Atnaujinkite slapukų nuostatas

Machine Intelligence and Smart Systems: Third International Conference, MISS 2023, Bhopal, India, January 2425, 2023, Revised Selected Papers, Part II 2024 ed. [Minkštas viršelis]

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formatas: Paperback / softback, 467 pages, aukštis x plotis: 235x155 mm, 152 Illustrations, color; 46 Illustrations, black and white; XXIII, 467 p. 198 illus., 152 illus. in color., 1 Paperback / softback
  • Serija: Communications in Computer and Information Science 1952
  • Išleidimo metai: 06-Mar-2025
  • Leidėjas: Springer International Publishing AG
  • ISBN-10: 3031691148
  • ISBN-13: 9783031691140
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 467 pages, aukštis x plotis: 235x155 mm, 152 Illustrations, color; 46 Illustrations, black and white; XXIII, 467 p. 198 illus., 152 illus. in color., 1 Paperback / softback
  • Serija: Communications in Computer and Information Science 1952
  • Išleidimo metai: 06-Mar-2025
  • Leidėjas: Springer International Publishing AG
  • ISBN-10: 3031691148
  • ISBN-13: 9783031691140
Kitos knygos pagal šią temą:
The two-volume set CCIS 1951 and 1952 constitutes the refereed post-conference proceedings of the Third International Conference on Machine Intelligence and Smart Systems, MISS 2023, Bhopal, India, during January 24-25, 2023. 





The 58 full papers included in this book were carefully reviewed and selected from 203 submissions. They were organized in topical sections as follows: Language processing; Recent trends; AI defensive schemes; Principle components; Deduction and prevention models.





 





 





 
.- Smart systems.



.- Design and implementation of a High-Performance Solar-Based Wireless
Sensor Network.



.- IoT Security: Challenges, IDS Evolution and AI Defensive schemes: A
Review.



.- An Effective Framework for Gastrointestinal disease detection using Hybrid
features.



.- An Integrated Best-Worst-VIKOR Method for Evaluation and Selection of
Luxury Hotels in India.



.- IPCCH:  Intrusion Prevention in Cloud Computing using Honeypot.



.- Entropy Based Transparent and Secure Watermarking Approach Using Arnold
Transform.



.- Dual Scrambling Based Non Blind Robust and  Secure Color Watermarking
Technique.



.- Efficient Technique for Image Enhancement Using Generative Adversarial
Network.



.- An overview of Security Intelligence in IoT Applications with Learning
Approaches.



.- Natural language processing: innovations, recent trends  and challenges.



.- Neural Machine Translation in Low-Resource Context:  Survey.



.- Recommendation System for Movies Using Improved version of SOM with Hybrid
Filtering Methods.



.- Hierarchical Attention with Time Information based Healthcare System for
Drug Recommendation and ADR Detection.



.- Evaluation of Different Mapping Schemes for Detection of Tandem Repeats in
DNA Sequences.



.- A Survey on Mammogram Datasets to Develop Breast CAD System.



.- A Hybrid Approach for Preserving Source Location Privacy for Wireless
Sensor Networks.



.- Multi-Criteria Decision Making Based Optimal Clustering Method for WSN.



.- Phish-EYE: A New Approach to Detect Homograph domain phishing Attack using
Domain Binary Visualization and TensorFlow.



.- Effect of Cosine Decay Restart Learning Rate Scheduler on Movie
Recommender System.



.- How Optimization Will Influence a Software Quality  Characteristics
Recommendation Model.



.- N-Gram approach to preparing Crime-related Legal DataSet: A roadmap to
classify Legal Text.



.- Handling Mouse Events using Fingers Landmarks.



.- Analysis on Stock Market stream data using Kafka, AWS and Power BI.



.- An algorithm for estimating corrected-QT interval in the
Electrocardiogram.



.- Enterprise of Fusion Cryptography-Steganographic Method for Cloud Loading
Refuge    with Social Spider Optimization Algorithm.



.- FOG Grounded Observing Scheme for E-Healthcare based Stroke Estimation and
Alert message in IoT Environment.



.- A System for Automatically Classifying Social Network Posts into Smart
Cities Dimensions.



.- Drowsiness detection and prevention models for the elderly people: a
promising design.



.- An Empirical Evaluation of Pre-Trained Convolutional  Neural Network
Models for Neural Style Transfer.



.- Offline Handwritten Signature Identification and Verification Using LBP
features.



.- Structured and Sparse Principle Component Analysis for Multi-Modal Data
Fusion Approach.



.- Squared Fault and Biased Entropy for Magnetic Resonance Imaging (MRI) and
Computed Tomography (CT) Image Synthesis using Firefly Algorithm.