LEADER 10888nam 22004933 450 001 9910900178903321 005 20241031080308.0 010 $a981-9766-75-3 035 $a(MiAaPQ)EBC31743893 035 $a(Au-PeEL)EBL31743893 035 $a(CKB)36414864600041 035 $a(EXLCZ)9936414864600041 100 $a20241031d2024 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aICT for Intelligent Systems $eProceedings of ICTIS 2024, Volume 3 205 $a1st ed. 210 1$aSingapore :$cSpringer,$d2024. 210 4$d©2024. 215 $a1 online resource (623 pages) 225 1 $aLecture Notes in Networks and Systems Series ;$vv.1109 311 $a981-9766-74-5 327 $aIntro -- Preface -- Contents -- Editors and Contributors -- Risk Analysis for Fall Detection: Exploiting Using GAIT, Part Affinity Field and Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Gait Analysis Using Image Processing -- 2.2 OpenPose: Realtime Multi-person 2D Pose Estimation Using Part Affinity Fields -- 2.3 Fall Detection Based on Key Points of Human-Skelet Using Open Pose -- 3 Methodology -- 3.1 Open Pose -- 3.2 Confidence Maps -- 3.3 Part Affinity Field -- 3.4 Fall Detection -- 4 Conclusion -- References -- Optimizing Content-Based Image Retrieval System Using Convolutional Neural Network Models -- 1 Introduction -- 2 Related Word -- 3 Proposed Methodology -- 3.1 Dataset -- 3.2 Preprocessing -- 3.3 Deep Features Extraction Using ResNet Pre-trained CNN -- 4 Results and Discussion -- 5 Conclusion -- References -- Advancements in Convolutional Neural Networks for Accurate and Efficient Skin Cancer Classification: A Comprehensive Survey -- 1 Introduction -- 2 Related Word -- 3 Why Does Skin Cancer Develop? -- 3.1 Other Types of Skin Cancers -- 4 Input Data -- 5 Proposed Methodology -- 5.1 ML Approaches Used in Skin Cancer Detection -- 5.2 CNN with Deep Learning Methods in Skin Cancer -- 5.3 Transfer Learning (TL) with CNN Architectures -- 5.4 Managerial Implications of the Methodologies -- 6 Conclusions -- References -- DestinAI: Your Personalized Travel Itinerary Planner and Chat Catalyst Using Generative AI -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 4 Results and Discussion -- 5 Conclusion -- References -- Technical and Economic Sustainability of Alternative Livelihood Strategies at the Grassroots: A Case Study in Byse, Karnataka, India -- 1 Introduction -- 1.1 Study Area -- 2 Methodology -- 2.1 Phase 1: Participatory Community and Challenge Understanding -- 2.2 Phase 2: Looking for Solutions. 327 $a3 Results -- 3.1 Technical Sustainability Assessment: A User-Centred Approach -- 3.2 Business Sustainability Assessment -- 4 Discussion -- 5 Conclusion -- References -- Comprehensive Certificate Validation and Verification System for Educational Institutes Using Blockchain -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Architecture -- 3.2 Workflow -- 4 Result and Discussion -- 5 Conclusion and Future Scope -- References -- An IOT and Machine Learning-Based System for Detecting Driver Drowsiness -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Design -- 3.2 Dataset -- 3.3 Preprocessing -- 3.4 Feature Extraction -- 3.5 Model Selection -- 3.6 IOT Technology -- 3.7 Jetson Nano -- 4 Result and Feature Work -- 4.1 Result -- 4.2 Feature Work -- 5 Conclusion -- References -- A Survey on Data Preprocessing Techniques in Stream Mining -- 1 Introduction -- 2 Challenges During Preprocessing Stream of Data -- 3 Data Reduction Techniques -- 3.1 Dimensionality Reduction -- 3.2 Instance Reduction Techniques -- 4 Data Cleaning -- 4.1 Imputing Missing Values -- 4.2 Noisy Data Removal -- 5 Data Integration -- 5.1 Extract -- 5.2 Transform -- 5.3 Load -- 6 Data Transformation -- 7 Conclusion -- References -- Data Privacy Attacks on Federated Learning -- 1 Introduction -- 2 Security Vulnerabilities in FL -- 2.1 Model Inversion Attacks -- 2.2 Poisoning Attacks -- 2.3 Data Reconstruction Attacks -- 2.4 Sybil Attacks -- 2.5 Generative Adversarial Network-Based Attacks -- 2.6 Model Stealing Attacks -- 3 Possible Solutions -- 3.1 Differential Privacy -- 3.2 Homomorphic Encryption -- 3.3 Secure Aggregation -- 3.4 Secure Multiparty Computation (SMC) -- 3.5 Attack Detection -- 3.6 Participant Authentication -- 3.7 Regular Auditing -- 4 Analysis of Existing Approach -- 5 Conclusion -- References. 327 $aAugmented Generalized Quadrature Spatial Modulation (AGQSM): Performance Evaluation in Spatially Correlated Channels for Next-Generation Wireless Communications -- 1 Introduction -- 2 System Model -- 3 Detection Methods -- 4 Findings and Analysis -- 5 Conclusion -- References -- Enhancing Security in a University Network Using Snort and Wireshark -- 1 Introduction -- 2 Motivation -- 3 Related Work -- 4 Proposed Work -- 5 Implementation and Result Analysis -- 6 Conclusion and Future Work -- References -- Social Responsibility of Business Entities in Achieving Sustainability: A CSR Review -- 1 Introduction -- 2 Defining Sustainability -- 3 Noteworthiness of Sustainable Development as a CSR Activity -- 4 Modus Operandi -- 5 Cases Used for the Study -- 5.1 Cummins India Ltd. -- 5.2 DB Corporation Ltd. -- 5.3 Karnataka Bank Ltd. -- 5.4 Century Plyboard India Ltd. -- 5.5 Tata Sponge Iron -- 5.6 Power Finance Corp Ltd. -- 5.7 Bharat Heavy Electrical Ltd. -- 5.8 Amrutanjan Healthcare -- 5.9 Atul Ltd. -- 6 Futuristics Research and Conclusion -- References -- Factors Affecting Digital Shifting of Food Industries Through Food Apps for Business Sustainability: an Empirical Study -- 1 Introduction -- 2 Conceptual Background and Hypothesis Development -- 2.1 TAM Facets -- 2.2 Relation Between ATT and INTFA -- 2.3 TPB Facets -- 2.4 Affordance as Moderator -- 3 Methodology and Results -- 3.1 Data Collection -- 3.2 Common Method Bias -- 3.3 Measurement Model: Reliability and Validity Testing -- 3.4 Structural Model: Hypothesis Testing -- 3.5 Moderation Analysis -- 4 Discussion -- 5 Conclusion -- 6 Theoretical and Managerial Implications -- 7 Study Limitations and Future Scope -- References -- Blockchain Organ Transplant Network with Fitness Check -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Architecture -- 3.2 Smart Contract -- 4 Result -- 5 Conclusion. 327 $aReferences -- An Implementation of Monte Carlo Tree Search Algorithm: Comparison with Random Samples -- 1 Introduction -- 2 Monte Carlo Tree Search -- 3 An Overview of Advanced Tic-Tac-Toe -- 4 Implementation -- 5 Results -- 6 Conclusion -- References -- Ur's Corporator-Innovating Citizen Corporator Interaction Through ML-Enabled Comprehensive Framework -- 1 Introduction -- 2 Problem Statement -- 3 Methodology -- 4 Applications -- 5 Literature Review -- 6 System Architecture -- 6.1 Explanation of System Architecture -- 7 Result and Discussion -- 8 Conclusion -- 9 Future Scope -- References -- Research Trends in Technology for Achieving Sustainable Development Goals -- 1 Introduction -- 2 Related Work -- 3 Methods -- 4 Results -- 4.1 Publication and Citation Trends -- 4.2 Impact of Open Access -- 4.3 Fields of Research -- 4.4 Prolific Institutions -- 4.5 Top Funders -- 5 Conclusion -- References -- A Comparative Evaluation of Different Distance Measures for Determining Initial Seeds in the K-means Algorithm -- 1 Introduction -- 2 The QuIK Algorithm -- 3 Some Popular Distance Measures for Numerical Data -- 4 The Novel Distance Function in the QuIK Seeding -- 5 Literature Review -- 6 Methodology -- 7 Experiments and Results -- 8 Conclusion -- References -- Etherdocs: Student Document Management Using Ethereum Blockchain and IPFS -- 1 Introduction -- 2 Problem Statement -- 3 Literature Review -- 3.1 Assumptions -- 3.2 Limitations of Existing Systems -- 4 Methodology -- 4.1 Issuer -- 4.2 Verifier -- 5 Implementation -- 6 Results -- 7 Conclusion -- References -- Beyond Ledgers: Exploring the Impact of Blockchain on Global Supply Chain Networks -- 1 Introduction -- 1.1 Background -- 1.2 Scope and Objectives -- 2 Fundamentals of Blockchain in Supply Chain -- 2.1 Blockchain Architecture -- 2.2 Blockchain in Supply Chain Management. 327 $a3 Current Trends and Challenges -- 3.1 Challenges in Traditional Supply Chains -- 3.2 Previous Studies -- 3.3 The Promise of Blockchain Technology -- 3.4 Applications of Blockchain in Supply Chain -- 4 Challenges in Adopting Blockchain in SCM and Preferable Solution -- 5 Future Directions and Research Gaps -- 6 Conclusion -- References -- Farmer-Based Smart Vegetable Vending Machine for the Modern Era -- 1 Introduction -- 2 Background and Related Work -- 3 Research Gap -- 4 Proposed Solution -- References -- Automated Question Generation System Using NLP -- 1 Introduction -- 2 Literature Review -- 2.1 TF-IDF and N-Grammode -- 2.2 RNN Encoder-Decoder -- 2.3 BART -- 2.4 BERT -- 2.5 T-5 -- 3 Implementation -- 3.1 Data Preparation -- 3.2 WorkFlow -- 3.3 Training -- 4 Results -- 5 Conclusion -- References -- Transforming Workspaces: The Convergence of Li-Fi, FTTO, and PoE -- 1 Introduction -- 2 Literature Review -- 2.1 Building Energy Management System: A Review -- 2.2 Seamless Interfacing with Thunderbolt? 4.0 -- 3 Methodology -- 3.1 Assessment -- 3.2 Technology Selection -- 3.3 System Design -- 3.4 Implementation -- 3.5 Evaluation and Optimization -- 4 Hardware Components -- 4.1 BMS Device with ARM Processor -- 4.2 CCTV -- 4.3 Ethernet Cable (802.3bt) -- 4.4 PoE Switches -- 4.5 Wi-Fi Router -- 4.6 USB Type-C Port -- 4.7 Li-Fi Technology -- 4.8 Split AC -- 4.9 Polycarbonate Sheets -- 4.10 Batteries -- 5 Hardware and Software Architecture -- 5.1 Block Diagram -- 5.2 AutoCAD and REVIT Design -- 6 Conclusion -- References -- Precise AI-Driven Cattle Identification and Classification System -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection and Preparation -- 3.2 Image Validation -- 3.3 Muzzle Point Detection and Extraction -- 3.4 Pattern Extraction and Matching -- 4 Results and Discussions -- 5 Conclusions -- References. 327 $aInstagram Reels Bites: Factors Influencing Food Customer Engagement and Intention to Purchase Food Through Instagram Reels. 410 0$aLecture Notes in Networks and Systems Series 676 $a004.6 700 $aChoudrie$b Jyoti$01427269 701 $aMahalle$b Parikshit N$0947748 701 $aPerumal$b Thinagaran$01427270 701 $aJoshi$b Amit$01265590 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910900178903321 996 $aICT for Intelligent Systems$93563094 997 $aUNINA