My Account Log in

1 option

Universal Threats in Expert Applications and Solutions : Proceedings of 3rd UNI-TEAS 2024, Volume 1 / edited by Vijay Singh Rathore, Joao Manuel R. S. Tavares, B. Surendiran, Anil Yadav.

Springer eBooks EBA - Intelligent Technologies and Robotics Collection 2024 Available online

View online
Format:
Book
Author/Creator:
Rathore, Vijay Singh.
Contributor:
Tavares, João Manuel R. S.
Surendiran, B.
Yadav, Anil.
Series:
Lecture Notes in Networks and Systems, 2367-3389 ; 1006
Language:
English
Subjects (All):
Computational intelligence.
Data protection.
Artificial intelligence.
Computational Intelligence.
Data and Information Security.
Artificial Intelligence.
Local Subjects:
Computational Intelligence.
Data and Information Security.
Artificial Intelligence.
Physical Description:
1 online resource (509 pages)
Edition:
1st ed. 2024.
Place of Publication:
Singapore : Springer Nature Singapore : Imprint: Springer, 2024.
Summary:
This book presents high-quality, peer-reviewed papers from 3rd International Conference on “Universal Threats in Expert Applications and Solutions" (UNI-TEAS 2024), jointly being organized by IES University, Bhopal, and Shree KKarni Universe College, Jaipur, in association with CSI Jaipur Chapter and Jaipur ACM Professional Chapter during January 6–9, 2024. The book is a collection of innovative ideas from researchers, scientists, academicians, industry professionals, and students. The book covers a variety of topics, such as expert applications and artificial intelligence/machine learning; advance web technologies such as IoT, big data, cloud computing in expert applications; information and cyber security threats and solutions, multimedia applications in forensics, security and intelligence; advancements in app development; management practices for expert applications; and social and ethical aspects in expert applications through applied sciences.
Contents:
Intro
Preface
Acknowledgements
About This Book
Contents
Editors and Contributors
An Advanced Algorithm and Utility for Identifying Critical Web Vulnerabilities with Exceptional Performance
1 Introduction
1.1 Automated Testing Mechanisms
1.2 Use of Machine Learning Techniques
1.3 Techniques for Reducing Input Data Space
1.4 Scanning Tool Development
2 Considered Website Vulnerability
2.1 SQL Injection
2.2 Cross-Site Scripting
3 Related Study
4 Proposed and Improved Algorithms
5 Algorithm for Detecting XSS
6 Enhancing Vulnerability Detection through the Application of Machine Learning
7 Scanning Tool
8 Systematic Flow of GKD Website Scanner
9 Conclusion
References
Potential Impacts of Online-Based Learning 2.0 and Certification on Employability
1.1 Background
1.2 Statement of the Problem
1.3 Study Rationale
1.4 Purpose of This Work
1.5 Limitations and Scope of the Work
1.6 Research Hypothesis
2 Research Methodology
2.1 The Sample Size of the Work
2.2 Data Collection
3 Data Analysis, Results, and Discussions
3.1 Average Age
3.2 Education Background
3.3 Employment
3.4 Online Certification
3.5 Online-Based Certification Availability
3.6 Online-Based Certification Acceptance
3.7 Online Certification Improves Skill Development
3.8 Online-Based Certification Increases Employability
3.9 Online Learning Fosters the Development of Reflective and Critical Thinking
3.10 Online Education is Useful for a Wide Range of Professions in Many Industries
3.11 Online-Based Learning Provides Knowledge as Required
3.12 Online Learning is Advantageous for Career Development and Ongoing Education
4 Conclusion
References.
An Intelligent Self-Driving Car's Design and Development, Including Lane Detection Using ROS and Machine Vision Algorithms
1 Existing Work
2 Proposed System
2.1 Mechanical
2.2 Electrical
2.3 Algorithm and Machine Vision
3 Implementation
3.1 Canny Edge Detection
3.2 Region of Interest
3.3 Hough Transform
3.4 Average Slope Intercept
3.5 Curvature Calculation
3.6 Sliding Window Approach
4 Results and Discussion
5 Conclusion
Text Summarization for Kannada Text Documents: A Review
2 Review of Literature
3 Datasets
3.1 Kannada Treebank
3.2 Kannada-MNIST: A New Handwritten Digit Dataset for the Kannada Language
3.3 Samanantar: Parallel Corpora Collection for 11 Indic Languages
3.4 MLe2e
3.5 IndicCorp
4 Evaluation Measures
5 Conclusion and Future Works
Solar Panel Tracking with Battery-Assisted and Battery Charging Modes
2 Literature Review
3 Methods and Materials
3.1 Implementation Using MATLAB
3.2 Charging Mode
3.3 Discharging Mode
4.1 Hardware Implementation
Elevator-Based Earth Tremor Sentinel Technique with MQTT Protocol
2 Related Work
2.1 Perseverance of Artificial Neural Networks (ANN) in Elevators
2.2 Purpose of Accelerometer in Elevators
2.3 Precedence of MQTT
3 Methodology
3.1 The Layout of the Proposed Model
3.2 Machine Learning Models for Earthquake Detection
3.3 Programming an AI Neural Network
4 Discussion
An Efficient System Model for Identification of Drug Addiction
3 Prpopsed Methodology
3.1 Attribute Selection
3.2 ID3 Algorithm
5 Conclusion and Future Scope
Design and Analysis of a Multipath Routing Protocol to Enhance QoS in MANET
2 Literature Survey
3 Proposed Work
3.1 Proposed Algorithm
4 Results Analysis
4.1 Simulation Parameters
4.2 Packet Sents
4.3 Packet Receives
4.4 Percentage of Data Receives (PDR)
4.5 Normal Routing Load (NRL)
Tagging of Uterine Cervix Cases at Cell and Slide Level Through Transfer Learning
1.1 Deep Neural Network
1.2 Transfer Learning
1.3 ResNet50
1.4 Cervical Cancer
3 Material and Method
3.1 Data
3.2 Methodology
4 Result and Analysis
Estimation of Medical Expenses Using Machine Learning
2 Methodology Applied
2.1 Dataset
2.2 Feature Engineering
2.3 Feature Importance Analysis
3 Used Models and Algorithms
4 Experiment Results
Challenges in Making OCR of Gujarati Newspaper
2.1 Review on Segmentation
2.2 Review on Recognition Text
3 Problem in Gujrati Language Newspaper
3.1 Scanner Image Quality
3.2 Background Noise
3.3 Font and Style Variation
3.4 Text Size Variation
3.5 Complex Ligatures in the Script
3.6 Limited Trained Data
4 Observation
A Hybrid Methodology for Software Development and IT Team Analysis in Manufacturing
2 Methods
2.1 A Comparison of Project Durations Before and After Model Release
2.2 Before and After the Model's Release on DRE
2.3 A Comparison of the Costs of Development and Maintenance
2.4 Criticality-Based Development to Maintenance Ratio of a Project
2.5 A Maintenance Ratio Determined by the Number of Lines of Code
3 Conclusion
AI Enabled Convolutional Neural Networks to Detect Brain Tumors
3 Problem Statement
4 Proposed Methodology
4.1 Image Database
4.2 Data Augmentation with Pre-Processing
4.3 Data Split
5 Results
6 Analysis
7 Conclusion
Increasing Productivity in Software Development Through the Use of Docker Technology
1 Introduction of Dockers
1.1 Docker
1.2 Docker File
1.3 Docker Image
2 Experiment
2.1 Docker Java Image File
2.2 Python-Enabled Docker Image File
2.3 Comparative Results
4 Future Scope
Multimodal Fusion-Based Hybrid CRNN Model for Emotion Prediction in Music
1.1 Key Contribution
2 Article Organization
3 Related Work
4 Methodology
4.1 Data Description
4.2 Pre-Processing
4.3 Feature Extraction
5 Proposed Model
5.1 Multimodel Fusion
6 Result and Discussion
6.1 Experimental Setup for the Proposed System
6.2 Implementation Details
Multimodal Analysis of Induction Motor Signals for Power Quality Abnormality Detection Using Wavelet-RBF Approach
2 Research Contribution
3 Proposed Methodology
3.1 Wavelet Transform
3.2 RBF Neural Networks
4 Result Analysis and Discussion
4.1 Vibration Analysis Using Sensor and Current Transformer
Smart Electronic Speaking Glove for Physically Challenged Person
1.1 Research Contribution
2 Proposed Methodology
3 Implementation and Execution
3.1 Hardware Description
3.2 Implemented in Proteus Simulation
4 Result and Discussion
COVID-19 Detection Using Fourier-Bessel Series Expansion-Based Dyadic Decomposition and Custom CNN
1.1 Author Contribution.
2 Article Organisation
4.2 Image Preprocessing
4.3 FBD Methodology
5.1 SMOTETomek
5.2 Keras Tunner
6.1 Experimental Configuration for the Suggested System
Instantaneous Interpretation into Sign Language for the Hearing Impaired
1.1 Feature Extraction
1.2 NLP
1.3 CNN
2.1 Improvement of Speech
2.2 Translation from Speech to Sign Language
2.3 Converter from Speech to Sign Language
3.1 Deaf People's Model
3.2 Mute People Model
4 Analysis by Comparison to the Current Model
6 Future Scope
A Review of Anomaly Based Multiple Intrusion Detection Methods Using a Feature Based Deep Learning Approach
4 Results and Discussions
Correlation of Traditional Technique and ML-Based Technique for Efficient Effort Estimation: In Agile Frameworks
2.1 Non-Algorithmic Technique-Based Effort Estimation in Agile
2.2 Algorithmic Technique-Based Effort Estimation in Agile
2.3 Machine Learning-Based Effort Estimation in Agile
3 Research Objective
3.1 Research Question
3.2 Question Objective
4 Research Methodology
4.1 (RQ1) What Are the Various Traditional Techniques for Effort Estimation in an Agile Context?
4.2 (RQ2) What Are the Different ML Techniques for Effort Estimation in an Agile Context?
4.3 (RQ3) Which ML Algorithm Outperformed Among Themselves and What Are the Different Metrics Used to Determine the Accuracy of ML Techniques?
6 Conclusion and Discussion
NLP-Based Processing of Gujarati Compound Word Sandhi's Generation and Segmentation.
Other Format:
Print version: Rathore, Vijay Singh Universal Threats in Expert Applications and Solutions
ISBN:
9789819738106

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account