


default search action
12th SoCPaR 2020: Virtual Event
- Ajith Abraham, Yukio Ohsawa, Niketa Gandhi, M. Akhil Jabbar, Abdelkrim Haqiq, Seán F. McLoone, Biju Issac

:
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 15-18 December 2020. Advances in Intelligent Systems and Computing 1383, Springer 2021, ISBN 978-3-030-73688-0 - Soumaya Zaghbani, Med Salim Bouhlel:

Mask RCNN for Human Motion and Actions Recognition. 1-9 - Joy Bose

:
Intelligent and Secure Autofill System in Web Browsers. 10-19 - Samaher Al-Janabi

, Ghydaa Kadhum:
Synthesis Biometric Materials Based on Cooperative Among (DSA, WOA and gSpan-FBR) to Water Treatment. 20-33 - Muhammad Zafran Bin Muhammad Zaly Shah, Anazida Binti Zainal:

An Initial Parameter Search for Rapid Concept Drift Adaptation in Deep Neural Networks. 34-42 - Gözde Alp

, Ali Fuat Alkaya:
A Comparison of Swarm Intelligence Algorithms Exploiting a Novel Neighbour Generation Technique. 43-52 - Hugo W. Maia

, Marcos E. Cintra
:
Skin Cancer Automatic Detection Based on Image Characteristics of Shape, Colour, and Texture. 53-62 - Swapna Davies

, S. Anand:
Breast Cancer Detection in Infrared Thermal Images Using Convolutional Neural Networks: A Transfer Learning Approach. 63-74 - Iván José Mestre Fernández

, Leonardo de Souza Mendes:
Implementation of a System for Collecting and Analyzing Public and Open Access Information from Brazilian Federal Legislative Houses. 75-84 - Teruaki Hayashi

, Yukio Ohsawa
:
Data Origination: Human-Centered Approach for Design, Acquisition, and Utilization of Data. 85-93 - Eliot Bytyçi

, Artan Berisha
, Fis Geci
:
Coarse-Grained Genetic Algorithm for Flexible Job Scheduling Problem. 94-102 - Hemshree Madaan, Shubham Gupta:

AI Improving the Lives of Physically Disabled. 103-112 - Fatima Ezzahraa Ben Bouazza

, Younès Bennani
, Abdelfettah Touzani, Guénaël Cabanes:
Subspace Guided Collaborative Clustering Based on Optimal Transport. 113-124 - Anita Qoiriah

, Yuni Yamasari
, Asmunin, Andi Iwan Nurhidayat, Rina Harimurti:
Exploring Automatic Assessment-Based Features for Clustering of Students' Academic Performance. 125-134 - Kaoutar Benlamine, Younès Bennani

, Basarab Matei
, Nistor Grozavu:
Quantum Semi Non-negative Matrix Factorization. 135-144 - Mohammad Babrdel Bonab, Bok-Min Goi, Madhavan Balan Nair, Chua Kein Huat, Wong Chim Chwee:

A New Genetic-Based Hyper-Heuristic Algorithm for Clustering Problem. 145-155 - Nouhaila Bensalah

, Habib Ayad
, Abdellah Adib
, Abdelhamid Ibn El Farouk
:
LSTM vs. GRU for Arabic Machine Translation. 156-165 - Sadia Afroze, Mohammed Moshiul Hoque

:
Towards Lip Motion Based Speaking Mode Detection Using Residual Neural Networks. 166-175 - Yuni Yamasari

, Naim Rochmawati
, Anita Qoiriah
, Dwi F. Suyatno, Tohari Ahmad
:
Reducing the Error Mapping of the Students' Performance Using Feature Selection. 176-185 - Sajid Javed, Xiao Zhang, Jorge Dias

, Lakmal D. Seneviratne, Naoufel Werghi:
Spatial Graph Regularized Correlation Filters for Visual Object Tracking. 186-195 - Shilpa Rani, Kamlesh Lakhwani

, Sandeep Kumar:
Three Dimensional Wireframe Model of Medical and Complex Images Using Cellular Logic Array Processing Techniques. 196-207 - Shubhangi Kale

, Raghunathan Shriram:
Suspicious Activity Detection Using Transfer Learning Based ResNet Tracking from Surveillance Videos. 208-220 - Najiya Koderi Valappil, Qurban A. Memon:

Vehicle Detection in UAV Videos Using CNN-SVM. 221-232 - Vrushali Pagire, Anuradha C. Phadke:

Underwater Moving Object Detection Using GMG. 233-244 - Angelica Lourenço Oliveira

, Marcos Eduardo Valle
:
Linear Dilation-Erosion Perceptron Trained Using a Convex-Concave Procedure. 245-255 - Taki Hasan Rafi, Faisal Farhan:

A Performance Evaluation of Machine Learning Models on Human Activity Identification (HAI). 256-265 - Thavavel Vaiyapuri:

Wavelet Filtering for Limited-Angle and Low-Dose Computed Tomographic Reconstruction. 266-277 - Anushka Desai, Vraj Mashruwala, Manish Khare:

Handwritten Signature Verification Using Complex Wavelet Transform and Mutual Information Based Kernel. 278-288 - Abdeljalil Gattal

, Chawki Djeddi
, Akhtar Jamil
, Ameur Bensefia:
Multi-Scale Oriented Basic Image Features Column for Handwritten Digit Recognition. 289-298 - Meenal Narkhede, Prashant P. Bartakke

, Mukul S. Sutaone:
Delving into Feature Maps: An Explanatory Analysis to Evaluate Weight Initialization. 299-310 - Parashuram Bannigidad

, Chandrashekar Gudada
:
Historical Kannada Handwritten Character Recognition Using Machine Learning Algorithm. 311-319 - Fariba Goodarzian, Aida Goodarzian, Ajith Abraham, Sohaib Dastgoshade:

Home Health Care Network Management Under Fuzzy Environment Using Meta-heuristic Algorithms. 320-332 - Sohaib Dastgoshade

, Ajith Abraham, Nazanin Fozooni:
The Lagrangian Relaxation Approach for Home Health Care Problems. 333-344 - Pradeep Nahak

, Atanu Jana, Dilip Kumar Pratihar, Alok Kanti Deb, Hena Ray:
Study on Vision System for Disease Detection Using CNN and LabVIEW of an Agricultural Robot. 345-353 - Mauricio Castillo

, Broderick Crawford
, Ricardo Soto
, Wenceslao Palma
, José Lemus-Romani
, Diego Tapia
, Felipe Cisternas-Caneo
, Marcelo Becerra-Rozas
, Fernando Paredes
, Sanjay Misra
:
An Autonomous Galactic Swarm Optimization Algorithm Supported by Hidden Markov Model. 354-363 - Dhawa Sang Dong

, Suraj Kandel
:
Machine Learning for Breast Cancer Diagnosis and Classification Using Hand-Crafted Features. 364-373 - Pradip M. Paithane

, S. N. Kakarwal, D. V. Kurmude:
Automatic Seeded Region Growing with Level Set Technique Used for Segmentation of Pancreas. 374-382 - Elahe Mohagheghian, Hasan Hosseini Nasab, Ajith Abraham, Mohammad Bagher Fakhrzad:

Sustainability Considerations in the Product Design Using System Dynamics and Fuzzy Cognitive Maps. 383-394 - Shibani Hamsa, Youssef Iraqi

, Ismail Shahin, Naoufel Werghi:
Dominant Voiced Speech Segregation and Noise Reduction Pre-processing Module for Hearing Aids and Speech Processing Applications. 395-403 - Hudan Studiawan, Rahmat Nazali Salimi, Tohari Ahmad

:
Forensic Analysis of Copy-Move Attack with Robust Duplication Detection. 404-413 - Abhishek Dixit, Ashish Mani, Rohit Bansal

:
Feature Selection Approach Based on a Novel Variant of Hybrid Differential Evolution and PSO for Sentiment Classification. 414-423 - Zhen Chen

, Anthimos Georgiadis
:
A Comparative Study for Fisheye Image Classification: SVM or DNN. 424-433 - Gervas Batister Mgaya

, Hongbo Liu, Bo Zhang:
A Survey on Applications of Modern Deep Learning Techniques in Team Sports Analytics. 434-443 - Youssef Ait Khouya

, Mohammed Ait Oussous, Faouzi Ghorbel
:
Describing Brachiopods Shape Based on Fusion of Curvature and Fourier Descriptors. 444-455 - Amit Gawade

, Rohit Pandharkar, Subodh Deolekar, Uday Salunkhe:
Early Diagnosis of Parkinson's Disease Using LSTM: A Deep Learning Approach. 456-465 - Paulo A. Salgado, Teresa Paula Azevedo Perdicoúlis:

Segmentation of Foetus Brain MRI Based on K-nn Algorithm, A Case Study. 466-475 - Omid Abdolazimi

, Mitra Salehi Esfandarani, Ajith Abraham:
Design of a Closed Supply Chain Under Uncertainty with Regards to Social and Environmental Impacts. 476-488 - Paulo A. Salgado

, Paulo Afonso
:
Contour Method for Ultrasound Images. 489-495 - Yohan Foucade, Younès Bennani

:
Unsupervised Learning from Data and Learners. 496-507 - Shourav Bin Rabbani, Amin Ahsan Ali, M. Ashraful Amin

:
Using Microsoft Kinect V2 for Custom Upper-Limb Rehabilitation Exercises. 508-519 - Omer Faruk Seymen

, Onur Dogan, Abdulkadir Hiziroglu
:
Customer Churn Prediction Using Deep Learning. 520-529 - Parashuram Bannigidad, Asmita Deshpande:

The Fusion of Features for Detection of Cotton Wool Spots in Digital Fundus Images. 530-538 - Ahsan Baidar Bakht, Sajid Javed, Roberto Dina, Hasan Almarzouqi, Ahsan Khandoker, Naoufel Werghi:

Thyroid Nodule Cell Classification in Cytology Images Using Transfer Learning Approach. 539-549 - Muhammad Shafay

, Taimur Hassan, Divya Velayudhan
, Ernesto Damiani, Naoufel Werghi:
Deep Fusion Driven Semantic Segmentation for the Automatic Recognition of Concealed Contraband Items. 550-559 - Aleksandra Rutkowska

, Dariusz Walczak
, Agata Filipowska
:
Project Comparison Method Supporting Participatory Budget Process - Poznan Case Study. 560-571 - Marc Chevallier

, Nicoleta Rogovschi, Faouzi Boufarès, Nistor Grozavu, Charly Clairmont:
Seeding Initial Population, in Genetic Algorithm for Features Selection. 572-582 - Vladyslav Yavtukhovskyi, Rami Abukhader, Nils Tillaeus, Ning Xiong:

An Incremental Fuzzy Learning Approach for Online Classification of Data Streams. 583-592 - Vanel A. Lazcano

, Felipe Calderero, Coloma Ballester:
Depth Image Completion Using Anisotropic Operators. 593-604 - Shital Patil

, Surendra Bhosale:
Hyperparameter Tuning Based Performance Analysis of Machine Learning Approaches for Prediction of Cardiac Complications. 605-617 - Sheena Christabel Pravin

, M. Palanivelan:
Acousto-Prosodic Delineation and Classification of Speech Disfluencies in Bilingual Children. 618-628 - Ilaiah Kavati, Erukala Suresh Babu

, Ramalingaswamy Cheruku
:
Real-Time Traffic Sign Recognition and Classification Using Deep Learning. 629-636 - Geetanjali Udawat, Niketa Gandhi

, Sanjay Deshmukh:
Merits of Mixotrophic Cultivation for Microalgal Biomass Production. 637-647 - Mehmet Korkmaz

, Emre Kocyigit
, Ozgur Koray Sahingoz
, Banu Diri
:
Deep Neural Network Based Phishing Classification on a High-Risk URL Dataset. 648-657 - Salma Benazzouza, Mohammed Ridouani

, Fatima Salahdine, Aawatif Hayar:
A Secure Bayesian Compressive Spectrum Sensing Technique Based Chaotic Matrix for Cognitive Radio Networks. 658-668 - Yassine Maleh

, Abdelkebir Sahid
, Mustapha Belaïssaoui:
Optimized Machine Learning Techniques for IoT 6LoWPAN Cyber Attacks Detection. 669-677 - Omar El Idrissi, Abdellatif Mezrioui, Abdelhamid Belmekki:

Inadequacy of IT Approaches to Manage Cyber Security in ICS Context. 678-689 - Hicham Zougagh, Noureddine Idboufker, Youssef Saadi:

Trust-Based Intrusion Detection for Multi Path OLSR Protocol. 690-705 - Aman Bhargava, Kartik Shankhavaram, Priyanshu Agarwal, Jayaprakash Kar:

Bitcoin Technology and Its Security Challenges: A Research Survey. 706-715 - Abdul Wahid Mir, Ketti Ramachandran Ram Kumar:

Zero Trust User Access and Identity Security in Smart Grid Based SCADA Systems. 716-726 - Sampsa Rauti, Samuli Laato

, Tinja Pitkämäki:
Man-in-the-Browser Attacks Against IoT Devices: A Study of Smart Homes. 727-737 - Samuli Laato

, Sampsa Rauti:
Scambaiting as a Form of Online Video Entertainment: An Exploratory Study. 738-748 - Rania A. Tabeidi, Hanaa F. Morse, Samia M. Masaad, Reem H. Al-shammari, Dalia M. Alsaffar:

Create a Hybrid Algorithm by Combining Hill and Advanced Encryption Standard Algorithms to Enhance Efficiency of RGB Image Encryption. 749-757 - Mohammed El Idrissi

, Omar Elbeqqali, Jamal Riffi:
An Improved Smart Wheat Health Monitor for Smart Farming Application Using Deep Residual Learning Framework. 758-767 - Meryem Cherkaoui Semmouni, Ali Azougaghe

, Abderrahmane Nitaj, Mostafa Belkasmi:
A New Electronic Voting System Based on Elliptic Curve in a Cloud Computing Environment. 768-778 - Elmehdi Adil

, Mohammed Mikou, Ahmed Mouhsen:
Investigation of Stereo Camera Calibration Based on Python. 779-789 - Houria Madani

, Noura Ouerdi
, Ahmed Boumesaoud, Abdelmalek Azizi
:
Study on the Different Types of Neural Networks to Improve the Classification of Ransomwares. 790-798 - Mahamadou Issoufou Tiado, Ibrahim Ganaou Noura

, Chaibou Dan Inna Hussein, Harouna Gazobi Souleymane, Hamani Mounkaila Mahamadou:
Quality of Service Evaluation with DSR (Dynamic Source Routing) Protocol in the Classroom Ad Hoc Network of the New Generation of Digital Open Universities (DOUNG). 799-809 - Didier Bassolé

, Yaya Traoré
, Gouayon Koala, Franklin Tchakounté, Oumarou Sié:
Detection of Vulnerabilities Related to Permissions Requests for Android Apps Using Machine Learning Techniques. 810-822 - Dandy Pramana Hostiadi

, Tohari Ahmad
, Waskitho Wibisono:
A New Approach to Detecting Bot Attack Activity Scenario. 823-835 - Maryem Ait El Hadj

, Ahmed Khoumsi, Yahya Benkaouz, Mohammed Erradi:
A Log-Based Method to Detect and Resolve Efficiently Conflicts in Access Control Policies. 836-846 - Manar Alohaly, Daniel Takabi:

A Hybrid Policy Engineering Approach for Attribute-Based Access Control (ABAC). 847-857 - Noe Elisa, Longzhi Yang, Fei Chao, Nitin Naik:

Anomaly Detection for Internet of Things (IoT) Using an Artificial Immune System. 858-867 - Zineb Bakraouy, Amine Baïna, Mostafa Bellafkih

:
Agreement-Broker: Performance Analysis Using KNN, SVM, and ANN Classifiers. 868-879 - Paolo D'Arco, Zahra Ebadi Ansaroudi

:
Secret Disclosure Attacks on a Recent Ultralightweight Mutual RFID Authentication Protocol for Blockchain-Enabled Supply Chains. 880-890 - Shahna K. U.

, Anuj Mohamed
:
A Novel Image Encryption Technique Using Multiple One Dimensional Chaotic Map. 891-903 - Mamadou Mbaye, Cheikhou Thiam:

Use of Cryptography for Monetary Issuance and Securing Financial Transactions. 904-910 - Joan Nabusoba, Calvins Otieno, Wilson Cheruiyot:

MAAMSIC: Multimodal Authentication and Authorization Model for Security of IoT Communication via GSM Messaging in Sub-Saharan Africa. 911-920 - Mohamed Ouhssini

, Karim Afdel, Elhafed Agherrabi:
Towards a Proactive System of DDoS Attacks Detection in the Cloud. 921-933 - Syed Usman Jamil

, M. Arif Khan
, Sabih ur Rehman
:
Edge Computing Enabled Technologies for Secure 6G Smart Environment-An Overview. 934-945 - Victor Fedoseev

, Daniil Kozlov
:
Secure QIM-Based Image Watermarking in JPEG Compression Domain. 946-955 - Latifah Almaiman, Noura Alqahtani:

Security and Privacy on IoMT. 956-963 - Ashutosh Singh, Yogendra Narain Singh, Pramod Kumar:

Biometric Template Protection Using Deep Learning. 964-974 - Bellal Belkacemi, Salah Saad

:
Inner and Outer Race Bearing Defects of Induction Motor Running at Low Speeds Signal Analysis with DWT. 975-983 - Jihane El Mokhtari, Anas Abou El Kalam

, Siham Benhadou, Jean-Philippe Leroy:
Transformation of PrivUML into XACML Using QVT. 984-996 - Hedi Choura

, Faten Chaabane
, Tarek Frikha
, Mouna Baklouti
:
Robust and Secure Watermarking Technique for E-Health Applications. 997-1008 - Shelley Gupta

, Archana Singh, Jayanthi Ranjan
:
Emoji Score and Polarity Evaluation Using CLDR Short Name and Expression Sentiment. 1009-1016 - Kazi Masum Sadique

, Rahim Rahmani
, Paul Johannesson
:
Dynamic and Decentralized Trust Management for the Internet of Things (IoT) Paradigm. 1017-1026 - Khaznah Alhajri, Wadha Almarrai, Amani Alzahrani, Ezaz Aldahasi, Maha AlGhamdi, Dabiah Ahmed Alboaneen

:
Comparison of Parental Control Tools for Blocking Advertisements on a Home Network. 1027-1037

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














