語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Intelligent Technologies and Applica...
~
SpringerLink (Online service)
Intelligent Technologies and Applications = Third International Conference, INTAP 2020, Grimstad, Norway, September 28–30, 2020, Revised Selected Papers /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Intelligent Technologies and Applications/ edited by Sule Yildirim Yayilgan, Imran Sarwar Bajwa, Filippo Sanfilippo.
其他題名:
Third International Conference, INTAP 2020, Grimstad, Norway, September 28–30, 2020, Revised Selected Papers /
其他作者:
Yildirim Yayilgan, Sule.
面頁冊數:
XIV, 418 p. 134 illus., 113 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer communication systems. -
電子資源:
https://doi.org/10.1007/978-3-030-71711-7
ISBN:
9783030717117
Intelligent Technologies and Applications = Third International Conference, INTAP 2020, Grimstad, Norway, September 28–30, 2020, Revised Selected Papers /
Intelligent Technologies and Applications
Third International Conference, INTAP 2020, Grimstad, Norway, September 28–30, 2020, Revised Selected Papers /[electronic resource] :edited by Sule Yildirim Yayilgan, Imran Sarwar Bajwa, Filippo Sanfilippo. - 1st ed. 2021. - XIV, 418 p. 134 illus., 113 illus. in color.online resource. - Communications in Computer and Information Science,13821865-0937 ;. - Communications in Computer and Information Science,498.
Image, Video Processing and Analysis -- Classification and Segmentation Models for Hyperspectral Imaging- An Overview -- Exploring Circular Hough Transforms for Detecting Hand Feature Points in Noisy Images from Ghost-Circle Patterns -- Occupancy Flow Control - Case Study: Elevator Cabin -- Security and IoT -- Protecting IoT Devices with Software-defined Networks -- Digital Forensic Readiness in IoT - a risk assessment model -- System Requirements of Software-defined IoT Networks for Critical Infrastructure -- An Optimized IoT-based Waste Collection and Transportation Solution: A Case Study of a Norwegian Municipality -- Health and AI -- Machine Learning based methodology for Depressive Sentiment Analysis -- Simultaneous Artefact-Lesion Extraction for Skin Cancer Diagnosis -- A Statistical Study to Analyze the Impact of External Weather on Chronic Pulmonary Infection in South Norway with Machine Learning Algorithms -- Deep Learning -- Interpretable Option Discovery using Deep Q-Learning and Variational Autoencoders -- Evaluating Predictive Deep Learning Models -- Pre-trained CNN based deep features with hand-crafted features and patient data for skin lesion classification -- Data-Driven Machine Learning Approach for Human Action Recognition Using Skeleton and Optical Flow -- Biometrics -- Multilingual Voice Impersonation Dataset and Evaluation -- A Survey on Unknown Presentation Attack Detection for Fingerprint -- Hierarchical Interpolation of Imagenet features for Cross-dataset Presentation Attack Detection -- Cross-lingual Speaker Verification: Evaluation On X-Vector Method -- Fusion of Texture and Optical Flow using Convolutional Neural Networks for Gender Classification in Videos -- Intelligent Environments -- A PM 2.5 Forecasting Model Based on Air Pollution and Meteorological Conditions in Neighboring Areas -- The Aquatic Surface Robot (AnSweR), a lightweight, low cost, multipurpose unmanned research vessel -- Intrusion and Malware Detection -- Empirical Analysis of Data Mining Techniques in Network Intrusion Detection Systems -- Deep Neural Network based Malicious Network Activity Detection Under Adversarial Machine Learning Attacks -- Towards Low Cost and Smart Load Testing as a Service using Containers -- Security Guard: An Automated Secure Coding Framework -- The multi-objective feature selection in Android malware detection system -- AIRLEAs -- Border Management Systems: How can they help against pandemics -- Translating Ethical Theory into Ethical Action: An Ethic of Responsibility Approach to Value-Oriented Design -- An Example of Privacy and Data Protection Best Practices for Biometrics Data Processing in Border Control: Lesson Learned from SMILE -- Unsupervised Single Image Super-Resolution using Cycle Generative Adversarial Network -- Criminal Network Community Detection in Social Media Forensics -- Data Privacy in IoT Equipped Future Smart Homes -- Machine Learning and the Legal Framework for the Use of Passenger Name Record Data -- Migration-Related Semantic Concepts for the Retrieval of Relevant Video Content.
This book constitutes the refereed post-conference proceedings of the Third International Conference on Intelligent Technologies and Applications, INTAP 2020, held in Grimstad, Norway, in September 2020. The 30 revised full papers and 4 revised short papers presented were carefully reviewed and selected from 117 submissions. The papers of this volume are organized in topical sections on image, video processing and analysis; security and IoT; health and AI; deep learning; biometrics; intelligent environments; intrusion and malware detection; and AIRLEAs.
ISBN: 9783030717117
Standard No.: 10.1007/978-3-030-71711-7doiSubjects--Topical Terms:
1115394
Computer communication systems.
LC Class. No.: TK5105.5-5105.9
Dewey Class. No.: 004.6
Intelligent Technologies and Applications = Third International Conference, INTAP 2020, Grimstad, Norway, September 28–30, 2020, Revised Selected Papers /
LDR
:05188nam a22003975i 4500
001
1047774
003
DE-He213
005
20210915135345.0
007
cr nn 008mamaa
008
220103s2021 sz | s |||| 0|eng d
020
$a
9783030717117
$9
978-3-030-71711-7
024
7
$a
10.1007/978-3-030-71711-7
$2
doi
035
$a
978-3-030-71711-7
050
4
$a
TK5105.5-5105.9
072
7
$a
UKN
$2
bicssc
072
7
$a
COM075000
$2
bisacsh
072
7
$a
UKN
$2
thema
082
0 4
$a
004.6
$2
23
245
1 0
$a
Intelligent Technologies and Applications
$h
[electronic resource] :
$b
Third International Conference, INTAP 2020, Grimstad, Norway, September 28–30, 2020, Revised Selected Papers /
$c
edited by Sule Yildirim Yayilgan, Imran Sarwar Bajwa, Filippo Sanfilippo.
250
$a
1st ed. 2021.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
XIV, 418 p. 134 illus., 113 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Communications in Computer and Information Science,
$x
1865-0937 ;
$v
1382
505
0
$a
Image, Video Processing and Analysis -- Classification and Segmentation Models for Hyperspectral Imaging- An Overview -- Exploring Circular Hough Transforms for Detecting Hand Feature Points in Noisy Images from Ghost-Circle Patterns -- Occupancy Flow Control - Case Study: Elevator Cabin -- Security and IoT -- Protecting IoT Devices with Software-defined Networks -- Digital Forensic Readiness in IoT - a risk assessment model -- System Requirements of Software-defined IoT Networks for Critical Infrastructure -- An Optimized IoT-based Waste Collection and Transportation Solution: A Case Study of a Norwegian Municipality -- Health and AI -- Machine Learning based methodology for Depressive Sentiment Analysis -- Simultaneous Artefact-Lesion Extraction for Skin Cancer Diagnosis -- A Statistical Study to Analyze the Impact of External Weather on Chronic Pulmonary Infection in South Norway with Machine Learning Algorithms -- Deep Learning -- Interpretable Option Discovery using Deep Q-Learning and Variational Autoencoders -- Evaluating Predictive Deep Learning Models -- Pre-trained CNN based deep features with hand-crafted features and patient data for skin lesion classification -- Data-Driven Machine Learning Approach for Human Action Recognition Using Skeleton and Optical Flow -- Biometrics -- Multilingual Voice Impersonation Dataset and Evaluation -- A Survey on Unknown Presentation Attack Detection for Fingerprint -- Hierarchical Interpolation of Imagenet features for Cross-dataset Presentation Attack Detection -- Cross-lingual Speaker Verification: Evaluation On X-Vector Method -- Fusion of Texture and Optical Flow using Convolutional Neural Networks for Gender Classification in Videos -- Intelligent Environments -- A PM 2.5 Forecasting Model Based on Air Pollution and Meteorological Conditions in Neighboring Areas -- The Aquatic Surface Robot (AnSweR), a lightweight, low cost, multipurpose unmanned research vessel -- Intrusion and Malware Detection -- Empirical Analysis of Data Mining Techniques in Network Intrusion Detection Systems -- Deep Neural Network based Malicious Network Activity Detection Under Adversarial Machine Learning Attacks -- Towards Low Cost and Smart Load Testing as a Service using Containers -- Security Guard: An Automated Secure Coding Framework -- The multi-objective feature selection in Android malware detection system -- AIRLEAs -- Border Management Systems: How can they help against pandemics -- Translating Ethical Theory into Ethical Action: An Ethic of Responsibility Approach to Value-Oriented Design -- An Example of Privacy and Data Protection Best Practices for Biometrics Data Processing in Border Control: Lesson Learned from SMILE -- Unsupervised Single Image Super-Resolution using Cycle Generative Adversarial Network -- Criminal Network Community Detection in Social Media Forensics -- Data Privacy in IoT Equipped Future Smart Homes -- Machine Learning and the Legal Framework for the Use of Passenger Name Record Data -- Migration-Related Semantic Concepts for the Retrieval of Relevant Video Content.
520
$a
This book constitutes the refereed post-conference proceedings of the Third International Conference on Intelligent Technologies and Applications, INTAP 2020, held in Grimstad, Norway, in September 2020. The 30 revised full papers and 4 revised short papers presented were carefully reviewed and selected from 117 submissions. The papers of this volume are organized in topical sections on image, video processing and analysis; security and IoT; health and AI; deep learning; biometrics; intelligent environments; intrusion and malware detection; and AIRLEAs.
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Application software.
$3
528147
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Computer security.
$3
557122
650
0
$a
Optical data processing.
$3
639187
650
1 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Image Processing and Computer Vision.
$3
670819
700
1
$a
Yildirim Yayilgan, Sule.
$e
editor.
$1
https://orcid.org/0000-0002-1982-6609
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1351509
700
1
$a
Bajwa, Imran Sarwar.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1307114
700
1
$a
Sanfilippo, Filippo.
$e
editor.
$1
https://orcid.org/0000-0002-1437-8368
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1351510
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030717100
776
0 8
$i
Printed edition:
$z
9783030717124
830
0
$a
Communications in Computer and Information Science,
$x
1865-0929 ;
$v
498
$3
1253583
856
4 0
$u
https://doi.org/10.1007/978-3-030-71711-7
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入