, , , , , , e.a.

Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020)

Specificaties
Paperback, blz. | Engels
Springer International Publishing | e druk, 2021
ISBN13: 9783030736880
Rubricering
Springer International Publishing e druk, 2021 9783030736880
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

This book highlights the recent research on soft computing and pattern recognition and their various practical applications. It presents 62 selected papers from the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020) and 35 papers from the 16th International Conference on Information Assurance and Security (IAS 2020), which was held online, from December 15 to 18, 2020. A premier conference in the field of artificial intelligence, SoCPaR-IAS 2020 brought together researchers, engineers and practitioners whose work involves intelligent systems, network security and their applications in industry. Including contributions by authors from 40 countries, the book offers a valuable reference guide for all researchers, students and practitioners in the fields of Computer Science and Engineering.

Specificaties

ISBN13:9783030736880
Taal:Engels
Bindwijze:paperback
Uitgever:Springer International Publishing

Inhoudsopgave

Mask RCNN for Human Motion and Actions Recognition<div>Intelligent and Secure Autofill System in Web Browsers</div><div>Synthesis Biometric Materials based on Cooperative among Graph Mining Techniques (DSA, WOA & gSpan-FBR) to Water Treatment</div><div>An Initial Parameter Search for Rapid Concept Drift Adaptation in Deep Neural Networks</div><div>A Comparison of Swarm Intelligence Algorithms Exploiting a Novel Neighbour Generation Technique</div><div>A Proposal for the Automatic detection of Skin Cancer Based on Image Characteristics of Shape, Colour, and Texture</div><div>Breast Cancer Detection in Infrared Thermal Images Using Convolutional Neural Networks: A Transfer Learning Approach&nbsp;</div><div>Implementation of a system for collecting and analyzing public and open access information from Brazilian federal legislative houses</div><div>Data Origination: Human-centered Approach for Design, Acquisition, and Utilization of Data</div><div>Coarse-Grained Genetic Algorithm for Flexible Job Scheduling Problem</div><div>Computer Vision and AI Improving the Lives of Physically Disabled by the means of Perceptual User Interfaces</div><div>Subspace guided collaborative clustering based on optimal transport</div><div>Exploring An automatic assessment-based features for clustering of students' academic performance</div><div>Quantum Semi Non-Negative Matrix Factorization</div><div>A New Genetic-Based Hyper-Heuristic Algorithm for Clustering Problem</div><div>LSTM vs. GRU for Arabic Machine Translation</div><div>Towards Lip Motion Based Speaking Mode Detection Using Residual Neural Networks</div><div>Reducing the Error Mapping of the Students’ Performance using Feature Selection</div><div>Spatial Graph Regularized Correlation Filters for Visual Object Tracking</div><div>3D Wireframe Model of Medical and Complex Images Using Cellular Logic Array Processing Techniques</div>Suspicious activity detection using Transfer learning based ResNet tracking from surveillance videos<div>Vehicle Detection in UAV Videos using CNN-SVM</div><div>Underwater moving object detection using GMG</div><div>Linear Dilation-Erosion Perceptron Trained Using a Convex-Concave Procedure</div><div>Smart Phone Sensor-Based Human Activity Recognition using Machine Learning Techniques</div><div>Wavelet Filtering for Limited-Angle and Low-Dose Computed Tomographic Reconstruction</div><div>Handwritten Signature Verification using Complex Wavelet Transform and Mutual Information based Kernel</div><div>Multi-Scale Oriented Basic Image Features Column for Handwritten Digit Recognition</div><div>Delving into Feature Maps: An Explanatory Analysis to Evaluate Weight Initialization</div><div>Historical Kannada Handwritten Character Recognition using Machine Learning Algorithm</div><div>Home Health Care Network Management Under Fuzzy Environment Using meta-heuristic algorithms</div><div>The Lagrangian Relaxation Approach for Home Health Care Problems&nbsp;</div><div>Study on Vision System for Disease Detection Using CNN and LabVIEW of an Agricultural Robot</div><div>An Autonomous Galactic Swarm Optimization Algorithm Supported by Hidden Markov Model</div><div>Machine Learning for Breast Cancer Diagnosis and Classification using hand-crafted features</div><div>Automatic Seeded Region Growing with Level Set Technique Used for Segmentation of Pancreas</div><div>Sustainability Considerations in the Product Design Using System Dynamics and Fuzzy Cognitive Maps&nbsp;</div><div>Dominant voiced speech segregation and noise reduction pre-processing module for hearing aids and speech processing applications</div><div>Forensic Analysis of Copy-Move Attack with Robust Duplication Detection</div><div>Feature selection approach based on a novel variant of hybrid differential evolution and PSO for sentiment classification</div><div>A Comparative Study for Fisheye Image Classification: SVM or DNN</div><div>A Survey on Applications of Modern Deep Learning Techniques in Team Sports Analytics</div><div>Describing Brachiopods shape based on fusion of Curvature and Fourier descriptors</div><div>Early diagnosis of Parkinson’s disease using LSTM: A Deep Learning Approach</div><div>Using the $K$-nn algorithm to segment a foetus brain MRI --- a case study</div><div>Design of a Closed Supply Chain with regards to the Social and Environmental Impacts under Uncertainty</div>Contour Method for Ultrasound Images<div>Unsupervised learning from data and learners</div><div>Using Microsoft Kinect v2 to record custom exercises for physical disability rehabilitation</div><div>Customer Churn Prediction using Deep Learning</div><div>The Fusion of Features for Detection of Cotton Wool Spots in Digital Fundus Images</div><div>Thyroid Nodule Cell Classification In Cytology Images Using Transfer Learning Approach</div><div>Deep Fusion Driven Semantic Segmentation for the Automatic Recognition of Concealed Contraband Items</div><div>Project comparison method supporting the participatory budget process - Poznan case study</div><div>Seeding initial population, in genetic algorithm for features selection</div><div>An Incremental Fuzzy Learning Approach for Online Classification of Data Streams</div><div>Depth Image Completion using Anisotropic Operators</div><div>Performance Analysis of Machine Learning Approaches for Prediction of Human Cardiac Complications</div><div>Acousto-Prosodic Delineation and Classification of Speech Disfluencies in Bilingual Children</div><div>Real-Time Traffic Sign Recognition and Classification using Deep Learning</div><div>Merits of Mixotrophic cultivation for microalgal biomass production</div><div>Deep Neural Network based Phishing Classification on a High-Risk URL Dataset</div><div>A Secure Bayesian Compressive Spectrum Sensing Technique Based Chaotic Matrix for Cognitive Radio Networks</div><div>Optimized machine learning techniques for IoT Cyber attacks Detection</div><div>Inadequacy of IT approaches to manage cyber security in ICS context</div><div>Trust-based intrusion detection for Multi Path OLSR protocol</div><div>Bitcoin Technology and its Security Challenges: A Research Survey</div><div>Zero Trust User Access & Identity Security in Smart Grid based SCADA Systems</div>Man-in-the-browser attacks against IoT devices: a study of smart homes<div>Scambaiting as a form of online video entertainment: An exploratory study</div><div>Create a hybrid algorithm by combining Hill and Ad-vanced Encryption Standard Algorithms to Enhance Ef-ficiency of RGB Image Encryption</div><div>An improved smart wheat health monitor for smart farming application using deep residual learning framework</div><div>A New Electronic Voting System based on elliptic curve in a Cloud Computing Environment</div><div>Investigation of stereo camera calibration based on Python</div><div>Study on the different types of neural networks to improve the classification of ransomwares</div><div>Quality of Service Evaluation with DSR (Dynamic Source Routing) protocol in the classroom ad hoc network of the New Generation of Digital Open Universities (DOUNG)</div><div>Detection of vulnerabilities related to permissions requests for Android apps using Machine Learning techniques</div><div>A New Approach to Detecting Bot Attack Activity Scenario</div><div>A Log-Based Method to Detect and Resolve Efficiently Conflicts in Access Control Policies</div><div>A Hybrid Policy Engineering Approach for Attribute-based Access Control (ABAC)</div><div>Anomaly Detection in the Internet of Things (IoT) by Using Articial Immune System</div><div>Agreement-Broker: Performance analysis using KNN, SVM, and ANN classifiers</div><div>Secret disclosure attacks on a recent ultralightweight mutual RFID authentication protocol for blockchain-enabled supply chains</div><div>A Novel Image Encryption Technique Using Multiple One Dimensional Chaotic Map</div><div>Use of cryptography for monetary issuance And securing financial transactions</div><div>MAAMSIC: Multimodal Authentication and Authorization Model For Security of IoT Communication via GSM Messaging in Sub-Saharan Africa&nbsp;</div><div>Towards a proactive system of DDoS attacks detection in the cloud</div><div>Edge Computing Enabled Technologies for Secure 6G Smart Environment - An overview</div>Secure QIM-based Image Watermarking in JPEG Compression Domain<div>Security and Privacy on IoMT</div><div>Biometric Template Protection using Deep Learning</div><div>Inner and outer race bearing defects of induction motor running at low speeds signal analysis with DWT&nbsp;</div><div>Transformation of PrivUML into XACML using QVT&nbsp;</div><div>Robust and Secure watermarking technique for e-health application</div><div>Emoji score and polarity evaluation using short name of emoji and expression sentiment&nbsp;</div><div>Dynamic and Decentralized Trust Management for the Internet of Things (IoT) paradigm</div><div>Comparison of Parental Control Systems for Blocking Advertisements on a Home Network</div><div><br></div>

Rubrieken

    Personen

      Trefwoorden

        Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020)