LEADER 03781nam 22006735 450 001 9910735798103321 005 20251009083557.0 010 $a9789819936083 010 $a981993608X 024 7 $a10.1007/978-981-99-3608-3 035 $a(MiAaPQ)EBC30657012 035 $a(Au-PeEL)EBL30657012 035 $a(DE-He213)978-981-99-3608-3 035 $a(PPN)272252476 035 $a(CKB)27675021100041 035 $a(OCoLC)1390923456 035 $a(EXLCZ)9927675021100041 100 $a20230719d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSoft Computing for Security Applications $eProceedings of ICSCS 2023 /$fedited by G. Ranganathan, Youssouf EL Allioui, Selwyn Piramuthu 205 $a1st ed. 2023. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2023. 215 $a1 online resource (921 pages) 225 1 $aAdvances in Intelligent Systems and Computing,$x2194-5365 ;$v1449 311 08$aPrint version: Ranganathan, G. Soft Computing for Security Applications Singapore : Springer Singapore Pte. Limited,c2023 9789819936076 327 $aChapter 1: Designing Recommendation System For Hotels Using Cosine Similarity Function -- Chapter 2: Vehicle Detection in Autonomous Vehicles using Computer Vision -- Chapter 3: Analysis of the Volume of Costs and Profits Under Conditions of Uncertainty Using the Method of Fuzzy Logic -- Chapter 4: Deep Learning based Sign Language Recognition and Translation -- Chapter 5: Automated Suspicious Activity Detection from Surveillance Videos -- Chapter 6: Emergence of Blockchain Technology in various Smart IoMT-enabled Healthcare Security Scenarios -- Chapter 7: Elderly People Assistance based on advanced Hardware module and a Mobile App -- Chapter 8: Escasalus-ML Based Food Quality Checker -- Chapter 9: IoT and Machine Learning based Soil Quality and Crop Yield Prediction For Agricultural System -- Chapter 10: Blockchain Technology Based Holiday Exchange Network. etc. 330 $aThis book features selected papers from the International Conference on Soft Computing for Security Applications (ICSCS 2023), held at Dhirajlal Gandhi College of Technology, Tamil Nadu, India, during April 21?22, 2023. It covers recent advances in the field of soft computing techniques such as fuzzy logic, neural network, support vector machines, evolutionary computation, machine learning, and probabilistic reasoning to solve various real-time challenges. The book presents innovative work by leading academics, researchers, and experts from industry. 410 0$aAdvances in Intelligent Systems and Computing,$x2194-5365 ;$v1449 606 $aComputational intelligence 606 $aArtificial intelligence 606 $aData protection 606 $aComputer networks$xSecurity measures 606 $aComputational Intelligence 606 $aArtificial Intelligence 606 $aData and Information Security 606 $aMobile and Network Security 615 0$aComputational intelligence. 615 0$aArtificial intelligence. 615 0$aData protection. 615 0$aComputer networks$xSecurity measures. 615 14$aComputational Intelligence. 615 24$aArtificial Intelligence. 615 24$aData and Information Security. 615 24$aMobile and Network Security. 676 $a005.8 700 $aRanganathan$b G$01265537 701 $aEL Allioui$b Youssouf$01379322 701 $aPiramuthu$b Selwyn$0915330 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910735798103321 996 $aSoft Computing for Security Applications$93418749 997 $aUNINA