Cargando…

Advanced Machine Learning Technologies and Applications First International Conference, AMLTA 2012, Cairo, Egypt, December 8-10, 2012, Proceedings /

This book constitutes the refereed proceedings of the First International Conference on Advanced Machine Learning Technologies and Applications, AMLTA 2012, held in Cairo, Egypt, in December 2012. The 58 full papers presented  were carefully reviewed and selected from  99 intial  submissions. The pa...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Hassanien, Aboul Ella (Editor ), Salem, Abdel-Badeeh M. (Editor ), Ramadan, Rabie (Editor ), Kim, Tai-hoon (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012.
Edición:1st ed. 2012.
Colección:Communications in Computer and Information Science, 322
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Part I: Rough Sets and Applications
  • Rough Sets-Based Machine Learning over Non-deterministic Data: A Brief Survey
  • A Role of (Not) Crisp Discernibility in Rough Set Approach to Numeric Feature Selection
  • Learning a Table from a Table with Non-deterministic Information: A Perspective
  • Parameterised Fuzzy Petri Nets for Approximate Reasoning in Decision Support Systems
  • New Method for Finding Rules in Incomplete and Distributed Information Systems Controlled by Reducts
  • Rough Sets-Based Rules Generation Approach: A Hepatitis C Virus Data Sets
  • Mammogram Segmentation Using Rough k-Means and Mass Lesion Classification with Artificial Neural Network
  • Part II: Machine Learning in Pattern Recognition and Image Processing Automatic Color Image Segmentation Based on Illumination Invariant and Superpixelization
  • CBARS: Cluster Based Classification for Activity Recognition Systems
  • Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces
  • Solving Avatar Captchas Automatically
  • Comparative Analysis of Image Fusion Techniques in Remote Sensing
  • Density Based Fuzzy Thresholding for Image Segmentation
  • Subjectivity and Sentiment Analysis of Arabic: A Survey
  • Part III: Machine Learning in Multimedia Computing
  • Support Vector Machine Approach for Detecting Events in Video Streams
  • Study of Feature Categories for Musical Instrument Recognition
  • Towards a Characterization of Musical Timbre Based on Chroma Contours
  • Augmenting Interaction Possibilities between People with Mobility Impairments and Their Surrounding Environment
  • A Genetic-CBR Approach for Cross-Document Relationship Identification
  • Improved Action Recognition Using an Efficient Boosting Method
  • Towards Smart Egypt -The Role of Large Scale WSNs
  • Arabic Sign Language Recognition System Based on Adaptive Pulse-Coupled Neural Network
  • Surface Mining Signal Discrimination Using Landsat TM Sensor: An Empirical Approach
  • Design Space Exploration for High Availability drFPGA Based Embedded Systems
  • Part IV: Bioinformatics and Cheminformatics
  • Trends and Applications
  • LWDOSM: Language for Writing Descriptors of Outline Shape of Molecules
  • Web Service Based Approach for Viral Hepatitis Ontology Sharing and Diagnosing
  • Analysis of Scintigraphic Renal Dynamic Studies: An Image Processing Tool for the Clinician and Researcher
  • Combining Multiple Individual Clusterings of Chemical Structures Using Cluster-Based Similarity Partitioning Algorithm
  • SampleBoost for Capsule Endoscopy Categorization and Abnormality Detection
  • Advanced Parallel Genetic Algorithm with Gene Matrix for Global Optimization
  • Combining Multiple K-Means Clusterings of Chemical Structures Using Cluster-Based Similarity Partitioning Algorithm
  • Part V: Data Classification and Clustering Theory and Applications
  • Soft Flexible Overlapping Biclustering Utilizing Hybrid Search Strategies
  • Semi-possibilistic Biclustering Applied to Discrete and Continuous Data
  • A Comparative Study of Localization Algorithms in WSNs
  • Sentiment Classification Using Graph Based Word Sense Disambigution
  • Test Cases Automatic Generator (TCAG): A Prototype
  • Support Vector Machines with Weighted Powered Kernels for Data Classification
  • Named Entity Based Document Similarity with SVM-Based Re-ranking for Entity Linking
  • Part VI: Cloud Computing and Recommender Systems Cloud Model-A Bidirectional Cognition Model between Concept's Extension and Intension
  • An Enhanced Cloud-Based View Materialization Approach for Peer-to-Peer Architecture
  • An Enhanced Resource Allocation Approach for Optimizing Sub Query on Cloud
  • Food Recommendation Using Ontology and Heuristics
  • A Population Based Feature Subset Selection Algorithm Guided by Fuzzy Feature Dependency
  • Adapting Voting Techniques for Online Forum Thread Retrieval
  • On the Use of Data Mining Techniques in Vehicular Ad Hoc Network.-Part VII: Case-Based Reasoning and Data Processing
  • Comparative Study of Data Quality Dimensions for Data Warehouse Development: A Survey
  • A General Framework for Measuring Information and Communication Technology Investment: Case Study of Kingdom of Saudi Arabia
  • Learning and Applying Range Adaptation Rules in Case-Based Reasoning Systems
  • Integration of Neural Network Preprocessing Model for OMI Aerosol Optical Depth Data Assimilation
  • Part VIII: Authentication, Digital Forensics and Plagiarism Detection Initial Study of the Content Authentication on Digital Preservation of Cultural Institutions
  • Advanced Encryption Standard Algorithm: Issues and Implementation Aspects
  • Machine Learning Techniques for Fingerprint Identification: A Short Review
  • A Novel Watermarking Approach for Data Integrity and Non-repudiation in Rational Databases
  • Fuzzy Semantic Plagiarism Detection
  • Development of Malaysian Digital Forensics Investigator Competency Identification Methods
  • A Holistic Approach to Duplicate Publication and Plagiarism Detection Using Probabilistic Ontologies
  • Novel Binary Search Algorithm for Fast Tag Detection in Robust and Secure RFID Systems
  • A New Dynamic Hash Algorithm in Digital Signature
  • Design of Adaptive IDS with Regulated Retraining Approach.