10869nam 22004813 450 991088288620332120240824060222.09789819720897(electronic bk.)9789819720880(MiAaPQ)EBC31609578(Au-PeEL)EBL31609578(CKB)34145979900041(EXLCZ)993414597990004120240824d2024 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierSoft Computing Proceedings of SoCTA 2023, Volume 21st ed.Singapore :Springer,2024.©2024.1 online resource (472 pages)Lecture Notes in Networks and Systems Series ;v.971Print version: Kumar, Rajesh Soft Computing: Theories and Applications Singapore : Springer,c2024 9789819720880 Intro -- Preface -- Contents -- Editors and Contributors -- An Extensive Review on Designing of Blood Bank Management System -- 1 Introduction -- 2 Literature Survey -- 2.1 Development of a Blood Bank Management System -- 2.2 Blood Bank Management and Inventory Control Database Management System -- 2.3 Effective Blood Bank Management Based on RFID in Real-Time Systems -- 2.4 Computerized Central Blood Bank Management System (CCBBMS) -- 2.5 Web Based Blood Donation Management System (BDMS) and Notifications -- 2.6 A Secure Cloud Computing-Based Framework for the Blood Bank -- 3 Methodology -- 4 Conclusion -- References -- Ensemble Models for Vulnerability Prediction Using Code Metrics -- 1 Introduction -- 2 Related Research -- 3 Methodology -- 3.1 Dataset Preparation -- 3.2 Ensemble Model -- 4 Experiment -- 5 Results and Discussion -- 6 Conclusion -- References -- Echo State Networks for Cryptography: A Novel Framework for Key Generation and Secure Communication -- 1 Introduction -- 2 Echo State Networks -- 3 Literature Review on Cryptography -- 4 ESN-Based Cryptography -- 5 Proposed Framework -- 5.1 System Architecture -- 5.2 Key Generation Unit (KGU) -- 5.3 Encryption Processing Unit (EPU) -- 5.4 Decryption Processing Unit (DPU) -- 5.5 System Robustness and Adaptability -- 5.6 Detailed Operation of the Proposed Framework -- 5.7 Computational Considerations and Practical Implications -- 6 Security Analysis -- 6.1 Resistance to Brute-Force Attacks -- 6.2 Resistance to Side-Channel Attacks -- 6.3 Resistance to Cryptanalysis Attacks -- 6.4 Key Space Analysis -- 6.5 Complexity Analysis -- 6.6 Theoretical Robustness and Adaptability -- 7 Discussion and Future Directions -- 7.1 Theoretical Contributions and Implications -- 7.2 Potential Practical Applications -- 7.3 Challenges and Future Directions -- 8 Conclusion -- References.Exploration of Coarse-Graining and Threshold Selection of Lempel-Ziv Complexity on Vibroarthrographic Signals -- 1 Introduction -- 2 Materials and Methods -- 2.1 Dataset -- 2.2 Lempel-Ziv Complexity -- 2.3 Various Coarse-Graining Techniques Applied to VAG Signals -- 2.4 Benchmark Indices and Statistical Test -- 3 Result -- 4 Conclusion -- References -- Image Super Resolution Using Extensive Residual Network (ERN) for Orange Fruit Disease Detection -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Super Resolution Model Using ERN -- 3.2 Classification of Orange Fruit Disease -- 3.3 Dataset -- 3.4 Experimentation -- 4 Results -- 4.1 Qualitative Analysis -- 4.2 Quantitative Analysis -- 5 Conclusion -- References -- A Powerful High-Order B-Spline Galerkin Technique for Numerical Solutions of Advection-Diffusion Equation -- 1 Introduction -- 2 A Higher-Order B-Spline Function with Galerkin Approach -- 3 Numerical Examples -- 3.1 Test Example 1 -- 3.2 Test Example 2 -- 4 Conclusions -- References -- Some Explicit Formulas for Changhee-Genocchi Polynomials and Numbers -- 1 Introduction -- 2 The Changhee-Genocchi Polynomials -- 3 Conclusion -- References -- Numerical Simulations of Third-Order Singularly Perturbed Boundary Value Problems -- 1 Introduction -- 1.1 The QTBS Functions -- 2 The Technique -- 3 Numerical Simulations -- 3.1 Problem-1 -- 3.2 Problem 2 -- 3.3 Problem 3 -- 4 Conclusion -- References -- A Study on lamdaλ-Analogue Type of Degenerate Daehee Polynomials and Numbers -- 1 Introduction -- 2 lamdaλ-Analogue Type of Degenerate Daehee Polynomials and Numbers -- 3 Conclusion -- References -- Water Quality Prediction Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Research Methodology -- 3.1 Machine Learning Methods' Applied -- 3.2 About Dataset -- 4 Experimental Results and Discussion -- 4.1 Training and Testing.4.2 The Performance Measurement Factors -- 5 Conclusion, Limitations, and Future Scope -- References -- Single Smart Card for Identity and Authentication Using Data Analytics -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Block Diagram -- 3.2 Implementation -- 4 Results and Discussions -- 5 Conclusion -- References -- Strategic Utilization of ChatGPT in Teaching and Learning -- 1 Introduction -- 1.1 Background and Motivation -- 1.2 Our Contributions -- 2 ChatGPT -- 2.1 Brief History of ChatGPT -- 2.2 Understanding Open AI and Current Research Focus on ChatGPT -- 2.3 Technical Setup and Operation of ChatGPT -- 3 Methodology -- 4 Results and Discussion -- 4.1 Benefits of ChatGPT for Teaching and Learning -- 4.2 Risks of ChatGPT in Teaching and Learning -- 4.3 Opportunities Arising from the Need to Optimize and Utilize ChatGPT for Teaching and Learning -- 4.4 Simple Practical Use Cases of ChatGPT for Teaching and Learning -- 5 Conclusion -- References -- Particle-Based Swarm Fuzzy Optimization Approach in Vague Measurement of the Distance in Transportation Problems -- 1 Introduction -- 2 Primary Definitions -- 2.1 Fuzzy Set -- 2.2 Fuzzy Number -- 2.3 Particle Swarm Optimization (PSO) -- 3 Proposed Methodology -- 4 Implementation in a Problem Using MATLAB -- 5 Results and Discussion -- 6 Conclusion and Future Aspect of the Work -- References -- Design and Implementation of Network Coverage Area in WSN Using Swarm Optimization Techniques -- 1 Introduction -- 2 WSN Node Network -- 3 Particle Swarm Optimization and Discussion -- 4 Conclusion -- References -- Divergence Models in Fuzzy Environment and Their Solicitations for the Development of Fuzzy Information Improvement Models -- 1 Introduction -- 2 A New Non-parametric Fuzzy Divergence Model -- 3 Information Improvement Models for Discrete Fuzzy Distributions -- 4 Conclusion.References -- ViT-ALZ: Vision Transformer with Deep Neural Network for Alzheimer's Disease Detection -- 1 Introduction -- 2 Materials and Methods -- 2.1 Dataset and Dataset Preparation -- 2.2 Proposed Vision Transformer and Deep Neural Network Model (ViT-ALZ)) -- 3 Experimental Setups -- 3.1 Implementation Details -- 3.2 Performance Metrics -- 4 Result -- 5 Conclusion -- References -- Edge-Ward Computational Offloading for Smart Waste Management System -- 1 Introduction -- 2 Background History -- 3 System Architecture -- 4 Experimental Setup -- 4.1 Network Topology for Cloud-Word Computational Offloading Architecture -- 4.2 Network Topology for Edge-Word Computational Offloading Architecture -- 5 Experimental Results and Discussion -- 5.1 Latency-Response Time -- 5.2 Network Usage -- 6 Conclusion and Future Work -- References -- AMPpred-CNN: Prediction of Antimicrobial Peptide by Using 1D Convolution Neural Network and Composition/Transition/Distribution (CTD) Encoding -- 1 Introduction -- 2 Material and Methods -- 2.1 Dataset Description -- 2.2 Overview of AmpPred-CNN -- 2.3 Performance Metric -- 3 Results and Discussion -- 3.1 Analyzing the Distribution of Sequence Lengths of AMPs and Non-AMPs in Different Datasets -- 3.2 Investigating Length Dependency of Antimicrobial Activity -- 3.3 Investigating Existence of Linearly Separable Features -- 3.4 Evaluating the Proposed Model on Benchmark Dataset -- 3.5 Comparative Performance on XUAMP Independent Dataset -- 3.6 Comparative Performance on DBAASP Independent Dataset -- 3.7 Performance of the Proposed Model with PCA -- 3.8 Performance of the Proposed Model with Top K Features and RFE -- 3.9 Performance of the Proposed Model with Different Ratios of AMPs and Non-AMPs -- 4 Conclusion -- References -- A Hybrid System for Detection of Stress Using Human Emotions Through Voice -- 1 Introduction.2 Material and Method -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusions -- References -- Quasi-oppositional-Based Whale Optimization Applied to Multilevel Image Thresholding -- 1 Introduction -- 2 Problem Formulation -- 2.1 Whale Optimization Algorithm -- 2.2 Encircling Prey -- 2.3 Bubble Net Feeding -- 2.4 Looking for Prey -- 2.5 Quasi-oppositional-Based Learning (QOBL) -- 2.6 Quasi-opposite Number -- 3 QOWOA in Multilevel Image Thresholding -- 4 Experiments and Results -- 5 Conclusion -- References -- Enhanced Georeferencing by Adapting Improvised Lens Distortion Correction in Stationary Drone Video Frames -- 1 Introduction -- 1.1 Existing Projective Transformation (Homography) -- 1.2 Traditional Lens Distortion Correction -- 2 Proposed Projective Transformation Methodology -- 2.1 Lens Distortion Correction -- 3 Optimal Polynomial Order Selection Approach -- 4 Experimental Evaluation -- 4.1 Dataset Selection Criteria -- 4.2 Dataset Features -- 4.3 Radial Distortion Coefficient Calculations -- 5 Result Analysis -- 5.1 Radial Distortion Calculations-Traditional -- 5.2 Radial Distortion Calculations-Improvised -- 5.3 Comparative Data Analysis-Traditional and Improvised Approach -- 5.4 Comparative Complexity Analysis -- 5.5 Conclusion and Future Scope -- References -- Feature Selection and Classification to Detect Fetal Abnormalities -- 1 Introduction -- 2 Feature Selection -- 2.1 Feature Classification -- 3 Proposed System -- 3.1 SVM-Based LDA -- 3.2 PNN-Based MLE -- 4 Results and Discussions -- 5 Conclusion -- References -- Adoption of Blockchain Technologies into Forensic Accounting Practices -- 1 Introduction -- 2 Literature Review -- 3 Conceptual Framework -- 4 Hypotheses Development -- 5 Research Methodology -- 6 Structural Model Assessment and Result Interpretation -- 6.1 Model Assessment -- 6.2 Result Interpretation.7 Recommendations.Lecture Notes in Networks and Systems SeriesKumar Rajesh437573Verma Ajit Kumar1062272Verma Om Prakash1732023Wadehra Tanu1749540MiAaPQMiAaPQMiAaPQ9910882886203321Soft Computing4183818UNINA