001471965 000__ 06107cam\\22006857a\4500 001471965 001__ 1471965 001471965 003__ OCoLC 001471965 005__ 20230908003323.0 001471965 006__ m\\\\\o\\d\\\\\\\\ 001471965 007__ cr\un\nnnunnun 001471965 008__ 230722s2023\\\\si\\\\\\o\\\\\101\0\eng\d 001471965 019__ $$a1390916333 001471965 020__ $$a9789819936083$$q(electronic bk.) 001471965 020__ $$a981993608X$$q(electronic bk.) 001471965 020__ $$z9819936071 001471965 020__ $$z9789819936076 001471965 0247_ $$a10.1007/978-981-99-3608-3$$2doi 001471965 035__ $$aSP(OCoLC)1390923456 001471965 040__ $$aEBLCP$$beng$$cEBLCP$$dYDX$$dGW5XE$$dEBLCP$$dOCLCQ 001471965 049__ $$aISEA 001471965 050_4 $$aQA76.9.A25 001471965 08204 $$a005.8$$223/eng/20230726 001471965 1112_ $$aInternational Conference on Soft Computing for Security Applications$$n(3rd :$$d2023 :$$cSalem, India) 001471965 24510 $$aSoft computing for security applications :$$bproceedings of ICSCS 2023 /$$cG. Ranganathan, Youssouf EL Allioui, Selwyn Piramuthu, editors. 001471965 2463_ $$aICSCS 2023 001471965 260__ $$aSingapore :$$bSpringer,$$c2023. 001471965 300__ $$a1 online resource (921 p.). 001471965 4901_ $$aAdvances in Intelligent Systems and Computing ;$$vv. 1449 001471965 500__ $$a3.2 Design Feasibility Inference 001471965 500__ $$aIncludes author index. 001471965 5050_ $$aIntro -- Preface -- Contents -- About the Editors -- Designing Recommendation System for Hotels Using Cosine Similarity Function -- 1 Introduction -- 2 Problem Modelling -- 3 Literature Review -- 4 Flow Diagram -- 5 Cosine Similarity Function -- 5.1 Compute the Similarity Score -- 5.2 Determine the Magnitude -- 6 Working Diagram -- 7 Contrasting -- 7.1 Cosine Similarity Function Versus Euclidean Distance -- 7.2 Drawbacks of Cosine Similarity Function -- 7.3 Jaccard Similarity Versus Cosine Similarity Function -- 8 Applications -- 9 Architecture Diagram -- 10 Results and Discussion 001471965 5058_ $$a11 Identifying Similar Users -- 12 Conclusion -- References -- Vehicle Detection in Autonomous Vehicles Using Computer Vision -- 1 Introduction -- 2 Background -- 3 Architecture of Self-driving Cars -- 4 Existing Methods -- 4.1 CNN -- 4.2 RCNN -- 4.3 Fast RCNN -- 4.4 Faster RCNN -- 5 Proposed Methodology-YOLO -- 6 YOLO Framework -- 7 Intersection Over Union and Non-max Suppression -- 8 Experimental Setup -- 9 Algorithm -- 10 Results and Discussions -- 10.1 Precision-Recall Curve -- 10.2 Prediction Rate -- 11 Conclusion -- References 001471965 5058_ $$aAnalysis of the Volume of Costs and Profits Under Conditions of Uncertainty Using the Method of Fuzzy Logic -- 1 Introduction -- 2 Fuzzy Logic Theory -- 2.1 Fuzzy Rules -- 2.2 Fuzzification -- 2.3 Inference -- 2.4 Defuzzification -- 3 Operating Volume Profit Analysis -- 3.1 Breakeven Point Analysis -- 4 Fuzzy Logic Approach for AVP Analysis -- 4.1 Analyzing Data Using Fuzzy Logic Method -- 4.2 Data, Purpose, and Method -- 4.3 Resolving Fuzzification -- 5 Conclusion -- References -- Deep Learning-Based Sign Language Recognition and Translation -- 1 Introduction -- 2 Literature Review 001471965 5058_ $$a3 Convolutional Neural Network -- 4 Proposed System -- 5 Implementation -- 6 Result and Discussion -- 7 Conclusion and Future Scope -- References -- Automated Suspicious Activity Detection from Surveillance Videos -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 LRCN Model -- 3.2 Dataset -- 3.3 Pre-processing -- 3.4 Training and Testing -- 3.5 Deployment -- 4 Results and Analysis -- 4.1 Model Layer Diagram -- 5 Conclusion and Future Scope -- References -- Emergence of Blockchain Technology in Various Smart IoMT-Enabled Healthcare Security Scenarios -- 1 Introduction 001471965 5058_ $$a2 Literature Review -- 3 Smart Healthcare Security Requirements -- 4 Blockchain -- 4.1 Blockchain Header -- 4.2 Transaction Header -- 5 Blockchain and Smart Health Care -- 5.1 Need of Blockchain for Smart Health Care -- 5.2 Security Issues of Blockchain -- 5.3 Integration of IoT and Machine Learning Models -- 6 Comparative Study -- 7 Research Challenges -- 8 Future Scope -- 9 Conclusion -- References -- Elderly People Assistance Based on Advanced Hardware Module and a Mobile App -- 1 Introduction -- 1.1 Objective and Scope -- 2 Literature Survey -- 3 Methodology -- 3.1 Technical Feasibility 001471965 506__ $$aAccess limited to authorized users. 001471965 520__ $$aThis book features selected papers from the International Conference on Soft Computing for Security Applications (ICSCS 2023), held at Dhirajlal Gandhi College of Technology, Tamil Nadu, India, during April 2122, 2023. It covers recent advances in the field of soft computing techniques such as fuzzy logic, neural network, support vector machines, evolutionary computation, machine learning, and probabilistic reasoning to solve various real-time challenges. The book presents innovative work by leading academics, researchers, and experts from industry. 001471965 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed July 26, 2023). 001471965 650_0 $$aComputer security$$vCongresses. 001471965 650_0 $$aSoft computing$$vCongresses. 001471965 655_0 $$aElectronic books. 001471965 7001_ $$aRanganathan, G. 001471965 7001_ $$aEL Allioui, Youssouf. 001471965 7001_ $$aPiramuthu, Selwyn. 001471965 77608 $$iPrint version:$$aRanganathan, G.$$tSoft Computing for Security Applications$$dSingapore : Springer Singapore Pte. Limited,c2023$$z9789819936076 001471965 830_0 $$aAdvances in intelligent systems and computing ;$$v1449. 001471965 852__ $$bebk 001471965 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-99-3608-3$$zOnline Access$$91397441.1 001471965 909CO $$ooai:library.usi.edu:1471965$$pGLOBAL_SET 001471965 980__ $$aBIB 001471965 980__ $$aEBOOK 001471965 982__ $$aEbook 001471965 983__ $$aOnline 001471965 994__ $$a92$$bISE