04436nam 22006615 450 991073602150332120230731131219.0981-9926-80-710.1007/978-981-99-2680-0(MiAaPQ)EBC30670637(Au-PeEL)EBL30670637(DE-He213)978-981-99-2680-0(PPN)272253359(EXLCZ)992789996120004120230731d2023 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierProceedings of International Conference on Frontiers in Computing and Systems[electronic resource] COMSYS 2022 /edited by Ram Sarkar, Sujata Pal, Subhadip Basu, Dariusz Plewczynski, Debotosh Bhattacharjee1st ed. 2023.Singapore :Springer Nature Singapore :Imprint: Springer,2023.1 online resource (558 pages)Lecture Notes in Networks and Systems,2367-3389 ;690Print version: Sarkar, Ram Proceedings of International Conference on Frontiers in Computing and Systems Singapore : Springer,c2023 9789819926794 Section 1: Machine Learning and Applications -- Chapter 1. AVENet:Attention based VGG 16 with ELM for obscene image classification -- Chapter 2. Analyzing Market Dynamics of Agricultural Commodities: A Case Study based on Cotton -- Chapter 3. Feature Selection for Nepali Part-Of-Speech Tagging in a Conditional Random Fields based System -- Chapter 4. Design and Development of a ML-based Safety-Critical Fire Detection System -- Chapter 5. Compressed Image Super-Resolution using Pre-trained Model Assistance -- Chapter 6. Optimization of Character Classes in Devanagari Ancient Manuscripts and Dataset Generation -- Chapter 7. Deep Learning based Classification of Rice Varieties from Seed Coat Images -- Chapter 8. Leaf Based Plant Disease Detection Using Intelligent Techniques – A Comprehensive Survey -- Chapter 9. Bengali Document Retrieval Using Model Combination -- Chapter 10. Deep Neural Networks Fused with Textures for Image Classification -- Chapter 11. Real Time Prediction of In-Hospital Outcomes using a Multilayer Perceptron deployed in a Web-based Application -- Chapter 12. Automated analysis of Connections in Model Diagrams -- Chapter 13. No-reference Image Quality Assessment using Meta-Learning -- Section 2: Security -- Chapter 14. Cryptanalysis of Markle Hellman Knapsack Cipher using Cuckoo Search Algorithm.-Chapter 15. Generating a Suitable Hash Function using Sudoku for Blockchain Network. etc.This book gathers high-quality research papers presented at the 3rd International Conference on Frontiers in Computing and Systems (COMSYS 2022) held at Indian Institute of Technology Ropar, Punjab, India, during December 19–21, 2022. The book covers research in “cyber-physical systems for real-life applications” pertaining to AI, machine learning, and data science; devices, circuits, and systems; computational biology, biomedical informatics and network medicine; communication networks, cloud computing and IoT; image, video and signal processing; and security and privacy.Lecture Notes in Networks and Systems,2367-3389 ;690Computational intelligenceTelecommunicationBioinformaticsData protectionComputational IntelligenceCommunications Engineering, NetworksComputational and Systems BiologyData and Information SecurityComputational intelligence.Telecommunication.Bioinformatics.Data protection.Computational Intelligence.Communications Engineering, Networks.Computational and Systems Biology.Data and Information Security.006.3Sarkar Ram1380273Pal Sujata1380274Basu Subhadip1380275Plewczynski Dariusz1380276Bhattacharjee Debotosh1380277MiAaPQMiAaPQMiAaPQBOOK9910736021503321Proceedings of International Conference on Frontiers in Computing and Systems3421557UNINA