소장자료
LDR | 08730nam a22006495i 4500 | ||
001 | 0100795205▲ | ||
003 | DE-He213▲ | ||
005 | 20240307131606▲ | ||
007 | cr nn 008mamaa▲ | ||
008 | 230928s2023 sz | s |||| 0|eng d▲ | ||
020 | ▼a9783031424304▼9978-3-031-42430-4▲ | ||
024 | 7 | ▼a10.1007/978-3-031-42430-4▼2doi▲ | |
050 | 4 | ▼aQ334-342▲ | |
050 | 4 | ▼aTA347.A78▲ | |
082 | 0 | 4 | ▼a006.3▼223▲ |
245 | 1 | 0 | ▼aRecent Challenges in Intelligent Information and Database Systems▼h[electronic resource] :▼b15th Asian Conference, ACIIDS 2023, Phuket, Thailand, July 24–26, 2023, Proceedings /▼cedited by Ngoc Thanh Nguyen, Siridech Boonsang, Hamido Fujita, Bogumiła Hnatkowska, Tzung-Pei Hong, Kitsuchart Pasupa, Ali Selamat.▲ |
250 | ▼a1st ed. 2023.▲ | ||
264 | 1 | ▼aCham :▼bSpringer Nature Switzerland :▼bImprint: Springer,▼c2023.▲ | |
300 | ▼aXXVI, 623 p. 211 illus., 168 illus. in color.▼bonline resource.▲ | ||
336 | ▼atext▼btxt▼2rdacontent▲ | ||
337 | ▼acomputer▼bc▼2rdamedia▲ | ||
338 | ▼aonline resource▼bcr▼2rdacarrier▲ | ||
347 | ▼atext file▼bPDF▼2rda▲ | ||
490 | 1 | ▼aCommunications in Computer and Information Science,▼x1865-0937 ;▼v1863▲ | |
505 | 0 | ▼aComputer Vision -- Fast Camera Motion Compensation Based Kalman Filter And Cascade Association For Multi-object Tracking -- Image-based Reliable Object Localization of UAV Cooperating with Ground Vehicle -- Images Retrieval and Classification for Acute Myeloid Leukemia Blood Cell Using Deep Metric Learning -- Superior automatic screening for human helminthic ova by using self-supervised learning approach-based object classification -- Cybersecurity and Fraud Detection -- Obfuscated Malware Detection: Impacts on Detection Methods -- Estimating Post-OCR Denoising Complexity on Numerical Texts -- Reciprocal Points Learning based Unknown DDoS Attacks Detection -- An Approach To Prevent DDOS Attack Using Real-Time Access Logs Analysis -- A novel method for spam call detection using graph convolutional networks -- The completion of a smart factory research project by concluding a DAO -- An Approach for Tamper-Proof QR Code Using Deep Learning Based-Data Hiding -- Data Analysis, Modeling, and Processing -- Enhanced Energy Characterization and Feature Selection using explainable Non-parametric AGGMM -- Hybrid Method for Short Text Topic Modeling -- AWS: GNNs that Aggregate and add With Self-node representation for Dehydrogenation Enthalpy Prediction -- Utilising Unet3+ for Tooth Segmentation on X-Ray Image -- Group Trip Planning Approach with Travel Time and Ratio Constraints -- When are Latent Topics Useful for Text Mining? Enriching Bag-of- Words Representations with Information Extraction in Thai News Articles -- Assessing Data Quality: An Approach for the Spread of COVID-19 -- Improved U-Net based on Dual Attention Mechanism for Glottis Segmentation and Dysphagia Auxiliary Diagnosis -- The Application of Machine Learning Technique to Soil Salinity Mapping in South of Kazakhstan -- Principal Components Analysis based frameworks for efficient missing data imputation algorithms -- An Integration of Big Data and Blockchain for Strategic Analysis for Schools in Thailand -- Federated Deep Reinforcement Learning - based Bitrate Adaptation for Dynamic Adaptive Streaming over HTTP -- A Multi-Criteria Framework Supporting Sustainability Assessment Considering SDG 7 Targets -- A Novel Software Tool for Fast Multiview Visualization of High-Dimensional Datasets -- A Distilled 2D CNN-LSTM Framework with Temporal Attention Mechanism for Action Recognition -- Data Mining and Machine Learning -- Goal-oriented Classification Measure Based on the Game Theory Concepts -- Comparative Study on Customer Churn Prediction by Using Machine Learning Techniques -- Improving the Expected Goal value in football using Multilayer Perceptron Networks -- A Projected Upper Bound for Mining High Utility Patterns from Interval-Based Event Sequences -- Mitigating Catastrophic Forgetting in Neural Machine Translation through Teacher-Student Distillation with Attention Mechanism -- The Achilles Heel of Artificial Intelligence -- Using machine learning algorithms to explore listeners musical tastes -- Forecasting and Optimization Techniques -- Forecasting performance of GARCH, EGARCH and SETAR non-linear models: an application on the MASI index of the Casablanca stock exchange -- Forecasting of Energy Consumption in the Philippines Using Machine Learning Algorithms -- A Deep Reinforcement Learning-based Multi-Objective Optimization for Crowdsensing-based Air Quality Monitoring Systems -- Healthcare and Medical Applications -- Crime Scene Detection in Surveillance Videos Using Variational AutoEncoder-Based Support Vector Data Description -- Cervical Spine Fracture Detection via Computed Tomography Scan -- Healthcare 4.0 for the improvement of the surgical monitoring Business Process -- Improvement of the Process of Diagnosing Patient’s Condition via Computer Tomography Lung Scans using Neural Networks -- Novel machine learning pipeline for real-time oculometry -- Elitism-based Genetic Algorithm Hyper-heuristic for Solving Real-life Surgical Scheduling Problem -- Speech and Text Processing -- Generation of Arabic Commonsense Explanations -- Automatic Speech Recognition improvement for Kazakh language with Enhanced Language Model -- Relationship Between Linguistic Complexity and MT Errors in the Context of Inflectional Languages -- Differential-Privacy Preserving Trajectory Data Publishing for Road Networks -- Using Text Mining and Tokenization Analysis to Identify Job Performance for Human Resource Management at the University of Phayao -- The task of generating text based on a semantic approach for a low-resource Kazakh language -- Nested Semisupervised Learning for Cross-Note Abbreviation Detection in Vietnamese Clinical Texts -- An Effectiveness of Repeating a Spoken Digit for Speaker Verification.▲ | |
520 | ▼aThis book constitutes the second part of the proceedings of the 15th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2023, held in Phuket, Thailand, during July 24–26, 2023. The 50 full papers included in this book were carefully reviewed and selected from 224 submissions. They were organized in topical sections as follows: Computer Vision, Cybersecurity and Fraud Detection, Data Analysis, Modeling, and Processing, Data Mining and Machine Learning, Forecasting and Optimization Techniques, Healthcare and Medical Applications, Speech and Text Processing. .▲ | ||
650 | 0 | ▼aArtificial intelligence.▲ | |
650 | 0 | ▼aComputer engineering.▲ | |
650 | 0 | ▼aComputer networks .▲ | |
650 | 0 | ▼aImage processing▼xDigital techniques.▲ | |
650 | 0 | ▼aComputer vision.▲ | |
650 | 0 | ▼aSocial sciences▼xData processing.▲ | |
650 | 1 | 4 | ▼aArtificial Intelligence.▲ |
650 | 2 | 4 | ▼aComputer Engineering and Networks.▲ |
650 | 2 | 4 | ▼aComputer Imaging, Vision, Pattern Recognition and Graphics.▲ |
650 | 2 | 4 | ▼aComputer Communication Networks.▲ |
650 | 2 | 4 | ▼aComputer Application in Social and Behavioral Sciences.▲ |
700 | 1 | ▼aNguyen, Ngoc Thanh.▼eeditor.▼0(orcid)0000-0002-3247-2948▼1https://orcid.org/0000-0002-3247-2948▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
700 | 1 | ▼aBoonsang, Siridech.▼eeditor.▼0(orcid)0000-0003-2866-8902▼1https://orcid.org/0000-0003-2866-8902▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
700 | 1 | ▼aFujita, Hamido.▼eeditor.▼0(orcid)0000-0001-5256-210X▼1https://orcid.org/0000-0001-5256-210X▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
700 | 1 | ▼aHnatkowska, Bogumiła.▼eeditor.▼0(orcid)0000-0003-1706-0205▼1https://orcid.org/0000-0003-1706-0205▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
700 | 1 | ▼aHong, Tzung-Pei.▼eeditor.▼0(orcid)0000-0001-7305-6492▼1https://orcid.org/0000-0001-7305-6492▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
700 | 1 | ▼aPasupa, Kitsuchart.▼eeditor.▼0(orcid)0000-0001-8359-9888▼1https://orcid.org/0000-0001-8359-9888▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
700 | 1 | ▼aSelamat, Ali.▼eeditor.▼0(orcid)0000-0001-9746-8459▼1https://orcid.org/0000-0001-9746-8459▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
710 | 2 | ▼aSpringerLink (Online service)▲ | |
773 | 0 | ▼tSpringer Nature eBook▲ | |
776 | 0 | 8 | ▼iPrinted edition:▼z9783031424298▲ |
776 | 0 | 8 | ▼iPrinted edition:▼z9783031424311▲ |
830 | 0 | ▼aCommunications in Computer and Information Science,▼x1865-0937 ;▼v1863▲ | |
856 | 4 | 0 | ▼uhttps://doi.org/10.1007/978-3-031-42430-4▲ |

Recent Challenges in Intelligent Information and Database Systems[electronic resource] : 15th Asian Conference, ACIIDS 2023, Phuket, Thailand, July 24–26, 2023, Proceedings
자료유형
국외eBook
서명/책임사항
Recent Challenges in Intelligent Information and Database Systems [electronic resource] : 15th Asian Conference, ACIIDS 2023, Phuket, Thailand, July 24–26, 2023, Proceedings / edited by Ngoc Thanh Nguyen, Siridech Boonsang, Hamido Fujita, Bogumiła Hnatkowska, Tzung-Pei Hong, Kitsuchart Pasupa, Ali Selamat.
개인저자
판사항
1st ed. 2023.
형태사항
XXVI, 623 p. 211 illus., 168 illus. in color. online resource.
총서사항
Communications in Computer and Information Science , 1865-0937 ; 1863
Communications in Computer and Information Science , 1865-0937 ; 1863
Communications in Computer and Information Science , 1865-0937 ; 1863
내용주기
Computer Vision -- Fast Camera Motion Compensation Based Kalman Filter And Cascade Association For Multi-object Tracking -- Image-based Reliable Object Localization of UAV Cooperating with Ground Vehicle -- Images Retrieval and Classification for Acute Myeloid Leukemia Blood Cell Using Deep Metric Learning -- Superior automatic screening for human helminthic ova by using self-supervised learning approach-based object classification -- Cybersecurity and Fraud Detection -- Obfuscated Malware Detection: Impacts on Detection Methods -- Estimating Post-OCR Denoising Complexity on Numerical Texts -- Reciprocal Points Learning based Unknown DDoS Attacks Detection -- An Approach To Prevent DDOS Attack Using Real-Time Access Logs Analysis -- A novel method for spam call detection using graph convolutional networks -- The completion of a smart factory research project by concluding a DAO -- An Approach for Tamper-Proof QR Code Using Deep Learning Based-Data Hiding -- Data Analysis, Modeling, and Processing -- Enhanced Energy Characterization and Feature Selection using explainable Non-parametric AGGMM -- Hybrid Method for Short Text Topic Modeling -- AWS: GNNs that Aggregate and add With Self-node representation for Dehydrogenation Enthalpy Prediction -- Utilising Unet3+ for Tooth Segmentation on X-Ray Image -- Group Trip Planning Approach with Travel Time and Ratio Constraints -- When are Latent Topics Useful for Text Mining? Enriching Bag-of- Words Representations with Information Extraction in Thai News Articles -- Assessing Data Quality: An Approach for the Spread of COVID-19 -- Improved U-Net based on Dual Attention Mechanism for Glottis Segmentation and Dysphagia Auxiliary Diagnosis -- The Application of Machine Learning Technique to Soil Salinity Mapping in South of Kazakhstan -- Principal Components Analysis based frameworks for efficient missing data imputation algorithms -- An Integration of Big Data and Blockchain for Strategic Analysis for Schools in Thailand -- Federated Deep Reinforcement Learning - based Bitrate Adaptation for Dynamic Adaptive Streaming over HTTP -- A Multi-Criteria Framework Supporting Sustainability Assessment Considering SDG 7 Targets -- A Novel Software Tool for Fast Multiview Visualization of High-Dimensional Datasets -- A Distilled 2D CNN-LSTM Framework with Temporal Attention Mechanism for Action Recognition -- Data Mining and Machine Learning -- Goal-oriented Classification Measure Based on the Game Theory Concepts -- Comparative Study on Customer Churn Prediction by Using Machine Learning Techniques -- Improving the Expected Goal value in football using Multilayer Perceptron Networks -- A Projected Upper Bound for Mining High Utility Patterns from Interval-Based Event Sequences -- Mitigating Catastrophic Forgetting in Neural Machine Translation through Teacher-Student Distillation with Attention Mechanism -- The Achilles Heel of Artificial Intelligence -- Using machine learning algorithms to explore listeners musical tastes -- Forecasting and Optimization Techniques -- Forecasting performance of GARCH, EGARCH and SETAR non-linear models: an application on the MASI index of the Casablanca stock exchange -- Forecasting of Energy Consumption in the Philippines Using Machine Learning Algorithms -- A Deep Reinforcement Learning-based Multi-Objective Optimization for Crowdsensing-based Air Quality Monitoring Systems -- Healthcare and Medical Applications -- Crime Scene Detection in Surveillance Videos Using Variational AutoEncoder-Based Support Vector Data Description -- Cervical Spine Fracture Detection via Computed Tomography Scan -- Healthcare 4.0 for the improvement of the surgical monitoring Business Process -- Improvement of the Process of Diagnosing Patient’s Condition via Computer Tomography Lung Scans using Neural Networks -- Novel machine learning pipeline for real-time oculometry -- Elitism-based Genetic Algorithm Hyper-heuristic for Solving Real-life Surgical Scheduling Problem -- Speech and Text Processing -- Generation of Arabic Commonsense Explanations -- Automatic Speech Recognition improvement for Kazakh language with Enhanced Language Model -- Relationship Between Linguistic Complexity and MT Errors in the Context of Inflectional Languages -- Differential-Privacy Preserving Trajectory Data Publishing for Road Networks -- Using Text Mining and Tokenization Analysis to Identify Job Performance for Human Resource Management at the University of Phayao -- The task of generating text based on a semantic approach for a low-resource Kazakh language -- Nested Semisupervised Learning for Cross-Note Abbreviation Detection in Vietnamese Clinical Texts -- An Effectiveness of Repeating a Spoken Digit for Speaker Verification.
요약주기
This book constitutes the second part of the proceedings of the 15th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2023, held in Phuket, Thailand, during July 24–26, 2023. The 50 full papers included in this book were carefully reviewed and selected from 224 submissions. They were organized in topical sections as follows: Computer Vision, Cybersecurity and Fraud Detection, Data Analysis, Modeling, and Processing, Data Mining and Machine Learning, Forecasting and Optimization Techniques, Healthcare and Medical Applications, Speech and Text Processing. .
주제
Artificial intelligence.
Computer engineering.
Computer networks .
Image processing, Digital techniques.
Computer vision.
Social sciences, Data processing.
Artificial Intelligence.
Computer Engineering and Networks.
Computer Imaging, Vision, Pattern Recognition and Graphics.
Computer Communication Networks.
Computer Application in Social and Behavioral Sciences.
Computer engineering.
Computer networks .
Image processing, Digital techniques.
Computer vision.
Social sciences, Data processing.
Artificial Intelligence.
Computer Engineering and Networks.
Computer Imaging, Vision, Pattern Recognition and Graphics.
Computer Communication Networks.
Computer Application in Social and Behavioral Sciences.
ISBN
9783031424304
관련 인기대출 도서