001447991 000__ 09245cam\a2200589Ii\4500 001447991 001__ 1447991 001447991 003__ OCoLC 001447991 005__ 20230310004216.0 001447991 006__ m\\\\\o\\d\\\\\\\\ 001447991 007__ cr\un\nnnunnun 001447991 008__ 220707s2022\\\\si\a\\\\o\\\\\101\0\eng\d 001447991 019__ $$a1334652410 001447991 020__ $$a9789811911224$$q(electronic bk.) 001447991 020__ $$a9811911223$$q(electronic bk.) 001447991 020__ $$z9789811911217$$q(print) 001447991 020__ $$z9811911215 001447991 0247_ $$a10.1007/978-981-19-1122-4$$2doi 001447991 035__ $$aSP(OCoLC)1334664994 001447991 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dEBLCP$$dOCLCF$$dOCLCQ 001447991 049__ $$aISEA 001447991 050_4 $$aQA76.76.E95$$bF53 2022eb 001447991 08204 $$a006.3/3$$223/eng/20220707 001447991 1112_ $$aFICR-TEAS (Conference)$$n(2nd :$$d2022 :$$cJaipur, India ; Online) 001447991 24510 $$aRising threats in expert applications and solutions :$$bproceedings of FICR-TEAS 2022 /$$cVijay Singh Rathore, Subhash Chander Sharma, Joao Manuel R.S. Tavares, Catarina Moreira, B. Surendiran, editors. 001447991 2463_ $$aFICR-TEAS 2022 001447991 264_1 $$aSingapore :$$bSpringer,$$c2022. 001447991 300__ $$a1 online resource (xxi, 729 pages) :$$billustrations (some color). 001447991 336__ $$atext$$btxt$$2rdacontent 001447991 337__ $$acomputer$$bc$$2rdamedia 001447991 338__ $$aonline resource$$bcr$$2rdacarrier 001447991 4901_ $$aLecture notes in networks and systems,$$x2367-3389 ;$$vvolume 434 001447991 5050_ $$aA Novel Approach for Detecting Online Malware Detection Using Performance Metrics Using LSTMRNN and BRNN Based Recurrent Neural Network in Cloud Environment -- Analytical Study of Augmented Reality Simulation System Application on Paintings -- A New Model SATV for Sentiment Analysis of Hinglish Sentences -- Characterization of Molecular Dynamic Trajectory using K-means clustering -- Data Warehouse Modernization using Document-Oriented ETL Framework for Real Time Analytics -- Opinion Mining for Breast Cancer Disease Using Apriori and K-Modes Clustering Algorithm -- Deep learning approach based on ADASYN for detection of Web attacks in the CICIDS2017 dataset -- FUNDUS and OCT Image Classification using Deep Learning Techniques -- A Secure Framework for the Deployment of Microservices using Cloud Container Technology -- Time Series Analytics : A fuel to Data Science in forecasting Analytics for time stamped data -- Sparse Autoencoder and Deep learning based Framework for Multi-label Classification of Chronic Diseases -- A Comparative study of different machine learning based feature extraction techniques in bacterial image classification -- Cloud removal and satellite image reconstruction using Deep Learning based Image inpainting approaches -- A Novel Cipher Technique using Substitution and Transposition Methods -- Edge Computing: State of Art with Current challenges and future opportunities -- Deep Learning and Machine Learning Approaches for the Classification of Personality Traits: Review -- Two Level Priority Task Scheduling Algorithm For Real Time IoT Based Storage Condition Assessment System -- Intrusion Detection of Internet of Things Botnet Attacks using Data Mining Technique -- Code Tamper-proofing using Return Oriented Programming in IoT Devices -- Conversion of Punjabi Sign Language using Animation -- Deep Learning based Classification of Microscopic Fungal Images -- Application of Artificial Neural Network and Multiple Linear Regression in Predicting Consumer Attitude towards Use of Mobile Wallet -- Securing Unauthorized Access to Cloud Data Storage -- A Survey on Water Usage Optimization using Artificial Intelligence in Agricultural Sector -- The Role of Artificial Neural Network in Word Sense Disambiguation (WSD) - A Survey -- Covid-19 Challenges for digital education and critical analysis -- Cloud Computing: Concepts and Techniques with Service Provider Analysis -- Analyzing Frequency Rhythms in Posed and Spontaneous Emotions Using Time- Intensity of EEG Signals -- Improving Classification Performance Using The Semi-Pivoted QR approximation algorithm -- Comparative Study on Video Based Face Recognition Methods -- An Innovative Framework based Algorithmic Approach for Object Detection -- Smart Bus Concept of COVID-19 Prevention using Face-Bio Keys -- Data Integration Solutions - A Key to the Cloud Migration -- A Proposed Structure, primarily based totally on Cloud Computing for Enhancing Electronic Commerce Applications -- Deep Learning and Internet of Things (IoT) Based Irrigation System for Cultivation of Paddy Crop -- Review of Machine Learning Techniques for Analysis of Medical Data Sets -- Incorporating contextual information in prediction based word embedding models -- Distributed Cloud Data Center for Efficient Services in Logistics Management -- Plants Disease Detection using Image Processing using Tensor flow: A boon to agriculture -- Data Visualisation using Self-Organising Maps -- SQL Injection Attacks, Detection Techniques on Web Application Databases -- Deep Learning Based Brain Tumor Segmentation: Recent Updates -- Mobile Application for Smart Agriculture in India: "An Analytical Approach" -- Offline handwritten character recognition of Gujarati characters using convolutional neural network -- Forecasting Solar Energy on Time Frame: A Review -- Framework for Faster Index Search -- Image Classification by Optimized Convolution Neural Networks -- Benefits of Mining Fashion Data -- Current state of Engineering Education in India: Student Teacher scenario in online mode -- Estimating Blockchain using Time-series forecasting ARIMA -- Analyzing Online Reviews of Customers using Machine Learning Techniques -- Assessing between-group differences in implementation of Lean Six Sigma management conception -- Boosting Blockchain Mechanism using Cryptographic Algorithm in WSN -- Virtual Try-On using Augmented Reality -- Fractures Classification and Detection Using DIP And ML -- Sentiment Analysis in Social Media Website -- Artificial Intelligence based Techniques for Underwater Image Restoration and Enhancement.-A rapid computing technology on profound computing era with quantum computing -- Covid-19: Comparison of Time series forecasting models and Hybrid ARIMA- ANN -- YOLOV5 and Morphological Hat Transform Based Traffic Sign Recognition -- Optimizer Based Performance Study of Block Wise Fine-Tuning AlexNet -- Comparative study on Image Feature Extraction Techniques -- Cyber Security Threat and it's Global Perspective -- Detecting Cheating in Online Assessments using Face Recognition and Head Pose Estimation -- Opinion System of Real-Time Emotions from Human Interaction incoporated in Class using Deep Learning -- A Study on Automatic Detection of Alzheimer's disease using Multimodalities -- IoT enabled smart tourism (IoTeST): tourism service dimension -- An Innovative Approach towards Designing Efficient K-Nearest Neighbour Algorithm -- Latest trends in Multi-Modality Medical Image Fusion: A Generic Review -- Comparison Study of Classification Techniques for Predicting Performance of Students using Weka Environment -- Multimodal Autism Detection in Children through Facial and Speech Emotion -- A Contemporary Learning on Smart Devices for Smart Metropolis -- Malpractice Detection in Online Assessment using Eye Gaze Tracking and Object Detection -- Big Data f5 Load Balancer with ChatBots Framework -- Keylogger awareness and use in Cyber Forensics. 001447991 506__ $$aAccess limited to authorized users. 001447991 520__ $$aThe book presents high-quality, peer-reviewed papers from the FICR International Conference on Rising Threats in Expert Applications and Solutions 2022 organized by IIS (Deemed to be University), Jaipur, Rajasthan, India, during January 7-8, 2022. The volume is a collection of innovative ideas from researchers, scientists, academicians, industry professionals, and students. The book covers a variety of topics, such as expert applications and artificial intelligence/machine learning; advance web technologies such as IoT, big data, cloud computing in expert applications; information and cyber security threats and solutions, multimedia applications in forensics, security and intelligence; advancements in app development; management practices for expert applications; and social and ethical aspects in expert applications through applied sciences. 001447991 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed July 7, 2022). 001447991 650_0 $$aExpert systems (Computer science)$$xSecurity measures$$vCongresses. 001447991 650_0 $$aComputer security$$vCongresses. 001447991 655_0 $$aElectronic books. 001447991 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001447991 7001_ $$aRathore, Vijay Singh,$$eeditor. 001447991 7001_ $$aSharma, Subhash Chander,$$eeditor. 001447991 7001_ $$aTavares, João Manuel R. S.,$$eeditor.$$1https://orcid.org/0000-0001-7603-6526 001447991 7001_ $$aMoreira, Catarina,$$eeditor. 001447991 7001_ $$aSurendiran, B.,$$eeditor. 001447991 77608 $$iPrint version: $$z9811911215$$z9789811911217$$w(OCoLC)1296402556 001447991 830_0 $$aLecture notes in networks and systems ;$$vv. 434.$$x2367-3389 001447991 852__ $$bebk 001447991 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-19-1122-4$$zOnline Access$$91397441.1 001447991 909CO $$ooai:library.usi.edu:1447991$$pGLOBAL_SET 001447991 980__ $$aBIB 001447991 980__ $$aEBOOK 001447991 982__ $$aEbook 001447991 983__ $$aOnline 001447991 994__ $$a92$$bISE