing for Energy-Efficient Wireless Sensor Net-works in Smart City Applications: A Distributed AI-Driven Approach. -- A novel symmetric key based authentication scheme that saves energy for edge devices of the Internet of Things. -- Objective Functions in High-Density Internet of Things Networks - A Performance Evaluation. -- Enhancing ASIC Design Efficiency: A Focus on RTL Verification with Spyglass. -- Enhancement in AOMDV Routing Protocol to Overcome Congestion Problem in MANET. -- Performance Evaluation of Parallel Processing Adder against Basic Adders on FPGAs. -- A Decentralised Application for Medical Insurance Claim System using Blockchain Technology. -- Performance Analysis of Energy Efficient Routing Protocols in Wireless Sensor Networks. -- Design of Performance Enhanced Approximate Multiplier for Image Processing Applications. -- Design and optimization in SPI master at the RTL level. 330 $aThis book constitutes the refereed proceedings of the 5th International Conference on Computing Science, Communication and Security, COMS2 2024, held in Mehsana, Gujarat, India, during February 6?7, 2024. The 28 full papers and 03 short papers presented in this volume were carefully reviewed and selected from 290 submissions. They are grouped into the following topics: experiences, ideas, and research results on aspects of Computing Science, Network Communication, and Security. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v2174 606 $aArtificial intelligence 606 $aSoftware engineering 606 $aComputer engineering 606 $aComputer networks 606 $aArtificial Intelligence 606 $aSoftware Engineering 606 $aComputer Engineering and Networks 615 0$aArtificial intelligence. 615 0$aSoftware engineering. 615 0$aComputer engineering. 615 0$aComputer networks. 615 14$aArtificial Intelligence. 615 24$aSoftware Engineering. 615 24$aComputer Engineering and Networks. 676 $a006.3 700 $aChaubey$b Nirbhay$01785961 701 $aJhanjhi$b Noor Zaman$01381881 701 $aThampi$b Sabu M$01751099 701 $aParikh$b Satyen$01785962 701 $aAmin$b Kiran$01785963 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910983297303321 996 $aComputing Science, Communication and Security$94317392 997 $aUNINA