libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

abraham ajith (curatore); ohsawa yukio (curatore); gandhi niketa (curatore); jabbar m.a. (curatore); haqiq abdelkrim (curatore); mcloone seán (curatore); issac biju (curatore) - proceedings of the 12th international conference on soft computing and pattern recognition (socpar 2020)

Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020)

; ; ; ; ; ;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
216,98 €
NICEPRICE
206,13 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 04/2021
Edizione: 1st ed. 2021





Trama

This book highlights the recent research on soft computing and pattern recognition and their various practical applications. It presents 62 selected papers from the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020) and 35 papers from the 16th International Conference on Information Assurance and Security (IAS 2020), which was held online, from December 15 to 18, 2020. A premier conference in the field of artificial intelligence, SoCPaR-IAS 2020 brought together researchers, engineers and practitioners whose work involves intelligent systems, network security and their applications in industry. Including contributions by authors from 40 countries, the book offers a valuable reference guide for all researchers, students and practitioners in the fields of Computer Science and Engineering.





Sommario

Mask RCNN for Human Motion and Actions Recognition
Intelligent and Secure Autofill System in Web Browsers
Synthesis Biometric Materials based on Cooperative among Graph Mining Techniques (DSA, WOA & gSpan-FBR) to Water Treatment
An Initial Parameter Search for Rapid Concept Drift Adaptation in Deep Neural Networks
A Comparison of Swarm Intelligence Algorithms Exploiting a Novel Neighbour Generation Technique
A Proposal for the Automatic detection of Skin Cancer Based on Image Characteristics of Shape, Colour, and Texture
Breast Cancer Detection in Infrared Thermal Images Using Convolutional Neural Networks: A Transfer Learning Approach 
Implementation of a system for collecting and analyzing public and open access information from Brazilian federal legislative houses
Data Origination: Human-centered Approach for Design, Acquisition, and Utilization of Data
Coarse-Grained Genetic Algorithm for Flexible Job Scheduling Problem
Computer Vision and AI Improving the Lives of Physically Disabled by the means of Perceptual User Interfaces
Subspace guided collaborative clustering based on optimal transport
Exploring An automatic assessment-based features for clustering of students' academic performance
Quantum Semi Non-Negative Matrix Factorization
A New Genetic-Based Hyper-Heuristic Algorithm for Clustering Problem
LSTM vs. GRU for Arabic Machine Translation
Towards Lip Motion Based Speaking Mode Detection Using Residual Neural Networks
Reducing the Error Mapping of the Students’ Performance using Feature Selection
Spatial Graph Regularized Correlation Filters for Visual Object Tracking
3D Wireframe Model of Medical and Complex Images Using Cellular Logic Array Processing Techniques
Suspicious activity detection using Transfer learning based ResNet tracking from surveillance videos
Vehicle Detection in UAV Videos using CNN-SVM
Underwater moving object detection using GMG
Linear Dilation-Erosion Perceptron Trained Using a Convex-Concave Procedure
Smart Phone Sensor-Based Human Activity Recognition using Machine Learning Techniques
Wavelet Filtering for Limited-Angle and Low-Dose Computed Tomographic Reconstruction
Handwritten Signature Verification using Complex Wavelet Transform and Mutual Information based Kernel
Multi-Scale Oriented Basic Image Features Column for Handwritten Digit Recognition
Delving into Feature Maps: An Explanatory Analysis to Evaluate Weight Initialization
Historical Kannada Handwritten Character Recognition using Machine Learning Algorithm
Home Health Care Network Management Under Fuzzy Environment Using meta-heuristic algorithms
The Lagrangian Relaxation Approach for Home Health Care Problems 
Study on Vision System for Disease Detection Using CNN and LabVIEW of an Agricultural Robot
An Autonomous Galactic Swarm Optimization Algorithm Supported by Hidden Markov Model
Machine Learning for Breast Cancer Diagnosis and Classification using hand-crafted features
Automatic Seeded Region Growing with Level Set Technique Used for Segmentation of Pancreas
Sustainability Considerations in the Product Design Using System Dynamics and Fuzzy Cognitive Maps 
Dominant voiced speech segregation and noise reduction pre-processing module for hearing aids and speech processing applications
Forensic Analysis of Copy-Move Attack with Robust Duplication Detection
Feature selection approach based on a novel variant of hybrid differential evolution and PSO for sentiment classification
A Comparative Study for Fisheye Image Classification: SVM or DNN
A Survey on Applications of Modern Deep Learning Techniques in Team Sports Analytics
Describing Brachiopods shape based on fusion of Curvature and Fourier descriptors
Early diagnosis of Parkinson’s disease using LSTM: A Deep Learning Approach
Using the $K$-nn algorithm to segment a foetus brain MRI --- a case study
Design of a Closed Supply Chain with regards to the Social and Environmental Impacts under Uncertainty
Contour Method for Ultrasound Images
Unsupervised learning from data and learners
Using Microsoft Kinect v2 to record custom exercises for physical disability rehabilitation
Customer Churn Prediction using Deep Learning
The Fusion of Features for Detection of Cotton Wool Spots in Digital Fundus Images
Thyroid Nodule Cell Classification In Cytology Images Using Transfer Learning Approach
Deep Fusion Driven Semantic Segmentation for the Automatic Recognition of Concealed Contraband Items
Project comparison method supporting the participatory budget process - Poznan case study
Seeding initial population, in genetic algorithm for features selection
An Incremental Fuzzy Learning Approach for Online Classification of Data Streams
Depth Image Completion using Anisotropic Operators
Performance Analysis of Machine Learning Approaches for Prediction of Human Cardiac Complications
Acousto-Prosodic Delineation and Classification of Speech Disfluencies in Bilingual Children
Real-Time Traffic Sign Recognition and Classification using Deep Learning
Merits of Mixotrophic cultivation for microalgal biomass production
Deep Neural Network based Phishing Classification on a High-Risk URL Dataset
A Secure Bayesian Compressive Spectrum Sensing Technique Based Chaotic Matrix for Cognitive Radio Networks
Optimized machine learning techniques for IoT Cyber attacks Detection
Inadequacy of IT approaches to manage cyber security in ICS context
Trust-based intrusion detection for Multi Path OLSR protocol
Bitcoin Technology and its Security Challenges: A Research Survey
Zero Trust User Access & Identity Security in Smart Grid based SCADA Systems
Man-in-the-browser attacks against IoT devices: a study of smart homes
Scambaiting as a form of online video entertainment: An exploratory study
Create a hybrid algorithm by combining Hill and Ad-vanced Encryption Standard Algorithms to Enhance Ef-ficiency of RGB Image Encryption
An improved smart wheat health monitor for smart farming application using deep residual learning framework
A New Electronic Voting System based on elliptic curve in a Cloud Computing Environment
Investigation of stereo camera calibration based on Python
Study on the different types of neural networks to improve the classification of ransomwares
Quality of Service Evaluation with DSR (Dynamic Source Routing) protocol in the classroom ad hoc network of the New Generation of Digital Open Universities (DOUNG)
Detection of vulnerabilities related to permissions requests for Android apps using Machine Learning techniques
A New Approach to Detecting Bot Attack Activity Scenario
A Log-Based Method to Detect and Resolve Efficiently Conflicts in Access Control Policies
A Hybrid Policy Engineering Approach for Attribute-based Access Control (ABAC)
Anomaly Detection in the Internet of Things (IoT) by Using Articial Immune System
Agreement-Broker: Performance analysis using KNN, SVM, and ANN classifiers
Secret disclosure attacks on a recent ultralightweight mutual RFID authentication protocol for blockchain-enabled supply chains
A Novel Image Encryption Technique Using Multiple One Dimensional Chaotic Map
Use of cryptography for monetary issuance And securing financial transactions
MAAMSIC: Multimodal Authenticati










Altre Informazioni

ISBN:

9783030736880

Condizione: Nuovo
Collana: Advances in Intelligent Systems and Computing
Dimensioni: 235 x 155 mm Ø 1597 gr
Formato: Brossura
Illustration Notes:XIX, 1042 p. 454 illus., 329 illus. in color.
Pagine Arabe: 1042
Pagine Romane: xix


Dicono di noi