LEADER 12521nam 22006975 450 001 9910725081903321 005 20240725070657.0 010 $a9783031311536$b(electronic bk.) 010 $z9783031311529 024 7 $a10.1007/978-3-031-31153-6 035 $a(MiAaPQ)EBC30544987 035 $a(Au-PeEL)EBL30544987 035 $a(OCoLC)1379440314 035 $a(DE-He213)978-3-031-31153-6 035 $a(BIP)089945217 035 $a(PPN)270616047 035 $a(CKB)26707037900041 035 $a(EXLCZ)9926707037900041 100 $a20230515d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aKey Digital Trends Shaping the Future of Information and Management Science $eProceedings of 5th International Conference on Information Systems and Management Science (ISMS) 2022 /$fedited by Lalit Garg, Dilip Singh Sisodia, Nishtha Kesswani, Joseph G. Vella, Imene Brigui, Sanjay Misra, Deepak Singh 205 $a1st ed. 2023. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2023. 215 $a1 online resource (639 pages) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v671 311 08$aPrint version: Garg, Lalit Key Digital Trends Shaping the Future of Information and Management Science Cham : Springer International Publishing AG,c2023 9783031311529 320 $aIncludes bibliographical references and index. 327 $aIntro -- Preface -- Organization -- Contents -- Improvisation of Predictive Modeling Using Different Classifiers for Predicting Thyroid Disease in Patients -- 1 Introduction -- 1.1 Data Analytics -- 1.2 Prediction and Predictive Analysis -- 2 Literature Review -- 3 Exploratory Data Analysis -- 4 Proposed Model -- 4.1 k-NN Classifier -- 4.2 Random Forest Classifier -- 4.3 XGBoost Classifier -- 4.4 CatBoost Classifier -- 5 Results -- 6 Conclusion -- References -- Application of IoT for Proximity Analysis and Alert Generation for Maintaining Social Distancing -- 1 Introduction -- 2 Related Work -- 3 Materials and Methods -- 3.1 Methodology and Block Diagram of System -- 4 Experimental Setup -- 5 Mathematical Modeling -- 6 Theoretical Results -- 7 Device Simulation and Result -- 8 Conclusions and Future Scope -- References -- Analysis and Optimization of Fault - Tolerant Behaviour of Motors in Electric Vehicular Systems -- 1 Introduction -- 2 Overview of Motors in Electric Vehicular Systems -- 3 EV Modelling -- 4 Exploratory Data Analysis of PMSM Characteristics Using Real - Time Data -- 4.1 About Dataset -- 4.2 Key Points About the Dataset -- 4.3 Determining Correlations -- 4.4 Generating Heatmap -- 4.5 Observations -- 5 Modelling of the Dynamics of Electric Vehicle -- 6 Fault Analysis -- 6.1 Normal Operation -- 6.2 Abnormal Operation -- 6.3 Observation Table -- 7 Optimization Technique of PMSM for Electric Vehicular Application -- 7.1 Normal Operation -- 7.2 Abnormal Operation -- 7.3 Observation Table -- 8 Conclusion -- References -- Transfer Learning of Mammogram Images Using Morphological Bilateral Subtraction and Enhancement Filter -- 1 Introduction -- 2 Contrast Enhancement -- 3 Histogram Equalization (HE) -- 4 Contrast Limited Adaptive Histogram Equalization (CLAHE) -- 4.1 Histogram Modified - Local Contrast Enhancement (HM-LCE). 327 $a5 Related Works -- 6 Image Segmentation -- 6.1 Mathematical Morphological Operations -- 7 Proposed Contrast Enhancement Using Modified Bi-level Histogram with Homomorphic Filter (MBH-HF) -- 7.1 Modified Bi-level Histogram -- 8 Experimental Analysis -- 8.1 Dataset Used -- 8.2 Experimental Result Analysis -- 9 Conclusion -- References -- Deep Learning Based Bengali Image Caption Generation -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Processing of Dataset -- 3.2 Extraction of Feature -- 3.3 Embedding -- 3.4 Encoder -- 3.5 Decoder -- 4 Experimental Setup -- 4.1 Output Generation -- 4.2 Result Analysis -- 5 Comparison -- 6 Future Scope and Conclusion -- References -- Analyzing Deep Neural Network Algorithms for Recognition of Emotions Using Textual Data -- 1 Introduction -- 2 Related Work -- 3 Research Methodology -- 3.1 Collection of Dataset -- 3.2 Data Pre-processing -- 3.3 Feature Extraction -- 3.4 Emotion Detection Using Deep Learning Models -- 4 Result and Analysis -- 5 Conclusion and Future Work -- References -- Smart Energy Saver -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 4 Implementation -- 5 Result and Analysis -- 6 Conclusion and Future Work -- References -- Agile Helmet-A Smart Secure System for Motorbike -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Helmet Module -- 3.2 Vehicle Module -- 4 Implementation -- 5 Results -- 5.1 Outputs -- 5.2 Performance Analysis -- 6 Conclusion and Future Work -- References -- Decentralized Digital Identity: A New Form of Secured Identity Using Blockchain Technology -- 1 Introduction -- 2 The Concept of Personal Identity -- 2.1 The model of Digital Identity Using Blockchain Technology -- 3 Materials and Methods -- 4 Result and Analysis -- 4.1 Biomedical Blockchain -- 4.2 Transport Blockchain -- 5 Conclusions -- References. 327 $aObject Detection with YOLO Version 3 for Big Data -- 1 Introduction -- 2 Literature Review -- 2.1 Artificial Neural Networks -- 2.2 Convolutional Neural Networks -- 2.3 Residual Network -- 2.4 Some Related Object Detection Techniques -- 3 Proposed Method: You Only Look Once (YOLO) -- 3.1 Prediction of Each Grid Cell -- 3.2 Necessity of Anchor-Boxes -- 3.3 Prediction of Anchor Boxes in YOLOv2 and Later -- 3.4 The Total Number of Bounding Box that YOLOv3 Can Predict -- 4 Implementation -- 4.1 Model Advancement -- 4.2 API Advancement -- 5 Conclusions and Future Work -- References -- Efficient Approach for Virtual Machine and Resource Allocation in Cloud Computing -- 1 Introduction -- 2 System Model -- 2.1 Actors in the Model -- 2.2 Mathematical Model for Resource Allocation and Profit Maximization -- 2.3 Mapping Strategy -- 3 Implementation -- 4 Result Analysis -- 5 Conclusions and Future Work -- References -- A Novel Approach for Service Selection and Ranking in Federated Cloud -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Ordered Weighted Averaging Method -- 4 VIKOR Method -- 5 Federated Cloud Service Broker (FCSB) Model -- 6 Service Selection Problem Scenario -- 7 User Preference Based Brokerage (UPB) Method -- 8 Simulation and Result Analysis -- 9 Conclusions and Future Work -- References -- A Review on IoT Based Wireless Sensor Network and Security -- 1 Introduction -- 2 Related Method -- 3 Wireless Sensor Network (WSN) -- 4 Data Aggregation -- 5 Conclusion and References -- References -- Automated Spoken Language Identification Using Convolutional Neural Networks & -- Spectrograms -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data and Pre-processing -- 3.2 Design and Training -- 3.3 Evaluation of the Model -- 4 Results and Discussions -- 5 Conclusion -- References. 327 $aA Software Quality Characteristics Optimization Model to Reduce Evaluation Overhead -- 1 Introduction -- 2 Related Study -- 3 Proposed Work -- 3.1 Attribute Categorization -- 3.2 Software Quality Attribute Optimization -- 4 Results Analysis -- 5 Conclusion and Future Work -- References -- Smart Home Using Internet of Things -- 1 Introduction -- 2 Cisco Packet Tracer Software -- 3 Literature Review -- 4 Methodology -- 5 Safe Home Implementation -- 6 Discussion and Result -- 7 Conclusion -- References -- ADAPT- Automated Defence TrAining PlaTform in a Cyber Range -- 1 Introduction -- 2 Research Background and Related Work -- 3 Research Methodology -- 4 Proposed System -- 4.1 Profile-Based Training Design -- 4.2 System Design -- 4.3 System Implementation -- 5 System Evaluation -- 6 Conclusion and Future Work -- A Sample Exercise Questions -- References -- An Improved Recommender System for Dealing with Data Sparsity Using Autoencoders and Neural Collaborative Filtering -- 1 Introduction -- 2 The Proposed Method -- 2.1 Recommendation System Frameworks -- 2.2 Autoencoder Based Feature Extraction -- 2.3 Embedding -- 2.4 Matrix Factorization -- 2.5 Generalized Matrix Factorization -- 2.6 Multilayer Perceptron -- 2.7 Neural Matrix Factorization -- 3 Dataset -- 4 Results and Discussions -- 4.1 Metrics for Evaluation -- 4.2 Experiment 1: Training of Models and Comparison of Performance -- 4.3 Experiment 2: Influence of the Sampling Ratio in the Dataset -- 4.4 Experiment 3: The Number of Predictive Factors -- 4.5 Experiment 4: The Factor K in the Evaluation -- 4.6 Experiment 5: Architecture of the Neural Network in MLP -- 4.7 Comparison with Existing Methods -- 5 Conclusion and Future Enhancements -- References -- Neural Network Based Algorithm to Estimate the Axial Capacity of Corroded RC Columns -- 1 Introduction -- 2 Research Significance -- 3 Methodology. 327 $a3.1 Data Bank -- 3.2 Preparation of Dataset -- 3.3 Performance Criteria -- 4 Artificial Neural Network -- 4.1 Development of ANN Model -- 5 Results and Discussion -- 6 Conclusion -- References -- ML-Based Computational Model to Estimate the Compressive Strength of Sustainable Concrete Integrating Silica Fume and Steel Fibers -- 1 Introduction -- 2 Research Significance -- 3 Methodology -- 3.1 Data Bank -- 3.2 Preparation of Data -- 4 ANN -- 4.1 Development of ANN Model -- 5 Results and Discussion -- 6 Formulation -- 7 Conclusion -- References -- Indian Sign Language Digit Translation Using CNN with Swish Activation Function -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Dataset -- 3.2 Preprocessing -- 3.3 Proposed CNN Architecture -- 3.4 Experimental Setup -- 4 Results and Discussion -- 4.1 Performance -- 4.2 Comparison with Other Models -- 5 Conclusion and Future Scope -- References -- Prognosis of Viral Transmission in Naturally Ventilated Office Rooms Using ML -- 1 Introduction -- 2 Existing Literature -- 3 Channelization of Data -- 3.1 Collection of Data -- 3.2 Criteria for Evaluation -- 3.3 Data Normalization -- 4 Machine Learning (ML) Algorithms -- 4.1 Support Vector Machine (SVM) -- 4.2 Ensemble Learning (EL) -- 4.3 Gaussian Process Regression (GPR) -- 5 Results and Discussion -- 5.1 Application of ML Algorithms -- 5.2 Results of Machine Learning Models -- 5.3 Discussion -- 6 Conclusion -- References -- Impact of Organization Justice on Organizational Citizenship Behavior and Employee Retention -- 1 Introduction -- 2 Organizational Justice and Employee Retention -- 3 Organizational Justice and Organisational Citizenship Behavior -- 4 Organisational Citizenship Behavior and Employee Retention -- 5 Organizational Justice, Organizational Citizenship Behaviour and Employee Retention: Mediation Analysis -- 6 Research Methodology. 327 $a7 Results. 330 $aThis book (proceedings of ISMS 2022) is intended to be used as a reference by students and researchers who collect scientific and technical contributions with respect to models, tools, technologies and applications in the field of information systems and management science. This textbook shows how to exploit information systems in a technology-rich management field. The book introduces concepts, principles, methods, and procedures that will be valuable to students and scholars in thinking about existing organization systems, proposing new systems, and working with management professionals in implementing new information systems. 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v671 606 $aComputational intelligence 606 $aEngineering?Data processing 606 $aManagement 606 $aComputational Intelligence 606 $aData Engineering 606 $aManagement 610 $aTechnology 610 $aTechnology & Engineering 615 0$aComputational intelligence. 615 0$aEngineering?Data processing. 615 0$aManagement. 615 14$aComputational Intelligence. 615 24$aData Engineering. 615 24$aManagement. 676 $a658.4038 702 $aGarg$b Lalit 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910725081903321 996 $aKey Digital Trends Shaping the Future of Information and Management Science$93430600 997 $aUNINA