Machine Intelligence and Smart Systems: Third International Conference, MISS 2023, Bhopal, India, January 24–25, 2023, Revised Selected Papers, Part II: Communications in Computer and Information Science, cartea 1952
Editat de Manish Gupta, Shikha Agrawal, Kamlesh Gupta, Jitendra Agrawal, korhan Cengisen Limba Engleză Paperback – 21 sep 2024
The 58 full papers included in this book were carefully reviewed and selected from 203 submissions. They were organized in topical sections as follows: Language processing; Recent trends; AI defensive schemes; Principle components; Deduction and prevention models.
Din seria Communications in Computer and Information Science
- 20%
Preț: 423.55 lei - 20%
Preț: 579.53 lei - 20%
Preț: 460.54 lei - 20%
Preț: 313.10 lei - 20%
Preț: 643.20 lei - 20%
Preț: 312.30 lei - 20%
Preț: 324.99 lei - 20%
Preț: 630.84 lei - 20%
Preț: 634.45 lei - 20%
Preț: 321.17 lei - 20%
Preț: 324.68 lei - 20%
Preț: 631.00 lei - 20%
Preț: 631.31 lei - 20%
Preț: 633.83 lei -
Preț: 377.68 lei - 20%
Preț: 388.30 lei - 20%
Preț: 317.05 lei -
Preț: 371.37 lei - 20%
Preț: 323.23 lei - 20%
Preț: 423.73 lei - 20%
Preț: 321.81 lei - 20%
Preț: 319.13 lei - 20%
Preț: 630.51 lei - 20%
Preț: 325.61 lei - 20%
Preț: 321.17 lei - 20%
Preț: 321.81 lei - 20%
Preț: 325.79 lei - 20%
Preț: 640.83 lei - 20%
Preț: 323.23 lei - 20%
Preț: 325.79 lei - 20%
Preț: 317.68 lei - 20%
Preț: 635.26 lei - 15%
Preț: 623.39 lei - 20%
Preț: 628.32 lei - 20%
Preț: 319.42 lei - 20%
Preț: 324.99 lei - 20%
Preț: 1014.25 lei - 20%
Preț: 804.07 lei - 20%
Preț: 529.54 lei - 20%
Preț: 631.31 lei - 20%
Preț: 1183.08 lei - 20%
Preț: 494.98 lei - 20%
Preț: 388.26 lei - 20%
Preț: 318.67 lei - 20%
Preț: 389.14 lei - 20%
Preț: 323.23 lei - 20%
Preț: 458.73 lei - 20%
Preț: 530.40 lei - 20%
Preț: 388.00 lei - 20%
Preț: 632.09 lei
Preț: 575.02 lei
Preț vechi: 718.78 lei
-20% Nou
Puncte Express: 863
Preț estimativ în valută:
101.74€ • 119.61$ • 89.10£
101.74€ • 119.61$ • 89.10£
Carte tipărită la comandă
Livrare economică 29 ianuarie-12 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031691140
ISBN-10: 3031691148
Pagini: 467
Ilustrații: X, 492 p.
Dimensiuni: 155 x 235 mm
Greutate: 0.68 kg
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Cham, Switzerland
ISBN-10: 3031691148
Pagini: 467
Ilustrații: X, 492 p.
Dimensiuni: 155 x 235 mm
Greutate: 0.68 kg
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Cham, Switzerland
Cuprins
.- Smart systems.
.- Design and implementation of a High-Performance Solar-Based Wireless Sensor Network.
.- IoT Security: Challenges, IDS Evolution and AI Defensive schemes: A Review.
.- An Effective Framework for Gastrointestinal disease detection using Hybrid features.
.- An Integrated Best-Worst-VIKOR Method for Evaluation and Selection of Luxury Hotels in India.
.- IPCCH: Intrusion Prevention in Cloud Computing using Honeypot.
.- Entropy Based Transparent and Secure Watermarking Approach Using Arnold Transform.
.- Dual Scrambling Based Non Blind Robust and Secure Color Watermarking Technique.
.- Efficient Technique for Image Enhancement Using Generative Adversarial Network.
.- An overview of Security Intelligence in IoT Applications with Learning Approaches.
.- Natural language processing: innovations, recent trends and challenges.
.- Neural Machine Translation in Low-Resource Context: Survey.
.- Recommendation System for Movies Using Improved version of SOM with Hybrid Filtering Methods.
.- Hierarchical Attention with Time Information based Healthcare System for Drug Recommendation and ADR Detection.
.- Evaluation of Different Mapping Schemes for Detection of Tandem Repeats in DNA Sequences.
.- A Survey on Mammogram Datasets to Develop Breast CAD System.
.- A Hybrid Approach for Preserving Source Location Privacy for Wireless Sensor Networks.
.- Multi-Criteria Decision Making Based Optimal Clustering Method for WSN.
.- Phish-EYE: A New Approach to Detect Homograph domain phishing Attack using Domain Binary Visualization and TensorFlow.
.- Effect of Cosine Decay Restart Learning Rate Scheduler on Movie Recommender System.
.- How Optimization Will Influence a Software Quality Characteristics Recommendation Model.
.- N-Gram approach to preparing Crime-related Legal DataSet: A roadmap to classify Legal Text.
.- Handling Mouse Events using Finger’s Landmarks.
.- Analysis on Stock Market stream data using Kafka, AWS and Power BI.
.- An algorithm for estimating corrected-QT interval in the Electrocardiogram.
.- Enterprise of Fusion Cryptography-Steganographic Method for Cloud Loading Refuge with Social Spider Optimization Algorithm.
.- FOG Grounded Observing Scheme for E-Healthcare based Stroke Estimation and Alert message in IoT Environment.
.- A System for Automatically Classifying Social Network Posts into Smart Cities Dimensions.
.- Drowsiness detection and prevention models for the elderly people: a promising design.
.- An Empirical Evaluation of Pre-Trained Convolutional Neural Network Models for Neural Style Transfer.
.- Offline Handwritten Signature Identification and Verification Using LBP features.
.- Structured and Sparse Principle Component Analysis for Multi-Modal Data Fusion Approach.
.- Squared Fault and Biased Entropy for Magnetic Resonance Imaging (MRI) and Computed Tomography (CT) Image Synthesis using Firefly Algorithm.
.- Design and implementation of a High-Performance Solar-Based Wireless Sensor Network.
.- IoT Security: Challenges, IDS Evolution and AI Defensive schemes: A Review.
.- An Effective Framework for Gastrointestinal disease detection using Hybrid features.
.- An Integrated Best-Worst-VIKOR Method for Evaluation and Selection of Luxury Hotels in India.
.- IPCCH: Intrusion Prevention in Cloud Computing using Honeypot.
.- Entropy Based Transparent and Secure Watermarking Approach Using Arnold Transform.
.- Dual Scrambling Based Non Blind Robust and Secure Color Watermarking Technique.
.- Efficient Technique for Image Enhancement Using Generative Adversarial Network.
.- An overview of Security Intelligence in IoT Applications with Learning Approaches.
.- Natural language processing: innovations, recent trends and challenges.
.- Neural Machine Translation in Low-Resource Context: Survey.
.- Recommendation System for Movies Using Improved version of SOM with Hybrid Filtering Methods.
.- Hierarchical Attention with Time Information based Healthcare System for Drug Recommendation and ADR Detection.
.- Evaluation of Different Mapping Schemes for Detection of Tandem Repeats in DNA Sequences.
.- A Survey on Mammogram Datasets to Develop Breast CAD System.
.- A Hybrid Approach for Preserving Source Location Privacy for Wireless Sensor Networks.
.- Multi-Criteria Decision Making Based Optimal Clustering Method for WSN.
.- Phish-EYE: A New Approach to Detect Homograph domain phishing Attack using Domain Binary Visualization and TensorFlow.
.- Effect of Cosine Decay Restart Learning Rate Scheduler on Movie Recommender System.
.- How Optimization Will Influence a Software Quality Characteristics Recommendation Model.
.- N-Gram approach to preparing Crime-related Legal DataSet: A roadmap to classify Legal Text.
.- Handling Mouse Events using Finger’s Landmarks.
.- Analysis on Stock Market stream data using Kafka, AWS and Power BI.
.- An algorithm for estimating corrected-QT interval in the Electrocardiogram.
.- Enterprise of Fusion Cryptography-Steganographic Method for Cloud Loading Refuge with Social Spider Optimization Algorithm.
.- FOG Grounded Observing Scheme for E-Healthcare based Stroke Estimation and Alert message in IoT Environment.
.- A System for Automatically Classifying Social Network Posts into Smart Cities Dimensions.
.- Drowsiness detection and prevention models for the elderly people: a promising design.
.- An Empirical Evaluation of Pre-Trained Convolutional Neural Network Models for Neural Style Transfer.
.- Offline Handwritten Signature Identification and Verification Using LBP features.
.- Structured and Sparse Principle Component Analysis for Multi-Modal Data Fusion Approach.
.- Squared Fault and Biased Entropy for Magnetic Resonance Imaging (MRI) and Computed Tomography (CT) Image Synthesis using Firefly Algorithm.