LEADER 05001nam 22007575 450 001 996558569703316 005 20231010072454.0 010 $a3-031-45121-X 024 7 $a10.1007/978-3-031-45121-8 035 $a(CKB)28487826300041 035 $a(MiAaPQ)EBC30781846 035 $a(Au-PeEL)EBL30781846 035 $a(DE-He213)978-3-031-45121-8 035 $a(PPN)272915092 035 $a(EXLCZ)9928487826300041 100 $a20231010d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvanced Communication and Intelligent Systems$b[electronic resource] $eSecond International Conference, ICACIS 2023, Warsaw, Poland, June 16?17, 2023, Revised Selected Papers, Part I /$fedited by Rabindra Nath Shaw, Marcin Paprzycki, Ankush Ghosh 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (287 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1920 311 $a9783031451201 320 $aIncludes bibliographical references and index. 327 $aComparative Analysis of Deep Learning Architectures for Garbage Classification -- Developing an Automated System for Pothole Detection and Management using Deep Learning -- Collating Weather Data and Grocery Cost using Machine Learning Techniques -- Integrating Scene and Text Recognition for Improved Scene Caption to assist Visually Impaired -- An Analysis of Current Advancements: Elderly Fall Detection Systems Using Machine Learning Techniques -- DLMEKL: Design of an efficient Deep Learning Model for analyzing the effect of ECG & EEG disturbances on Kidney, Lungs and Liver functions -- Integration of IoT and Industry 4.0: Revolutionizing Industrial Processes -- Artificial Intelligence based Optimized Traffic Diversion System in Smart Cities -- Understanding Career Trajectories of IT professionals -A Machine Learning Approach -- A Review on Machine Learning based Security in Edge Computing Environment -- Ransomware Taxonomy and Detection Techniques Based on Machine Learning: A Review -- Analysis And Design of Document Similarity Using BiLSTM and BERT -- Customer Churn Analysis for Live Stream E-Commerce Platforms by Using Decision Tree Method -- Estimation of Reliability, BER, BLER and throughput during the coexistence of 4G LTE and 5G NR -- Exploring the Future of Edge Computing: Advantages, Limitations, and Opportunities -- Fake Product Review Detection Using Machine Learning -- A survey on Designing Efficient WSN using Duty Cycle optimization -- A Novel Framework for Harnessing AI for Evidence-Based Policymaking in E-Governance Using Smart Contracts -- Vehicular Ad-hoc Networks: A Review on Applications & Security -- An Approach for Efficient Experts Selection in Team Formation Problems -- Cybersecurity Model for Mobile and Web Application Banking Sectors. 330 $aThis book constitutes the refereed proceedings of the Second International Conference on Advanced Communication and Intelligent Systems, ICACIS 2023, held in Warsaw, Poland, during June 16?17, 2023 The 22 full papers included in this book were carefully reviewed and selected from 221 submissions. They were organized in topical sections as follows: Wireless Communication, Artificial Intelligence and Machine Learning, Robotics & Automation, Data Science, IoT and Smart Applications. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1920 606 $aImage processing$xDigital techniques 606 $aComputer vision 606 $aArtificial intelligence 606 $aComputer engineering 606 $aComputer networks 606 $aData protection 606 $aApplication software 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics 606 $aArtificial Intelligence 606 $aComputer Engineering and Networks 606 $aData and Information Security 606 $aComputer and Information Systems Applications 615 0$aImage processing$xDigital techniques. 615 0$aComputer vision. 615 0$aArtificial intelligence. 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aData protection. 615 0$aApplication software. 615 14$aComputer Imaging, Vision, Pattern Recognition and Graphics. 615 24$aArtificial Intelligence. 615 24$aComputer Engineering and Networks. 615 24$aData and Information Security. 615 24$aComputer and Information Systems Applications. 676 $a006.3 702 $aShaw$b Rabindra Nath 702 $aPaprzycki$b Marcin 702 $aGhosh$b Ankush 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996558569703316 996 $aAdvanced Communication and Intelligent Systems$93363886 997 $aUNISA