Limit search to available items
Book Cover
E-book

Title IT Convergence and Security 2017 : Volume 1 / edited by Kuinam J. Kim, Hyuncheol Kim, Nakhoon Baek
Published Singapore : Springer Singapore : Imprint: Springer, 2018
Online access available from:
Springer eBooks    View Resource Record  

Copies

Description 1 online resource (XIX, 350 pages 177 illustrations :) : online resource
Series Lecture Notes in Electrical Engineering ; 449
Lecture notes in electrical engineering ; 449
Contents Preface; Organizing Committee; General Chairs; Steering Committee; Program Chair; Publicity Chairs; Financial Chair; Publication Chairs; Organizers and Supporters; Program Committee; Contents; Machine Learning and Deep Learning; Image-Based Content Retrieval via Class-Based Histogram Comparisons; Abstract; 1 Introduction; 2 Research in Image-Based Recall; 3 IBR Packages; 4 Experimental Setup and Methodology; 5 Results; 6 Conclusions and Future Work; References; Smart Content Recognition from Images Using a Mixture of Convolutional Neural Networks; Abstract; 1 Introduction; 2 Related Works
1 Introduction2 Methods; 2.1 Data Sources and Types; 2.2 Token-Based Features; 2.3 Decision Tree Models Building and Evaluation; 3 Results; 4 Discussion; 5 Conclusion; Acknowledgments; References; Heavy Rainfall Forecasting Model Using Artificial Neural Network for Flood Prone Area; Abstract; 1 Introduction; 2 Materials and Methods; 2.1 Study Area; 2.2 Handling Missing Data; 2.3 Data Gathering; 2.4 Data Normalization; 2.5 Development of Artificial Neural Networks (ANN); 3 Results and Discussion; 4 Conclusion; References; Communication and Signal Processing
2 Materials and Methods2.1 Data; 2.2 SVM-RFE Algorithm; 2.3 Feature Ranking Algorithms for Gene Selection; 2.4 MA-Plot-Based Methods for Normalization; 3 The Proposed Algorithm; 4 The Proposed Algorithm Evaluation; 5 Conclusion; References; Vehicle Counting System Based on Vehicle Type Classification Using Deep Learning Method; Abstract; 1 Introduction; 2 Methodology; 2.1 Vehicle Counting System (VCS); 2.2 Vehicle Type Classification -- CNNLS; 3 Result and Discussion; 4 Conclusion; References; Metadata Discovery of Heterogeneous Biomedical Datasets Using Token-Based Features; Abstract
2.2 Feature Selection2.3 Ensemble; 2.4 Classifier; 2.5 Evaluation; 3 The Proposed Method; 3.1 Student Data; 3.2 Data Preprocessing; 4 Experiment and Result; 5 Conclusion; Acknowledgements; References; Reduction of Overfitting in Diabetes Prediction Using Deep Learning Neural Network; Abstract; 1 Introduction; 2 Proposed Method; 2.1 Multilayer Perceptron; 2.2 Dropout; 3 Experimental Results and Analysis; 4 Conclusion; Acknowledgements; References; An Improved SVM-T-RFE Based on Intensity-Dependent Normalization for Feature Selection in Gene Expre ...; Abstract; 1 Introduction
3 The Proposed Mixture of CNN Model4 Dataset; 5 Experimental Results; 6 Conclusion; References; Failure Part Mining Using an Association Rules Mining by FP-Growth and Apriori Algorithms: Case of ATM Maintenance in Thailand; Abstract; 1 Introduction; 2 Relate Work; 2.1 Association Rules; 2.2 Apriori; 2.3 FP-Growth; 3 The Proposed Model; 4 Result and Discussion; 5 Conclusion; Acknowledgements; References; Improving Classification of Imbalanced Student Dataset Using Ensemble Method of Voting, Bagging, and ...; Abstract; 1 Introduction; 2 Methodology and Related Work; 2.1 Resampling
Summary This is the first volume of proceedings including selected papers from the International Conference on IT Convergence and Security (ICITCS) 2017, presenting a snapshot of the latest issues encountered in this field. It explores how IT convergence and security issues are core to most current research, and industrial and commercial activities. It consists of contributions covering topics such as machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics. ICITCS 2017 is the latest in a series of highly successful International Conferences on IT Convergence and Security, previously held in Prague, Czech Republic(2016), Kuala Lumpur, Malaysia (2015) Beijing, China (2014), Macau, China (2013), Pyeong Chang, Korea (2012), and Suwon, Korea (2011)
Subject Computational intelligence.
Computer security.
Electrical engineering.
Engineering.
Genre/Form Conference papers and proceedings.
Form Electronic book
Author Baek, Nakhoon
Kim, Hyuncheol
Kim, Kuinam J.
ISBN 9789811064500
9789811064517
9811064504
9811064512