LEADER 05061nam 22006255 450 001 9911049208503321 005 20260102122837.0 010 $a981-9669-41-3 024 7 $a10.1007/978-981-96-6941-7 035 $a(CKB)44769995300041 035 $a(MiAaPQ)EBC32471237 035 $a(Au-PeEL)EBL32471237 035 $a(DE-He213)978-981-96-6941-7 035 $a(EXLCZ)9944769995300041 100 $a20260102d2026 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProceedings of the Eleventh International Conference on Mathematics and Computing $eICMC 2025, Volume 1 /$fedited by Debasis Giri, Indrakshi Ray, S. Ponnusamy, Rakesh M. Verma, James B. D. Joshi 205 $a1st ed. 2026. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2026. 215 $a1 online resource (807 pages) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v1420 311 08$a981-9669-40-5 327 $aTrajectory Prediction in Ship Movement Using Geohash Embedding -- 6G-IoT Enabled Authentication Framework for Secure Waterborne Transportation Systems using Blockchain -- A Zero-Knowledge Proof Approach on IoT Sensor Readings for Improving Data Security in Smart Agriculture -- Hybrid NasNetMobile and Xception-Based Feature Extraction with Ensemble Learning for Efficient Oral Cancer Detection -- Cryptanalysis and Countermeasures on Multivariate Polynomial-based Group Signature Scheme -- Adversarial Neural Cryptography: Security Challenges and Solutions -- Classifying Students in Flipped Learning Pedagogy Exploiting EEG Signals and Deep Learning Techniques -- SCA-DU-Net: Spatial and Channel Attention with Dilation U-Net for Enhanced Skin Cancer Image Segmentation -- Towards Efficient Deployment of Compressed Neural Networks on MCU for EdgeAI Applications -- Phishing Email Detection using Header Features Leveraging Large Language Models (LLMs) -- Precision Pest Identification in Crops using EfficientNet Based Ensemble Model -- Ensuring Safety and Security in Blood Screening Systems Using Decentralized Ledger Based Technology -- An Intelligent Framework for Early Diagnosis of Multivariate Respiratory Diseases Using Lightweight Deep Neural Network -- Deep Learning assisted Ring Artifact Corrections in X-ray MicroCT images -- RedactChain: A Redactable Blockchain-Driven Privacy Protected Personal Data Management Scheme -- Cryptanalysis of ?Cross-domain Identity Authentication Scheme based on Blockchain and PKI System -- Survey on the Bohr radius in higher dimension -- On improving the applicability of a Jarratt-type iterative method -- Discretization of a Smoking Model: A Comparison of Euler and NSFD Schemes -- Characterization of exponential distribution with application in testing exponentiality -- Classifying into Several Normal Populations with a Common Mean and Order Restricted Variances -- Investigating the Role of Initial Stress and Triangular Surface Irregularities in SH-Wave Propagation through Multilayer Anisotropic Media -- Effect of preservation and green technology investment on a sustainable inventory model with carbon tax policy under inflation -- Fractal generation via Multi-parameter Weakly Enriched Contraction -- Use of GJR-GARCH model for forecasting of financial risk. 330 $aThis book features selected papers from the 11th International Conference on Mathematics and Computing (ICMC 2025), held at IIT Bhilai, India during January 09 ? 11, 2025. It covers recent advances in the field of mathematics, statistics, and scientific computing. The book presents innovative work by leading academics, researchers, and experts from industry in mathematics, statistics, cryptography, network security, cyber security, machine learning, data analytics and blockchain technology in computer science and information technology. The book is divided into two volumes. 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v1420 606 $aComputational intelligence 606 $aArtificial intelligence 606 $aComputer networks$xSecurity measures 606 $aData protection 606 $aComputational Intelligence 606 $aArtificial Intelligence 606 $aMobile and Network Security 606 $aData and Information Security 615 0$aComputational intelligence. 615 0$aArtificial intelligence. 615 0$aComputer networks$xSecurity measures. 615 0$aData protection. 615 14$aComputational Intelligence. 615 24$aArtificial Intelligence. 615 24$aMobile and Network Security. 615 24$aData and Information Security. 676 $a006.3 700 $aGiri$b Debasis$01380213 701 $aGiri$01885668 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911049208503321 996 $aProceedings of the Eleventh International Conference on Mathematics and Computing$94520975 997 $aUNINA