GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Data mining. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (172 pages)
    Edition: 1st ed.
    ISBN: 9789811037795
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.555
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- About the Book -- Contents -- About the Editors -- 1 Research on SaaS-Based Mine Emergency Rescue Preplan and Case Management System -- Abstract -- 1 Introduction -- 2 SaaS and Service-Oriented Architecture -- 3 The Architecture of System -- 4 The Components of System -- 5 System Implementation and Testing -- 6 Conclusion -- Acknowledgements -- References -- 2 An Investigation of Matching Approaches in Fingerprints Identification -- Abstract -- 1 Introduction -- 2 Research Method -- 2.1 Research Questions -- 2.2 Research Strategies -- 3 Fingerprints Matching Approaches -- 3.1 Taxonomy of the Study -- 3.2 Generic Process of Three Main Types of Fingerprints Matching -- 4 Current Issues of the Matching Approaches -- Acknowledgements -- References -- 3 Figure Plagiarism Detection Using Content-Based Features -- Abstract -- 1 Introduction -- 2 Content-Based Feature Extraction -- 3 Similarity Detection -- 4 Result and Evaluation -- 5 Conclusions -- Acknowledgements -- References -- 4 An Efficient Content-Based Image Retrieval (CBIR) Using GLCM for Feature Extraction -- Abstract -- 1 Introduction -- 2 Proposed System -- 2.1 Preprocessing Phase -- 2.2 Feature Extraction Phase -- 3 Methodology -- 4 Similarity Feature Extraction -- 5 Algorithm for GLCM -- 6 Results and Discussion -- 7 Comparative Analysis -- 8 Conclusions -- References -- 5 Emotion Recognition System Based on Facial Expressions Using SVM -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Emotion Recognition -- 3.1 Image Preprocessing -- 3.2 Feature Extraction -- 3.3 Feature Selection -- 3.4 Expression Recognition -- 3.5 Experiments Results -- 4 Conclusion -- References -- 6 An AES-CHAOS-Based Hybrid Approach to Encrypt Multiple Images -- Abstract -- 1 Introduction -- 1.1 Fast Chaotic Algorithm -- 1.2 AES Image Encryption -- 1.3 Cramer's Rule. , 2 Literature Review -- 3 Proposed Algorithm -- 4 Results -- 5 Conclusion -- References -- 7 Automatic Text Summarization of Video Lectures Using Subtitles -- Abstract -- 1 Introduction -- 2 Proposed System -- 2.1 Proposed Architecture -- 2.1.1 Data Preprocessing -- 2.1.2 Feature Selection for Summarization -- 2.1.3 Processing After Feature Selection for Summarization -- 3 Conclusion -- References -- 8 Classification of EMG Signals Using ANFIS for the Detection of Neuromuscular Disorders -- Abstract -- 1 Introduction -- 2 Proposed Model -- 2.1 Preprocessing of the EMG Signal -- 2.2 Processing or Feature Extraction of EMG Signal -- 2.3 Classification of EMG Signal -- 3 Results and Analysis -- 4 Conclusion -- References -- 9 Evaluating Similarity of Websites Using Genetic Algorithm for Web Design Reorganisation -- Abstract -- 1 Introduction -- 2 Web Mining-A Background -- 2.1 Web Mining Taxonomy -- 2.2 Web Mining Tasks -- 3 Literature Survey -- 4 Proposed Methodology -- 5 Experimental Evaluation -- 5.1 Proposed Genetic Algorithm -- 5.2 Computation of Similarity -- 6 Conclusion -- References -- 10 Fusion of Misuse Detection with Anomaly Detection Technique for Novel Hybrid Network Intrusion Detection System -- Abstract -- 1 Introduction -- 2 Proposed Hybrid Intrusion Detection Methodology -- 2.1 Feature Preparation Module -- 2.2 Misuse Analyzer Module -- 2.3 Anomaly Analyzer Module -- 3 Simulation Results -- 4 Conclusion -- References -- 11 Analysis of Reconfigurable Fabric Architecture with Cryptographic Application Using Hashing Techniques -- Abstract -- 1 Introduction -- 2 Methodology -- 3 Implementation of Reconfigurable Fabric -- 4 Interconnect Topologies -- 5 Operation -- 6 Results -- 6.1 Hashing Function -- 7 Conclusion -- References -- 12 Privacy Preservation of Infrequent Itemsets Mining Using GA Approach -- Abstract -- 1 Introduction. , 2 Literature Survey -- 3 Problem Definition -- 4 Proposed Framework -- 5 Proposed Algorithm -- 5.1 Illustrated Example -- 6 Result Analysis -- 7 Conclusion -- References -- 13 A Quinphone-Based Context-Dependent Acoustic Modeling for LVCSR -- Abstract -- 1 Introduction -- 2 Working of ASR -- 3 Phonetic Representation of Speech Signals -- 3.1 Modeling Using Monophones -- 3.2 Modeling Using Triphones -- 3.3 Modeling Using Quinphones -- 4 Implementation -- 4.1 Speech Data Preparation -- 4.2 Training -- 4.3 ASR Performance Analysis -- 5 Experiments -- 5.1 Testing with Varying Vocabulary Sizes -- 5.2 Testing with Varying Gaussian Mixtures -- 6 Conclusion -- References -- 14 Slot-Loaded Microstrip Antenna: A Possible Solution for Wide Banding and Attaining Low Cross-Polarization -- Abstract -- 1 Introduction -- 2 Theoretical Background -- 3 Proposed Structure -- 4 Results and Discussions -- 5 Conclusions -- Acknowledgements -- References -- 15 Fractal PKC-Based Key Management Scheme for Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 System Model -- 3.2 Fractal-based Key Pair Generation and Key Exchange -- 4 Fractal PKC-based Key Management Scheme: FPKM -- 4.1 Set-up Phase -- 4.2 Clustering Phase -- 4.3 Rekeying Phase -- 5 The Performance Evaluation of Proposed Scheme -- 6 Conclusion -- References -- 16 Histogram-Based Human Segmentation Technique for Infrared Images -- Abstract -- 1 Introduction -- 2 The Proposed Method -- 2.1 Selection of ROIs -- 2.2 Human Candidates Segmentation -- 3 Experiment Results -- 4 Conclusion -- References -- 17 Medical Image Segmentation Based on Beta Mixture Distribution for Effective Identification of Lesions -- Abstract -- 1 Introduction -- 2 Probability Distribution Functions of Beta Mixture Model Using the EM Algorithm -- 3 Clustering Algorithm Based on Fuzzy c-Means. , 4 Dataset -- 5 Segmentation Algorithm -- 5.1 Experimentation -- 6 Results Derived and Performance Analysis -- 7 Conclusion -- References -- 18 Toward Segmentation of Images Based on Non-Normal Mixture Models Based on Bivariate Skew Distribution -- Abstract -- 1 Introduction -- 2 Bivariate Skew Gaussian Mixture Model -- 3 k-Means Algorithm -- 4 Data Set Considered -- 5 Feature Selection -- 6 Experiment Result and Performance Evolution -- 7 Conclusion -- References -- 19 Development of Video Surveillance System in All-Black Environment Based on Infrared Laser Light -- Abstract -- 1 Introduction -- 2 Design of Video Capture System -- 2.1 IR Laser Aiding Light Module -- 2.2 Photoelectric Sensor Module -- 2.3 Central Control Module -- 3 System Testing -- 4 Conclusion -- Acknowledgements -- References -- 20 Data Preprocessing Techniques for Research Performance Analysis -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Business Intelligence -- 2.2 Data Preprocessing -- 3 Research Performance Analysis -- 3.1 Data Preprocessing Approach -- 4 Conclusion -- Acknowledgements -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...