LEADER 12676nam 22006615 450 001 9910878978003321 005 20240804130639.0 010 $a9789819738106$b(electronic bk.) 010 $z9789819738090 024 7 $a10.1007/978-981-97-3810-6 035 $a(MiAaPQ)EBC31579778 035 $a(Au-PeEL)EBL31579778 035 $a(CKB)33645284400041 035 $a(DE-He213)978-981-97-3810-6 035 $a(EXLCZ)9933645284400041 100 $a20240804d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aUniversal Threats in Expert Applications and Solutions $eProceedings of 3rd UNI-TEAS 2024, Volume 1 /$fedited by Vijay Singh Rathore, Joao Manuel R. S. Tavares, B. Surendiran, Anil Yadav 205 $a1st ed. 2024. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2024. 215 $a1 online resource (509 pages) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v1006 311 08$aPrint version: Rathore, Vijay Singh Universal Threats in Expert Applications and Solutions Singapore : Springer,c2024 9789819738090 327 $aIntro -- Preface -- Acknowledgements -- About This Book -- Contents -- Editors and Contributors -- An Advanced Algorithm and Utility for Identifying Critical Web Vulnerabilities with Exceptional Performance -- 1 Introduction -- 1.1 Automated Testing Mechanisms -- 1.2 Use of Machine Learning Techniques -- 1.3 Techniques for Reducing Input Data Space -- 1.4 Scanning Tool Development -- 2 Considered Website Vulnerability -- 2.1 SQL Injection -- 2.2 Cross-Site Scripting -- 3 Related Study -- 4 Proposed and Improved Algorithms -- 5 Algorithm for Detecting XSS -- 6 Enhancing Vulnerability Detection through the Application of Machine Learning -- 7 Scanning Tool -- 8 Systematic Flow of GKD Website Scanner -- 9 Conclusion -- References -- Potential Impacts of Online-Based Learning 2.0 and Certification on Employability -- 1 Introduction -- 1.1 Background -- 1.2 Statement of the Problem -- 1.3 Study Rationale -- 1.4 Purpose of This Work -- 1.5 Limitations and Scope of the Work -- 1.6 Research Hypothesis -- 2 Research Methodology -- 2.1 The Sample Size of the Work -- 2.2 Data Collection -- 3 Data Analysis, Results, and Discussions -- 3.1 Average Age -- 3.2 Education Background -- 3.3 Employment -- 3.4 Online Certification -- 3.5 Online-Based Certification Availability -- 3.6 Online-Based Certification Acceptance -- 3.7 Online Certification Improves Skill Development -- 3.8 Online-Based Certification Increases Employability -- 3.9 Online Learning Fosters the Development of Reflective and Critical Thinking -- 3.10 Online Education is Useful for a Wide Range of Professions in Many Industries -- 3.11 Online-Based Learning Provides Knowledge as Required -- 3.12 Online Learning is Advantageous for Career Development and Ongoing Education -- 4 Conclusion -- References. 327 $aAn Intelligent Self-Driving Car's Design and Development, Including Lane Detection Using ROS and Machine Vision Algorithms -- 1 Existing Work -- 2 Proposed System -- 2.1 Mechanical -- 2.2 Electrical -- 2.3 Algorithm and Machine Vision -- 3 Implementation -- 3.1 Canny Edge Detection -- 3.2 Region of Interest -- 3.3 Hough Transform -- 3.4 Average Slope Intercept -- 3.5 Curvature Calculation -- 3.6 Sliding Window Approach -- 4 Results and Discussion -- 5 Conclusion -- References -- Text Summarization for Kannada Text Documents: A Review -- 1 Introduction -- 2 Review of Literature -- 3 Datasets -- 3.1 Kannada Treebank -- 3.2 Kannada-MNIST: A New Handwritten Digit Dataset for the Kannada Language -- 3.3 Samanantar: Parallel Corpora Collection for 11 Indic Languages -- 3.4 MLe2e -- 3.5 IndicCorp -- 4 Evaluation Measures -- 5 Conclusion and Future Works -- References -- Solar Panel Tracking with Battery-Assisted and Battery Charging Modes -- 1 Introduction -- 2 Literature Review -- 3 Methods and Materials -- 3.1 Implementation Using MATLAB -- 3.2 Charging Mode -- 3.3 Discharging Mode -- 4 Results and Discussion -- 4.1 Hardware Implementation -- 5 Conclusion -- References -- Elevator-Based Earth Tremor Sentinel Technique with MQTT Protocol -- 1 Introduction -- 2 Related Work -- 2.1 Perseverance of Artificial Neural Networks (ANN) in Elevators -- 2.2 Purpose of Accelerometer in Elevators -- 2.3 Precedence of MQTT -- 3 Methodology -- 3.1 The Layout of the Proposed Model -- 3.2 Machine Learning Models for Earthquake Detection -- 3.3 Programming an AI Neural Network -- 4 Discussion -- 5 Conclusion -- References -- An Efficient System Model for Identification of Drug Addiction -- 1 Introduction -- 2 Related Work -- 3 Prpopsed Methodology -- 3.1 Attribute Selection -- 3.2 ID3 Algorithm -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References. 327 $aDesign and Analysis of a Multipath Routing Protocol to Enhance QoS in MANET -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 3.1 Proposed Algorithm -- 4 Results Analysis -- 4.1 Simulation Parameters -- 4.2 Packet Sents -- 4.3 Packet Receives -- 4.4 Percentage of Data Receives (PDR) -- 4.5 Normal Routing Load (NRL) -- 5 Conclusion -- References -- Tagging of Uterine Cervix Cases at Cell and Slide Level Through Transfer Learning -- 1 Introduction -- 1.1 Deep Neural Network -- 1.2 Transfer Learning -- 1.3 ResNet50 -- 1.4 Cervical Cancer -- 2 Literature Review -- 3 Material and Method -- 3.1 Data -- 3.2 Methodology -- 4 Result and Analysis -- References -- Estimation of Medical Expenses Using Machine Learning -- 1 Introduction -- 2 Methodology Applied -- 2.1 Dataset -- 2.2 Feature Engineering -- 2.3 Feature Importance Analysis -- 3 Used Models and Algorithms -- 4 Experiment Results -- 5 Conclusion -- Challenges in Making OCR of Gujarati Newspaper -- 1 Introduction -- 2 Review of Literature -- 2.1 Review on Segmentation -- 2.2 Review on Recognition Text -- 3 Problem in Gujrati Language Newspaper -- 3.1 Scanner Image Quality -- 3.2 Background Noise -- 3.3 Font and Style Variation -- 3.4 Text Size Variation -- 3.5 Complex Ligatures in the Script -- 3.6 Limited Trained Data -- 4 Observation -- 5 Conclusion -- References -- A Hybrid Methodology for Software Development and IT Team Analysis in Manufacturing -- 1 Introduction -- 2 Methods -- 2.1 A Comparison of Project Durations Before and After Model Release -- 2.2 Before and After the Model's Release on DRE -- 2.3 A Comparison of the Costs of Development and Maintenance -- 2.4 Criticality-Based Development to Maintenance Ratio of a Project -- 2.5 A Maintenance Ratio Determined by the Number of Lines of Code -- 3 Conclusion -- References. 327 $aAI Enabled Convolutional Neural Networks to Detect Brain Tumors -- 1 Introduction -- 2 Literature Review -- 3 Problem Statement -- 4 Proposed Methodology -- 4.1 Image Database -- 4.2 Data Augmentation with Pre-Processing -- 4.3 Data Split -- 5 Results -- 6 Analysis -- 7 Conclusion -- References -- Increasing Productivity in Software Development Through the Use of Docker Technology -- 1 Introduction of Dockers -- 1.1 Docker -- 1.2 Docker File -- 1.3 Docker Image -- 2 Experiment -- 2.1 Docker Java Image File -- 2.2 Python-Enabled Docker Image File -- 2.3 Comparative Results -- 3 Conclusion -- 4 Future Scope -- References -- Multimodal Fusion-Based Hybrid CRNN Model for Emotion Prediction in Music -- 1 Introduction -- 1.1 Key Contribution -- 2 Article Organization -- 3 Related Work -- 4 Methodology -- 4.1 Data Description -- 4.2 Pre-Processing -- 4.3 Feature Extraction -- 5 Proposed Model -- 5.1 Multimodel Fusion -- 6 Result and Discussion -- 6.1 Experimental Setup for the Proposed System -- 6.2 Implementation Details -- 7 Conclusion -- References -- Multimodal Analysis of Induction Motor Signals for Power Quality Abnormality Detection Using Wavelet-RBF Approach -- 1 Introduction -- 2 Research Contribution -- 3 Proposed Methodology -- 3.1 Wavelet Transform -- 3.2 RBF Neural Networks -- 4 Result Analysis and Discussion -- 4.1 Vibration Analysis Using Sensor and Current Transformer -- 5 Conclusion -- References -- Smart Electronic Speaking Glove for Physically Challenged Person -- 1 Introduction -- 1.1 Research Contribution -- 2 Proposed Methodology -- 3 Implementation and Execution -- 3.1 Hardware Description -- 3.2 Implemented in Proteus Simulation -- 4 Result and Discussion -- 5 Conclusion -- References -- COVID-19 Detection Using Fourier-Bessel Series Expansion-Based Dyadic Decomposition and Custom CNN -- 1 Introduction -- 1.1 Author Contribution. 327 $a2 Article Organisation -- 3 Related Work -- 4 Methodology -- 4.1 Data Description -- 4.2 Image Preprocessing -- 4.3 FBD Methodology -- 5 Proposed Model -- 5.1 SMOTETomek -- 5.2 Keras Tunner -- 6 Result and Discussion -- 6.1 Experimental Configuration for the Suggested System -- 7 Conclusion -- References -- Instantaneous Interpretation into Sign Language for the Hearing Impaired -- 1 Introduction -- 1.1 Feature Extraction -- 1.2 NLP -- 1.3 CNN -- 2 Literature Survey -- 2.1 Improvement of Speech -- 2.2 Translation from Speech to Sign Language -- 2.3 Converter from Speech to Sign Language -- 3 Proposed Methodology -- 3.1 Deaf People's Model -- 3.2 Mute People Model -- 4 Analysis by Comparison to the Current Model -- 5 Conclusion -- 6 Future Scope -- References -- A Review of Anomaly Based Multiple Intrusion Detection Methods Using a Feature Based Deep Learning Approach -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- Correlation of Traditional Technique and ML-Based Technique for Efficient Effort Estimation: In Agile Frameworks -- 1 Introduction -- 2 Related Work -- 2.1 Non-Algorithmic Technique-Based Effort Estimation in Agile -- 2.2 Algorithmic Technique-Based Effort Estimation in Agile -- 2.3 Machine Learning-Based Effort Estimation in Agile -- 3 Research Objective -- 3.1 Research Question -- 3.2 Question Objective -- 4 Research Methodology -- 4.1 (RQ1) What Are the Various Traditional Techniques for Effort Estimation in an Agile Context? -- 4.2 (RQ2) What Are the Different ML Techniques for Effort Estimation in an Agile Context? -- 4.3 (RQ3) Which ML Algorithm Outperformed Among Themselves and What Are the Different Metrics Used to Determine the Accuracy of ML Techniques? -- 5 Results -- 6 Conclusion and Discussion -- References. 327 $aNLP-Based Processing of Gujarati Compound Word Sandhi's Generation and Segmentation. 330 $aThis book presents high-quality, peer-reviewed papers from 3rd International Conference on ?Universal Threats in Expert Applications and Solutions" (UNI-TEAS 2024), jointly being organized by IES University, Bhopal, and Shree KKarni Universe College, Jaipur, in association with CSI Jaipur Chapter and Jaipur ACM Professional Chapter during January 6?9, 2024. The book is a collection of innovative ideas from researchers, scientists, academicians, industry professionals, and students. The book covers a variety of topics, such as expert applications and artificial intelligence/machine learning; advance web technologies such as IoT, big data, cloud computing in expert applications; information and cyber security threats and solutions, multimedia applications in forensics, security and intelligence; advancements in app development; management practices for expert applications; and social and ethical aspects in expert applications through applied sciences. 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v1006 606 $aComputational intelligence 606 $aData protection 606 $aArtificial intelligence 606 $aComputational Intelligence 606 $aData and Information Security 606 $aArtificial Intelligence 615 0$aComputational intelligence. 615 0$aData protection. 615 0$aArtificial intelligence. 615 14$aComputational Intelligence. 615 24$aData and Information Security. 615 24$aArtificial Intelligence. 676 $a006.3 700 $aRathore$b Vijay Singh$01733795 701 $aTavares$b Joao Manuel R. S$0872315 701 $aSurendiran$b B$01764998 701 $aYadav$b Anil$01764999 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910878978003321 996 $aUniversal Threats in Expert Applications and Solutions$94206236 997 $aUNINA