001469778 000__ 11381cam\\2200769\i\4500 001469778 001__ 1469778 001469778 003__ OCoLC 001469778 005__ 20230803003346.0 001469778 006__ m\\\\\o\\d\\\\\\\\ 001469778 007__ cr\cn\nnnunnun 001469778 008__ 230617s2023\\\\si\a\\\\o\\\\\101\0\eng\d 001469778 019__ $$a1382689956 001469778 020__ $$a9789819917266$$q(electronic bk.) 001469778 020__ $$a9819917263$$q(electronic bk.) 001469778 020__ $$z9789819917259 001469778 020__ $$z9819917255 001469778 0247_ $$a10.1007/978-981-99-1726-6$$2doi 001469778 035__ $$aSP(OCoLC)1382695794 001469778 040__ $$aEBLCP$$beng$$erda$$epn$$cEBLCP$$dYDX$$dGW5XE$$dOCLCF$$dSFB 001469778 049__ $$aISEA 001469778 050_4 $$aQA76.76.E95 001469778 08204 $$a006.3/3$$223/eng/20230626 001469778 1112_ $$aInternational Conference on Intelligent Sustainable Systems$$n(6th :$$d2023 :$$cTirunelveli, India). 001469778 24510 $$aIntelligent sustainable systems :$$bproceedings of ICISS 2023 /$$cJennifer S. Raj, Isidoros Perikos, Valentina Emilia Balas, editors. 001469778 24630 $$aICISS 2023 001469778 264_1 $$aSingapore :$$bSpringer,$$c[2023] 001469778 264_4 $$c©2023 001469778 300__ $$a1 online resource (xxx, 868 pages) :$$billustrations (chiefly color). 001469778 336__ $$atext$$btxt$$2rdacontent 001469778 337__ $$acomputer$$bc$$2rdamedia 001469778 338__ $$aonline resource$$bcr$$2rdacarrier 001469778 4901_ $$aLecture notes in networks and systems ;$$vvolume 665 001469778 500__ $$aInternational conference proceedings. 001469778 500__ $$aIncludes author index. 001469778 5050_ $$aIntro -- Preface -- Contents -- Editors and Contributors -- Image Processing-Based Solution to Repel Crop-Damaging Wild Animals -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Identifying Types of Animals that Come to Damage the Crop During Daytime and Nighttime Using Image Processing -- 3.2 Analyzing the Behavior of Animals Who are Near or Approaching Crops -- 3.3 Identifying Animals that Come to Damage the Crop Using Sounds they Make -- 4 Results and Discussion -- 4.1 Identifying Types of Animals that Come to Damage the Crop During Daytime Using Image Processing -- 4.2 Identifying Types of Animals that Come to Damage the Crop During Daytime Using Image Processing -- 4.3 Analyzing the Behavior of Animals Who Are Near or Approaching Crops -- 4.4 Identifying Animals that Come to Damage the Crop Using Sounds they Make -- 5 Conclusion and Future Work -- References -- SDN Framework for Efficient Latency-Aware Topology Discovery in ISTN -- 1 Introduction -- 1.1 Outline of SDN-Based ISTN System -- 1.2 Outline of IEEE 802.1Q-TSN System -- 2 Literature Review -- 2.1 Motivation -- 3 Proposed Method -- 4 Implementation -- 4.1 Topology Setup -- 5 Evaluation Results and Discussions -- 6 Conclusion -- References -- Recommendation System Based on Clustering Techniques Using Collaborative Filtering Method -- 1 Introduction -- 1.1 Implicit Reaction -- 1.2 Explicit Reaction -- 1.3 Types of Filtering -- 2 Related Work -- 3 Methods -- 4 Conclusion -- References -- Compartmented Proactive Secret Sharing Scheme -- 1 Introduction -- 2 Background -- 2.1 CSSS -- 3 Compartmented Proactive Secret Sharing Scheme -- 3.1 Share Distribution -- 3.2 Commitments -- 3.3 Share Verification -- 3.4 Compartment Number Computation -- 3.5 Share Renewal -- 3.6 Secret Reconstruction -- 4 Correctness and Security Analysis of the Scheme. 001469778 5058_ $$a4.1 Correctness and Security Analysis for Compartment Number -- 4.2 Correctness and Security Analysis for Share Verification -- 4.3 Correctness and Security Analysis for Share Renewal -- 5 Conclusion -- References -- DevOps Challenges and Practices in Software Engineering -- 1 Introduction -- 1.1 Problem with Existing Method -- 1.2 Pre DevOps -- 1.3 The Rise of DevOps -- 2 DevOps Practices -- 2.1 Core Practice of DevOps -- 2.2 DevOps Strategy and Goals -- 3 Challenges in DevOps -- 4 Conclusion -- References -- The Effects of Climate Change on Crop Yield -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 3.1 Model Architecture -- 3.2 Training Configuration -- 3.3 Dataset -- 4 Experiments -- 4.1 Metrics -- 4.2 Linear Regressor -- 4.3 Support Vector Regressor -- 4.4 Random Forest Regressor -- 4.5 Decision Tree Regressor -- 4.6 ANN -- 4.7 Autoencoder ANN -- 5 Results and Analysis -- 6 Conclusion -- References -- Finetuned-VGG16 CNN Model for Tissue Classification of Colorectal Cancer -- 1 Introduction -- 2 Literature Review -- 3 Materials and Methods -- 3.1 Dataset -- 3.2 Preprocessing of Dataset -- 3.3 Finetuned VGG 16 -- 4 Results and Discussion -- 5 Conclusion -- References -- Effective Heart Disease Prediction and Classification Using Intelligent System -- 1 Introduction -- 2 Literature Survey -- 3 Heart Failure Prediction Using IBM Auto AI Service -- 3.1 Creation of IBM Services -- 3.2 Creation of Watson Studio Service -- 3.3 Creation of IBM Node-Red Service -- 3.4 Building Machine Learning Model to Predict Heart Failure -- 3.5 Run Auto AI Experiment -- 3.6 Building Pipelines -- 3.7 Save Watson ML Model -- 3.8 Deploy the Model -- 4 Experimental Setup -- 5 Results and Discussions -- 6 Conclusion and Future Work -- References -- A Machine Learning Approach for Aeroponic Lettuce Crop Growth Monitoring System -- 1 Introduction. 001469778 5058_ $$a2 Related Work -- 2.1 Methods for Estimating the Outcome of a Harvest -- 2.2 Crop Varieties that Can be Grown -- 2.3 Machine Learning's Emergence in Yield Prediction -- 2.4 The Efficiency of Yield-Affecting Factors -- 3 Materials and Methods -- 3.1 Input Parameters -- 3.2 Correlogram of the Input Variables -- 4 Proposed Model -- 4.1 Data Pre-processing -- 4.2 Splitting of the Dataset -- 4.3 Training Model -- 5 Results and Discussions -- 5.1 Comparative Analysis -- 5.2 Execution Time of the Model -- 6 Conclusion -- 7 Future Scope -- References -- A Novel Approach for Privacy Preserving Technique in IoT Fog and Cloud Environment -- 1 Introduction -- 2 Literature Survey -- 3 Different Approaches for Achieving Data Confidentiality, Integrity, and Verifiability -- 3.1 Approach 1 -- 3.2 Approach 2 -- 3.3 Approach 3 -- 4 Results -- 4.1 Approach 1 -- 4.2 Approach 2 -- 4.3 Approach 3 -- 5 Conclusion -- References -- IOT-Based Fertilizer Recommendation System Using a Hybrid Boosting Algorithm -- 1 Introduction -- 1.1 Sensors -- 2 Related Work -- 3 Proposed Work -- 3.1 Dataset Description -- 3.2 Preprocessing -- 3.3 Hypertuning -- 3.4 Classification -- 3.5 Test Dataset -- 3.6 Recommendation -- 4 Result Analysis -- 5 Conclusion -- References -- Development of a System for Controlling IoT Devices Using Gaze Tracking -- 1 Introduction -- 2 Related Work -- 2.1 Devices -- 2.2 Libraries -- 2.3 Gaze Tracking Solutions -- 3 Methodology -- 4 Proposed Work -- 4.1 First Increment -- 4.2 Second Increment -- 4.3 Third Increment -- 4.4 Fourth Increment -- 5 Integrated Prototype Testing -- 5.1 Planning -- 5.2 Testing -- 5.3 Results -- 6 Result Analysis -- 7 Conclusions -- References -- Towards Human-Like Robotic Grasping for Industrial Applications Using Computer Vision -- 1 Introduction -- 2 Background -- 3 Methodology -- 4 Results -- 5 Conclusion -- References. 001469778 5058_ $$aAn Extensive Study on Unattended Object Detection in Video Surveillance -- 1 Introduction -- 1.1 Scope -- 1.2 Purpose -- 1.3 Problem Statement -- 2 Comparative Study About Various Algorithms for Object Detection -- 3 Literature Survey -- 4 Proposed Model -- 5 Conclusion -- References -- Analysis of Digital Data on Social Network TikTok During COVID-19 -- 1 Introduction -- 2 Methodology -- 3 Results -- 3.1 Users' Motivations for Using TikTok -- 3.2 TikTok as a Tool for Education -- 3.3 Presence of Media and Journalists in TikTok -- 3.4 Fact-Checking in TikTok -- 4 Discussion -- 5 Conclusions -- References -- An Hybrid Edge Algorithm for Vehicle License Plate Detection -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Canny Edge Detection Algorithm for Image Classification -- 3.1 Canny Edge Detection Algorithm for Image Classification -- 4 Results and Experimental Images -- 5 Conclusion -- References -- Gesture Controlled Drone Swarm System for Violence Detection Using Machine Learning for Women Safety -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 3.1 Algorithm -- 4 Implementation and Results -- 4.1 Autonomous Drones -- 4.2 Gesture Recognition -- 4.3 Mobile Application -- 4.4 Drone Control Software -- 4.5 Drone Swarm System -- 5 Conclusion and Future Work -- References -- Healthcare System Modeling and Security Engineering -- 1 Introduction -- 2 Healthcare Attack -- 3 Potential Attacks on IoT Health Care System -- 3.1 Commercial Attack Types -- 3.2 Preventive Measures -- 4 Cyber Physical Healthcare System -- 4.1 User Services -- 4.2 Expect Management -- 4.3 Trend Analysis -- 4.4 Entitlement Enforcement -- 5 Threat Modeling of an IoT System -- 5.1 Identifying the Assets -- 5.2 System Architecture Overview -- 5.3 Decomposition of an IoT System -- 5.4 Documentation of Threat Types -- 6 IoT Security Lifecycle and System Design. 001469778 506__ $$aAccess limited to authorized users. 001469778 520__ $$aThis book features research papers presented at the 6th International Conference on Intelligent Sustainable Systems (ICISS 2023), held at SCAD College of Engineering and Technology, Tirunelveli, Tamil Nadu, India, during February 23, 2023. The book reports research results on the development and implementation of novel systems, technologies, and applications that focus on the advancement of sustainable living. The chapters included in this book discuss a spectrum of related research issues such as applications of intelligent computing practices that can have ecological and societal impacts. Moreover, this book emphasizes on the state-of-the-art networked and intelligent technologies that are influencing a promising development in the direction of a long-term sustainable future. The book is beneficial for readers from both academia and industry. 001469778 588__ $$aDescription based upon print version of record. 001469778 650_0 $$aExpert systems (Computer science)$$vCongresses. 001469778 650_0 $$aElectronic systems$$vCongresses. 001469778 650_0 $$aInformation technology$$vCongresses. 001469778 650_0 $$aSustainable engineering$$vCongresses. 001469778 655_0 $$aElectronic books. 001469778 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001469778 655_7 $$aConference papers and proceedings.$$2lcgft 001469778 7001_ $$aRaj, Jennifer S.,$$eeditor. 001469778 7001_ $$aPerikos, Isidoros,$$eeditor. 001469778 7001_ $$aBalas, Valentina Emilia,$$eeditor. 001469778 77608 $$iPrint version:$$aRaj, Jennifer S.$$tIntelligent Sustainable Systems$$dSingapore : Springer Singapore Pte. Limited,c2023$$z9789819917259 001469778 830_0 $$aLecture notes in networks and systems ;$$vv.665. 001469778 852__ $$bebk 001469778 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-99-1726-6$$zOnline Access$$91397441.1 001469778 909CO $$ooai:library.usi.edu:1469778$$pGLOBAL_SET 001469778 980__ $$aBIB 001469778 980__ $$aEBOOK 001469778 982__ $$aEbook 001469778 983__ $$aOnline 001469778 994__ $$a92$$bISE