Cantitate/Preț
Produs

Machine Intelligence and Smart Systems: Third International Conference, MISS 2023, Bhopal, India, January 24–25, 2023, Revised Selected Papers, Part II: Communications in Computer and Information Science, cartea 1952

Editat de Manish Gupta, Shikha Agrawal, Kamlesh Gupta, Jitendra Agrawal, korhan Cengis
en Limba Engleză Paperback – 21 sep 2024
​The two-volume set CCIS 1951 and 1952 constitutes the refereed post-conference proceedings of the Third International Conference on Machine Intelligence and Smart Systems, MISS 2023, Bhopal, India, during January 24-25, 2023. 
The 58 full papers included in this book were carefully reviewed and selected from 203 submissions. They were organized in topical sections as follows: Language processing; Recent trends; AI defensive schemes; Principle components; Deduction and prevention models.
 
 
 
Citește tot Restrânge

Din seria Communications in Computer and Information Science

Preț: 57502 lei

Preț vechi: 71878 lei
-20% Nou

Puncte Express: 863

Preț estimativ în valută:
10174 11961$ 8910£

Carte tipărită la comandă

Livrare economică 29 ianuarie-12 februarie 26

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783031691140
ISBN-10: 3031691148
Pagini: 467
Ilustrații: X, 492 p.
Dimensiuni: 155 x 235 mm
Greutate: 0.68 kg
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria Communications in Computer and Information Science

Locul publicării:Cham, Switzerland

Cuprins

.- Smart systems.
.- Design and implementation of a High-Performance Solar-Based Wireless Sensor Network.
.- IoT Security: Challenges, IDS Evolution and AI Defensive schemes: A Review.
.- An Effective Framework for Gastrointestinal disease detection using Hybrid features.
.- An Integrated Best-Worst-VIKOR Method for Evaluation and Selection of Luxury Hotels in India.
.- IPCCH:  Intrusion Prevention in Cloud Computing using Honeypot.
.- Entropy Based Transparent and Secure Watermarking Approach Using Arnold Transform.
.- Dual Scrambling Based Non Blind Robust and  Secure Color Watermarking Technique.
.- Efficient Technique for Image Enhancement Using Generative Adversarial Network.
.- An overview of Security Intelligence in IoT Applications with Learning Approaches.
.- Natural language processing: innovations, recent trends  and challenges.
.- Neural Machine Translation in Low-Resource Context:  Survey.
.- Recommendation System for Movies Using Improved version of SOM with Hybrid Filtering Methods.
.- Hierarchical Attention with Time Information based Healthcare System for Drug Recommendation and ADR Detection.
.- Evaluation of Different Mapping Schemes for Detection of Tandem Repeats in DNA Sequences.
.- A Survey on Mammogram Datasets to Develop Breast CAD System.
.- A Hybrid Approach for Preserving Source Location Privacy for Wireless Sensor Networks.
.- Multi-Criteria Decision Making Based Optimal Clustering Method for WSN.
.- Phish-EYE: A New Approach to Detect Homograph domain phishing Attack using Domain Binary Visualization and TensorFlow.
.- Effect of Cosine Decay Restart Learning Rate Scheduler on Movie Recommender System.
.- How Optimization Will Influence a Software Quality  Characteristics Recommendation Model.
.- N-Gram approach to preparing Crime-related Legal DataSet: A roadmap to classify Legal Text.
.- Handling Mouse Events using Finger’s Landmarks.
.- Analysis on Stock Market stream data using Kafka, AWS and Power BI.
.- An algorithm for estimating corrected-QT interval in the Electrocardiogram.
.- Enterprise of Fusion Cryptography-Steganographic Method for Cloud Loading Refuge    with Social Spider Optimization Algorithm.
.- FOG Grounded Observing Scheme for E-Healthcare based Stroke Estimation and Alert message in IoT Environment.
.- A System for Automatically Classifying Social Network Posts into Smart Cities Dimensions.
.- Drowsiness detection and prevention models for the elderly people: a promising design.
.- An Empirical Evaluation of Pre-Trained Convolutional  Neural Network Models for Neural Style Transfer.
.- Offline Handwritten Signature Identification and Verification Using LBP features.
.- Structured and Sparse Principle Component Analysis for Multi-Modal Data Fusion Approach.
.- Squared Fault and Biased Entropy for Magnetic Resonance Imaging (MRI) and Computed Tomography (CT) Image Synthesis using Firefly Algorithm.