001476014 000__ 05525cam\\22006977i\4500 001476014 001__ 1476014 001476014 003__ OCoLC 001476014 005__ 20231003174628.0 001476014 006__ m\\\\\o\\d\\\\\\\\ 001476014 007__ cr\un\nnnunnun 001476014 008__ 230817s2023\\\\sz\a\\\\o\\\\\101\0\eng\d 001476014 019__ $$a1393138373$$a1393308118 001476014 020__ $$a9783031405648$$q(electronic bk.) 001476014 020__ $$a3031405641$$q(electronic bk.) 001476014 020__ $$z9783031405631 001476014 020__ $$z3031405633 001476014 0247_ $$a10.1007/978-3-031-40564-8$$2doi 001476014 035__ $$aSP(OCoLC)1394039511 001476014 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dEBLCP$$dOCLCQ 001476014 049__ $$aISEA 001476014 050_4 $$aQA75.5$$b.C66 2023eb 001476014 08204 $$a004$$223/eng/20230817 001476014 1112_ $$aCOMS2 (Conference)$$n(4th :$$d2023 :$$cMahesāna, India ; Online) 001476014 24510 $$aComputing science, communication and security :$$b4th International Conference, COMS2 2023, Mehsana, Gujarat, India, February 6-7, 2023, Revised Selected Papers /$$cNirbhay Chaubey, Sabu M. Thampi, Noor Zaman Jhanjhi, Satyen Parikh, Kiran Amin, editors. 001476014 2463_ $$aCOMS2 2023 001476014 264_1 $$aCham :$$bSpringer,$$c2023. 001476014 300__ $$a1 online resource (xiv, 280 pages) :$$billustrations (some color). 001476014 336__ $$atext$$btxt$$2rdacontent 001476014 337__ $$acomputer$$bc$$2rdamedia 001476014 338__ $$aonline resource$$bcr$$2rdacarrier 001476014 4901_ $$aCommunications in Computer and Information Science,$$x1865-0937 ;$$v1861 001476014 500__ $$aIncludes author index. 001476014 5050_ $$aAn Efficient Signal Detection Technique for STBC-OFDM in Fast Fading Channel -- Achieving accurate Trajectory Control while training legged robots using Machine Learning -- Relational Model and Improvised DSR Assisted Frame- work for Secure Wireless Communication -- DEEC Protocol with ACO Based Cluster Head Selection in Wireless Sensor Network -- Performance Analysis of Recovery Methods for Loss of Target in Wireless Sensor Network following TDNN Prediction Algorithm -- A Comparative Study of DWT and DCT Along with AES Techniques for Safety Transmission of Digital Bank Cheque Image -- Advancement of Non-Coherent Spectrum Sensing Technique in Cognitive Radio Networks – A Simulation-based Analysis -- Improvement of network protocol and analysis of security using aspect of cryptography -- Gaussian Mixture Model-Based Clustering for Energy Saving in WSN -- Physical Layer Security Optimisation for NOMA-based UAV communication for Optimal Resource Allocation -- DBFEH: Design of a Deep-learning-based Bioinspired model to improve Feature Extraction capabilities of healthcare device sets -- Protecting OT Hosts with Intelligent Model-Based Defense System against Malware Families -- Design and Analysis of Wide-Planar Antenna using Meta-material for S band Applications -- Performance Comparison of IEEE 802.11ax, 802.11ac and 802.11n using Network Simulator NS3 -- Web Browser Forensics : A comparative Integrated approach on artefacts acquisition, evidence collections and analysis of Google Chrome, Firefox and Brave -- An Innovative AI Architecture for Detecting the Primary User in the Spectrum -- Power Optimization for Millimeter Wave MIMO System -- Performance Evaluation of VBF, DBR and Modified CARP for Underwater Acoustic Sensor Network -- Performance Analysis of Smart antenna in Wireless Communication System -- Low-Light Video Enhancement on a Mobile Device using Illumination-Reflection Model based Retinex Envelope. 001476014 506__ $$aAccess limited to authorized users. 001476014 520__ $$aThis book constitutes the refereed proceedings of the 4th International Conference on Computing Science, Communication and Security, COMS2 2023, held in Gandhinagar, India, during February 6-7, 2023. The 20 full papers included in this book were carefully reviewed and selected from 190 submissions. They were organized in topical sections on artificial intelligence and machine learning; networking and communications. 001476014 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed August 17, 2023). 001476014 650_0 $$aComputer science$$vCongresses. 001476014 650_0 $$aComputer networks$$vCongresses. 001476014 650_0 $$aComputer security$$vCongresses. 001476014 655_0 $$aElectronic books. 001476014 7001_ $$aChaubey, Nirbhay Kumar,$$d1971-$$eeditor.$$1https://orcid.org/0000-0001-6575-7723 001476014 7001_ $$aThampi, Sabu M.,$$eeditor.$$1https://orcid.org/0000-0001-6453-5520 001476014 7001_ $$aZaman, Noor,$$d1972-$$eeditor.$$1https://orcid.org/0000-0001-8116-4733 001476014 7001_ $$aParikh, Satyen,$$eeditor.$$0(orcid)0000-0002-6578-899X$$1https://orcid.org/0000-0002-6578-899X 001476014 7001_ $$aAmin, Kiran,$$eeditor.$$0(orcid)0000-0001-6843-2449$$1https://orcid.org/0000-0001-6843-2449 001476014 77608 $$iPrint version: $$z3031405633$$z9783031405631$$w(OCoLC)1389339428 001476014 830_0 $$aCommunications in computer and information science ;$$v1861.$$x1865-0937 001476014 852__ $$bebk 001476014 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-40564-8$$zOnline Access$$91397441.1 001476014 909CO $$ooai:library.usi.edu:1476014$$pGLOBAL_SET 001476014 980__ $$aBIB 001476014 980__ $$aEBOOK 001476014 982__ $$aEbook 001476014 983__ $$aOnline 001476014 994__ $$a92$$bISE