Fr. 117.00

Machine Intelligence and Smart Systems - Third International Conference, MISS 2023, Bhopal, India, January 24-25, 2023, Revised Selected Papers, Part II

English · Paperback / Softback

Shipping usually within 6 to 7 weeks

Description

Read more

The two-volume set CCIS 1951 and 1952 constitutes the refereed post-conference proceedings of the Third International Conference on Machine Intelligence and Smart Systems, MISS 2023, Bhopal, India, during January 24-25, 2023. 
The 58 full papers included in this book were carefully reviewed and selected from 203 submissions. They were organized in topical sections as follows: Language processing; Recent trends; AI defensive schemes; Principle components; Deduction and prevention models.
 
 
 

List of contents

.- Smart systems.
.- Design and implementation of a High-Performance Solar-Based Wireless Sensor Network.
.- IoT Security: Challenges, IDS Evolution and AI Defensive schemes: A Review.
.- An Effective Framework for Gastrointestinal disease detection using Hybrid features.
.- An Integrated Best-Worst-VIKOR Method for Evaluation and Selection of Luxury Hotels in India.
.- IPCCH:  Intrusion Prevention in Cloud Computing using Honeypot.
.- Entropy Based Transparent and Secure Watermarking Approach Using Arnold Transform.
.- Dual Scrambling Based Non Blind Robust and  Secure Color Watermarking Technique.
.- Efficient Technique for Image Enhancement Using Generative Adversarial Network.
.- An overview of Security Intelligence in IoT Applications with Learning Approaches.
.- Natural language processing: innovations, recent trends  and challenges.
.- Neural Machine Translation in Low-Resource Context:  Survey.
.- Recommendation System for Movies Using Improved version of SOM with Hybrid Filtering Methods.
.- Hierarchical Attention with Time Information based Healthcare System for Drug Recommendation and ADR Detection.
.- Evaluation of Different Mapping Schemes for Detection of Tandem Repeats in DNA Sequences.
.- A Survey on Mammogram Datasets to Develop Breast CAD System.
.- A Hybrid Approach for Preserving Source Location Privacy for Wireless Sensor Networks.
.- Multi-Criteria Decision Making Based Optimal Clustering Method for WSN.
.- Phish-EYE: A New Approach to Detect Homograph domain phishing Attack using Domain Binary Visualization and TensorFlow.
.- Effect of Cosine Decay Restart Learning Rate Scheduler on Movie Recommender System.
.- How Optimization Will Influence a Software Quality  Characteristics Recommendation Model.
.- N-Gram approach to preparing Crime-related Legal DataSet: A roadmap to classify Legal Text.
.- Handling Mouse Events using Finger's Landmarks.
.- Analysis on Stock Market stream data using Kafka, AWS and Power BI.
.- An algorithm for estimating corrected-QT interval in the Electrocardiogram.
.- Enterprise of Fusion Cryptography-Steganographic Method for Cloud Loading Refuge    with Social Spider Optimization Algorithm.
.- FOG Grounded Observing Scheme for E-Healthcare based Stroke Estimation and Alert message in IoT Environment.
.- A System for Automatically Classifying Social Network Posts into Smart Cities Dimensions.
.- Drowsiness detection and prevention models for the elderly people: a promising design.
.- An Empirical Evaluation of Pre-Trained Convolutional  Neural Network Models for Neural Style Transfer.
.- Offline Handwritten Signature Identification and Verification Using LBP features.
.- Structured and Sparse Principle Component Analysis for Multi-Modal Data Fusion Approach.
.- Squared Fault and Biased Entropy for Magnetic Resonance Imaging (MRI) and Computed Tomography (CT) Image Synthesis using Firefly Algorithm.

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.