Amazon cover image
Image from Amazon.com

Intelligent Technologies and Applications [electronic resource] : Third International Conference, INTAP 2020, Gjøvik, Norway, September 28–30, 2020, Revised Selected Papers /

Contributor(s): Material type: TextTextSeries: Communications in Computer and Information Science ; 1382Publisher: Cham : Springer International Publishing : Imprint: Springer, 2021Edition: 1st ed. 2021Description: XIV, 418 p. 134 illus., 113 illus. in color. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783030717117
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 004.6 23
LOC classification:
  • TK5105.5-5105.9
Online resources:
Contents:
Image, Video Processing and Analysis -- Classification and Segmentation Models for Hyperspectral Imaging- An Overview -- Exploring Circular Hough Transforms for Detecting Hand Feature Points in Noisy Images from Ghost-Circle Patterns -- Occupancy Flow Control - Case Study: Elevator Cabin -- Security and IoT -- Protecting IoT Devices with Software-defined Networks -- Digital Forensic Readiness in IoT - a risk assessment model -- System Requirements of Software-defined IoT Networks for Critical Infrastructure -- An Optimized IoT-based Waste Collection and Transportation Solution: A Case Study of a Norwegian Municipality -- Health and AI -- Machine Learning based methodology for Depressive Sentiment Analysis -- Simultaneous Artefact-Lesion Extraction for Skin Cancer Diagnosis -- A Statistical Study to Analyze the Impact of External Weather on Chronic Pulmonary Infection in South Norway with Machine Learning Algorithms -- Deep Learning -- Interpretable Option Discovery usingDeep Q-Learning and Variational Autoencoders -- Evaluating Predictive Deep Learning Models -- Pre-trained CNN based deep features with hand-crafted features and patient data for skin lesion classification -- Data-Driven Machine Learning Approach for Human Action Recognition Using Skeleton and Optical Flow -- Biometrics -- Multilingual Voice Impersonation Dataset and Evaluation -- A Survey on Unknown Presentation Attack Detection for Fingerprint -- Hierarchical Interpolation of Imagenet features for Cross-dataset Presentation Attack Detection -- Cross-lingual Speaker Verification: Evaluation On X-Vector Method -- Fusion of Texture and Optical Flow using Convolutional Neural Networks for Gender Classification in Videos -- Intelligent Environments -- A PM 2.5 Forecasting Model Based on Air Pollution and Meteorological Conditions in Neighboring Areas -- The Aquatic Surface Robot (AnSweR), a lightweight, low cost, multipurpose unmanned research vessel -- Intrusion and Malware Detection -- Empirical Analysis of Data Mining Techniques in Network Intrusion Detection Systems -- Deep Neural Network based Malicious Network Activity Detection Under Adversarial Machine Learning Attacks -- Towards Low Cost and Smart Load Testing as a Service using Containers -- Security Guard: An Automated Secure Coding Framework -- The multi-objective feature selection in Android malware detection system -- AIRLEAs -- Border Management Systems: How can they help against pandemics -- Translating Ethical Theory into Ethical Action: An Ethic of Responsibility Approach to Value-Oriented Design -- An Example of Privacy and Data Protection Best Practices for Biometrics Data Processing in Border Control: Lesson Learned from SMILE -- Unsupervised Single Image Super-Resolution using Cycle Generative Adversarial Network -- Criminal Network Community Detection in Social Media Forensics -- Data Privacy in IoT Equipped Future Smart Homes -- Machine Learning and the Legal Framework for the Use of PassengerName Record Data -- Migration-Related Semantic Concepts for the Retrieval of Relevant Video Content.
In: Springer Nature eBookSummary: This book constitutes the refereed post-conference proceedings of the Third International Conference on Intelligent Technologies and Applications, INTAP 2020, held in Grimstad, Norway, in September 2020. The 30 revised full papers and 4 revised short papers presented were carefully reviewed and selected from 117 submissions. The papers of this volume are organized in topical sections on image, video processing and analysis; security and IoT; health and AI; deep learning; biometrics; intelligent environments; intrusion and malware detection; and AIRLEAs.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Image, Video Processing and Analysis -- Classification and Segmentation Models for Hyperspectral Imaging- An Overview -- Exploring Circular Hough Transforms for Detecting Hand Feature Points in Noisy Images from Ghost-Circle Patterns -- Occupancy Flow Control - Case Study: Elevator Cabin -- Security and IoT -- Protecting IoT Devices with Software-defined Networks -- Digital Forensic Readiness in IoT - a risk assessment model -- System Requirements of Software-defined IoT Networks for Critical Infrastructure -- An Optimized IoT-based Waste Collection and Transportation Solution: A Case Study of a Norwegian Municipality -- Health and AI -- Machine Learning based methodology for Depressive Sentiment Analysis -- Simultaneous Artefact-Lesion Extraction for Skin Cancer Diagnosis -- A Statistical Study to Analyze the Impact of External Weather on Chronic Pulmonary Infection in South Norway with Machine Learning Algorithms -- Deep Learning -- Interpretable Option Discovery usingDeep Q-Learning and Variational Autoencoders -- Evaluating Predictive Deep Learning Models -- Pre-trained CNN based deep features with hand-crafted features and patient data for skin lesion classification -- Data-Driven Machine Learning Approach for Human Action Recognition Using Skeleton and Optical Flow -- Biometrics -- Multilingual Voice Impersonation Dataset and Evaluation -- A Survey on Unknown Presentation Attack Detection for Fingerprint -- Hierarchical Interpolation of Imagenet features for Cross-dataset Presentation Attack Detection -- Cross-lingual Speaker Verification: Evaluation On X-Vector Method -- Fusion of Texture and Optical Flow using Convolutional Neural Networks for Gender Classification in Videos -- Intelligent Environments -- A PM 2.5 Forecasting Model Based on Air Pollution and Meteorological Conditions in Neighboring Areas -- The Aquatic Surface Robot (AnSweR), a lightweight, low cost, multipurpose unmanned research vessel -- Intrusion and Malware Detection -- Empirical Analysis of Data Mining Techniques in Network Intrusion Detection Systems -- Deep Neural Network based Malicious Network Activity Detection Under Adversarial Machine Learning Attacks -- Towards Low Cost and Smart Load Testing as a Service using Containers -- Security Guard: An Automated Secure Coding Framework -- The multi-objective feature selection in Android malware detection system -- AIRLEAs -- Border Management Systems: How can they help against pandemics -- Translating Ethical Theory into Ethical Action: An Ethic of Responsibility Approach to Value-Oriented Design -- An Example of Privacy and Data Protection Best Practices for Biometrics Data Processing in Border Control: Lesson Learned from SMILE -- Unsupervised Single Image Super-Resolution using Cycle Generative Adversarial Network -- Criminal Network Community Detection in Social Media Forensics -- Data Privacy in IoT Equipped Future Smart Homes -- Machine Learning and the Legal Framework for the Use of PassengerName Record Data -- Migration-Related Semantic Concepts for the Retrieval of Relevant Video Content.

This book constitutes the refereed post-conference proceedings of the Third International Conference on Intelligent Technologies and Applications, INTAP 2020, held in Grimstad, Norway, in September 2020. The 30 revised full papers and 4 revised short papers presented were carefully reviewed and selected from 117 submissions. The papers of this volume are organized in topical sections on image, video processing and analysis; security and IoT; health and AI; deep learning; biometrics; intelligent environments; intrusion and malware detection; and AIRLEAs.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in