LEADER 04445nam 22006735 450 001 9910736021503321 005 20230731131219.0 010 $a981-9926-80-7 024 7 $a10.1007/978-981-99-2680-0 035 $a(MiAaPQ)EBC30670637 035 $a(Au-PeEL)EBL30670637 035 $a(DE-He213)978-981-99-2680-0 035 $a(PPN)272253359 035 $a(CKB)27899961200041 035 $a(EXLCZ)9927899961200041 100 $a20230731d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProceedings of International Conference on Frontiers in Computing and Systems $eCOMSYS 2022 /$fedited by Ram Sarkar, Sujata Pal, Subhadip Basu, Dariusz Plewczynski, Debotosh Bhattacharjee 205 $a1st ed. 2023. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2023. 215 $a1 online resource (558 pages) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v690 311 08$aPrint version: Sarkar, Ram Proceedings of International Conference on Frontiers in Computing and Systems Singapore : Springer,c2023 9789819926794 327 $aSection 1: Machine Learning and Applications -- Chapter 1. AVENet:Attention based VGG 16 with ELM for obscene image classification -- Chapter 2. Analyzing Market Dynamics of Agricultural Commodities: A Case Study based on Cotton -- Chapter 3. Feature Selection for Nepali Part-Of-Speech Tagging in a Conditional Random Fields based System -- Chapter 4. Design and Development of a ML-based Safety-Critical Fire Detection System -- Chapter 5. Compressed Image Super-Resolution using Pre-trained Model Assistance -- Chapter 6. Optimization of Character Classes in Devanagari Ancient Manuscripts and Dataset Generation -- Chapter 7. Deep Learning based Classification of Rice Varieties from Seed Coat Images -- Chapter 8. Leaf Based Plant Disease Detection Using Intelligent Techniques ? A Comprehensive Survey -- Chapter 9. Bengali Document Retrieval Using Model Combination -- Chapter 10. Deep Neural Networks Fused with Textures for Image Classification -- Chapter 11. Real Time Prediction of In-Hospital Outcomes using a Multilayer Perceptron deployed in a Web-based Application -- Chapter 12. Automated analysis of Connections in Model Diagrams -- Chapter 13. No-reference Image Quality Assessment using Meta-Learning -- Section 2: Security -- Chapter 14. Cryptanalysis of Markle Hellman Knapsack Cipher using Cuckoo Search Algorithm.-Chapter 15. Generating a Suitable Hash Function using Sudoku for Blockchain Network. etc. 330 $aThis book gathers high-quality research papers presented at the 3rd International Conference on Frontiers in Computing and Systems (COMSYS 2022) held at Indian Institute of Technology Ropar, Punjab, India, during December 19?21, 2022. The book covers research in ?cyber-physical systems for real-life applications? pertaining to AI, machine learning, and data science; devices, circuits, and systems; computational biology, biomedical informatics and network medicine; communication networks, cloud computing and IoT; image, video and signal processing; and security and privacy. 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v690 606 $aComputational intelligence 606 $aTelecommunication 606 $aBioinformatics 606 $aData protection 606 $aComputational Intelligence 606 $aCommunications Engineering, Networks 606 $aComputational and Systems Biology 606 $aData and Information Security 615 0$aComputational intelligence. 615 0$aTelecommunication. 615 0$aBioinformatics. 615 0$aData protection. 615 14$aComputational Intelligence. 615 24$aCommunications Engineering, Networks. 615 24$aComputational and Systems Biology. 615 24$aData and Information Security. 676 $a006.3 700 $aSarkar$b Ram$01380273 701 $aPal$b Sujata$01380274 701 $aBasu$b Subhadip$01380275 701 $aPlewczynski$b Dariusz$01380276 701 $aBhattacharjee$b Debotosh$01380277 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910736021503321 996 $aProceedings of International Conference on Frontiers in Computing and Systems$93421557 997 $aUNINA