


default search action
7. SoCPaR 2015: Fukuoka, Japan
- Mario Köppen, Bing Xue, Hideyuki Takagi, Ajith Abraham, Azah Kamilah Muda, Kun Ma:

7th International Conference of Soft Computing and Pattern Recognition, SoCPaR 2015, Fukuoka, Japan, November 13-15, 2015. IEEE 2015, ISBN 978-1-4673-9360-7 - Asmaa Hashem Sweidan, Nashwa El-Bendary, Aboul Ella Hassanien, Osman Mohammed Hegazy, Abd El-karim Mohamed:

Water quality classification approach based on bio-inspired Gray Wolf Optimization. 1-6 - Esraa Elhariri, Nashwa El-Bendary, Aboul Ella Hassanien, Ajith Abraham:

Grey wolf optimization for one-against-one multi-class support vector machines. 7-12 - Sara Yassen, Tarek Gaber

, Aboul Ella Hassanien:
Integer wavelet transform for thermal image authentication. 13-18 - Ahmed Ibrahem Hafez

, Hossam M. Zawbaa
, Eid Emary, Hamdi A. Mahmoud, Aboul Ella Hassanien:
An innovative approach for feature selection based on chicken swarm optimization. 19-24 - Hossam M. Zawbaa

, Eid Emary, Aboul Ella Hassanien, Bazil Pârv:
A wrapper approach for feature selection based on swarm optimization algorithm inspired from the behavior of social-spiders. 25-30 - Andrii Shalaginov, Katrin Franke:

Automated generation of fuzzy rules from large-scale network traffic analysis in digital forensics investigations. 31-36 - Katsuhiro Honda, Masahiro Omori, Seiki Ubukata

, Akira Notsu:
A study on fuzzy clustering-based k-anonymization for privacy preserving crowd movement analysis with face recognition. 37-41 - Petr Hurtík

, Petra Hodáková:
FTIP: A tool for an image plagiarism detection. 42-47 - Koji Kinoshita:

Estimation of inverse model by PSO and simultaneous perturbation method. 48-53 - Yeni Herdiyeni

, Asep Rahmat Ginanjar, M. Rake Linggar Anggoro, Stéphane Douady, Ervizal A. M. Zuhud:
MedLeaf: Mobile biodiversity informatics tool for mapping and identifying Indonesian medicinal Plants. 54-59 - Sadaaki Miyamoto, Ryosuke Abe, Yasunori Endo, Jun-ichi Takeshita:

Ward method of hierarchical clustering for non-Euclidean similarity measures. 60-63 - Dongming Tang:

Clustering analysis SAGE libraries using maximal information coefficient. 64-69 - Ran Li, Xuezhen Li, Takio Kurita

:
Soft local binary patterns. 70-75 - Gilberto Antonio Marcon dos Santos, Victor Terra Ferrão, Cássio Dener N. Vinhal, Gelson da Cruz:

An adaptive algorithm for embedded real-time point cloud ground segmentation. 76-83 - Tohari Ahmad

, Doni S. Pambudi
, Tsuyoshi Usagawa:
Improving the performance of projection-based cancelable fingerprint template method. 84-88 - Wladyslaw Homenda, Agnieszka Jastrzebska:

Global, local and embedded architectures for multiclass classification with foreign elements rejection: An overview. 89-94 - Ghada Hamed, Mohammed Marey, Safaa Amin El-Sayed, Mohamed Fahmy Tolba:

Hybrid technique for steganography-based on DNA with n-bits binary coding rule. 95-102 - Céline Rabouy, Sébastien Paris, Hervé Glotin:

Improving image classification by orthogonality of sparse codes. 103-110 - Zhesheng Zhang, Wei Yuan, Fanyu You:

Power allocation of jamming attackers against PEV charging stations: A game theoretical approach. 111-116 - Alaa Tharwat, Hani Mahdi

, Adel El-Hennawy, Aboul Ella Hassanien:
Face sketch recognition using local invariant features. 117-122 - Yuta Ueki, Kei Ohnishi:

Inducing awareness for learners through visualizing mutual evaluation data by a self-organizing map. 123-128 - Haitham El-Hussieny

, Samy F. M. Assal
, A. A. Abouelsoud, Said M. Megahed, Tsukasa Ogasawara
:
Incremental learning of reach-to-grasp behavior: A PSO-based Inverse optimal control approach. 129-135 - Hasitha Muthumala Waidyasooriya, Daisuke Ono, Masanori Hariyama:

Hardware-oriented succinct-data-structure based on block-size-constrained compression. 136-140 - Ryozo Kitajima, Ryotaro Kamimura, Osamu Uchida

, Fujio Toriumi
:
Neural potential learning for tweets classification and interpretation. 141-148 - Koki Kawasaki, Tomohiro Yoshikawa, Takeshi Furuhashi:

Visualizing extracted feature by deep learning in P300 discrimination task. 149-154 - Yuya Kaneda, Qiangfu Zhao, Yong Liu, Yan Pei

:
Strategies for determining effective step size of the backpropagation algorithm for on-line learning. 155-160 - Prarinya Siritanawan, Kazunori Kotani:

Facial action units detection by robust temporal features. 161-168 - Jun Yu, Hideyuki Takagi:

Clustering of moving vectors for evolutionary computation. 169-174 - Divya S. Vidyadharan, Sabu M. Thampi

:
Detecting spliced face in a group photo using PCA. 175-180 - Kazuya Nakamura, Hiroshi Kawasaki, Satoshi Ono

:
Agent-based two-dimensional barcode decoding robust against non-uniform geometric distortion. 181-186 - Ramazan Algin, Ali Fuat Alkaya:

Solving the obstacle neutralization problem using swarm intelligence algorithms. 187-192 - Bo-Wen Hsieh, Wei-Lun Chen, Jian-Hung Chen:

Video summarization of timestamp comments videos based on concept of folksonomy. 193-198 - Jérémie Sublime

, Nistor Grozavu, Younès Bennani
, Antoine Cornuéjols:
Vertical collaborative clustering using generative topographic maps. 199-204 - Petr Hurtík

, Marek Vajgl
, Michal Burda
:
Jewelry stones classification: Case study. 205-210 - Wen-Hung Liao, Yi-Hsuan Liang, Yi-Chieh Wu

:
An integrated approach for multilingual scene text detection. 211-217 - Yeni Herdiyeni

, Dicky Iqbal Lubis, Stéphane Douady:
Leaf shape identification of medicinal leaves using curvilinear shape descriptor. 218-223 - Whina Ayu Lestari, Yeni Herdiyeni

, Lilik Budi Prasetyo, Wahyudi Hasbi
, Kohei Arai, Hiroshi Okumura:
Nitrogen estimation of paddy based on leaf reflectance using Artificial Neural Network. 224-229 - Nehal A. Mohamed, Mostafa A. El-Azeim, Alaa Zaghloul, Ahmed A. Abd El-Latif

:
Image encryption scheme for secure digital images based on 3D cat map and Turing machine. 230-234 - Pavel Vlasánek

, Irina Perfilieva:
Patch based inpainting method based on the F1-transform. 235-240 - Xiyan Chen, Qinggang Meng:

Robust vehicle tracking and detection from UAVs. 241-246 - Martin Zsifkovits, Marian Sorin Nistor

, Silja Meyer-Nieberg
:
Quantitative network analysis for passenger pattern recognition: An analysis of railway stations. 247-252 - Saiful Izwan Suliman, Graham Kendall, Ismail Musirin:

An effective AIS-based model for frequency assignment in mobile communication. 253-259 - Takeshi Saitoh

, Toshiki Shibata, Tsubasa Miyazono:
Image-based fish recognition. 260-263 - Qiuchen Cheng, Kun Ma

, Bo Yang:
Stream-based Particle Swarm Optimization for data migration decision. 264-269 - Munehiro Namba:

A recursive estimation of network state for improving probabilistic caching. 270-273 - Yu-Min Chiang, Yih-Lon Lin, Wei-Hong Chien:

Automated surface defect inspection system for capacitive touch sensor. 274-277 - Hoan Tran Quoc, Hideya Ochiai, Hiroshi Esaki:

Hidden topics modeling approach for review quality prediction and classification. 278-283 - Tetsuyuki Takahama, Setsuko Sakai:

Improving an adaptive differential evolution using hill-valley detection. 284-289 - Won-Gil Huh, Sung-Bae Cho:

Optimal partial filters of EEG signals for shared control of vehicle. 290-293 - Sang-Muk Jo, Sung-Bae Cho:

Automatic generation of GUI for smartphone IME by classifying user behavior patterns. 294-297 - Sung-Bae Cho, Jun-Ho Kim:

Predicting group emotion in kindergarten classes by modular Bayesian networks. 298-302 - Kee-Hoon Kim, Sung-Bae Cho:

A group emotion control system based on reinforcement learning. 303-307 - Llewyn Salt, Branislav Kusy

, Raja Jurdak
:
Adaptive threshold triggering of GPS for long-term tracking in WSN. 308-313 - Kee-Hoon Kim, Chang-Seok Lee, Sang-Muk Jo, Sung-Bae Cho:

Predicting the success of bank telemarketing using deep convolutional neural network. 314-317 - Yih-Lon Lin, Chung-Ming Sung:

Preliminary study on QR code detection using HOG and AdaBoost. 318-321 - Junya Sato, Takuya Akashi:

Evolutionary multi-view face tracking on pixel replaced image in video sequence. 322-327 - Sebastián Basterrech

, Gerardo Rubino, Václav Snásel:
Sensitivity analysis of echo state networks for forecasting pseudo-periodic time series. 328-333 - Anahita Ghazvini, Mohd Zakree Bin Ahmad Nazri, Siti Norul Huda Sheikh Abdullah

, Md Nawawi Junoh, Zainal Abidin bin Kasim:
Biography commercial serial crime analysis using enhanced dynamic neural network. 334-339 - Wai Chong Chia, Lee Seng Yeong, Sue Inn Ch'ng, Yoke Lun Kam:

The effect of using super-resolution to improve feature extraction and registration of low resolution images in sensor networks. 340-345 - Katsuhiko Murakami:

Extraction of latent concepts from an integrated human gene database: Non-negative matrix factorization for identification of hidden data structure. 346-350 - Rodrigo Lisbôa Pereira

, Edson Koiti Kudo Yasojima, Rodrigo M. S. de Oliveira, Marco Antônio Florenzano Mollinetti, Otávio Noura Teixeira
, Roberto Célio Limão de Oliveira
:
Parallel genetic algorithm with social interaction for solving constrained global optimization problems. 351-356 - Hachemi Nabil Dellys

, Noussaiba Benadjimi, Meriem Romaissa Boubakeur, Layth Sliman
, Fathelalem F. Ali:
Fingerprint fuzzy vault chaff point generation by squares method. 357-362 - Takaya Ogiso, Koichiro Yamauchi, Norio Ishii, Yuri Suzuki:

A co-learning system for humans and machines. 363-368

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














