
Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.
Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente
The two-volume set CCIS 1951 and 1952 constitutes the refereed post-conference proceedings of the Third International Conference on Machine Intelligence and Smart Systems, MISS 2023, Bhopal, India, during January 24-25, 2023.
The 58 full papers included in this book were carefully reviewed and selected from 203 submissions. They were organized in topical sections as follows: Language processing; Recent trends; AI defensive schemes; Principle components; Deduction and prevention models.
.- Smart systems.
.- Design and implementation of a High-Performance Solar-Based Wireless Sensor Network.
.- IoT Security: Challenges, IDS Evolution and AI Defensive schemes: A Review.
.- An Effective Framework for Gastrointestinal disease detection using Hybrid features.
.- An Integrated Best-Worst-VIKOR Method for Evaluation and Selection of Luxury Hotels in India.
.- IPCCH: Intrusion Prevention in Cloud Computing using Honeypot.
.- Entropy Based Transparent and Secure Watermarking Approach Using Arnold Transform.
.- Dual Scrambling Based Non Blind Robust and Secure Color Watermarking Technique.
.- Efficient Technique for Image Enhancement Using Generative Adversarial Network.
.- An overview of Security Intelligence in IoT Applications with Learning Approaches.
.- Natural language processing: innovations, recent trends and challenges.
.- Neural Machine Translation in Low-Resource Context: Survey.
.- Recommendation System for Movies Using Improved version of SOM with Hybrid Filtering Methods.
.- Hierarchical Attention with Time Information based Healthcare System for Drug Recommendation and ADR Detection.
.- Evaluation of Different Mapping Schemes for Detection of Tandem Repeats in DNA Sequences.
.- A Survey on Mammogram Datasets to Develop Breast CAD System.
.- A Hybrid Approach for Preserving Source Location Privacy for Wireless Sensor Networks.
.- Multi-Criteria Decision Making Based Optimal Clustering Method for WSN.
.- Phish-EYE: A New Approach to Detect Homograph domain phishing Attack using Domain Binary Visualization and TensorFlow.
.- Effect of Cosine Decay Restart Learning Rate Scheduler on Movie Recommender System.
.- How Optimization Will Influence a Software Quality Characteristics Recommendation Model.
.- N-Gram approach to preparing Crime-related Legal DataSet: A roadmap to classify Legal Text.
.- Handling Mouse Events using Finger’s Landmarks.
.- Analysis on Stock Market stream data using Kafka, AWS and Power BI.
.- An algorithm for estimating corrected-QT interval in the Electrocardiogram.
.- Enterprise of Fusion Cryptography-Steganographic Method for Cloud Loading Refuge with Social Spider Optimization Algorithm.
.- FOG Grounded Observing Scheme for E-Healthcare based Stroke Estimation and Alert message in IoT Environment.
.- A System for Automatically Classifying Social Network Posts into Smart Cities Dimensions.
.- Drowsiness detection and prevention models for the elderly people: a promising design.
.- An Empirical Evaluation of Pre-Trained Convolutional Neural Network Models for Neural Style Transfer.
.- Offline Handwritten Signature Identification and Verification Using LBP features.
.- Structured and Sparse Principle Component Analysis for Multi-Modal Data Fusion Approach.
.- Squared Fault and Biased Entropy for Magnetic Resonance Imaging (MRI) and Computed Tomography (CT) Image Synthesis using Firefly Algorithm.


Il sito utilizza cookie ed altri strumenti di tracciamento che raccolgono informazioni dal dispositivo dell’utente. Oltre ai cookie tecnici ed analitici aggregati, strettamente necessari per il funzionamento di questo sito web, previo consenso dell’utente possono essere installati cookie di profilazione e marketing e cookie dei social media. Cliccando su “Accetto tutti i cookie” saranno attivate tutte le categorie di cookie. Per accettare solo deterninate categorie di cookie, cliccare invece su “Impostazioni cookie”. Chiudendo il banner o continuando a navigare saranno installati solo cookie tecnici. Per maggiori dettagli, consultare la Cookie Policy.