Machine Intelligence and Smart Systems
Third International Conference, MISS 2023, Bhopal, India, January 24-25, 2023, Revised Selected Papers, Part II
Herausgegeben:Gupta, Manish; Agrawal, Shikha; Gupta, Kamlesh; Agrawal, Jitendra; Cengis, korhan
Machine Intelligence and Smart Systems
Third International Conference, MISS 2023, Bhopal, India, January 24-25, 2023, Revised Selected Papers, Part II
Herausgegeben:Gupta, Manish; Agrawal, Shikha; Gupta, Kamlesh; Agrawal, Jitendra; Cengis, korhan
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
The two-volume set CCIS 1951 and 1952 constitutes the refereed post-conference proceedings of the Third International Conference on Machine Intelligence and Smart Systems, MISS 2023, Bhopal, India, during January 24-25, 2023.
The 58 full papers included in this book were carefully reviewed and selected from 203 submissions. They were organized in topical sections as follows: Language processing; Recent trends; AI defensive schemes; Principle components; Deduction and prevention models.
Andere Kunden interessierten sich auch für
- Computational Intelligence and Network Systems45,99 €
- Intelligent Systems in Computing and Communication100,99 €
- Intelligent Systems in Computing and Communication100,99 €
- Computer, Communication, and Signal Processing. AI, Knowledge Engineering and IoT for Smart Systems82,99 €
- Advances in Computational Intelligence45,99 €
- Computer, Communication, and Signal Processing. AI, Knowledge Engineering and IoT for Smart Systems82,99 €
- Advancements in Smart Computing and Information Security67,99 €
-
-
-
The two-volume set CCIS 1951 and 1952 constitutes the refereed post-conference proceedings of the Third International Conference on Machine Intelligence and Smart Systems, MISS 2023, Bhopal, India, during January 24-25, 2023.
The 58 full papers included in this book were carefully reviewed and selected from 203 submissions. They were organized in topical sections as follows: Language processing; Recent trends; AI defensive schemes; Principle components; Deduction and prevention models.
The 58 full papers included in this book were carefully reviewed and selected from 203 submissions. They were organized in topical sections as follows: Language processing; Recent trends; AI defensive schemes; Principle components; Deduction and prevention models.
Produktdetails
- Produktdetails
- Communications in Computer and Information Science 1952
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-69114-0
- Seitenzahl: 492
- Erscheinungstermin: 6. März 2025
- Englisch
- Abmessung: 235mm x 155mm x 27mm
- Gewicht: 739g
- ISBN-13: 9783031691140
- ISBN-10: 3031691148
- Artikelnr.: 71222968
- Herstellerkennzeichnung
- Springer Nature c/o IBS
- Benzstrasse 21
- 48619 Heek
- Tanja.Keller@springer.com
- Communications in Computer and Information Science 1952
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-69114-0
- Seitenzahl: 492
- Erscheinungstermin: 6. März 2025
- Englisch
- Abmessung: 235mm x 155mm x 27mm
- Gewicht: 739g
- ISBN-13: 9783031691140
- ISBN-10: 3031691148
- Artikelnr.: 71222968
- Herstellerkennzeichnung
- Springer Nature c/o IBS
- Benzstrasse 21
- 48619 Heek
- Tanja.Keller@springer.com
.- Smart systems.
.- Design and implementation of a High-Performance Solar-Based Wireless Sensor Network.
.- IoT Security: Challenges, IDS Evolution and AI Defensive schemes: A Review.
.- An Effective Framework for Gastrointestinal disease detection using Hybrid features.
.- An Integrated Best-Worst-VIKOR Method for Evaluation and Selection of Luxury Hotels in India.
.- IPCCH: Intrusion Prevention in Cloud Computing using Honeypot.
.- Entropy Based Transparent and Secure Watermarking Approach Using Arnold Transform.
.- Dual Scrambling Based Non Blind Robust and Secure Color Watermarking Technique.
.- Efficient Technique for Image Enhancement Using Generative Adversarial Network.
.- An overview of Security Intelligence in IoT Applications with Learning Approaches.
.- Natural language processing: innovations, recent trends and challenges.
.- Neural Machine Translation in Low-Resource Context: Survey.
.- Recommendation System for Movies Using Improved version of SOM with Hybrid Filtering Methods.
.- Hierarchical Attention with Time Information based Healthcare System for Drug Recommendation and ADR Detection.
.- Evaluation of Different Mapping Schemes for Detection of Tandem Repeats in DNA Sequences.
.- A Survey on Mammogram Datasets to Develop Breast CAD System.
.- A Hybrid Approach for Preserving Source Location Privacy for Wireless Sensor Networks.
.- Multi-Criteria Decision Making Based Optimal Clustering Method for WSN.
.- Phish-EYE: A New Approach to Detect Homograph domain phishing Attack using Domain Binary Visualization and TensorFlow.
.- Effect of Cosine Decay Restart Learning Rate Scheduler on Movie Recommender System.
.- How Optimization Will Influence a Software Quality Characteristics Recommendation Model.
.- N-Gram approach to preparing Crime-related Legal DataSet: A roadmap to classify Legal Text.
.- Handling Mouse Events using Finger's Landmarks.
.- Analysis on Stock Market stream data using Kafka, AWS and Power BI.
.- An algorithm for estimating corrected-QT interval in the Electrocardiogram.
.- Enterprise of Fusion Cryptography-Steganographic Method for Cloud Loading Refuge with Social Spider Optimization Algorithm.
.- FOG Grounded Observing Scheme for E-Healthcare based Stroke Estimation and Alert message in IoT Environment.
.- A System for Automatically Classifying Social Network Posts into Smart Cities Dimensions.
.- Drowsiness detection and prevention models for the elderly people: a promising design.
.- An Empirical Evaluation of Pre-Trained Convolutional Neural Network Models for Neural Style Transfer.
.- Offline Handwritten Signature Identification and Verification Using LBP features.
.- Structured and Sparse Principle Component Analysis for Multi-Modal Data Fusion Approach.
.- Squared Fault and Biased Entropy for Magnetic Resonance Imaging (MRI) and Computed Tomography (CT) Image Synthesis using Firefly Algorithm.
.- Design and implementation of a High-Performance Solar-Based Wireless Sensor Network.
.- IoT Security: Challenges, IDS Evolution and AI Defensive schemes: A Review.
.- An Effective Framework for Gastrointestinal disease detection using Hybrid features.
.- An Integrated Best-Worst-VIKOR Method for Evaluation and Selection of Luxury Hotels in India.
.- IPCCH: Intrusion Prevention in Cloud Computing using Honeypot.
.- Entropy Based Transparent and Secure Watermarking Approach Using Arnold Transform.
.- Dual Scrambling Based Non Blind Robust and Secure Color Watermarking Technique.
.- Efficient Technique for Image Enhancement Using Generative Adversarial Network.
.- An overview of Security Intelligence in IoT Applications with Learning Approaches.
.- Natural language processing: innovations, recent trends and challenges.
.- Neural Machine Translation in Low-Resource Context: Survey.
.- Recommendation System for Movies Using Improved version of SOM with Hybrid Filtering Methods.
.- Hierarchical Attention with Time Information based Healthcare System for Drug Recommendation and ADR Detection.
.- Evaluation of Different Mapping Schemes for Detection of Tandem Repeats in DNA Sequences.
.- A Survey on Mammogram Datasets to Develop Breast CAD System.
.- A Hybrid Approach for Preserving Source Location Privacy for Wireless Sensor Networks.
.- Multi-Criteria Decision Making Based Optimal Clustering Method for WSN.
.- Phish-EYE: A New Approach to Detect Homograph domain phishing Attack using Domain Binary Visualization and TensorFlow.
.- Effect of Cosine Decay Restart Learning Rate Scheduler on Movie Recommender System.
.- How Optimization Will Influence a Software Quality Characteristics Recommendation Model.
.- N-Gram approach to preparing Crime-related Legal DataSet: A roadmap to classify Legal Text.
.- Handling Mouse Events using Finger's Landmarks.
.- Analysis on Stock Market stream data using Kafka, AWS and Power BI.
.- An algorithm for estimating corrected-QT interval in the Electrocardiogram.
.- Enterprise of Fusion Cryptography-Steganographic Method for Cloud Loading Refuge with Social Spider Optimization Algorithm.
.- FOG Grounded Observing Scheme for E-Healthcare based Stroke Estimation and Alert message in IoT Environment.
.- A System for Automatically Classifying Social Network Posts into Smart Cities Dimensions.
.- Drowsiness detection and prevention models for the elderly people: a promising design.
.- An Empirical Evaluation of Pre-Trained Convolutional Neural Network Models for Neural Style Transfer.
.- Offline Handwritten Signature Identification and Verification Using LBP features.
.- Structured and Sparse Principle Component Analysis for Multi-Modal Data Fusion Approach.
.- Squared Fault and Biased Entropy for Magnetic Resonance Imaging (MRI) and Computed Tomography (CT) Image Synthesis using Firefly Algorithm.
.- Smart systems.
.- Design and implementation of a High-Performance Solar-Based Wireless Sensor Network.
.- IoT Security: Challenges, IDS Evolution and AI Defensive schemes: A Review.
.- An Effective Framework for Gastrointestinal disease detection using Hybrid features.
.- An Integrated Best-Worst-VIKOR Method for Evaluation and Selection of Luxury Hotels in India.
.- IPCCH: Intrusion Prevention in Cloud Computing using Honeypot.
.- Entropy Based Transparent and Secure Watermarking Approach Using Arnold Transform.
.- Dual Scrambling Based Non Blind Robust and Secure Color Watermarking Technique.
.- Efficient Technique for Image Enhancement Using Generative Adversarial Network.
.- An overview of Security Intelligence in IoT Applications with Learning Approaches.
.- Natural language processing: innovations, recent trends and challenges.
.- Neural Machine Translation in Low-Resource Context: Survey.
.- Recommendation System for Movies Using Improved version of SOM with Hybrid Filtering Methods.
.- Hierarchical Attention with Time Information based Healthcare System for Drug Recommendation and ADR Detection.
.- Evaluation of Different Mapping Schemes for Detection of Tandem Repeats in DNA Sequences.
.- A Survey on Mammogram Datasets to Develop Breast CAD System.
.- A Hybrid Approach for Preserving Source Location Privacy for Wireless Sensor Networks.
.- Multi-Criteria Decision Making Based Optimal Clustering Method for WSN.
.- Phish-EYE: A New Approach to Detect Homograph domain phishing Attack using Domain Binary Visualization and TensorFlow.
.- Effect of Cosine Decay Restart Learning Rate Scheduler on Movie Recommender System.
.- How Optimization Will Influence a Software Quality Characteristics Recommendation Model.
.- N-Gram approach to preparing Crime-related Legal DataSet: A roadmap to classify Legal Text.
.- Handling Mouse Events using Finger's Landmarks.
.- Analysis on Stock Market stream data using Kafka, AWS and Power BI.
.- An algorithm for estimating corrected-QT interval in the Electrocardiogram.
.- Enterprise of Fusion Cryptography-Steganographic Method for Cloud Loading Refuge with Social Spider Optimization Algorithm.
.- FOG Grounded Observing Scheme for E-Healthcare based Stroke Estimation and Alert message in IoT Environment.
.- A System for Automatically Classifying Social Network Posts into Smart Cities Dimensions.
.- Drowsiness detection and prevention models for the elderly people: a promising design.
.- An Empirical Evaluation of Pre-Trained Convolutional Neural Network Models for Neural Style Transfer.
.- Offline Handwritten Signature Identification and Verification Using LBP features.
.- Structured and Sparse Principle Component Analysis for Multi-Modal Data Fusion Approach.
.- Squared Fault and Biased Entropy for Magnetic Resonance Imaging (MRI) and Computed Tomography (CT) Image Synthesis using Firefly Algorithm.
.- Design and implementation of a High-Performance Solar-Based Wireless Sensor Network.
.- IoT Security: Challenges, IDS Evolution and AI Defensive schemes: A Review.
.- An Effective Framework for Gastrointestinal disease detection using Hybrid features.
.- An Integrated Best-Worst-VIKOR Method for Evaluation and Selection of Luxury Hotels in India.
.- IPCCH: Intrusion Prevention in Cloud Computing using Honeypot.
.- Entropy Based Transparent and Secure Watermarking Approach Using Arnold Transform.
.- Dual Scrambling Based Non Blind Robust and Secure Color Watermarking Technique.
.- Efficient Technique for Image Enhancement Using Generative Adversarial Network.
.- An overview of Security Intelligence in IoT Applications with Learning Approaches.
.- Natural language processing: innovations, recent trends and challenges.
.- Neural Machine Translation in Low-Resource Context: Survey.
.- Recommendation System for Movies Using Improved version of SOM with Hybrid Filtering Methods.
.- Hierarchical Attention with Time Information based Healthcare System for Drug Recommendation and ADR Detection.
.- Evaluation of Different Mapping Schemes for Detection of Tandem Repeats in DNA Sequences.
.- A Survey on Mammogram Datasets to Develop Breast CAD System.
.- A Hybrid Approach for Preserving Source Location Privacy for Wireless Sensor Networks.
.- Multi-Criteria Decision Making Based Optimal Clustering Method for WSN.
.- Phish-EYE: A New Approach to Detect Homograph domain phishing Attack using Domain Binary Visualization and TensorFlow.
.- Effect of Cosine Decay Restart Learning Rate Scheduler on Movie Recommender System.
.- How Optimization Will Influence a Software Quality Characteristics Recommendation Model.
.- N-Gram approach to preparing Crime-related Legal DataSet: A roadmap to classify Legal Text.
.- Handling Mouse Events using Finger's Landmarks.
.- Analysis on Stock Market stream data using Kafka, AWS and Power BI.
.- An algorithm for estimating corrected-QT interval in the Electrocardiogram.
.- Enterprise of Fusion Cryptography-Steganographic Method for Cloud Loading Refuge with Social Spider Optimization Algorithm.
.- FOG Grounded Observing Scheme for E-Healthcare based Stroke Estimation and Alert message in IoT Environment.
.- A System for Automatically Classifying Social Network Posts into Smart Cities Dimensions.
.- Drowsiness detection and prevention models for the elderly people: a promising design.
.- An Empirical Evaluation of Pre-Trained Convolutional Neural Network Models for Neural Style Transfer.
.- Offline Handwritten Signature Identification and Verification Using LBP features.
.- Structured and Sparse Principle Component Analysis for Multi-Modal Data Fusion Approach.
.- Squared Fault and Biased Entropy for Magnetic Resonance Imaging (MRI) and Computed Tomography (CT) Image Synthesis using Firefly Algorithm.