Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020) (eBook, PDF)
Redaktion: Abraham, Ajith; Issac, Biju; McLoone, Seán; Haqiq, Abdelkrim; Jabbar, M. A.; Gandhi, Niketa; Ohsawa, Yukio
Alle Infos zum eBook verschenken
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020) (eBook, PDF)
Redaktion: Abraham, Ajith; Issac, Biju; McLoone, Seán; Haqiq, Abdelkrim; Jabbar, M. A.; Gandhi, Niketa; Ohsawa, Yukio
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Hier können Sie sich einloggen
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book highlights the recent research on soft computing and pattern recognition and their various practical applications. It presents 62 selected papers from the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020) and 35 papers from the 16th International Conference on Information Assurance and Security (IAS 2020), which was held online, from December 15 to 18, 2020. A premier conference in the field of artificial intelligence, SoCPaR-IAS 2020 brought together researchers, engineers and practitioners whose work involves intelligent systems, network security…mehr
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 116.58MB
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: Springer Nature Switzerland
- Seitenzahl: 1042
- Erscheinungstermin: 15. April 2021
- Englisch
- ISBN-13: 9783030736897
- Artikelnr.: 61520482
- Verlag: Springer Nature Switzerland
- Seitenzahl: 1042
- Erscheinungstermin: 15. April 2021
- Englisch
- ISBN-13: 9783030736897
- Artikelnr.: 61520482
Intelligent and Secure Autofill System in Web Browsers
Synthesis Biometric Materials based on Cooperative among Graph Mining
Techniques (DSA, WOA & gSpan-FBR) to Water Treatment
An Initial Parameter Search for Rapid Concept Drift Adaptation in Deep
Neural Networks
A Comparison of Swarm Intelligence Algorithms Exploiting a Novel Neighbour
Generation Technique
A Proposal for the Automatic detection of Skin Cancer Based on Image
Characteristics of Shape, Colour, and Texture
Breast Cancer Detection in Infrared Thermal Images Using Convolutional
Neural Networks: A Transfer Learning Approach
Implementation of a system for collecting and analyzing public and open
access information from Brazilian federal legislative houses
Data Origination: Human-centered Approach for Design, Acquisition, and
Utilization of Data
Coarse-Grained Genetic Algorithm for Flexible Job Scheduling Problem
Computer Vision and AI Improving the Lives of Physically Disabled by the
means of Perceptual User Interfaces
Subspace guided collaborative clustering based on optimal transport
Exploring An automatic assessment-based features for clustering of
students' academic performance
Quantum Semi Non-Negative Matrix Factorization
A New Genetic-Based Hyper-Heuristic Algorithm for Clustering Problem
LSTM vs. GRU for Arabic Machine Translation
Towards Lip Motion Based Speaking Mode Detection Using Residual Neural
Networks
Reducing the Error Mapping of the Students' Performance using Feature
Selection
Spatial Graph Regularized Correlation Filters for Visual Object Tracking
3D Wireframe Model of Medical and Complex Images Using Cellular Logic Array
Processing Techniques
Suspicious activity detection using Transfer learning based ResNet tracking
from surveillance videos
Vehicle Detection in UAV Videos using CNN-SVM
Underwater moving object detection using GMG
Linear Dilation-Erosion Perceptron Trained Using a Convex-Concave Procedure
Smart Phone Sensor-Based Human Activity Recognition using Machine Learning
Techniques
Wavelet Filtering for Limited-Angle and Low-Dose Computed Tomographic
Reconstruction
Handwritten Signature Verification using Complex Wavelet Transform and
Mutual Information based Kernel
Multi-Scale Oriented Basic Image Features Column for Handwritten Digit
Recognition
Delving into Feature Maps: An Explanatory Analysis to Evaluate Weight
Initialization
Historical Kannada Handwritten Character Recognition using Machine Learning
Algorithm
Home Health Care Network Management Under Fuzzy Environment Using
meta-heuristic algorithms
The Lagrangian Relaxation Approach for Home Health Care Problems
Study on Vision System for Disease Detection Using CNN and LabVIEW of an
Agricultural Robot
An Autonomous Galactic Swarm Optimization Algorithm Supported by Hidden
Markov Model
Machine Learning for Breast Cancer Diagnosis and Classification using
hand-crafted features
Automatic Seeded Region Growing with Level Set Technique Used for
Segmentation of Pancreas
Sustainability Considerations in the Product Design Using System Dynamics
and Fuzzy Cognitive Maps
Dominant voiced speech segregation and noise reduction pre-processing
module for hearing aids and speech processing applications
Forensic Analysis of Copy-Move Attack with Robust Duplication Detection
Feature selection approach based on a novel variant of hybrid differential
evolution and PSO for sentiment classification
A Comparative Study for Fisheye Image Classification: SVM or DNN
A Survey on Applications of Modern Deep Learning Techniques in Team Sports
Analytics
Describing Brachiopods shape based on fusion of Curvature and Fourier
descriptors
Early diagnosis of Parkinson's disease using LSTM: A Deep Learning Approach
Using the $K$-nn algorithm to segment a foetus brain MRI --- a case study
Design of a Closed Supply Chain with regards to the Social and
Environmental Impacts under Uncertainty
Contour Method for Ultrasound Images
Unsupervised learning from data and learners
Using Microsoft Kinect v2 to record custom exercises for physical
disability rehabilitation
Customer Churn Prediction using Deep Learning
The Fusion of Features for Detection of Cotton Wool Spots in Digital Fundus
Images
Thyroid Nodule Cell Classification In Cytology Images Using Transfer
Learning Approach
Deep Fusion Driven Semantic Segmentation for the Automatic Recognition of
Concealed Contraband Items
Project comparison method supporting the participatory budget process -
Poznan case study
Seeding initial population, in genetic algorithm for features selection
An Incremental Fuzzy Learning Approach for Online Classification of Data
Streams
Depth Image Completion using Anisotropic Operators
Performance Analysis of Machine Learning Approaches for Prediction of Human
Cardiac Complications
Acousto-Prosodic Delineation and Classification of Speech Disfluencies in
Bilingual Children
Real-Time Traffic Sign Recognition and Classification using Deep Learning
Merits of Mixotrophic cultivation for microalgal biomass production
Deep Neural Network based Phishing Classification on a High-Risk URL
Dataset
A Secure Bayesian Compressive Spectrum Sensing Technique Based Chaotic
Matrix for Cognitive Radio Networks
Optimized machine learning techniques for IoT Cyber attacks Detection
Inadequacy of IT approaches to manage cyber security in ICS context
Trust-based intrusion detection for Multi Path OLSR protocol
Bitcoin Technology and its Security Challenges: A Research Survey
Zero Trust User Access & Identity Security in Smart Grid based SCADA
Systems
Man-in-the-browser attacks against IoT devices: a study of smart homes
Scambaiting as a form of online video entertainment: An exploratory study
Create a hybrid algorithm by combining Hill and Ad-vanced Encryption
Standard Algorithms to Enhance Ef-ficiency of RGB Image Encryption
An improved smart wheat health monitor for smart farming application using
deep residual learning framework
A New Electronic Voting System based on elliptic curve in a Cloud Computing
Environment
Investigation of stereo camera calibration based on Python
Study on the different types of neural networks to improve the
classification of ransomwares
Quality of Service Evaluation with DSR (Dynamic Source Routing) protocol in
the classroom ad hoc network of the New Generation of Digital Open
Universities (DOUNG)
Detection of vulnerabilities related to permissions requests for Android
apps using Machine Learning techniques
A New Approach to Detecting Bot Attack Activity Scenario
A Log-Based Method to Detect and Resolve Efficiently Conflicts in Access
Control Policies
A Hybrid Policy Engineering Approach for Attribute-based Access Control
(ABAC)
Anomaly Detection in the Internet of Things (IoT) by Using Articial Immune
System
Agreement-Broker: Performance analysis using KNN, SVM, and ANN classifiers
Secret disclosure attacks on a recent ultralightweight mutual RFID
authentication protocol for blockchain-enabled supply chains
A Novel Image Encryption Technique Using Multiple One Dimensional Chaotic
Map
Use of cryptography for monetary issuance And securing financial
transactions
MAAMSIC: Multimodal Authentication and Authorization Model For Security of
IoT Communication via GSM Messaging in Sub-Saharan Africa
Towards a proactive system of DDoS attacks detection in the cloud
Edge Computing Enabled Technologies for Secure 6G Smart Environment - An
overview
Secure QIM-based Image Watermarking in JPEG Compression Domain
Security and Privacy on IoMT
Biometric Template Protection using Deep Learning
Inner and outer race bearing defects of induction motor running at low
speeds signal analysis with DWT
Transformation of PrivUML into XACML using QVT
Robust and Secure watermarking technique for e-health application
Emoji score and polarity evaluation using short name of emoji and
expression sentiment
Dynamic and Decentralized Trust Management for the Internet of Things (IoT)
paradigm
Comparison of Parental Control Systems for Blocking Advertisements on a
Home Network
Intelligent and Secure Autofill System in Web Browsers
Synthesis Biometric Materials based on Cooperative among Graph Mining
Techniques (DSA, WOA & gSpan-FBR) to Water Treatment
An Initial Parameter Search for Rapid Concept Drift Adaptation in Deep
Neural Networks
A Comparison of Swarm Intelligence Algorithms Exploiting a Novel Neighbour
Generation Technique
A Proposal for the Automatic detection of Skin Cancer Based on Image
Characteristics of Shape, Colour, and Texture
Breast Cancer Detection in Infrared Thermal Images Using Convolutional
Neural Networks: A Transfer Learning Approach
Implementation of a system for collecting and analyzing public and open
access information from Brazilian federal legislative houses
Data Origination: Human-centered Approach for Design, Acquisition, and
Utilization of Data
Coarse-Grained Genetic Algorithm for Flexible Job Scheduling Problem
Computer Vision and AI Improving the Lives of Physically Disabled by the
means of Perceptual User Interfaces
Subspace guided collaborative clustering based on optimal transport
Exploring An automatic assessment-based features for clustering of
students' academic performance
Quantum Semi Non-Negative Matrix Factorization
A New Genetic-Based Hyper-Heuristic Algorithm for Clustering Problem
LSTM vs. GRU for Arabic Machine Translation
Towards Lip Motion Based Speaking Mode Detection Using Residual Neural
Networks
Reducing the Error Mapping of the Students' Performance using Feature
Selection
Spatial Graph Regularized Correlation Filters for Visual Object Tracking
3D Wireframe Model of Medical and Complex Images Using Cellular Logic Array
Processing Techniques
Suspicious activity detection using Transfer learning based ResNet tracking
from surveillance videos
Vehicle Detection in UAV Videos using CNN-SVM
Underwater moving object detection using GMG
Linear Dilation-Erosion Perceptron Trained Using a Convex-Concave Procedure
Smart Phone Sensor-Based Human Activity Recognition using Machine Learning
Techniques
Wavelet Filtering for Limited-Angle and Low-Dose Computed Tomographic
Reconstruction
Handwritten Signature Verification using Complex Wavelet Transform and
Mutual Information based Kernel
Multi-Scale Oriented Basic Image Features Column for Handwritten Digit
Recognition
Delving into Feature Maps: An Explanatory Analysis to Evaluate Weight
Initialization
Historical Kannada Handwritten Character Recognition using Machine Learning
Algorithm
Home Health Care Network Management Under Fuzzy Environment Using
meta-heuristic algorithms
The Lagrangian Relaxation Approach for Home Health Care Problems
Study on Vision System for Disease Detection Using CNN and LabVIEW of an
Agricultural Robot
An Autonomous Galactic Swarm Optimization Algorithm Supported by Hidden
Markov Model
Machine Learning for Breast Cancer Diagnosis and Classification using
hand-crafted features
Automatic Seeded Region Growing with Level Set Technique Used for
Segmentation of Pancreas
Sustainability Considerations in the Product Design Using System Dynamics
and Fuzzy Cognitive Maps
Dominant voiced speech segregation and noise reduction pre-processing
module for hearing aids and speech processing applications
Forensic Analysis of Copy-Move Attack with Robust Duplication Detection
Feature selection approach based on a novel variant of hybrid differential
evolution and PSO for sentiment classification
A Comparative Study for Fisheye Image Classification: SVM or DNN
A Survey on Applications of Modern Deep Learning Techniques in Team Sports
Analytics
Describing Brachiopods shape based on fusion of Curvature and Fourier
descriptors
Early diagnosis of Parkinson's disease using LSTM: A Deep Learning Approach
Using the $K$-nn algorithm to segment a foetus brain MRI --- a case study
Design of a Closed Supply Chain with regards to the Social and
Environmental Impacts under Uncertainty
Contour Method for Ultrasound Images
Unsupervised learning from data and learners
Using Microsoft Kinect v2 to record custom exercises for physical
disability rehabilitation
Customer Churn Prediction using Deep Learning
The Fusion of Features for Detection of Cotton Wool Spots in Digital Fundus
Images
Thyroid Nodule Cell Classification In Cytology Images Using Transfer
Learning Approach
Deep Fusion Driven Semantic Segmentation for the Automatic Recognition of
Concealed Contraband Items
Project comparison method supporting the participatory budget process -
Poznan case study
Seeding initial population, in genetic algorithm for features selection
An Incremental Fuzzy Learning Approach for Online Classification of Data
Streams
Depth Image Completion using Anisotropic Operators
Performance Analysis of Machine Learning Approaches for Prediction of Human
Cardiac Complications
Acousto-Prosodic Delineation and Classification of Speech Disfluencies in
Bilingual Children
Real-Time Traffic Sign Recognition and Classification using Deep Learning
Merits of Mixotrophic cultivation for microalgal biomass production
Deep Neural Network based Phishing Classification on a High-Risk URL
Dataset
A Secure Bayesian Compressive Spectrum Sensing Technique Based Chaotic
Matrix for Cognitive Radio Networks
Optimized machine learning techniques for IoT Cyber attacks Detection
Inadequacy of IT approaches to manage cyber security in ICS context
Trust-based intrusion detection for Multi Path OLSR protocol
Bitcoin Technology and its Security Challenges: A Research Survey
Zero Trust User Access & Identity Security in Smart Grid based SCADA
Systems
Man-in-the-browser attacks against IoT devices: a study of smart homes
Scambaiting as a form of online video entertainment: An exploratory study
Create a hybrid algorithm by combining Hill and Ad-vanced Encryption
Standard Algorithms to Enhance Ef-ficiency of RGB Image Encryption
An improved smart wheat health monitor for smart farming application using
deep residual learning framework
A New Electronic Voting System based on elliptic curve in a Cloud Computing
Environment
Investigation of stereo camera calibration based on Python
Study on the different types of neural networks to improve the
classification of ransomwares
Quality of Service Evaluation with DSR (Dynamic Source Routing) protocol in
the classroom ad hoc network of the New Generation of Digital Open
Universities (DOUNG)
Detection of vulnerabilities related to permissions requests for Android
apps using Machine Learning techniques
A New Approach to Detecting Bot Attack Activity Scenario
A Log-Based Method to Detect and Resolve Efficiently Conflicts in Access
Control Policies
A Hybrid Policy Engineering Approach for Attribute-based Access Control
(ABAC)
Anomaly Detection in the Internet of Things (IoT) by Using Articial Immune
System
Agreement-Broker: Performance analysis using KNN, SVM, and ANN classifiers
Secret disclosure attacks on a recent ultralightweight mutual RFID
authentication protocol for blockchain-enabled supply chains
A Novel Image Encryption Technique Using Multiple One Dimensional Chaotic
Map
Use of cryptography for monetary issuance And securing financial
transactions
MAAMSIC: Multimodal Authentication and Authorization Model For Security of
IoT Communication via GSM Messaging in Sub-Saharan Africa
Towards a proactive system of DDoS attacks detection in the cloud
Edge Computing Enabled Technologies for Secure 6G Smart Environment - An
overview
Secure QIM-based Image Watermarking in JPEG Compression Domain
Security and Privacy on IoMT
Biometric Template Protection using Deep Learning
Inner and outer race bearing defects of induction motor running at low
speeds signal analysis with DWT
Transformation of PrivUML into XACML using QVT
Robust and Secure watermarking technique for e-health application
Emoji score and polarity evaluation using short name of emoji and
expression sentiment
Dynamic and Decentralized Trust Management for the Internet of Things (IoT)
paradigm
Comparison of Parental Control Systems for Blocking Advertisements on a
Home Network