default search action
12th SoCPaR 2020: Virtual Event
- Ajith Abraham, Yukio Ohsawa, Niketa Gandhi, M. Akhil Jabbar, Abdelkrim Haqiq, Seán F. McLoone, Biju Issac:
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 15-18 December 2020. Advances in Intelligent Systems and Computing 1383, Springer 2021, ISBN 978-3-030-73688-0 - Soumaya Zaghbani, Med Salim Bouhlel:
Mask RCNN for Human Motion and Actions Recognition. 1-9 - Joy Bose:
Intelligent and Secure Autofill System in Web Browsers. 10-19 - Samaher Al-Janabi, Ghydaa Kadhum:
Synthesis Biometric Materials Based on Cooperative Among (DSA, WOA and gSpan-FBR) to Water Treatment. 20-33 - Muhammad Zafran Bin Muhammad Zaly Shah, Anazida Binti Zainal:
An Initial Parameter Search for Rapid Concept Drift Adaptation in Deep Neural Networks. 34-42 - Gözde Alp, Ali Fuat Alkaya:
A Comparison of Swarm Intelligence Algorithms Exploiting a Novel Neighbour Generation Technique. 43-52 - Hugo W. Maia, Marcos E. Cintra:
Skin Cancer Automatic Detection Based on Image Characteristics of Shape, Colour, and Texture. 53-62 - Swapna Davies, S. Anand:
Breast Cancer Detection in Infrared Thermal Images Using Convolutional Neural Networks: A Transfer Learning Approach. 63-74 - Iván José Mestre Fernández, Leonardo de Souza Mendes:
Implementation of a System for Collecting and Analyzing Public and Open Access Information from Brazilian Federal Legislative Houses. 75-84 - Teruaki Hayashi, Yukio Ohsawa:
Data Origination: Human-Centered Approach for Design, Acquisition, and Utilization of Data. 85-93 - Eliot Bytyçi, Artan Berisha, Fis Geci:
Coarse-Grained Genetic Algorithm for Flexible Job Scheduling Problem. 94-102 - Hemshree Madaan, Shubham Gupta:
AI Improving the Lives of Physically Disabled. 103-112 - Fatima Ezzahraa Ben Bouazza, Younès Bennani, Abdelfettah Touzani, Guénaël Cabanes:
Subspace Guided Collaborative Clustering Based on Optimal Transport. 113-124 - Anita Qoiriah, Yuni Yamasari, Asmunin, Andi Iwan Nurhidayat, Rina Harimurti:
Exploring Automatic Assessment-Based Features for Clustering of Students' Academic Performance. 125-134 - Kaoutar Benlamine, Younès Bennani, Basarab Matei, Nistor Grozavu:
Quantum Semi Non-negative Matrix Factorization. 135-144 - Mohammad Babrdel Bonab, Bok-Min Goi, Madhavan Balan Nair, Chua Kein Huat, Wong Chim Chwee:
A New Genetic-Based Hyper-Heuristic Algorithm for Clustering Problem. 145-155 - Nouhaila Bensalah, Habib Ayad, Abdellah Adib, Abdelhamid Ibn El Farouk:
LSTM vs. GRU for Arabic Machine Translation. 156-165 - Sadia Afroze, Mohammed Moshiul Hoque:
Towards Lip Motion Based Speaking Mode Detection Using Residual Neural Networks. 166-175 - Yuni Yamasari, Naim Rochmawati, Anita Qoiriah, Dwi F. Suyatno, Tohari Ahmad:
Reducing the Error Mapping of the Students' Performance Using Feature Selection. 176-185 - Sajid Javed, Xiao Zhang, Jorge Dias, Lakmal D. Seneviratne, Naoufel Werghi:
Spatial Graph Regularized Correlation Filters for Visual Object Tracking. 186-195 - Shilpa Rani, Kamlesh Lakhwani, Sandeep Kumar:
Three Dimensional Wireframe Model of Medical and Complex Images Using Cellular Logic Array Processing Techniques. 196-207 - Shubhangi Kale, Raghunathan Shriram:
Suspicious Activity Detection Using Transfer Learning Based ResNet Tracking from Surveillance Videos. 208-220 - Najiya Koderi Valappil, Qurban A. Memon:
Vehicle Detection in UAV Videos Using CNN-SVM. 221-232 - Vrushali Pagire, Anuradha Phadke:
Underwater Moving Object Detection Using GMG. 233-244 - Angelica Lourenço Oliveira, Marcos Eduardo Valle:
Linear Dilation-Erosion Perceptron Trained Using a Convex-Concave Procedure. 245-255 - Taki Hasan Rafi, Faisal Farhan:
A Performance Evaluation of Machine Learning Models on Human Activity Identification (HAI). 256-265 - Thavavel Vaiyapuri:
Wavelet Filtering for Limited-Angle and Low-Dose Computed Tomographic Reconstruction. 266-277 - Anushka Desai, Vraj Mashruwala, Manish Khare:
Handwritten Signature Verification Using Complex Wavelet Transform and Mutual Information Based Kernel. 278-288 - Abdeljalil Gattal, Chawki Djeddi, Akhtar Jamil, Ameur Bensefia:
Multi-Scale Oriented Basic Image Features Column for Handwritten Digit Recognition. 289-298 - Meenal Narkhede, Prashant P. Bartakke, Mukul S. Sutaone:
Delving into Feature Maps: An Explanatory Analysis to Evaluate Weight Initialization. 299-310 - Parashuram Bannigidad, Chandrashekar Gudada:
Historical Kannada Handwritten Character Recognition Using Machine Learning Algorithm. 311-319 - Fariba Goodarzian, Aida Goodarzian, Ajith Abraham, Sohaib Dastgoshade:
Home Health Care Network Management Under Fuzzy Environment Using Meta-heuristic Algorithms. 320-332 - Sohaib Dastgoshade, Ajith Abraham, Nazanin Fozooni:
The Lagrangian Relaxation Approach for Home Health Care Problems. 333-344 - Pradeep Nahak, Atanu Jana, Dilip Kumar Pratihar, Alok Kanti Deb, Hena Ray:
Study on Vision System for Disease Detection Using CNN and LabVIEW of an Agricultural Robot. 345-353 - Mauricio Castillo, Broderick Crawford, Ricardo Soto, Wenceslao Palma, José Lemus-Romani, Diego Tapia, Felipe Cisternas-Caneo, Marcelo Becerra-Rozas, Fernando Paredes, Sanjay Misra:
An Autonomous Galactic Swarm Optimization Algorithm Supported by Hidden Markov Model. 354-363 - Dhawa Sang Dong, Suraj Kandel:
Machine Learning for Breast Cancer Diagnosis and Classification Using Hand-Crafted Features. 364-373 - Pradip M. Paithane, S. N. Kakarwal, D. V. Kurmude:
Automatic Seeded Region Growing with Level Set Technique Used for Segmentation of Pancreas. 374-382 - Elahe Mohagheghian, Hasan Hosseini Nasab, Ajith Abraham, Mohammad Bagher Fakhrzad:
Sustainability Considerations in the Product Design Using System Dynamics and Fuzzy Cognitive Maps. 383-394 - Shibani Hamsa, Youssef Iraqi, Ismail Shahin, Naoufel Werghi:
Dominant Voiced Speech Segregation and Noise Reduction Pre-processing Module for Hearing Aids and Speech Processing Applications. 395-403 - Hudan Studiawan, Rahmat Nazali Salimi, Tohari Ahmad:
Forensic Analysis of Copy-Move Attack with Robust Duplication Detection. 404-413 - Abhishek Dixit, Ashish Mani, Rohit Bansal:
Feature Selection Approach Based on a Novel Variant of Hybrid Differential Evolution and PSO for Sentiment Classification. 414-423 - Zhen Chen, Anthimos Georgiadis:
A Comparative Study for Fisheye Image Classification: SVM or DNN. 424-433 - Gervas Batister Mgaya, Hongbo Liu, Bo Zhang:
A Survey on Applications of Modern Deep Learning Techniques in Team Sports Analytics. 434-443 - Youssef Ait Khouya, Mohammed Ait Oussous, Faouzi Ghorbel:
Describing Brachiopods Shape Based on Fusion of Curvature and Fourier Descriptors. 444-455 - Amit Gawade, Rohit Pandharkar, Subodh Deolekar, Uday Salunkhe:
Early Diagnosis of Parkinson's Disease Using LSTM: A Deep Learning Approach. 456-465 - Paulo A. Salgado, Teresa Paula Azevedo Perdicoúlis:
Segmentation of Foetus Brain MRI Based on K-nn Algorithm, A Case Study. 466-475 - Omid Abdolazimi, Mitra Salehi Esfandarani, Ajith Abraham:
Design of a Closed Supply Chain Under Uncertainty with Regards to Social and Environmental Impacts. 476-488 - Paulo A. Salgado, Paulo Afonso:
Contour Method for Ultrasound Images. 489-495 - Yohan Foucade, Younès Bennani:
Unsupervised Learning from Data and Learners. 496-507 - Shourav Bin Rabbani, Amin Ahsan Ali, M. Ashraful Amin:
Using Microsoft Kinect V2 for Custom Upper-Limb Rehabilitation Exercises. 508-519 - Omer Faruk Seymen, Onur Dogan, Abdulkadir Hiziroglu:
Customer Churn Prediction Using Deep Learning. 520-529 - Parashuram Bannigidad, Asmita Deshpande:
The Fusion of Features for Detection of Cotton Wool Spots in Digital Fundus Images. 530-538 - Ahsan Baidar Bakht, Sajid Javed, Roberto Dina, Hasan Almarzouqi, Ahsan Khandoker, Naoufel Werghi:
Thyroid Nodule Cell Classification in Cytology Images Using Transfer Learning Approach. 539-549 - Muhammad Shafay, Taimur Hassan, Divya Velayudhan, Ernesto Damiani, Naoufel Werghi:
Deep Fusion Driven Semantic Segmentation for the Automatic Recognition of Concealed Contraband Items. 550-559 - Aleksandra Rutkowska, Dariusz Walczak, Agata Filipowska:
Project Comparison Method Supporting Participatory Budget Process - Poznan Case Study. 560-571 - Marc Chevallier, Nicoleta Rogovschi, Faouzi Boufarès, Nistor Grozavu, Charly Clairmont:
Seeding Initial Population, in Genetic Algorithm for Features Selection. 572-582 - Vladyslav Yavtukhovskyi, Rami Abukhader, Nils Tillaeus, Ning Xiong:
An Incremental Fuzzy Learning Approach for Online Classification of Data Streams. 583-592 - Vanel A. Lazcano, Felipe Calderero, Coloma Ballester:
Depth Image Completion Using Anisotropic Operators. 593-604 - Shital Patil, Surendra Bhosale:
Hyperparameter Tuning Based Performance Analysis of Machine Learning Approaches for Prediction of Cardiac Complications. 605-617 - Sheena Christabel Pravin, M. Palanivelan:
Acousto-Prosodic Delineation and Classification of Speech Disfluencies in Bilingual Children. 618-628 - Ilaiah Kavati, Erukala Suresh Babu, Ramalingaswamy Cheruku:
Real-Time Traffic Sign Recognition and Classification Using Deep Learning. 629-636 - Geetanjali Udawat, Niketa Gandhi, Sanjay Deshmukh:
Merits of Mixotrophic Cultivation for Microalgal Biomass Production. 637-647 - Mehmet Korkmaz, Emre Kocyigit, Ozgur Koray Sahingoz, Banu Diri:
Deep Neural Network Based Phishing Classification on a High-Risk URL Dataset. 648-657 - Salma Benazzouza, Mohammed Ridouani, Fatima Salahdine, Aawatif Hayar:
A Secure Bayesian Compressive Spectrum Sensing Technique Based Chaotic Matrix for Cognitive Radio Networks. 658-668 - Yassine Maleh, Abdelkebir Sahid, Mustapha Belaïssaoui:
Optimized Machine Learning Techniques for IoT 6LoWPAN Cyber Attacks Detection. 669-677 - Omar El Idrissi, Abdellatif Mezrioui, Abdelhamid Belmekki:
Inadequacy of IT Approaches to Manage Cyber Security in ICS Context. 678-689 - Hicham Zougagh, Noureddine Idboufker, Youssef Saadi:
Trust-Based Intrusion Detection for Multi Path OLSR Protocol. 690-705 - Aman Bhargava, Kartik Shankhavaram, Priyanshu Agarwal, Jayaprakash Kar:
Bitcoin Technology and Its Security Challenges: A Research Survey. 706-715 - Abdul Wahid Mir, Ketti Ramachandran Ram Kumar:
Zero Trust User Access and Identity Security in Smart Grid Based SCADA Systems. 716-726 - Sampsa Rauti, Samuli Laato, Tinja Pitkämäki:
Man-in-the-Browser Attacks Against IoT Devices: A Study of Smart Homes. 727-737 - Samuli Laato, Sampsa Rauti:
Scambaiting as a Form of Online Video Entertainment: An Exploratory Study. 738-748 - Rania A. Tabeidi, Hanaa F. Morse, Samia M. Masaad, Reem H. Al-shammari, Dalia M. Alsaffar:
Create a Hybrid Algorithm by Combining Hill and Advanced Encryption Standard Algorithms to Enhance Efficiency of RGB Image Encryption. 749-757 - Mohammed El Idrissi, Omar Elbeqqali, Jamal Riffi:
An Improved Smart Wheat Health Monitor for Smart Farming Application Using Deep Residual Learning Framework. 758-767 - Meryem Cherkaoui Semmouni, Ali Azougaghe, Abderrahmane Nitaj, Mostafa Belkasmi:
A New Electronic Voting System Based on Elliptic Curve in a Cloud Computing Environment. 768-778 - Elmehdi Adil, Mohammed Mikou, Ahmed Mouhsen:
Investigation of Stereo Camera Calibration Based on Python. 779-789 - Houria Madani, Noura Ouerdi, Ahmed Boumesaoud, Abdelmalek Azizi:
Study on the Different Types of Neural Networks to Improve the Classification of Ransomwares. 790-798 - Mahamadou Issoufou Tiado, Ibrahim Ganaou Noura, Chaibou Dan Inna Hussein, Harouna Gazobi Souleymane, Hamani Mounkaila Mahamadou:
Quality of Service Evaluation with DSR (Dynamic Source Routing) Protocol in the Classroom Ad Hoc Network of the New Generation of Digital Open Universities (DOUNG). 799-809 - Didier Bassolé, Yaya Traoré, Gouayon Koala, Franklin Tchakounté, Oumarou Sié:
Detection of Vulnerabilities Related to Permissions Requests for Android Apps Using Machine Learning Techniques. 810-822 - Dandy Pramana Hostiadi, Tohari Ahmad, Waskitho Wibisono:
A New Approach to Detecting Bot Attack Activity Scenario. 823-835 - Maryem Ait El Hadj, Ahmed Khoumsi, Yahya Benkaouz, Mohammed Erradi:
A Log-Based Method to Detect and Resolve Efficiently Conflicts in Access Control Policies. 836-846 - Manar Alohaly, Daniel Takabi:
A Hybrid Policy Engineering Approach for Attribute-Based Access Control (ABAC). 847-857 - Noe Elisa, Longzhi Yang, Fei Chao, Nitin Naik:
Anomaly Detection for Internet of Things (IoT) Using an Artificial Immune System. 858-867 - Zineb Bakraouy, Amine Baïna, Mostafa Bellafkih:
Agreement-Broker: Performance Analysis Using KNN, SVM, and ANN Classifiers. 868-879 - Paolo D'Arco, Zahra Ebadi Ansaroudi:
Secret Disclosure Attacks on a Recent Ultralightweight Mutual RFID Authentication Protocol for Blockchain-Enabled Supply Chains. 880-890 - Shahna K. U., Anuj Mohamed:
A Novel Image Encryption Technique Using Multiple One Dimensional Chaotic Map. 891-903 - Mamadou Mbaye, Cheikhou Thiam:
Use of Cryptography for Monetary Issuance and Securing Financial Transactions. 904-910 - Joan Nabusoba, Calvins Otieno, Wilson Cheruiyot:
MAAMSIC: Multimodal Authentication and Authorization Model for Security of IoT Communication via GSM Messaging in Sub-Saharan Africa. 911-920 - Mohamed Ouhssini, Karim Afdel, Elhafed Agherrabi:
Towards a Proactive System of DDoS Attacks Detection in the Cloud. 921-933 - Syed Usman Jamil, M. Arif Khan, Sabih ur Rehman:
Edge Computing Enabled Technologies for Secure 6G Smart Environment-An Overview. 934-945 - Victor Fedoseev, Daniil Kozlov:
Secure QIM-Based Image Watermarking in JPEG Compression Domain. 946-955 - Latifah Almaiman, Noura Alqahtani:
Security and Privacy on IoMT. 956-963 - Ashutosh Singh, Yogendra Narain Singh, Pramod Kumar:
Biometric Template Protection Using Deep Learning. 964-974 - Bellal Belkacemi, Salah Saad:
Inner and Outer Race Bearing Defects of Induction Motor Running at Low Speeds Signal Analysis with DWT. 975-983 - Jihane El Mokhtari, Anas Abou El Kalam, Siham Benhadou, Jean-Philippe Leroy:
Transformation of PrivUML into XACML Using QVT. 984-996 - Hedi Choura, Faten Chaabane, Tarek Frikha, Mouna Baklouti:
Robust and Secure Watermarking Technique for E-Health Applications. 997-1008 - Shelley Gupta, Archana Singh, Jayanthi Ranjan:
Emoji Score and Polarity Evaluation Using CLDR Short Name and Expression Sentiment. 1009-1016 - Kazi Masum Sadique, Rahim Rahmani, Paul Johannesson:
Dynamic and Decentralized Trust Management for the Internet of Things (IoT) Paradigm. 1017-1026 - Khaznah Alhajri, Wadha Almarrai, Amani Alzahrani, Ezaz Aldahasi, Maha AlGhamdi, Dabiah Ahmed Alboaneen:
Comparison of Parental Control Tools for Blocking Advertisements on a Home Network. 1027-1037
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.