LEADER 10582nam 22004333 450 001 9910799233303321 005 20240202080215.0 010 $a981-9969-84-0 035 $a(CKB)29526890300041 035 $a(MiAaPQ)EBC31094201 035 $a(Au-PeEL)EBL31094201 035 $a(EXLCZ)9929526890300041 100 $a20240202d2024 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aIntelligent Systems for Smart Cities $eSelect Proceedings of the 2nd International Conference, ICISA 2023 205 $a1st ed. 210 1$aSingapore :$cSpringer Singapore Pte. Limited,$d2024. 210 4$d©2024. 215 $a1 online resource (522 pages) 311 08$a9789819969838 327 $aIntro -- Preface -- Contents -- About the Editors -- Intelligent Systems for Cyber Security, Social Media and Crime Prevention -- Manifesta: An Event Management Platform Using Recommendation System -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Data Flow Models -- 3.2 Database Design -- 3.3 Frontend Development -- 3.4 Backend Development -- 3.5 Chatbot -- 3.6 Apriori Algorithm -- 3.7 FP-Growth Algorithm -- 3.8 Measurement Metrics -- 4 Implementation -- 4.1 User Module -- 4.2 Vendor Module -- 4.3 Admin Module -- 4.4 Recommendation System -- 5 Result and Discussion -- 6 Conclusion -- 7 Future Scope -- References -- An Empirical Study on the Information Security Threats Due to Remote Working Environments -- 1 Introduction -- 1.1 Importance of the Research -- 1.2 Research Questions -- 1.3 Research Motivation -- 1.4 Objectives -- 1.5 How the Current Research Objectives Address the Gaps -- 2 Literature Review -- 3 Research Design -- 3.1 Methodology -- 3.2 Data Collection -- 3.3 The Research Model -- 3.4 Hypotheses -- 3.5 Data Analysis -- 3.6 Descriptive Statistics -- 3.7 Construct Reliability and Validity -- 3.8 Discriminant Validity -- 4 Results and Discussion -- 5 Conclusion -- Appendix -- References -- Intelligent Surveillance Tower for Detection of the Drone from the Other Aerial Objects Using Deep Learning -- 1 Introduction -- 2 Proposed System -- 2.1 Dataset -- 2.2 Training -- 2.3 Testing -- 3 Experimental Setup Description -- 4 Results and Discussion -- 5 Conclusion -- References -- A Hybrid Ensemble Machine Learning Approach (EHML) for DDOS Attack Detection in Smart City Network Traffic -- 1 Introduction -- 2 Literature Review -- 2.1 Feature Extraction Technique -- 2.2 Machine Learning Technique -- 3 Proposed System -- 4 Result and Discussion -- 4.1 Dataset Description -- 4.2 Experimental Setup -- 4.3 Performance Parameters. 327 $a4.4 Result Analysis -- 5 Conclusion -- References -- Credit Card Fraud Detection System Using Support Vector Classifier -- 1 Introduction -- 1.1 Statistical Analysis -- 1.2 Motivation -- 2 Literature Review -- 2.1 Support Vector Classifier -- 3 Classification Imbalance Problem -- 4 Proposed Method -- 4.1 Database -- 4.2 Data Preprocessing -- 4.3 Feature Engineering -- 4.4 Dimensionality Reduction -- 4.5 Model Training -- 4.6 Hyperparameter Tuning -- 4.7 Model Validation -- 4.8 Experimental Results -- 5 Conclusion -- References -- Identifying Instances of Cyberbullying on Twitter Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results -- 5 Conclusion -- References -- Machine Learning Techniques for Real-Time Human Face Recognition -- 1 Introduction -- 1.1 Face Recognition System Process -- 1.2 Face Recognizing Verification Structure -- 1.3 Machine Learning -- 1.4 Image Processing -- 2 Literature Review -- 3 Machine Learning Techniques -- 4 Research Methodologies -- 4.1 Datasets -- 4.2 Confusion Matrix and Accuracy Metrics -- 5 Experimental Results and Discussion -- 6 Conclusion -- References -- Image Steganography Using Particle Swarm Optimization -- 1 Introduction -- 2 Literature Review -- 2.1 Jpeg-Jsteg and JQTM Method -- 2.2 The OLSB (Optimal Least Significant Bit) Method -- 3 The Suggested Method -- 3.1 The Embedding Process -- 3.2 The Extracting Procedure -- 3.3 Particle Swarm Optimization Algorithm -- 3.4 Optimal Substitution Matrix Identification Using PSO Algorithm -- 4 Experiment and Result -- 5 Conclusion -- References -- Intelligent Systems in Supply Chain and Logistics -- Intelligent Inventory Management in Retail Stores Using Four State of the Art Object Detection Models -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 System Architecture with Hardware Components. 327 $a3.2 Training Process -- 3.3 Machine Learning Models -- 4 Experimentation and Results -- 4.1 Results -- 4.2 Comparison of All Models -- 5 Data Visualization -- 5.1 YOLOv5 -- 5.2 YOLOv7 -- 6 Conclusion -- References -- Supply Chain Risk Management Through Zero-Trust Architecture -- 1 Introduction -- 2 Literature Review -- 2.1 Related Studies -- 2.2 Cause for the Research -- 2.3 Gap Identification -- 3 Objective and Scope -- 4 Methodology -- 4.1 Step One: Identifying Issues -- 4.2 Comparing Dimensions and Criteria Using a Questionnaire -- 4.3 Step Three: The Importance Assessment -- 4.4 Step Four: Weight Priority Via Fuzzing -- 5 Data Analysis -- 6 Discussions -- 7 Conclusion -- References -- Real Time Food Monitoring and Quality Alert System Using IoT and Streamlit -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Materials and Components -- 3.2 System Architechture -- 3.3 Database and Client Interface -- 4 Results and Discussions -- 5 Conclusion -- References -- Solution of Goal Programming Product Mix Problem with Cohort Intelligence Algorithm -- 1 Introduction -- 2 Methodology -- 2.1 CI with PF-Based Constraint Handling Approach -- 2.2 CI with Prob-Based Constrained Handling Approach -- 2.3 CI with Hybrid PF-Based and Prob-Based Approach -- 3 Problem Description -- 4 Results and Discussion -- 5 Conclusions and Future Directions -- References -- QuickTag: A Machine Learning-Based Automated Toll Collection System Using Optical Character Recognition -- 1 Introduction -- 2 Related Work -- 3 Implementation -- 3.1 Object Detection -- 3.2 Optical Character Recognition -- 4 Results -- 5 Conclusion -- References -- Intelligent Systems for Sustainable Environment -- IoT-Based Pothole Detection and Analysis for Road Quality Assessment and Human Safety Using Machine Learning Approach -- 1 Introduction -- 2 Literature Review. 327 $a3 Summary and Research Gap -- 4 Proposed System -- 4.1 System Architecture with Hardware Components -- 4.2 Hardware Components Used in Proposed Work -- 4.3 Dataset -- 4.4 Model Selection -- 5 Results and Discussion -- 6 Conclusion -- References -- Localised Land-Use Classification Using U-Net and Satellite Imaging -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Pre-processing the Data -- 3.2 U-Net [5] Prediction -- 3.3 QGIS Prediction -- 3.4 QGIS Building Classification -- 4 Results -- 4.1 U-Net [5] Classification -- 4.2 QGIS Classification -- 4.3 U-Net [5] Backbone Comparison -- 4.4 Comparing U-Net [5] and QGIS Classification -- 4.5 Road Networks -- 5 Conclusion -- 6 Future Work -- References -- Intelligent Fire Extinguisher Monitoring System for Smart Cities -- 1 Introduction -- 2 Review on Work Done -- 3 Proposed System -- 3.1 Hardware -- 3.2 Server Application -- 3.3 User Application -- 4 Experimental Setup and Used Algorithms -- 4.1 Email Notification -- 4.2 Prediction Model -- 5 Conclusion -- References -- Performance Analysis of Node Classification to Secure Intelligent Transportation System in VANET -- 1 Introduction -- 2 Literature Review -- 2.1 Related Work -- 3 Adov Protocol -- 3.1 AODV Algorithm -- 4 Knn Algorithm -- 5 Security Threats to Intelligent Transportation Systems -- 6 Methodology -- 7 Performance Matrix -- 8 Result and Discussion -- 9 Conclusion and Future Scope -- References -- Safety and Disaster Evaluation in the Civil Aviation of Iran -- 1 Introduction -- 2 Methods and Materials -- 2.1 Case Study -- 2.2 Data Collection -- 2.3 Fuzzy Failure Mode and Effects Analysis -- 2.4 Methodology -- 3 Results -- 3.1 Determination of Accidents and Serious Incident Cases -- 3.2 Gathering the Official Reports and Information on the Accidents. 327 $a3.3 Analyzing the Reports and Information and Extracting All of the Influential Factors -- 3.4 Implementing FMEA Technique and Statistical Evaluations -- 4 Conclusions -- Appendix A Scoring Scales for Severity, Occurrence, and Detection -- References -- Comparison Between SVR and SVM in Rainfall Estimation from Remote Sensing Data -- 1 Introduction -- 2 Study Area and Data -- 2.1 Study Region -- 3 Data -- 3.1 Data from MSG -- 3.2 Data from Rain Gauge -- 3.3 Correspondence MSG Data/Rain Gauge Data -- 4 Methodology -- 4.1 Support Vector Machine -- 4.2 Learning of SVM and SVR -- 5 Application and Results -- 6 Conclusion -- References -- Investigation of Renewable Energy-Based Power System by Implementing ACO Technique Optimized Secondary Controller for Frequency Regulation -- 1 Introduction -- 2 System Modeling -- 3 Controller Design -- 4 Ant Colony Optimization Technique -- 5 Result Analysis -- 5.1 Case 1: Performance of Thermal with PV Power Plant -- 5.2 Case 2: Performance of Thermal with Wind Power Plant -- 5.3 Case 3: Performance of Thermal with Wind and PV Power Plant -- 6 Conclusion -- References -- Intelligent Systems in Healthcare -- Impact of Deepfakes and Gradient Centralization on COVID-19 Diagnosis: A Compact Swin Transformer-Based Approach -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data -- 3.2 Swin Transformer -- 3.3 Training -- 3.4 Optimizer -- 3.5 Regularization -- 4 Results -- 4.1 Learning Curves -- 4.2 Performance Metrics -- 5 Conclusion -- References -- A Deep Learning Pipeline for Cervical Cancer Detection -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 3.1 Preprocessing -- 3.2 ROI Extraction -- 3.3 HSV Transformation -- 3.4 Green Filter -- 3.5 Feature Extraction -- 3.6 Machine Learning Classifiers -- 4 Result and Discussion -- 4.1 Experimentation Environment -- 4.2 Performance Measure. 327 $a4.3 Performance Analysis. 700 $aKulkarni$b Anand J$01368635 701 $aCheikhrouhou$b Naoufel$01586953 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910799233303321 996 $aIntelligent Systems for Smart Cities$93874228 997 $aUNINA