Listing 1 - 10 of 64 | << page >> |
Sort by
|
Choose an application
This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2022) held at Institute of Engineering & Management, Kolkata, India, during February 23–25, 2022. The book is organized in three volumes and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers and case studies related to all the areas of data mining, machine learning, Internet of Things (IoT) and information security.
Computer security --- Data mining --- Computational intelligence. --- Information storage and retrieval systems. --- Image processing --- Computer vision. --- Artificial intelligence --- Computational Intelligence. --- Information Storage and Retrieval. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Data Science. --- Digital techniques. --- Data processing. --- Machine vision --- Vision, Computer --- Pattern recognition systems --- Digital image processing --- Digital electronics --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data centers --- Digital libraries --- Information organization --- Information retrieval --- Intelligence, Computational --- Soft computing
Choose an application
This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2022) held at Institute of Engineering & Management, Kolkata, India, during 23–25 February 2022. The book is organized in three volumes and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data mining, machine learning, Internet of Things (IoT) and information security.
Computer security --- Data mining --- Computational intelligence. --- Information storage and retrieval systems. --- Image processing --- Computer vision. --- Artificial intelligence --- Computational Intelligence. --- Information Storage and Retrieval. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Data Science. --- Digital techniques. --- Data processing. --- Machine vision --- Vision, Computer --- Pattern recognition systems --- Digital image processing --- Digital electronics --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data centers --- Digital libraries --- Information organization --- Information retrieval --- Intelligence, Computational --- Soft computing
Choose an application
Choose an application
This book discusses human emotion recognition from face images using different modalities, highlighting key topics in facial expression recognition, such as the grid formation, distance signature, shape signature, texture signature, feature selection, classifier design, and the combination of signatures to improve emotion recognition. The book explains how six basic human emotions can be recognized in various face images of the same person, as well as those available from benchmark face image databases like CK+, JAFFE, MMI, and MUG. The authors present the concept of signatures for different characteristics such as distance and shape texture, and describe the use of associated stability indices as features, supplementing the feature set with statistical parameters such as range, skewedness, kurtosis, and entropy. In addition, they demonstrate that experiments with such feature choices offer impressive results, and that performance can be further improved by combining the signatures rather than using them individually. There is an increasing demand for emotion recognition in diverse fields, including psychotherapy, biomedicine, and security in government, public and private agencies. This book offers a valuable resource for researchers working in these areas.
User interfaces (Computer systems). --- Optical data processing. --- Pattern recognition. --- User Interfaces and Human Computer Interaction. --- Image Processing and Computer Vision. --- Pattern Recognition. --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Computers --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Optical equipment --- Human face recognition (Computer science) --- Emotion recognition --- Computer programs. --- Emotion perception --- Perception of emotion --- Recognition of emotion --- Emotional intelligence --- Face recognition, Human (Computer science) --- Facial pattern recognition (Computer science) --- Optical pattern recognition
Choose an application
This book discusses human emotion recognition from face images using different modalities, highlighting key topics in facial expression recognition, such as the grid formation, distance signature, shape signature, texture signature, feature selection, classifier design, and the combination of signatures to improve emotion recognition. The book explains how six basic human emotions can be recognized in various face images of the same person, as well as those available from benchmark face image databases like CK+, JAFFE, MMI, and MUG. The authors present the concept of signatures for different characteristics such as distance and shape texture, and describe the use of associated stability indices as features, supplementing the feature set with statistical parameters such as range, skewedness, kurtosis, and entropy. In addition, they demonstrate that experiments with such feature choices offer impressive results, and that performance can be further improved by combining the signatures rather than using them individually. There is an increasing demand for emotion recognition in diverse fields, including psychotherapy, biomedicine, and security in government, public and private agencies. This book offers a valuable resource for researchers working in these areas.
Mathematical statistics --- Electronics --- Telecommunication technology --- Programming --- Computer. Automation --- patroonherkenning --- factoranalyse --- optische communicatie --- optische elektronica --- datacommunicatie --- interfaces
Choose an application
Choose an application
The book provides a platform for dealing with the flaws and failings of the soft computing paradigm through different manifestations. The different chapters highlight the necessity of the hybrid soft computing methodology in general with emphasis on several application perspectives in particular. Typical examples include (a) Study of Economic Load Dispatch by Various Hybrid Optimization Techniques, (b) An Application of Color Magnetic Resonance Brain Image Segmentation by ParaOptiMUSIG activation Function, (c) Hybrid Rough-PSO Approach in Remote Sensing Imagery Analysis, (d) A Study and Analysis of Hybrid Intelligent Techniques for Breast Cancer Detection using Breast Thermograms, and (e) Hybridization of 2D-3D Images for Human Face Recognition. The elaborate findings of the chapters enhance the exhibition of the hybrid soft computing paradigm in the field of intelligent computing.
Computer Science --- Engineering & Applied Sciences --- Engineering. --- Software engineering. --- Artificial intelligence. --- Computational intelligence. --- Computational Intelligence. --- Artificial Intelligence (incl. Robotics). --- Software Engineering. --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer software engineering --- Engineering --- Construction --- Industrial arts --- Technology --- Artificial Intelligence. --- Hybrid computers. --- Computers
Choose an application
The two volume set CCIS 775 and 776 constitutes the refereed proceedings of the First International Conference on Computational Intelligence, Communications, and Business Analytics, CICBA 2017, held in Kolkata, India, in March 2017. The 90 revised full papers presented in the two volumes were carefully reviewed and selected from 276 submissions. The papers are organized in topical sections on data science and advanced data analytics; signal processing and communications; microelectronics, sensors, intelligent networks; computational forensics (privacy and security); computational intelligence in bio-computing; computational intelligence in mobile and quantum computing; intelligent data mining and data warehousing; computational intelligence. .
Computer science. --- Computer security. --- Data structures (Computer science). --- Computers. --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Systems and Data Security. --- Information Systems and Communication Service. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data protection --- Security systems --- Hacking --- Science --- Data structures (Computer scienc. --- Information systems. --- Data Structures and Information Theory. --- Data structures (Computer science)
Choose an application
The two volume set CCIS 775 and 776 constitutes the refereed proceedings of the First International Conference on Computational Intelligence, Communications, and Business Analytics, CICBA 2017, held in Kolkata, India, in March 2017. The 90 revised full papers presented in the two volumes were carefully reviewed and selected from 276 submissions. The papers are organized in topical sections on data science and advanced data analytics; signal processing and communications; microelectronics, sensors, intelligent networks; computational forensics (privacy and security); computational intelligence in bio-computing; computational intelligence in mobile and quantum computing; intelligent data mining and data warehousing; computational intelligence. .
Computer science. --- Computer security. --- Data structures (Computer science). --- Computers. --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Systems and Data Security. --- Information Systems and Communication Service. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data protection --- Security systems --- Hacking --- Science --- Data structures (Computer scienc. --- Information systems. --- Data Structures and Information Theory. --- Web usage mining --- Business --- Computational intelligence --- Communication systems --- Data processing --- Trade --- Economics --- Management --- Commerce --- Industrial management --- Analysis, Web usage --- Analytics, Web --- Mining, Web usage --- Web analytics --- Web usage analysis --- Data mining
Choose an application
This book identifies the time-dependent network parameters: neighbour count, link load, path length, cluster count and delay, and presents a first-of-its-kind discussion on temporal parameters in mobile ad hoc networks. Frequent topology changes and multiple link failures occur in mobile ad hoc network due to arbitrary and random movement of nodes. This dynamic environment challenges the delivery of data and makes it essential to find better models for network parameters that are shifting with time. The parameters identified are put into the framework of time series because of their temporal characteristic, and when they are modelled using time series framework they exhibit a sound fit with Autoregressive AR(p) models of order p. The order p is evaluated for each fitted model and found to lie between one and three. The book also analyses the dependence of end-to-end delay of ad hoc network on various external factors such as the number of nodes, routing protocol, mobility models and path length and develops two prediction models. The book will be useful for researchers and professionals alike.
Ad hoc networks (Computer networks) --- COMPUTERS -- Computer Science. --- COMPUTERS / Computer Literacy. --- Engineering. --- Computer communication systems. --- Electrical engineering. --- Communications Engineering, Networks. --- Computer Communication Networks. --- Mobile Computing. --- MANETs (Computer networks) --- Mobile ad hoc networks --- Wireless ad hoc networks --- Computer networks --- Wireless communication systems --- Telecommunication. --- Mobile computing. --- Electronic data processing --- Context-aware computing --- Portable computers --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Electric engineering --- Engineering --- Distributed processing
Listing 1 - 10 of 64 | << page >> |
Sort by
|