My Account Log in

1 option

Intelligent Technologies and Applications : Third International Conference, INTAP 2020, Gjøvik, Norway, September 28-30, 2020, Revised Selected Papers / edited by Sule Yildirim Yayilgan, Imran Sarwar Bajwa, Filippo Sanfilippo.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Yildirim Yayilgan, Sule., Editor.
Bajwa, Imran Sarwar., Editor.
Sanfilippo, Filippo., Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
Communications in computer and information science 1865-0937 ; 1382
Communications in Computer and Information Science, 1865-0937 ; 1382
Language:
English
Subjects (All):
Computer networks.
Application software.
Artificial intelligence.
Data protection.
Computer vision.
Computer Communication Networks.
Computer and Information Systems Applications.
Artificial Intelligence.
Data and Information Security.
Computer Vision.
Local Subjects:
Computer Communication Networks.
Computer and Information Systems Applications.
Artificial Intelligence.
Data and Information Security.
Computer Vision.
Physical Description:
1 online resource (XIV, 418 pages) : 134 illustrations, 113 illustrations in color.
Edition:
1st ed. 2021.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2021.
System Details:
text file PDF
Summary:
This book constitutes the refereed post-conference proceedings of the Third International Conference on Intelligent Technologies and Applications, INTAP 2020, held in Grimstad, Norway, in September 2020. The 30 revised full papers and 4 revised short papers presented were carefully reviewed and selected from 117 submissions. The papers of this volume are organized in topical sections on image, video processing and analysis; security and IoT; health and AI; deep learning; biometrics; intelligent environments; intrusion and malware detection; and AIRLEAs.
Contents:
Image, Video Processing and Analysis
Classification and Segmentation Models for Hyperspectral Imaging- An Overview
Exploring Circular Hough Transforms for Detecting Hand Feature Points in Noisy Images from Ghost-Circle Patterns
Occupancy Flow Control - Case Study: Elevator Cabin
Security and IoT
Protecting IoT Devices with Software-defined Networks
Digital Forensic Readiness in IoT - a risk assessment model
System Requirements of Software-defined IoT Networks for Critical Infrastructure
An Optimized IoT-based Waste Collection and Transportation Solution: A Case Study of a Norwegian Municipality
Health and AI
Machine Learning based methodology for Depressive Sentiment Analysis
Simultaneous Artefact-Lesion Extraction for Skin Cancer Diagnosis
A Statistical Study to Analyze the Impact of External Weather on Chronic Pulmonary Infection in South Norway with Machine Learning Algorithms
Deep Learning
Interpretable Option Discovery using Deep Q-Learning and Variational Autoencoders
Evaluating Predictive Deep Learning Models
Pre-trained CNN based deep features with hand-crafted features and patient data for skin lesion classification
Data-Driven Machine Learning Approach for Human Action Recognition Using Skeleton and Optical Flow
Biometrics
Multilingual Voice Impersonation Dataset and Evaluation
A Survey on Unknown Presentation Attack Detection for Fingerprint
Hierarchical Interpolation of Imagenet features for Cross-dataset Presentation Attack Detection
Cross-lingual Speaker Verification: Evaluation On X-Vector Method
Fusion of Texture and Optical Flow using Convolutional Neural Networks for Gender Classification in Videos
Intelligent Environments
A PM 2.5 Forecasting Model Based on Air Pollution and Meteorological Conditions in Neighboring Areas
The Aquatic Surface Robot (AnSweR), a lightweight, low cost, multipurpose unmanned research vessel
Intrusion and Malware Detection
Empirical Analysis of Data Mining Techniques in Network Intrusion Detection Systems
Deep Neural Network based Malicious Network Activity Detection Under Adversarial Machine Learning Attacks
Towards Low Cost and Smart Load Testing as a Service using Containers
Security Guard: An Automated Secure Coding Framework
The multi-objective feature selection in Android malware detection system
AIRLEAs
Border Management Systems: How can they help against pandemics
Translating Ethical Theory into Ethical Action: An Ethic of Responsibility Approach to Value-Oriented Design
An Example of Privacy and Data Protection Best Practices for Biometrics Data Processing in Border Control: Lesson Learned from SMILE
Unsupervised Single Image Super-Resolution using Cycle Generative Adversarial Network
Criminal Network Community Detection in Social Media Forensics
Data Privacy in IoT Equipped Future Smart Homes
Machine Learning and the Legal Framework for the Use of Passenger Name Record Data
Migration-Related Semantic Concepts for the Retrieval of Relevant Video Content.
Other Format:
Printed edition:
ISBN:
978-3-030-71711-7
9783030717117
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account