GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Soft computing. ; Computer vision. ; Electronic books.
    Description / Table of Contents: Covering the latest research on soft computing techniques in the emerging field of vision science, this publication features contributions from leading experts and covers a range of topics including frequent pattern mining and 4D stereo camera systems.
    Type of Medium: Online Resource
    Pages: 1 online resource (221 pages)
    Edition: 1st ed.
    ISBN: 9783642255076
    Series Statement: Studies in Computational Intelligence Series ; v.395
    DDC: 006.37
    Language: English
    Note: Title Page -- Foreword -- Preface -- Editorial -- Contents -- Genetic Algorithm Based Fuzzy Frequent Pattern Mining from Gene Expression Data -- Introduction -- Goal of the Paper -- Proposed Model -- Paper Layout -- Related Work -- Preliminaries -- Apriori Algorithm -- FP-Growth Algorithm -- Fuzzy FP-Growth Tree -- Genetic Algorithm -- Experimental Evaluation -- Conclusion and Future Work -- References -- Prediction of Protein Tertiary Structure Using Genetic Algorithm -- Introduction -- Related Work -- Proposed Scheme -- Protein Conformation Representation -- Energy Function -- The Algorithm -- Experiments and Results -- Conclusion and Future Work -- References -- Hybrid Image Mining Methods to Classify the Abnormality in Complete Field Image Mammograms Based on Normal Regions -- Introduction -- Full-Field Mammogram Analysis -- Mammogram Database -- Enhancement Based on H Representation -- Regional Feature Extraction -- A Cascading Classifier for Identifying Normal Regions -- Full-Field Analysis Using Overlapped Regions -- Results -- Conclusion -- References -- Handwritten Script Recognition Using DCT, Gabor Filter and Wavelet Features at Line Level -- Introduction -- Method Description -- Data Collection and Preprocessing -- Feature Extraction -- Script Recognition -- Experimental Results -- Conclusion -- References -- Character Recognition Using 2D View and Support Vector Machine -- Introduction -- Character Recognition System -- Image Acquisition -- Preprocessing -- Segmentation -- Feature Extraction -- Classification and Recognition Using Support Vector Machine -- Experimental Result -- Conclusion -- References -- Automatic Localization of Pupil Using Histogram Thresholding and Region Based Mask Filter -- Introduction -- Proposed Method -- Algorithm -- Experimental Results -- Conclusion and Future Work -- References. , A Comparative Analysis on Edge Detection of Colloid Cyst: A Medical Imaging Approach -- Introduction -- Review of Previous Work -- Edge Detection Operators -- Sobel Operator -- Robert's Cross Operator -- Prewitt's Operator -- Laplacian of Gaussian -- Canny's Edge Detection Algorithm -- Performance of Edge Detection Algorithms -- Morphological Analysis -- Implementation of the Method -- Analysis-1 -- Analysis 2 -- Results -- References -- Automatic Localization and Segmentation of Left Ventricle from Short Axis Cine MR Images: An Image Driven Method -- Introduction -- Materials -- Methodology -- Automatic Cropping -- LV Segmentation -- Level Set Method -- Implementation Details -- Experimental Results -- Conclusion -- References -- Performance Analysis of Neural Network and ANFIS in Brain MR Image Classification -- Introduction -- Medical Image Classification -- Block Diagram of the System -- Transformation of Image to Data Form -- Principal Component Analysis -- Adaptive Neuro Fuzzy Inference System -- Neuro Fuzzy Model -- ANFIS Architecture -- Learning Algorithm of ANFIS -- ANFIS Classifier -- Results -- Conclusion -- References -- Hybrid Algorithm Using Fuzzy C-Means and Local Binary Patterns for Image Indexing and Retrieval -- Introduction -- Motivation -- Related Work -- Main Contribution -- Fuzzy C-Means Algorithms -- Local Binary Patterns -- Proposed System Framework (FLBP) -- Similarity Measurement -- Experimental Results and Discussions -- Database DB1 -- Database DB2 -- Conclusions -- References -- Artificial Neural Network (ANN) Based Object Recognition Using Multiple Feature Sets -- Introduction -- Some of the Relevant Works -- System Model -- Input and Pre-processing -- Feature Extraction -- Artificial Neural Network (ANN) -- Experiential Results and Discussion -- Conclusion -- References. , Protein Structure Prediction Using Multiple Artificial Neural Network Classifier -- Introduction -- Basic Biological Concept -- Necessities of PSSP -- Basics of Artificial Neural Network -- Methodology -- System Model -- Results -- Conclusions -- References -- An Intelligent Agent Based Intrusion Detection System Using Fuzzy Rough Set Based Outlier Detection -- Introduction -- Literature Survey -- Intelligent Agent Based Approach -- System Architecture -- Feature Selection Agent -- Fuzzy Rough Set Based Outlier Detection -- Fuzzy Rough Set Based Outlier Detection Algorithm -- Decision Manager -- Fuzzy Rough Set Based SVM (FRSVM) -- Results and Discussion -- Conclusion -- References -- Application of Ant Colony Algorithm for Classification and Rule Generation of Data -- Introduction -- Social Insects and Real Ant Colonies -- Ant Colony Optimization -- Ant-Miner.ACO Algorithm for Data Mining -- General Description of Ant-Miner -- Heuristic Function -- Rule Pruning -- Pheromone Updating -- Computational Results -- Dataset -- Test Setup -- Test Results -- Conclusion an Future Work -- References -- Immunised Navigational Controller for Mobile Robot Navigation -- Introduction -- Background -- The Primary and Secondary Response of the Immune System -- Antibodies -- Antibody-Antigen Binding -- Artifical Immune System for Robots -- System Architecture -- Immune Network Formulation -- Selection of Antibodies and Antigens -- Paratope and Idiotope Matrices -- Results and Discussion -- Reinforcement Learning -- Conclusion -- References -- Modified A* Algorithm for Mobile Robot Path Planning -- Introduction -- Related Works -- Proposed Approach -- Assumptions -- Algorithm of Path Planning -- Results and Discussions -- Case I: Obstacle Free Environment -- Case II: Obstacle Avoidance -- Conclusion -- References. , Artificial Immune System Based Path Planning of Mobile Robot -- Introduction -- Biological Immune System -- Concept of Immune System -- Idiotopic Network -- Path Planning Algorithm -- Defining Antibody and Antigen -- Mutual Action of Among Antibodies -- Mobile Robot Path Planning Algorithm Based on AIN -- The Proposed GA -- GA Operators -- Demonstrations -- Collision Free Movements in a Cluttered Environment -- Collision Free Movements in a Simple Environment -- Comparison between the Different Types of Fuzzy Controllers and Neuro-Fuzzy Controller -- Conclusion and Future Works -- References -- Facial Feature Extraction Using a 4D Stereo Camera System -- Introduction -- Face Acquisition -- The 4D Camera System and the Dimensional Imaging Software -- Obj File Format -- Facial Feature Extraction -- Detection of 'Tip of the Nose' -- Detection of the Point Where Nose Meets the Forehead -- Detection of Near Corners of the Two Eyes -- Results -- Future Work -- Discussion -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Data mining. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (172 pages)
    Edition: 1st ed.
    ISBN: 9789811037795
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.555
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- About the Book -- Contents -- About the Editors -- 1 Research on SaaS-Based Mine Emergency Rescue Preplan and Case Management System -- Abstract -- 1 Introduction -- 2 SaaS and Service-Oriented Architecture -- 3 The Architecture of System -- 4 The Components of System -- 5 System Implementation and Testing -- 6 Conclusion -- Acknowledgements -- References -- 2 An Investigation of Matching Approaches in Fingerprints Identification -- Abstract -- 1 Introduction -- 2 Research Method -- 2.1 Research Questions -- 2.2 Research Strategies -- 3 Fingerprints Matching Approaches -- 3.1 Taxonomy of the Study -- 3.2 Generic Process of Three Main Types of Fingerprints Matching -- 4 Current Issues of the Matching Approaches -- Acknowledgements -- References -- 3 Figure Plagiarism Detection Using Content-Based Features -- Abstract -- 1 Introduction -- 2 Content-Based Feature Extraction -- 3 Similarity Detection -- 4 Result and Evaluation -- 5 Conclusions -- Acknowledgements -- References -- 4 An Efficient Content-Based Image Retrieval (CBIR) Using GLCM for Feature Extraction -- Abstract -- 1 Introduction -- 2 Proposed System -- 2.1 Preprocessing Phase -- 2.2 Feature Extraction Phase -- 3 Methodology -- 4 Similarity Feature Extraction -- 5 Algorithm for GLCM -- 6 Results and Discussion -- 7 Comparative Analysis -- 8 Conclusions -- References -- 5 Emotion Recognition System Based on Facial Expressions Using SVM -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Emotion Recognition -- 3.1 Image Preprocessing -- 3.2 Feature Extraction -- 3.3 Feature Selection -- 3.4 Expression Recognition -- 3.5 Experiments Results -- 4 Conclusion -- References -- 6 An AES-CHAOS-Based Hybrid Approach to Encrypt Multiple Images -- Abstract -- 1 Introduction -- 1.1 Fast Chaotic Algorithm -- 1.2 AES Image Encryption -- 1.3 Cramer's Rule. , 2 Literature Review -- 3 Proposed Algorithm -- 4 Results -- 5 Conclusion -- References -- 7 Automatic Text Summarization of Video Lectures Using Subtitles -- Abstract -- 1 Introduction -- 2 Proposed System -- 2.1 Proposed Architecture -- 2.1.1 Data Preprocessing -- 2.1.2 Feature Selection for Summarization -- 2.1.3 Processing After Feature Selection for Summarization -- 3 Conclusion -- References -- 8 Classification of EMG Signals Using ANFIS for the Detection of Neuromuscular Disorders -- Abstract -- 1 Introduction -- 2 Proposed Model -- 2.1 Preprocessing of the EMG Signal -- 2.2 Processing or Feature Extraction of EMG Signal -- 2.3 Classification of EMG Signal -- 3 Results and Analysis -- 4 Conclusion -- References -- 9 Evaluating Similarity of Websites Using Genetic Algorithm for Web Design Reorganisation -- Abstract -- 1 Introduction -- 2 Web Mining-A Background -- 2.1 Web Mining Taxonomy -- 2.2 Web Mining Tasks -- 3 Literature Survey -- 4 Proposed Methodology -- 5 Experimental Evaluation -- 5.1 Proposed Genetic Algorithm -- 5.2 Computation of Similarity -- 6 Conclusion -- References -- 10 Fusion of Misuse Detection with Anomaly Detection Technique for Novel Hybrid Network Intrusion Detection System -- Abstract -- 1 Introduction -- 2 Proposed Hybrid Intrusion Detection Methodology -- 2.1 Feature Preparation Module -- 2.2 Misuse Analyzer Module -- 2.3 Anomaly Analyzer Module -- 3 Simulation Results -- 4 Conclusion -- References -- 11 Analysis of Reconfigurable Fabric Architecture with Cryptographic Application Using Hashing Techniques -- Abstract -- 1 Introduction -- 2 Methodology -- 3 Implementation of Reconfigurable Fabric -- 4 Interconnect Topologies -- 5 Operation -- 6 Results -- 6.1 Hashing Function -- 7 Conclusion -- References -- 12 Privacy Preservation of Infrequent Itemsets Mining Using GA Approach -- Abstract -- 1 Introduction. , 2 Literature Survey -- 3 Problem Definition -- 4 Proposed Framework -- 5 Proposed Algorithm -- 5.1 Illustrated Example -- 6 Result Analysis -- 7 Conclusion -- References -- 13 A Quinphone-Based Context-Dependent Acoustic Modeling for LVCSR -- Abstract -- 1 Introduction -- 2 Working of ASR -- 3 Phonetic Representation of Speech Signals -- 3.1 Modeling Using Monophones -- 3.2 Modeling Using Triphones -- 3.3 Modeling Using Quinphones -- 4 Implementation -- 4.1 Speech Data Preparation -- 4.2 Training -- 4.3 ASR Performance Analysis -- 5 Experiments -- 5.1 Testing with Varying Vocabulary Sizes -- 5.2 Testing with Varying Gaussian Mixtures -- 6 Conclusion -- References -- 14 Slot-Loaded Microstrip Antenna: A Possible Solution for Wide Banding and Attaining Low Cross-Polarization -- Abstract -- 1 Introduction -- 2 Theoretical Background -- 3 Proposed Structure -- 4 Results and Discussions -- 5 Conclusions -- Acknowledgements -- References -- 15 Fractal PKC-Based Key Management Scheme for Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 System Model -- 3.2 Fractal-based Key Pair Generation and Key Exchange -- 4 Fractal PKC-based Key Management Scheme: FPKM -- 4.1 Set-up Phase -- 4.2 Clustering Phase -- 4.3 Rekeying Phase -- 5 The Performance Evaluation of Proposed Scheme -- 6 Conclusion -- References -- 16 Histogram-Based Human Segmentation Technique for Infrared Images -- Abstract -- 1 Introduction -- 2 The Proposed Method -- 2.1 Selection of ROIs -- 2.2 Human Candidates Segmentation -- 3 Experiment Results -- 4 Conclusion -- References -- 17 Medical Image Segmentation Based on Beta Mixture Distribution for Effective Identification of Lesions -- Abstract -- 1 Introduction -- 2 Probability Distribution Functions of Beta Mixture Model Using the EM Algorithm -- 3 Clustering Algorithm Based on Fuzzy c-Means. , 4 Dataset -- 5 Segmentation Algorithm -- 5.1 Experimentation -- 6 Results Derived and Performance Analysis -- 7 Conclusion -- References -- 18 Toward Segmentation of Images Based on Non-Normal Mixture Models Based on Bivariate Skew Distribution -- Abstract -- 1 Introduction -- 2 Bivariate Skew Gaussian Mixture Model -- 3 k-Means Algorithm -- 4 Data Set Considered -- 5 Feature Selection -- 6 Experiment Result and Performance Evolution -- 7 Conclusion -- References -- 19 Development of Video Surveillance System in All-Black Environment Based on Infrared Laser Light -- Abstract -- 1 Introduction -- 2 Design of Video Capture System -- 2.1 IR Laser Aiding Light Module -- 2.2 Photoelectric Sensor Module -- 2.3 Central Control Module -- 3 System Testing -- 4 Conclusion -- Acknowledgements -- References -- 20 Data Preprocessing Techniques for Research Performance Analysis -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Business Intelligence -- 2.2 Data Preprocessing -- 3 Research Performance Analysis -- 3.1 Data Preprocessing Approach -- 4 Conclusion -- Acknowledgements -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...