LEADER 10869nam 22004813 450 001 9910882886203321 005 20240824060222.0 010 $a9789819720897$b(electronic bk.) 010 $z9789819720880 035 $a(MiAaPQ)EBC31609578 035 $a(Au-PeEL)EBL31609578 035 $a(CKB)34145979900041 035 $a(EXLCZ)9934145979900041 100 $a20240824d2024 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSoft Computing $eProceedings of SoCTA 2023, Volume 2 205 $a1st ed. 210 1$aSingapore :$cSpringer,$d2024. 210 4$d©2024. 215 $a1 online resource (472 pages) 225 1 $aLecture Notes in Networks and Systems Series ;$vv.971 311 08$aPrint version: Kumar, Rajesh Soft Computing: Theories and Applications Singapore : Springer,c2024 9789819720880 327 $aIntro -- Preface -- Contents -- Editors and Contributors -- An Extensive Review on Designing of Blood Bank Management System -- 1 Introduction -- 2 Literature Survey -- 2.1 Development of a Blood Bank Management System -- 2.2 Blood Bank Management and Inventory Control Database Management System -- 2.3 Effective Blood Bank Management Based on RFID in Real-Time Systems -- 2.4 Computerized Central Blood Bank Management System (CCBBMS) -- 2.5 Web Based Blood Donation Management System (BDMS) and Notifications -- 2.6 A Secure Cloud Computing-Based Framework for the Blood Bank -- 3 Methodology -- 4 Conclusion -- References -- Ensemble Models for Vulnerability Prediction Using Code Metrics -- 1 Introduction -- 2 Related Research -- 3 Methodology -- 3.1 Dataset Preparation -- 3.2 Ensemble Model -- 4 Experiment -- 5 Results and Discussion -- 6 Conclusion -- References -- Echo State Networks for Cryptography: A Novel Framework for Key Generation and Secure Communication -- 1 Introduction -- 2 Echo State Networks -- 3 Literature Review on Cryptography -- 4 ESN-Based Cryptography -- 5 Proposed Framework -- 5.1 System Architecture -- 5.2 Key Generation Unit (KGU) -- 5.3 Encryption Processing Unit (EPU) -- 5.4 Decryption Processing Unit (DPU) -- 5.5 System Robustness and Adaptability -- 5.6 Detailed Operation of the Proposed Framework -- 5.7 Computational Considerations and Practical Implications -- 6 Security Analysis -- 6.1 Resistance to Brute-Force Attacks -- 6.2 Resistance to Side-Channel Attacks -- 6.3 Resistance to Cryptanalysis Attacks -- 6.4 Key Space Analysis -- 6.5 Complexity Analysis -- 6.6 Theoretical Robustness and Adaptability -- 7 Discussion and Future Directions -- 7.1 Theoretical Contributions and Implications -- 7.2 Potential Practical Applications -- 7.3 Challenges and Future Directions -- 8 Conclusion -- References. 327 $aExploration of Coarse-Graining and Threshold Selection of Lempel-Ziv Complexity on Vibroarthrographic Signals -- 1 Introduction -- 2 Materials and Methods -- 2.1 Dataset -- 2.2 Lempel-Ziv Complexity -- 2.3 Various Coarse-Graining Techniques Applied to VAG Signals -- 2.4 Benchmark Indices and Statistical Test -- 3 Result -- 4 Conclusion -- References -- Image Super Resolution Using Extensive Residual Network (ERN) for Orange Fruit Disease Detection -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Super Resolution Model Using ERN -- 3.2 Classification of Orange Fruit Disease -- 3.3 Dataset -- 3.4 Experimentation -- 4 Results -- 4.1 Qualitative Analysis -- 4.2 Quantitative Analysis -- 5 Conclusion -- References -- A Powerful High-Order B-Spline Galerkin Technique for Numerical Solutions of Advection-Diffusion Equation -- 1 Introduction -- 2 A Higher-Order B-Spline Function with Galerkin Approach -- 3 Numerical Examples -- 3.1 Test Example 1 -- 3.2 Test Example 2 -- 4 Conclusions -- References -- Some Explicit Formulas for Changhee-Genocchi Polynomials and Numbers -- 1 Introduction -- 2 The Changhee-Genocchi Polynomials -- 3 Conclusion -- References -- Numerical Simulations of Third-Order Singularly Perturbed Boundary Value Problems -- 1 Introduction -- 1.1 The QTBS Functions -- 2 The Technique -- 3 Numerical Simulations -- 3.1 Problem-1 -- 3.2 Problem 2 -- 3.3 Problem 3 -- 4 Conclusion -- References -- A Study on lamda?-Analogue Type of Degenerate Daehee Polynomials and Numbers -- 1 Introduction -- 2 lamda?-Analogue Type of Degenerate Daehee Polynomials and Numbers -- 3 Conclusion -- References -- Water Quality Prediction Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Research Methodology -- 3.1 Machine Learning Methods' Applied -- 3.2 About Dataset -- 4 Experimental Results and Discussion -- 4.1 Training and Testing. 327 $a4.2 The Performance Measurement Factors -- 5 Conclusion, Limitations, and Future Scope -- References -- Single Smart Card for Identity and Authentication Using Data Analytics -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Block Diagram -- 3.2 Implementation -- 4 Results and Discussions -- 5 Conclusion -- References -- Strategic Utilization of ChatGPT in Teaching and Learning -- 1 Introduction -- 1.1 Background and Motivation -- 1.2 Our Contributions -- 2 ChatGPT -- 2.1 Brief History of ChatGPT -- 2.2 Understanding Open AI and Current Research Focus on ChatGPT -- 2.3 Technical Setup and Operation of ChatGPT -- 3 Methodology -- 4 Results and Discussion -- 4.1 Benefits of ChatGPT for Teaching and Learning -- 4.2 Risks of ChatGPT in Teaching and Learning -- 4.3 Opportunities Arising from the Need to Optimize and Utilize ChatGPT for Teaching and Learning -- 4.4 Simple Practical Use Cases of ChatGPT for Teaching and Learning -- 5 Conclusion -- References -- Particle-Based Swarm Fuzzy Optimization Approach in Vague Measurement of the Distance in Transportation Problems -- 1 Introduction -- 2 Primary Definitions -- 2.1 Fuzzy Set -- 2.2 Fuzzy Number -- 2.3 Particle Swarm Optimization (PSO) -- 3 Proposed Methodology -- 4 Implementation in a Problem Using MATLAB -- 5 Results and Discussion -- 6 Conclusion and Future Aspect of the Work -- References -- Design and Implementation of Network Coverage Area in WSN Using Swarm Optimization Techniques -- 1 Introduction -- 2 WSN Node Network -- 3 Particle Swarm Optimization and Discussion -- 4 Conclusion -- References -- Divergence Models in Fuzzy Environment and Their Solicitations for the Development of Fuzzy Information Improvement Models -- 1 Introduction -- 2 A New Non-parametric Fuzzy Divergence Model -- 3 Information Improvement Models for Discrete Fuzzy Distributions -- 4 Conclusion. 327 $aReferences -- ViT-ALZ: Vision Transformer with Deep Neural Network for Alzheimer's Disease Detection -- 1 Introduction -- 2 Materials and Methods -- 2.1 Dataset and Dataset Preparation -- 2.2 Proposed Vision Transformer and Deep Neural Network Model (ViT-ALZ)) -- 3 Experimental Setups -- 3.1 Implementation Details -- 3.2 Performance Metrics -- 4 Result -- 5 Conclusion -- References -- Edge-Ward Computational Offloading for Smart Waste Management System -- 1 Introduction -- 2 Background History -- 3 System Architecture -- 4 Experimental Setup -- 4.1 Network Topology for Cloud-Word Computational Offloading Architecture -- 4.2 Network Topology for Edge-Word Computational Offloading Architecture -- 5 Experimental Results and Discussion -- 5.1 Latency-Response Time -- 5.2 Network Usage -- 6 Conclusion and Future Work -- References -- AMPpred-CNN: Prediction of Antimicrobial Peptide by Using 1D Convolution Neural Network and Composition/Transition/Distribution (CTD) Encoding -- 1 Introduction -- 2 Material and Methods -- 2.1 Dataset Description -- 2.2 Overview of AmpPred-CNN -- 2.3 Performance Metric -- 3 Results and Discussion -- 3.1 Analyzing the Distribution of Sequence Lengths of AMPs and Non-AMPs in Different Datasets -- 3.2 Investigating Length Dependency of Antimicrobial Activity -- 3.3 Investigating Existence of Linearly Separable Features -- 3.4 Evaluating the Proposed Model on Benchmark Dataset -- 3.5 Comparative Performance on XUAMP Independent Dataset -- 3.6 Comparative Performance on DBAASP Independent Dataset -- 3.7 Performance of the Proposed Model with PCA -- 3.8 Performance of the Proposed Model with Top K Features and RFE -- 3.9 Performance of the Proposed Model with Different Ratios of AMPs and Non-AMPs -- 4 Conclusion -- References -- A Hybrid System for Detection of Stress Using Human Emotions Through Voice -- 1 Introduction. 327 $a2 Material and Method -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusions -- References -- Quasi-oppositional-Based Whale Optimization Applied to Multilevel Image Thresholding -- 1 Introduction -- 2 Problem Formulation -- 2.1 Whale Optimization Algorithm -- 2.2 Encircling Prey -- 2.3 Bubble Net Feeding -- 2.4 Looking for Prey -- 2.5 Quasi-oppositional-Based Learning (QOBL) -- 2.6 Quasi-opposite Number -- 3 QOWOA in Multilevel Image Thresholding -- 4 Experiments and Results -- 5 Conclusion -- References -- Enhanced Georeferencing by Adapting Improvised Lens Distortion Correction in Stationary Drone Video Frames -- 1 Introduction -- 1.1 Existing Projective Transformation (Homography) -- 1.2 Traditional Lens Distortion Correction -- 2 Proposed Projective Transformation Methodology -- 2.1 Lens Distortion Correction -- 3 Optimal Polynomial Order Selection Approach -- 4 Experimental Evaluation -- 4.1 Dataset Selection Criteria -- 4.2 Dataset Features -- 4.3 Radial Distortion Coefficient Calculations -- 5 Result Analysis -- 5.1 Radial Distortion Calculations-Traditional -- 5.2 Radial Distortion Calculations-Improvised -- 5.3 Comparative Data Analysis-Traditional and Improvised Approach -- 5.4 Comparative Complexity Analysis -- 5.5 Conclusion and Future Scope -- References -- Feature Selection and Classification to Detect Fetal Abnormalities -- 1 Introduction -- 2 Feature Selection -- 2.1 Feature Classification -- 3 Proposed System -- 3.1 SVM-Based LDA -- 3.2 PNN-Based MLE -- 4 Results and Discussions -- 5 Conclusion -- References -- Adoption of Blockchain Technologies into Forensic Accounting Practices -- 1 Introduction -- 2 Literature Review -- 3 Conceptual Framework -- 4 Hypotheses Development -- 5 Research Methodology -- 6 Structural Model Assessment and Result Interpretation -- 6.1 Model Assessment -- 6.2 Result Interpretation. 327 $a7 Recommendations. 410 0$aLecture Notes in Networks and Systems Series 700 $aKumar$b Rajesh$0437573 701 $aVerma$b Ajit Kumar$01062272 701 $aVerma$b Om Prakash$01732023 701 $aWadehra$b Tanu$01749540 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910882886203321 996 $aSoft Computing$94183818 997 $aUNINA