LEADER 05907nam 22007215 450 001 9910986130203321 005 20250305120731.0 010 $a9783031691157 010 $a3031691156 024 7 $a10.1007/978-3-031-69115-7 035 $a(MiAaPQ)EBC31946512 035 $a(Au-PeEL)EBL31946512 035 $a(CKB)37783637300041 035 $a(DE-He213)978-3-031-69115-7 035 $a(OCoLC)1507694468 035 $a(EXLCZ)9937783637300041 100 $a20250305d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aMachine Intelligence and Smart Systems $eThird International Conference, MISS 2023, Bhopal, India, January 24?25, 2023, Revised Selected Papers, Part II /$fedited by Manish Gupta, Shikha Agrawal, Kamlesh Gupta, Jitendra Agrawal, Korhan Cengis 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (641 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1952 311 08$a9783031691140 311 08$a3031691148 327 $a -- Smart systems. -- Design and implementation of a High-Performance Solar-Based Wireless Sensor Network. -- IoT Security: Challenges, IDS Evolution and AI Defensive schemes: A Review. -- An Effective Framework for Gastrointestinal disease detection using Hybrid features. -- An Integrated Best-Worst-VIKOR Method for Evaluation and Selection of Luxury Hotels in India. -- IPCCH: Intrusion Prevention in Cloud Computing using Honeypot. -- Entropy Based Transparent and Secure Watermarking Approach Using Arnold Transform. -- Dual Scrambling Based Non Blind Robust and Secure Color Watermarking Technique. -- Efficient Technique for Image Enhancement Using Generative Adversarial Network. -- An overview of Security Intelligence in IoT Applications with Learning Approaches. -- Natural language processing: innovations, recent trends and challenges. -- Neural Machine Translation in Low-Resource Context: Survey. -- Recommendation System for Movies Using Improved version of SOM with Hybrid Filtering Methods. -- Hierarchical Attention with Time Information based Healthcare System for Drug Recommendation and ADR Detection. -- Evaluation of Different Mapping Schemes for Detection of Tandem Repeats in DNA Sequences. -- A Survey on Mammogram Datasets to Develop Breast CAD System. -- A Hybrid Approach for Preserving Source Location Privacy for Wireless Sensor Networks. -- Multi-Criteria Decision Making Based Optimal Clustering Method for WSN. -- Phish-EYE: A New Approach to Detect Homograph domain phishing Attack using Domain Binary Visualization and TensorFlow. -- Effect of Cosine Decay Restart Learning Rate Scheduler on Movie Recommender System. -- How Optimization Will Influence a Software Quality Characteristics Recommendation Model. -- N-Gram approach to preparing Crime-related Legal DataSet: A roadmap to classify Legal Text. -- Handling Mouse Events using Finger?s Landmarks. -- Analysis on Stock Market stream data using Kafka, AWS and Power BI. -- An algorithm for estimating corrected-QT interval in the Electrocardiogram. -- Enterprise of Fusion Cryptography-Steganographic Method for Cloud Loading Refuge with Social Spider Optimization Algorithm. -- FOG Grounded Observing Scheme for E-Healthcare based Stroke Estimation and Alert message in IoT Environment. -- A System for Automatically Classifying Social Network Posts into Smart Cities Dimensions. -- Drowsiness detection and prevention models for the elderly people: a promising design. -- An Empirical Evaluation of Pre-Trained Convolutional Neural Network Models for Neural Style Transfer. -- Offline Handwritten Signature Identification and Verification Using LBP features. -- Structured and Sparse Principle Component Analysis for Multi-Modal Data Fusion Approach. -- Squared Fault and Biased Entropy for Magnetic Resonance Imaging (MRI) and Computed Tomography (CT) Image Synthesis using Firefly Algorithm. 330 $aThe two-volume set CCIS 1951 and 1952 constitutes the refereed post-conference proceedings of the Third International Conference on Machine Intelligence and Smart Systems, MISS 2023, Bhopal, India, during January 24-25, 2023. The 58 full papers included in this book were carefully reviewed and selected from 203 submissions. They were organized in topical sections as follows: Language processing; Recent trends; AI defensive schemes; Principle components; Deduction and prevention models. . 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1952 606 $aArtificial intelligence 606 $aComputer engineering 606 $aComputer networks 606 $aApplication software 606 $aData mining 606 $aArtificial Intelligence 606 $aComputer Engineering and Networks 606 $aComputer and Information Systems Applications 606 $aData Mining and Knowledge Discovery 615 0$aArtificial intelligence. 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aApplication software. 615 0$aData mining. 615 14$aArtificial Intelligence. 615 24$aComputer Engineering and Networks. 615 24$aComputer and Information Systems Applications. 615 24$aData Mining and Knowledge Discovery. 676 $a006.3 700 $aGupta$b Manish$0919178 701 $aAgrawal$b Shikha$01790658 701 $aGupta$b Kamlesh$01790659 701 $aAgrawal$b Jitendra$01769163 701 $aCengis$b Korhan$01790660 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910986130203321 996 $aMachine Intelligence and Smart Systems$94327393 997 $aUNINA