Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almafu_9961637412102883
    Format: 1 online resource (509 pages)
    Edition: 1st ed. 2024.
    ISBN: 9789819738106
    Series Statement: Lecture Notes in Networks and Systems, 1006
    Content: This book presents high-quality, peer-reviewed papers from 3rd International Conference on “Universal Threats in Expert Applications and Solutions" (UNI-TEAS 2024), jointly being organized by IES University, Bhopal, and Shree KKarni Universe College, Jaipur, in association with CSI Jaipur Chapter and Jaipur ACM Professional Chapter during January 6–9, 2024. The book is a collection of innovative ideas from researchers, scientists, academicians, industry professionals, and students. The book covers a variety of topics, such as expert applications and artificial intelligence/machine learning; advance web technologies such as IoT, big data, cloud computing in expert applications; information and cyber security threats and solutions, multimedia applications in forensics, security and intelligence; advancements in app development; management practices for expert applications; and social and ethical aspects in expert applications through applied sciences.
    Note: Intro -- Preface -- Acknowledgements -- About This Book -- Contents -- Editors and Contributors -- An Advanced Algorithm and Utility for Identifying Critical Web Vulnerabilities with Exceptional Performance -- 1 Introduction -- 1.1 Automated Testing Mechanisms -- 1.2 Use of Machine Learning Techniques -- 1.3 Techniques for Reducing Input Data Space -- 1.4 Scanning Tool Development -- 2 Considered Website Vulnerability -- 2.1 SQL Injection -- 2.2 Cross-Site Scripting -- 3 Related Study -- 4 Proposed and Improved Algorithms -- 5 Algorithm for Detecting XSS -- 6 Enhancing Vulnerability Detection through the Application of Machine Learning -- 7 Scanning Tool -- 8 Systematic Flow of GKD Website Scanner -- 9 Conclusion -- References -- Potential Impacts of Online-Based Learning 2.0 and Certification on Employability -- 1 Introduction -- 1.1 Background -- 1.2 Statement of the Problem -- 1.3 Study Rationale -- 1.4 Purpose of This Work -- 1.5 Limitations and Scope of the Work -- 1.6 Research Hypothesis -- 2 Research Methodology -- 2.1 The Sample Size of the Work -- 2.2 Data Collection -- 3 Data Analysis, Results, and Discussions -- 3.1 Average Age -- 3.2 Education Background -- 3.3 Employment -- 3.4 Online Certification -- 3.5 Online-Based Certification Availability -- 3.6 Online-Based Certification Acceptance -- 3.7 Online Certification Improves Skill Development -- 3.8 Online-Based Certification Increases Employability -- 3.9 Online Learning Fosters the Development of Reflective and Critical Thinking -- 3.10 Online Education is Useful for a Wide Range of Professions in Many Industries -- 3.11 Online-Based Learning Provides Knowledge as Required -- 3.12 Online Learning is Advantageous for Career Development and Ongoing Education -- 4 Conclusion -- References. , An Intelligent Self-Driving Car's Design and Development, Including Lane Detection Using ROS and Machine Vision Algorithms -- 1 Existing Work -- 2 Proposed System -- 2.1 Mechanical -- 2.2 Electrical -- 2.3 Algorithm and Machine Vision -- 3 Implementation -- 3.1 Canny Edge Detection -- 3.2 Region of Interest -- 3.3 Hough Transform -- 3.4 Average Slope Intercept -- 3.5 Curvature Calculation -- 3.6 Sliding Window Approach -- 4 Results and Discussion -- 5 Conclusion -- References -- Text Summarization for Kannada Text Documents: A Review -- 1 Introduction -- 2 Review of Literature -- 3 Datasets -- 3.1 Kannada Treebank -- 3.2 Kannada-MNIST: A New Handwritten Digit Dataset for the Kannada Language -- 3.3 Samanantar: Parallel Corpora Collection for 11 Indic Languages -- 3.4 MLe2e -- 3.5 IndicCorp -- 4 Evaluation Measures -- 5 Conclusion and Future Works -- References -- Solar Panel Tracking with Battery-Assisted and Battery Charging Modes -- 1 Introduction -- 2 Literature Review -- 3 Methods and Materials -- 3.1 Implementation Using MATLAB -- 3.2 Charging Mode -- 3.3 Discharging Mode -- 4 Results and Discussion -- 4.1 Hardware Implementation -- 5 Conclusion -- References -- Elevator-Based Earth Tremor Sentinel Technique with MQTT Protocol -- 1 Introduction -- 2 Related Work -- 2.1 Perseverance of Artificial Neural Networks (ANN) in Elevators -- 2.2 Purpose of Accelerometer in Elevators -- 2.3 Precedence of MQTT -- 3 Methodology -- 3.1 The Layout of the Proposed Model -- 3.2 Machine Learning Models for Earthquake Detection -- 3.3 Programming an AI Neural Network -- 4 Discussion -- 5 Conclusion -- References -- An Efficient System Model for Identification of Drug Addiction -- 1 Introduction -- 2 Related Work -- 3 Prpopsed Methodology -- 3.1 Attribute Selection -- 3.2 ID3 Algorithm -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References. , Design and Analysis of a Multipath Routing Protocol to Enhance QoS in MANET -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 3.1 Proposed Algorithm -- 4 Results Analysis -- 4.1 Simulation Parameters -- 4.2 Packet Sents -- 4.3 Packet Receives -- 4.4 Percentage of Data Receives (PDR) -- 4.5 Normal Routing Load (NRL) -- 5 Conclusion -- References -- Tagging of Uterine Cervix Cases at Cell and Slide Level Through Transfer Learning -- 1 Introduction -- 1.1 Deep Neural Network -- 1.2 Transfer Learning -- 1.3 ResNet50 -- 1.4 Cervical Cancer -- 2 Literature Review -- 3 Material and Method -- 3.1 Data -- 3.2 Methodology -- 4 Result and Analysis -- References -- Estimation of Medical Expenses Using Machine Learning -- 1 Introduction -- 2 Methodology Applied -- 2.1 Dataset -- 2.2 Feature Engineering -- 2.3 Feature Importance Analysis -- 3 Used Models and Algorithms -- 4 Experiment Results -- 5 Conclusion -- Challenges in Making OCR of Gujarati Newspaper -- 1 Introduction -- 2 Review of Literature -- 2.1 Review on Segmentation -- 2.2 Review on Recognition Text -- 3 Problem in Gujrati Language Newspaper -- 3.1 Scanner Image Quality -- 3.2 Background Noise -- 3.3 Font and Style Variation -- 3.4 Text Size Variation -- 3.5 Complex Ligatures in the Script -- 3.6 Limited Trained Data -- 4 Observation -- 5 Conclusion -- References -- A Hybrid Methodology for Software Development and IT Team Analysis in Manufacturing -- 1 Introduction -- 2 Methods -- 2.1 A Comparison of Project Durations Before and After Model Release -- 2.2 Before and After the Model's Release on DRE -- 2.3 A Comparison of the Costs of Development and Maintenance -- 2.4 Criticality-Based Development to Maintenance Ratio of a Project -- 2.5 A Maintenance Ratio Determined by the Number of Lines of Code -- 3 Conclusion -- References. , AI Enabled Convolutional Neural Networks to Detect Brain Tumors -- 1 Introduction -- 2 Literature Review -- 3 Problem Statement -- 4 Proposed Methodology -- 4.1 Image Database -- 4.2 Data Augmentation with Pre-Processing -- 4.3 Data Split -- 5 Results -- 6 Analysis -- 7 Conclusion -- References -- Increasing Productivity in Software Development Through the Use of Docker Technology -- 1 Introduction of Dockers -- 1.1 Docker -- 1.2 Docker File -- 1.3 Docker Image -- 2 Experiment -- 2.1 Docker Java Image File -- 2.2 Python-Enabled Docker Image File -- 2.3 Comparative Results -- 3 Conclusion -- 4 Future Scope -- References -- Multimodal Fusion-Based Hybrid CRNN Model for Emotion Prediction in Music -- 1 Introduction -- 1.1 Key Contribution -- 2 Article Organization -- 3 Related Work -- 4 Methodology -- 4.1 Data Description -- 4.2 Pre-Processing -- 4.3 Feature Extraction -- 5 Proposed Model -- 5.1 Multimodel Fusion -- 6 Result and Discussion -- 6.1 Experimental Setup for the Proposed System -- 6.2 Implementation Details -- 7 Conclusion -- References -- Multimodal Analysis of Induction Motor Signals for Power Quality Abnormality Detection Using Wavelet-RBF Approach -- 1 Introduction -- 2 Research Contribution -- 3 Proposed Methodology -- 3.1 Wavelet Transform -- 3.2 RBF Neural Networks -- 4 Result Analysis and Discussion -- 4.1 Vibration Analysis Using Sensor and Current Transformer -- 5 Conclusion -- References -- Smart Electronic Speaking Glove for Physically Challenged Person -- 1 Introduction -- 1.1 Research Contribution -- 2 Proposed Methodology -- 3 Implementation and Execution -- 3.1 Hardware Description -- 3.2 Implemented in Proteus Simulation -- 4 Result and Discussion -- 5 Conclusion -- References -- COVID-19 Detection Using Fourier-Bessel Series Expansion-Based Dyadic Decomposition and Custom CNN -- 1 Introduction -- 1.1 Author Contribution. , 2 Article Organisation -- 3 Related Work -- 4 Methodology -- 4.1 Data Description -- 4.2 Image Preprocessing -- 4.3 FBD Methodology -- 5 Proposed Model -- 5.1 SMOTETomek -- 5.2 Keras Tunner -- 6 Result and Discussion -- 6.1 Experimental Configuration for the Suggested System -- 7 Conclusion -- References -- Instantaneous Interpretation into Sign Language for the Hearing Impaired -- 1 Introduction -- 1.1 Feature Extraction -- 1.2 NLP -- 1.3 CNN -- 2 Literature Survey -- 2.1 Improvement of Speech -- 2.2 Translation from Speech to Sign Language -- 2.3 Converter from Speech to Sign Language -- 3 Proposed Methodology -- 3.1 Deaf People's Model -- 3.2 Mute People Model -- 4 Analysis by Comparison to the Current Model -- 5 Conclusion -- 6 Future Scope -- References -- A Review of Anomaly Based Multiple Intrusion Detection Methods Using a Feature Based Deep Learning Approach -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- Correlation of Traditional Technique and ML-Based Technique for Efficient Effort Estimation: In Agile Frameworks -- 1 Introduction -- 2 Related Work -- 2.1 Non-Algorithmic Technique-Based Effort Estimation in Agile -- 2.2 Algorithmic Technique-Based Effort Estimation in Agile -- 2.3 Machine Learning-Based Effort Estimation in Agile -- 3 Research Objective -- 3.1 Research Question -- 3.2 Question Objective -- 4 Research Methodology -- 4.1 (RQ1) What Are the Various Traditional Techniques for Effort Estimation in an Agile Context? -- 4.2 (RQ2) What Are the Different ML Techniques for Effort Estimation in an Agile Context? -- 4.3 (RQ3) Which ML Algorithm Outperformed Among Themselves and What Are the Different Metrics Used to Determine the Accuracy of ML Techniques? -- 5 Results -- 6 Conclusion and Discussion -- References. , NLP-Based Processing of Gujarati Compound Word Sandhi's Generation and Segmentation.
    Additional Edition: Print version: Rathore, Vijay Singh Universal Threats in Expert Applications and Solutions Singapore : Springer,c2024 ISBN 9789819738090
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages