LEADER 10833nam 22004813 450 001 9910766892903321 005 20231128080241.0 010 $a981-9959-97-7 035 $a(MiAaPQ)EBC30970255 035 $a(Au-PeEL)EBL30970255 035 $a(CKB)29038781000041 035 $a(EXLCZ)9929038781000041 100 $a20231128d2024 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDecision Intelligence $eProceedings of the International Conference on Information Technology, InCITe 2023, Volume 1 205 $a1st ed. 210 1$aSingapore :$cSpringer,$d2024. 210 4$d©2023. 215 $a1 online resource (416 pages) 225 1 $aLecture Notes in Electrical Engineering Series ;$vv.1079 311 08$aPrint version: Murthy, B. K. Decision Intelligence Singapore : Springer,c2024 327 $aIntro -- Preface -- Contents -- About the Editors -- A Radio Frequency-Based Energy Harvesting Model for IoMT Device -- 1 Introduction -- 1.1 Contribution -- 2 Related Works -- 3 Proposed Model -- 3.1 RFEH Model -- 3.2 RFEH-IoMT Model -- 4 Performance Analysis -- 5 Conclusion -- References -- Cancer Hotspot Identification and Analysis: A Scan Statistics Approach -- 1 Introduction -- 1.1 Research Problem -- 1.2 Related Work -- 2 Relevance -- 3 Objective -- 4 Data Design and Processing -- 5 Methodology Adopted -- 5.1 Hotspot Analysis -- 5.2 Welch's T-test -- 6 Spearman's Rank Correlation Coefficient (rs) -- 7 Results and Discussion -- 7.1 Hotspot Detection -- 7.2 Descriptive Approach -- 8 Conclusion -- 9 Limitations -- 10 Scope for Future Research -- References -- An Artificial Voice Box that Makes Use of Unconventional Methods of Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Materials and Methods -- 3.1 Neuro Decoder -- 3.2 Artificial Voice Box -- 4 Conclusion -- References -- State-of-Art Review on Medical Image Classification Techniques -- 1 Introduction -- 2 Image Pre-processing Techniques for Medical Images -- 2.1 Image Filtering -- 2.2 Segmentation -- 3 Feature Selection and Feature Extraction -- 4 Classification Techniques -- 4.1 Using Traditional Classifiers -- 4.2 Using Deep Learning Algorithms -- 5 Conclusion -- References -- Prediction of Loan Approval of Customers Based on Credit Score Using Machine Learning -- 1 Introduction -- 2 Motivation -- 3 Literature Survey -- 4 Methodology -- 4.1 Dataset -- 4.2 Credit Score -- 4.3 Pre-processing -- 4.4 Logistic Regression -- 4.5 K-Nearest Neighbour -- 4.6 Decision Tree -- 4.7 Random Forest -- 4.8 Linear Discriminant Analysis -- 5 Result Analysis -- 6 Conclusion and Future Scope -- References. 327 $aStrategies for the Adoption of AI Technologies in the South African Wine and Fruit Industries -- 1 Introduction -- 2 Literature Review -- 2.1 AI Technologies for the SA Agricultural Sector -- 2.2 Barriers and Challenges of Adopting AI Technologies in Agriculture -- 3 Research Design and Methodology -- 4 Findings and Discussion -- 4.1 Current AI Technologies in Agricultural Processes -- 4.2 Challenges of Adopting AI Technologies -- 4.3 Strategies to Facilitate the Adoption of AI Technologies in Agriculture -- 5 Conclusion -- References -- Real-Time Facial Mask Detection Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Collection -- 3.2 Model -- 3.3 Training -- 4 Result -- 5 Limitations -- 6 Conclusion and Future Scope -- References -- SSATS-Enhancement of Semantic Similarity of Abstractive Text Summarization Using Transformer -- 1 Introduction -- 2 Key Contributions -- 3 Literature Survey -- 4 Proposed Methodology -- 5 Experiments -- 5.1 Dataset -- 5.2 Metrics -- 6 Results and Discussion -- 7 Conclusion and Future Work -- References -- Semantic Segmentation of Optical Satellite Images -- 1 Introduction -- 2 Evaluation Metric -- 3 Related Work -- 4 Comparison Between State-of-the-Art Methods -- 5 Future Work and Challenges -- 6 Conclusion -- References -- Human Gender and Age Estimator Using Local and Global Features with Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Data Acquisition -- 3.2 Pre-processing -- 3.3 Face Detection -- 3.4 Adaboost Algorithm -- 3.5 Feature Extraction -- 3.6 HOG Descriptors-Histogram of Oriented Gradients -- 3.7 LBP-Local Binary Pattern -- 3.8 Feature Reduction Using PCA -- 3.9 Principle Component Analysis (PCA) -- 3.10 SVM-Support Vector Machine Classifier -- 4 Experimental Results -- 4.1 Training and Testing -- 5 Conclusion -- References. 327 $aPredictive Analysis of Neurodegenerative and Chronic Fatigue Disease -- 1 Introduction -- 1.1 Literature Review -- 2 Methodology -- References -- An Automatic Early Alert System on Detecting Dozing Driver -- 1 Introduction -- 2 Related Research Work -- 3 Proposed Methodology -- 3.1 Facial Landmark Identification -- 3.2 Eye Closing Detection -- 3.3 Yawning Detection -- 3.4 Alert -- 4 Experimental Results -- 5 Conclusion -- References -- Reversible Image Steganography to Achieve Effective PSNR -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Reversible Image Steganography Methods for Compressed Images -- 3.2 Reversible Steganography Methods for Coded Images -- 3.3 High-Capacity Techniques for Reversible Image Steganography -- 3.4 Performance Study for Reversible Image Steganography -- 4 Experimental Results -- 5 Conclusion -- References -- EDA and Predicting Customer's Response for Cross-Sell Vehicle Insurance -- 1 Introduction -- 2 Literature Review -- 2.1 Why ML in Insurance -- 2.2 Related Work -- 3 Data Collection and Understanding -- 4 Work Flow and Framework of the Proposed Analysis -- 5 Data Preparation -- 6 Techniques Employed -- 7 Results and Discussion -- 8 Conclusion and Future Work -- References -- A Study of Feature-Based and Pixel-Level Image Fusion Techniques -- 1 Introduction -- 2 Pixel Fusion -- 3 Feature Level -- 4 Discrete Wavelet Transform -- 5 C-Mean Fuzzy Clustering -- 6 The Proposed Model -- 7 Performance Measures -- 7.1 Standard Deviation (SD) -- 7.2 Entropy (En) -- 7.3 Signal-to-Noise Ratio (SNR) -- 7.4 Deviation Index (DI) -- 8 Results -- 9 Conclusion -- References -- Catch Your Session, Track Your Pulse e-Health Service Using Blockchain -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Proposed System -- 5 Architecture System -- 5.1 Patient information management Module -- 5.2 Slot Booking Module. 327 $a6 Results and Analysis -- 7 Conclusion -- References -- Ansuni Baat-A Bridge to Sign Language Communication -- 1 Introduction -- 1.1 Aim and Features -- 1.2 Background of the Study -- 2 Literature Review -- 3 System Analysis -- 3.1 Software Requirement Specification -- 3.2 Flow Diagram for the System -- 4 Methodology -- 4.1 Front-end -- 4.2 Back-end -- 4.3 Database -- 5 Result -- 6 Conclusion -- 7 Future Scope -- References -- A Review of Deep Learning Algorithms for Early Detection of Oral Mouth Cancer -- 1 Introduction -- 2 Research Approach -- 2.1 Research Question -- 2.2 Data Source -- 2.3 Paper Selection Criteria -- 3 Findings -- 4 Future Challenges -- 5 Conclusion -- References -- Malware Detection Using Deep Learning -- 1 Literature Review -- 2 Linear Regression -- 3 Types of Malwares -- 3.1 Virus -- 3.2 Worm -- 3.3 Trojan Horse -- 3.4 Spyware -- 3.5 Rootkit -- 4 Malware Detection -- 4.1 Anomaly Detection -- 4.2 Signature Detection -- 4.3 Specification-Based Detection -- 5 Botnet -- 5.1 How Botnet Attacks IoT Devices -- 5.2 Feature Selection -- 6 Algorithms Used -- 6.1 Logistic Regression -- 6.2 F1 Score -- 6.3 Epoch -- 6.4 KERAS -- 6.5 Standardization -- 7 Attributes of Datasets Used in the Project -- 7.1 KNN -- 7.2 Decision Tree -- 7.3 ANN -- 7.4 Logistic Regression -- 7.5 Naïve Bayes -- 7.6 SVM -- 8 Conclusion -- References -- Automatic Title Generation with Attention-Based LSTM -- 1 Introduction -- 1.1 Motivation and Justification of Automatic Title Generation -- 1.2 Contribution of the Proposed Work -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Sequence-to-Sequence (Seq-to-Seq) Model -- 3.2 Seq-to-Seq Model Components -- 4 Experimental Setup and Result -- 4.1 Data Collection -- 4.2 Data Preprocessing -- 4.3 Train the Processed Data Using the Seq-to-Seq Model -- 5 Conclusion of the Proposed Work and Future Work -- References. 327 $aCOVID-19 (COV-19) Spreading Diagnoses by Feature Representation Method Through Visual Learning (FVisL-CoV19) -- 1 Introduction -- 2 Related Works -- 3 Proposed Model -- 3.1 Feature Illustration of Visible-Learning-Methodology (FVisL-CoV19) -- 3.2 CoV19 Spreading Diagnoses Algorithm -- 4 Results and Discussions -- 4.1 Dataset Evaluation -- 4.2 Evaluation Metrics -- 4.3 Results -- 5 Conclusions -- References -- Alzheimer's Disease Classification Using Deep Learning Models -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 3.1 Input -- 3.2 Data Pre-processing -- 3.3 Model Building -- 4 Results and Discussion -- 5 Conclusion -- References -- Brain Pathology Detection Using Convolutional Neural Network from EEG Signal -- 1 Introduction -- 2 Related Works -- 3 Methodology and Design -- 4 Implementation and Results -- 5 Conclusion -- References -- CNN-Based Adversarial Embedding for Image Steganograpy -- 1 Introduction -- 2 Literature Review -- 3 Methods -- 3.1 Existing Methods -- 3.2 Proposed Methods -- 4 Result and Discussion -- 5 Conclusion -- References -- Machine Learning Approaches for Entity Extraction from Citation Strings -- 1 Introduction -- 2 Related Work -- 2.1 Non-machine Learning based Approaches -- 2.2 Machine Learning based Approaches -- 2.3 Limitations of Machine Learning based Approaches -- 2.4 Combination of Machine Learning and non-Machine Learning methods -- 3 Comparative Analysis -- 4 Conclusion -- 5 Future Scope -- References -- A Survey on Brain Tumor Segmentation with Missing MRI Modalities -- 1 Introduction -- 2 Methodologies -- 2.1 Common Latent Space -- 2.2 Knowledge Distillation Network -- 2.3 Mutual Information Maximization -- 3 Dataset -- 4 Evaluation Metrices -- 5 Experimental Analysis -- 6 Conclusion and Future Work -- References. 327 $aDeep Learning Based Segmentation Approach for Cervical Cancer Detection Using Pap Smears. 410 0$aLecture Notes in Electrical Engineering Series 700 $aMurthy$b B. K$01449923 701 $aReddy$b B. V. R$01449924 701 $aHasteer$b Nitasha$01449925 701 $aVan Belle$b Jean-Paul$01449926 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910766892903321 996 $aDecision Intelligence$93648666 997 $aUNINA