03781nam 22006735 450 991073579810332120251009083557.09789819936083981993608X10.1007/978-981-99-3608-3(MiAaPQ)EBC30657012(Au-PeEL)EBL30657012(DE-He213)978-981-99-3608-3(PPN)272252476(CKB)27675021100041(OCoLC)1390923456(EXLCZ)992767502110004120230719d2023 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierSoft Computing for Security Applications Proceedings of ICSCS 2023 /edited by G. Ranganathan, Youssouf EL Allioui, Selwyn Piramuthu1st ed. 2023.Singapore :Springer Nature Singapore :Imprint: Springer,2023.1 online resource (921 pages)Advances in Intelligent Systems and Computing,2194-5365 ;1449Print version: Ranganathan, G. Soft Computing for Security Applications Singapore : Springer Singapore Pte. Limited,c2023 9789819936076 Chapter 1: Designing Recommendation System For Hotels Using Cosine Similarity Function -- Chapter 2: Vehicle Detection in Autonomous Vehicles using Computer Vision -- Chapter 3: Analysis of the Volume of Costs and Profits Under Conditions of Uncertainty Using the Method of Fuzzy Logic -- Chapter 4: Deep Learning based Sign Language Recognition and Translation -- Chapter 5: Automated Suspicious Activity Detection from Surveillance Videos -- Chapter 6: Emergence of Blockchain Technology in various Smart IoMT-enabled Healthcare Security Scenarios -- Chapter 7: Elderly People Assistance based on advanced Hardware module and a Mobile App -- Chapter 8: Escasalus-ML Based Food Quality Checker -- Chapter 9: IoT and Machine Learning based Soil Quality and Crop Yield Prediction For Agricultural System -- Chapter 10: Blockchain Technology Based Holiday Exchange Network. etc.This book features selected papers from the International Conference on Soft Computing for Security Applications (ICSCS 2023), held at Dhirajlal Gandhi College of Technology, Tamil Nadu, India, during April 21–22, 2023. It covers recent advances in the field of soft computing techniques such as fuzzy logic, neural network, support vector machines, evolutionary computation, machine learning, and probabilistic reasoning to solve various real-time challenges. The book presents innovative work by leading academics, researchers, and experts from industry.Advances in Intelligent Systems and Computing,2194-5365 ;1449Computational intelligenceArtificial intelligenceData protectionComputer networksSecurity measuresComputational IntelligenceArtificial IntelligenceData and Information SecurityMobile and Network SecurityComputational intelligence.Artificial intelligence.Data protection.Computer networksSecurity measures.Computational Intelligence.Artificial Intelligence.Data and Information Security.Mobile and Network Security.005.8Ranganathan G1265537EL Allioui Youssouf1379322Piramuthu Selwyn915330MiAaPQMiAaPQMiAaPQBOOK9910735798103321Soft Computing for Security Applications3418749UNINA