Fr. 236.00

Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020)

English · Paperback / Softback

Shipping usually within 1 to 2 weeks (title will be printed to order)

Description

Read more

This book highlights the recent research on soft computing and pattern recognition and their various practical applications. It presents 62 selected papers from the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020) and 35 papers from the 16th International Conference on Information Assurance and Security (IAS 2020), which was held online, from December 15 to 18, 2020. A premier conference in the field of artificial intelligence, SoCPaR-IAS 2020 brought together researchers, engineers and practitioners whose work involves intelligent systems, network security and their applications in industry. Including contributions by authors from 40 countries, the book offers a valuable reference guide for all researchers, students and practitioners in the fields of Computer Science and Engineering.

List of contents

Mask RCNN for Human Motion and Actions RecognitionIntelligent and Secure Autofill System in Web BrowsersSynthesis Biometric Materials based on Cooperative among Graph Mining Techniques (DSA, WOA & gSpan-FBR) to Water TreatmentAn Initial Parameter Search for Rapid Concept Drift Adaptation in Deep Neural NetworksA Comparison of Swarm Intelligence Algorithms Exploiting a Novel Neighbour Generation TechniqueA Proposal for the Automatic detection of Skin Cancer Based on Image Characteristics of Shape, Colour, and TextureBreast Cancer Detection in Infrared Thermal Images Using Convolutional Neural Networks: A Transfer Learning Approach Implementation of a system for collecting and analyzing public and open access information from Brazilian federal legislative housesData Origination: Human-centered Approach for Design, Acquisition, and Utilization of DataCoarse-Grained Genetic Algorithm for Flexible Job Scheduling ProblemComputer Vision and AI Improving the Lives of Physically Disabled by the means of Perceptual User InterfacesSubspace guided collaborative clustering based on optimal transportExploring An automatic assessment-based features for clustering of students' academic performanceQuantum Semi Non-Negative Matrix FactorizationA New Genetic-Based Hyper-Heuristic Algorithm for Clustering ProblemLSTM vs. GRU for Arabic Machine TranslationTowards Lip Motion Based Speaking Mode Detection Using Residual Neural NetworksReducing the Error Mapping of the Students' Performance using Feature SelectionSpatial Graph Regularized Correlation Filters for Visual Object Tracking3D Wireframe Model of Medical and Complex Images Using Cellular Logic Array Processing TechniquesSuspicious activity detection using Transfer learning based ResNet tracking from surveillance videosVehicle Detection in UAV Videos using CNN-SVMUnderwater moving object detection using GMGLinear Dilation-Erosion Perceptron Trained Using a Convex-Concave ProcedureSmart Phone Sensor-Based Human Activity Recognition using Machine Learning TechniquesWavelet Filtering for Limited-Angle and Low-Dose Computed Tomographic ReconstructionHandwritten Signature Verification using Complex Wavelet Transform and Mutual Information based KernelMulti-Scale Oriented Basic Image Features Column for Handwritten Digit RecognitionDelving into Feature Maps: An Explanatory Analysis to Evaluate Weight InitializationHistorical Kannada Handwritten Character Recognition using Machine Learning AlgorithmHome Health Care Network Management Under Fuzzy Environment Using meta-heuristic algorithmsThe Lagrangian Relaxation Approach for Home Health Care Problems Study on Vision System for Disease Detection Using CNN and LabVIEW of an Agricultural RobotAn Autonomous Galactic Swarm Optimization Algorithm Supported by Hidden Markov ModelMachine Learning for Breast Cancer Diagnosis and Classification using hand-crafted featuresAutomatic Seeded Region Growing with Level Set Technique Used for Segmentation of PancreasSustainability Considerations in the Product Design Using System Dynamics and Fuzzy Cognitive Maps Dominant voiced speech segregation and noise reduction pre-processing module for hearing aids and speech processing applicationsForensic Analysis of Copy-Move Attack with Robust Duplication DetectionFeature selection approach based on a novel variant of hybrid differential evolution and PSO for sentiment classificationA Comparative Study for Fisheye Image Classification: SVM or DNNA Survey on Applications of Modern Deep Learning Techniques in Team Sports AnalyticsDescribing Brachiopods shape based on fusion of Curvature and Fourier descriptorsEarly diagnosis of Parkinson's disease using LSTM: A Deep Learning ApproachUsing the $K$-nn algorithm to segment a foetus brain MRI --- a case studyDesign of a Closed Supply Chain with regards to the Social and Environmental Impacts under UncertaintyContour Method for Ultrasound ImagesUnsupervised learning from data and learnersUsing Microsoft Kinect v2 to record custom exercises for physical disability rehabilitationCustomer Churn Prediction using Deep LearningThe Fusion of Features for Detection of Cotton Wool Spots in Digital Fundus ImagesThyroid Nodule Cell Classification In Cytology Images Using Transfer Learning ApproachDeep Fusion Driven Semantic Segmentation for the Automatic Recognition of Concealed Contraband ItemsProject comparison method supporting the participatory budget process - Poznan case studySeeding initial population, in genetic algorithm for features selectionAn Incremental Fuzzy Learning Approach for Online Classification of Data StreamsDepth Image Completion using Anisotropic OperatorsPerformance Analysis of Machine Learning Approaches for Prediction of Human Cardiac ComplicationsAcousto-Prosodic Delineation and Classification of Speech Disfluencies in Bilingual ChildrenReal-Time Traffic Sign Recognition and Classification using Deep LearningMerits of Mixotrophic cultivation for microalgal biomass productionDeep Neural Network based Phishing Classification on a High-Risk URL DatasetA Secure Bayesian Compressive Spectrum Sensing Technique Based Chaotic Matrix for Cognitive Radio NetworksOptimized machine learning techniques for IoT Cyber attacks DetectionInadequacy of IT approaches to manage cyber security in ICS contextTrust-based intrusion detection for Multi Path OLSR protocolBitcoin Technology and its Security Challenges: A Research SurveyZero Trust User Access & Identity Security in Smart Grid based SCADA SystemsMan-in-the-browser attacks against IoT devices: a study of smart homesScambaiting as a form of online video entertainment: An exploratory studyCreate a hybrid algorithm by combining Hill and Ad-vanced Encryption Standard Algorithms to Enhance Ef-ficiency of RGB Image EncryptionAn improved smart wheat health monitor for smart farming application using deep residual learning frameworkA New Electronic Voting System based on elliptic curve in a Cloud Computing EnvironmentInvestigation of stereo camera calibration based on PythonStudy on the different types of neural networks to improve the classification of ransomwaresQuality of Service Evaluation with DSR (Dynamic Source Routing) protocol in the classroom ad hoc network of the New Generation of Digital Open Universities (DOUNG)Detection of vulnerabilities related to permissions requests for Android apps using Machine Learning techniquesA New Approach to Detecting Bot Attack Activity ScenarioA Log-Based Method to Detect and Resolve Efficiently Conflicts in Access Control PoliciesA Hybrid Policy Engineering Approach for Attribute-based Access Control (ABAC)Anomaly Detection in the Internet of Things (IoT) by Using Articial Immune SystemAgreement-Broker: Performance analysis using KNN, SVM, and ANN classifiersSecret disclosure attacks on a recent ultralightweight mutual RFID authentication protocol for blockchain-enabled supply chainsA Novel Image Encryption Technique Using Multiple One Dimensional Chaotic MapUse of cryptography for monetary issuance And securing financial transactionsMAAMSIC: Multimodal Authentication and Authorization Model For Security of IoT Communication via GSM Messaging in Sub-Saharan Africa Towards a proactive system of DDoS attacks detection in the cloudEdge Computing Enabled Technologies for Secure 6G Smart Environment - An overviewSecure QIM-based Image Watermarking in JPEG Compression DomainSecurity and Privacy on IoMTBiometric Template Protection using Deep LearningInner and outer race bearing defects of induction motor running at low speeds signal analysis with DWT Transformation of PrivUML into XACML using QVT Robust and Secure watermarking technique for e-health applicationEmoji score and polarity evaluation using short name of emoji and expression sentiment Dynamic and Decentralized Trust Management for the Internet of Things (IoT) paradigmComparison of Parental Control Systems for Blocking Advertisements on a Home Network

Product details

Assisted by Ajith Abraham (Editor), Niketa Gandhi (Editor), Niketa Gandhi et al (Editor), Abdelkrim Haqiq (Editor), Biju Issac (Editor), M. A. Jabbar (Editor), M.A. Jabbar (Editor), Seán McLoone (Editor), Yuki Ohsawa (Editor), Yukio Ohsawa (Editor)
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 18.05.2021
 
EAN 9783030736880
ISBN 978-3-0-3073688-0
No. of pages 1042
Dimensions 155 mm x 56 mm x 235 mm
Illustrations XIX, 1042 p. 454 illus., 329 illus. in color.
Series Advances in Intelligent Systems and Computing
Subject Natural sciences, medicine, IT, technology > Technology > General, dictionaries

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.