Intelligent Technologies and Applications

Inhaltsverzeichnis


Image, Video Processing and Analysis.- Classification and Segmentation Models for Hyperspectral Imaging- An Overview.- Exploring Circular Hough Transforms for Detecting Hand Feature Points in Noisy Images from Ghost-Circle Patterns.- Occupancy Flow Control - Case Study: Elevator Cabin.- Security and IoT.- Protecting IoT Devices with Software-defined Networks.- Digital Forensic Readiness in IoT - a risk assessment model.- System Requirements of Software-defined IoT Networks for Critical Infrastructure.- An Optimized IoT-based Waste Collection and Transportation Solution: A Case Study of a Norwegian Municipality.- Health and AI.- Machine Learning based methodology for Depressive Sentiment Analysis.- Simultaneous Artefact-Lesion Extraction for Skin Cancer Diagnosis.- A Statistical Study to Analyze the Impact of External Weather on Chronic Pulmonary Infection in South Norway with Machine Learning Algorithms.- Deep Learning.- Interpretable Option Discovery using Deep Q-Learning and Variational Autoencoders.- Evaluating Predictive Deep Learning Models.- Pre-trained CNN based deep features with hand-crafted features and patient data for skin lesion classification.- Data-Driven Machine Learning Approach for Human Action Recognition Using Skeleton and Optical Flow.- Biometrics.- Multilingual Voice Impersonation Dataset and Evaluation.- A Survey on Unknown Presentation Attack Detection for Fingerprint.- Hierarchical Interpolation of Imagenet features for Cross-dataset Presentation Attack Detection.- Cross-lingual Speaker Verification: Evaluation On X-Vector Method.- Fusion of Texture and Optical Flow using Convolutional Neural Networks for Gender Classification in Videos.- Intelligent Environments.- A PM 2.5 Forecasting Model Based on Air Pollution and Meteorological Conditions in Neighboring Areas.- The Aquatic Surface Robot (AnSweR), a lightweight, low cost, multipurpose unmanned research vessel.- Intrusion and Malware Detection.- Empirical Analysis of Data Mining Techniques in Network Intrusion Detection Systems.- Deep Neural Network based Malicious Network Activity Detection Under Adversarial Machine Learning Attacks.- Towards Low Cost and Smart Load Testing as a Service using Containers.- Security Guard: An Automated Secure Coding Framework.- The multi-objective feature selection in Android malware detection system.- AIRLEAs.- Border Management Systems: How can they help against pandemics.- Translating Ethical Theory into Ethical Action: An Ethic of Responsibility Approach to Value-Oriented Design.- An Example of Privacy and Data Protection Best Practices for Biometrics Data Processing in Border Control: Lesson Learned from SMILE.- Unsupervised Single Image Super-Resolution using Cycle Generative Adversarial Network.- Criminal Network Community Detection in Social Media Forensics.- Data Privacy in IoT Equipped Future Smart Homes.- Machine Learning and the Legal Framework for the Use of Passenger Name Record Data.- Migration-Related Semantic Concepts for the Retrieval of Relevant Video Content.
Communications in Computer and Information Science Band 1382

Intelligent Technologies and Applications

Third International Conference, INTAP 2020, Grimstad, Norway, September 28–30, 2020, Revised Selected Papers

Buch (Taschenbuch, Englisch)

98,99 € inkl. gesetzl. MwSt.

Weitere Formate

Taschenbuch

ab 98,99 €

eBook

ab 96,29 €

  • Intelligent Technologies and Applications

    PDF (Springer)

    Sofort per Download lieferbar

    96,29 €

    PDF (Springer)
  • Intelligent Technologies and Applications

    PDF (Springer)

    Sofort per Download lieferbar

    106,99 €

    PDF (Springer)
  • Intelligent Technologies and Applications

    PDF (Springer)

    Sofort per Download lieferbar

    117,69 €

    PDF (Springer)

Beschreibung

This book constitutes the refereed post-conference proceedings of the Third International Conference on Intelligent Technologies and Applications, INTAP 2020, held in Grimstad, Norway, in September 2020.

The 30 revised full papers and 4 revised short papers presented were carefully reviewed and selected from 117 submissions. The papers of this volume are organized in topical sections on image, video processing and analysis; security and IoT; health and AI; deep learning; biometrics; intelligent environments; intrusion and malware detection; and AIRLEAs.

Details

Einband

Taschenbuch

Erscheinungsdatum

15.03.2021

Herausgeber

Sule Yildirim Yayilgan + weitere

Verlag

Springer

Seitenzahl

418

Beschreibung

Details

Einband

Taschenbuch

Erscheinungsdatum

15.03.2021

Herausgeber

Verlag

Springer

Seitenzahl

418

Maße (L/B/H)

23,5/15,5/2,3 cm

Gewicht

658 g

Auflage

1st ed. 2021

Sprache

Englisch

ISBN

978-3-030-71710-0

Weitere Bände von Communications in Computer and Information Science

Das meinen unsere Kund*innen

0.0

0 Bewertungen

Informationen zu Bewertungen

Zur Abgabe einer Bewertung ist eine Anmeldung im Kund*innenkonto notwendig. Die Authentizität der Bewertungen wird von uns nicht überprüft. Wir behalten uns vor, Bewertungstexte, die unseren Richtlinien widersprechen, entsprechend zu kürzen oder zu löschen.

Verfassen Sie die erste Bewertung zu diesem Artikel

Helfen Sie anderen Kund*innen durch Ihre Meinung

Erste Bewertung verfassen

Unsere Kund*innen meinen

0.0

0 Bewertungen filtern

  • Intelligent Technologies and Applications

  • Image, Video Processing and Analysis.- Classification and Segmentation Models for Hyperspectral Imaging- An Overview.- Exploring Circular Hough Transforms for Detecting Hand Feature Points in Noisy Images from Ghost-Circle Patterns.- Occupancy Flow Control - Case Study: Elevator Cabin.- Security and IoT.- Protecting IoT Devices with Software-defined Networks.- Digital Forensic Readiness in IoT - a risk assessment model.- System Requirements of Software-defined IoT Networks for Critical Infrastructure.- An Optimized IoT-based Waste Collection and Transportation Solution: A Case Study of a Norwegian Municipality.- Health and AI.- Machine Learning based methodology for Depressive Sentiment Analysis.- Simultaneous Artefact-Lesion Extraction for Skin Cancer Diagnosis.- A Statistical Study to Analyze the Impact of External Weather on Chronic Pulmonary Infection in South Norway with Machine Learning Algorithms.- Deep Learning.- Interpretable Option Discovery using Deep Q-Learning and Variational Autoencoders.- Evaluating Predictive Deep Learning Models.- Pre-trained CNN based deep features with hand-crafted features and patient data for skin lesion classification.- Data-Driven Machine Learning Approach for Human Action Recognition Using Skeleton and Optical Flow.- Biometrics.- Multilingual Voice Impersonation Dataset and Evaluation.- A Survey on Unknown Presentation Attack Detection for Fingerprint.- Hierarchical Interpolation of Imagenet features for Cross-dataset Presentation Attack Detection.- Cross-lingual Speaker Verification: Evaluation On X-Vector Method.- Fusion of Texture and Optical Flow using Convolutional Neural Networks for Gender Classification in Videos.- Intelligent Environments.- A PM 2.5 Forecasting Model Based on Air Pollution and Meteorological Conditions in Neighboring Areas.- The Aquatic Surface Robot (AnSweR), a lightweight, low cost, multipurpose unmanned research vessel.- Intrusion and Malware Detection.- Empirical Analysis of Data Mining Techniques in Network Intrusion Detection Systems.- Deep Neural Network based Malicious Network Activity Detection Under Adversarial Machine Learning Attacks.- Towards Low Cost and Smart Load Testing as a Service using Containers.- Security Guard: An Automated Secure Coding Framework.- The multi-objective feature selection in Android malware detection system.- AIRLEAs.- Border Management Systems: How can they help against pandemics.- Translating Ethical Theory into Ethical Action: An Ethic of Responsibility Approach to Value-Oriented Design.- An Example of Privacy and Data Protection Best Practices for Biometrics Data Processing in Border Control: Lesson Learned from SMILE.- Unsupervised Single Image Super-Resolution using Cycle Generative Adversarial Network.- Criminal Network Community Detection in Social Media Forensics.- Data Privacy in IoT Equipped Future Smart Homes.- Machine Learning and the Legal Framework for the Use of Passenger Name Record Data.- Migration-Related Semantic Concepts for the Retrieval of Relevant Video Content.