Search Results - Hierarchical clustering algorithm

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Machine Learning Methods for Behaviour Analysis and Anomaly Detection in Video by Isupova, Olga

    ISBN: 9783319755083
    ISSN: 2190-5053
    Published: Cham : Springer International Publishing, 2018.
    Table of Contents: “…Introduction -- Background -- Proposed Learning Algorithms for Markov Clustering Topic Model -- Dynamic Hierarchical Dirlchlet Process -- Change Point Detection with Gaussian Processes -- Conclusions and Future Work.…”

    Get full text
    Electronic eBook
  2. 2

    The International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2018)

    ISBN: 9783319746906
    ISSN: 2194-5357 ;
    Published: Cham : Springer International Publishing, 2018.
    Table of Contents: “…Content -- -- Part(1) Swarm intelligence and optimzation -- A Hybrid Grey Wolf-Bat Algorithm for Global Optimization -- Fractional Order Sliding Mode PID Controller/Observer for Continuous Nonlinear Switched Systems with PSO Parameter Tuning -- Modified Optimal Foraging Algorithm for Parameters Optimization of Support Vector Machine -- Pareto based Bat Algorithm for Multi Objectives Multiple Constraints Optimization in GMPLS Networks -- Fish Image Segmentation using Salp Swarm Algorithm -- Swarming behaviors of chicken for predicting posts on Facebook branding pages -- Enhancing AGDE algorithm using population size reduction for global numerical optimization -- Simulated Annealing based Quantum Inspired Automatic Clustering Technique -- Hybrid grasshopper optimization algorithm and support vector machines for automatic seizure detection in EEG Signals -- A Novel Genetic Algorithm Based k-means Algorithm for Cluster Analysis -- Pairwise Global Sequence Alignment using Sine-Cosine Optimization Algorithm -- An automated fish species identification system based on crow search algorithm -- Part(2) Fuzzy Logic and applications -- Design and implementation of Fuzzy PID controller into Multi agent Smart Library System Prototype -- Fuzzy Logic controller with color vision system tracking for mobile manipulator robot -- Interactive Fuzzy Cellular Automata for Fast Person Re-Identification -- Decision Support System for Determination of Forces Applied in Orthodontic based on Fuzzy Logic -- Part (3) Advanced Machine Learning and Applications -- Behaviorally-Based Textual Similarity Engine for Matching Job-Seekers with Jobs -- Machine Learning: A Convergence of Emerging Technologies in Computing -- Discrimination of Satellite Signals from Opencast Mining of Mineral Ores of Hematite and Uranium using Digital Image Processing and Geostatistical Algorithms -- Detecting Cross-Site Scripting Attacks using Machine Learning -- Text Mining Approach to Extract Associations between Obesity and Arabic Herbal Plants -- A Reinforcement Learning-based Adaptive Learning System -- Performance Evaluation of SVM-Based Amazighe Named Entity Recognition -- Trained Neural Networks Ensembles Weight Connections Analysis -- An Empirical Analysis of User Behavior for P2P IPTV Workloads -- Intelligent Decision Framework to Explore And control Infection Of Hepatitis C Virus -- Supervised Rainfall Learning Model using Machine Learning Algorithms -- Reducing Stage Weight Estimation Error of Slow Task Detection in MapReduce Scheduling -- Analysis of Complete-Link Clustering for Identifying Multi-attributes Software Quality Data -- Student Profile in E-learning Environment Based on Two-Dimensional Ontologies -- Comparative Sentiment Analysis on a Set of Movie Reviews using Deep Learning Approach -- Medical Equipment Failure Rate Analysis Using Supervised Machine Learning -- Part(4) Big data and classification -- Big-Data Aggregating, Linking, Integrating and Representing using Semantic Web Technologies -- Computer Aided Diagnostic System for Automatic Detection of Brain Tumor through MRI Using Clustering Based Segmentation Technique and SVM Classifier -- Feature selection using Genetic algorithm for big data -- Prediction of Liver Diseases Based on Machine Learning Technique for Big Data -- Stance Detection in Tweets Using a Majority Vote Classifier -- A Comparative Study of Classification Methods for Flash Memory Error Rate Prediction -- Opinion extraction and classification of real time YouTube cooking recipes comments -- A Framework for Big Data Analysis in Smart Cities -- Performance Enhancement of Distributed Clustering for Big Data Analytics -- Open Circuit Fault Diagnosis of Cascaded H-Bridge MLI using k-NN Classifier based on PPCA -- Improved Production Key Performance Indicators (KPI's) Using Intelligent-Manufacturing Execution Systems (I-MES) -- Improving Land-Cover and Crop-Types Classification of Sentinel-2 Satellite Images -- GPU-based CAPSO with N-Dimension Particles -- Machine Learning and Big Data Processing: A Technological Perspective and Review -- Harnessing the power of Big Data in Science -- Building Online Social Network Dataset for Arabic Text Classification -- Breast Cancer Detection and Classification using Thermography: A Review -- An Optimized K-Nearest Neighbor Algorithm for Extending Wireless Sensor Network Lifetime -- Efficient Sentiment Analysis Approach Using Feature Selection and Classifier Ensemble -- Part(5) Intelligent Systems and Applications -- Development of an Ontology Based Solution for Energy Saving Through a Smart Home in the City of Adrar in Algeria -- Embeddings of Categorical Variables for Sequential Data in Fraud Context -- Hybrid Information Filtering Engine for Personalized Job Recommender System -- Behaviorally-Based Textual Similarity Engine for Matching Job-Seekers with Jobs -- Adaptive Task Scheduling on Multicore Processors -- PFastNCA: Parallel Fast Network Component Analysis for gene regulatory network -- Robots That Can Mix Serious With Fun -- Dialect versus MSA Sentiment Analysis -- Energy Aware Optimized Hierarchical Routing Technique for Wireless Sensor Networks -- Multi-filter Score-level Fusion for Fingerprint Verification -- Color Image Segmentation of Fishes with Complex Background in Water -- Analysis of Credit Risk Prediction using ARSkNN -- Dental Age Estimation in East Asian Population with Least Squares Regression -- Text Mining Approach to Analyse Stock Market Movement -- Stock Market Real Time Recommender Model Using Apache Spark Framework -- Patient Fingerprint Minutiae based Medical Image Watermarking and Adaptive Integrity -- Toward a Secure and Robust Medical Image Watermarking in Untrusted Environment -- Gray matter volume abnormalities in the reward system in first-episode patients with major depressive disorder .…”

    Get full text
    Electronic eBook
  3. 3

    Intelligent Distributed Computing XI

    ISBN: 9783319663791
    ISSN: 1860-949X ;
    Published: Cham : Springer International Publishing, 2018.
    Table of Contents: “…Part I: Distributed Algorithms and Optimization -- A Performance Analysis of Self-* Evolutionary Algorithms on Networks with Correlated Failures -- Spatially Structured Evolutionary Algorithms: Graph Degree, Population Size and Convergence Speed -- Heuristic of Anticipation for Fair Scheduling and Resource Allocation in Grid VOs -- On the Applications of Dijkstra's Shortest Path Algorithm in Software Defined Networks -- Part II: Reasoning and Decision Making in Distributed Environments -- Towards a Paraconsistent Approach to Actions in Distributed Information-Rich Environments -- A Modified Vickrey Auction with Regret Minimization for Uniform Alliance Decisions -- Lightweight Cooperative Self-Localization as Support to Traffic Regulation for Autonomous Car Driving -- A New Approach for Vertical Handover between LTE and WLAN Based on Fuzzy Logic and Graph Theory -- Part III: Multi-agent Systems -- Programming the Interaction Space Effectively with ReSpecTX -- Multi-Agent System to Design Next Generation of Airborne Platform -- A Drone-based Building Inspection System using Software-Agents -- Part IV: Data Analysis, Mining and Integration -- Connecting Social Media Data with Observed Hybrid Data for Environment Monitoring -- EUStress: a Human Behaviour Analysis System for Monitoring and Assessing Stress during Exams -- Post Sharing-based Credibility Network for Social Network -- Ontological Hybrid Storage for Security Data -- Part V: Machine Learning -- Wind Power Production Forecasting using Ant Colony Optimization and Extreme Learning Machines -- Convolutional Neural Networks for Four-Class Motor Imagery Data Classification -- Binary Classification of Images for Applications in Intelligent 3D Scanning -- Part VI: Internet of Things and Cloud Computing -- Context Aware Resource and Service Provisioning Management in Fog Computing Systems -- An Argumentative Approach to Smart Home Office Ambient Lighting -- A Recommender System Based on Hierarchical Clustering for Cloud e-Learning -- A Taxonomy of Anomalies in Distributed Cloud Systems: The CRI-Model -- Modeling and Analysis of IoT Energy Resource Exhaustion Attacks -- Part VII: Service-based Distributed Systems -- Service Discovery in Megascale Distributed Systems -- Context-Aware Access Control Model for Services Provided from Cloud Computing -- Reference Architecture for Self-Adaptive Microservice Systems -- Part VIII: WASA 2017 (7th Workshop on Applications of Software Agents) -- Agent-Based Computing in the Internet of Things: a Survey -- Teaching, Learning and Assessment of Agents and Robotics in a Computer Science Curriculum.…”

    Get full text
    Electronic eBook
  4. 4

    Information Technology - New Generations 15th International Conference on Information Technology /

    ISBN: 9783319770284
    ISSN: 2194-5357 ;
    Published: Cham : Springer International Publishing, 2018.
    Table of Contents: “…Part I Cybersecurity -- Safeguarding Personal Health Information: Case Study -- Cybersecurity as People Powered Perpetual Innovation -- Performance Study of the Impact of Security on 802.11ac Networks -- Training Neural Tensor Networks with the Never Ending Language Learner -- PERIA-Framework: A Prediction Extension Revision Image Annotation Framework -- The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan -- Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network -- A Virtual Animated Commentator Architecture for Cybersecurity Competitions -- Malicious Software Classification using VGG16 Deep Neural Network's Bottleneck Features -- Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach) -- A Self Proxy Signature Scheme over NTRU Lattices -- Towards an Ontology of Security Assessment: a core model proposal -- Integration of Mobile Forensic Tool Capabilities -- Deep Packet Inspection: A Key Issue for Network Security -- What Petya/NotPetya Ransomware is and What its Remidiations are -- Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform -- New Techniques for Public Key Encryption with Sender Recovery -- Cloud Intrusion Detection and Prevention system for M-voting application in South Africa -- Protecting Personal Data with Blockchain Technology -- The Role of CAE-CDE in Cybersecurity Education for Workforce Development -- Software Optimizations for DES -- Part II Networking and Wireless Communications -- Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment -- End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks -- Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges -- A Dual canister medicine IoT Dispenser -- Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks -- Denial of service attacks in wireless sensor networks with proposed countermeasures -- Part III Education and Technology -- Internet-Based Education: A New Milestone for Formal Language and Automata Courses -- Teaching Communication Management in Software Projects through Serious Educational Games -- Gamification applied in the teaching of agile Scrum methodology -- An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework -- Part IV Agile Software Testing and Development -- Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects -- Alignment of Requirements and Testing in Agile: an Industrial Experience -- Health Care Information Systems: A Crisis Approach -- Using Correct-by-Construction Software Agile Development -- Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services -- Improving Agile Software Development with Domain Ontologies -- A Stratified Sampling Algorithm for Artificial Neural Networks -- Part V Data Mining/Machine Learning -- Mining ENADE Data from the Ulbra Network Institution -- Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA) -- Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise -- Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets -- Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series -- DeRis: Information system supporting the prediction of default risk in companies -- Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm -- Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics -- A model for hour-wise prediction of mobile device energy availability -- Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model -- A Traffic Light Recognition Device -- An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment -- Reproducible Research in Document Analysis and Recognition -- Music Genre Classification using Data Mining and Machine Learning -- Improving word representations using Paraphrase dataset -- A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions -- Dual Long Short-Term Memory Networks for Sub-Character Representation Learning -- Business Intelligence Dashboard Application for Insurance Cross Selling -- Speech Features Analysis for Tone Language Speaker Discrimination Systems -- Selection of Transformations of Continuous Predictors in Logistic Regression -- Part VI Software Engineering -- A Generic Approach to Efficiently Parallelize Legacy Sequential Software -- Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications -- A Timed Petri Net Model to Specify Scenarios of Video Games -- Survey of Biometric Techniques for Automotive Applications -- A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations -- Budget and User Feedback Control Strategy-based PRMS Scenario Web Application -- A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules -- An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games -- A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies -- Increasing the prediction quality of software defective modules with automatic feature engineering -- Part VII High Performance Computing Architectures -- NSF Noyce Recruitment and Mentorship -- Mining Associations between Two Categories using Unstructured Text Data in Cloud -- A Note on Computational Science Curriculum -- Development of a Local Cloud-Based Bioinformatics Architecture -- Part VIII Computer Vision, Image Processing/Analysis -- A Computer Vision Based Algorithm for Obstacle Avoidance -- The ST-Vis tool for SpatioTemporal Visualization -- Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima -- Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network -- Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation -- Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC Countries -- Part IX Health, Bioinformatics, Pattern Detection and Optimization -- Benefits of Establishing Makerspaces in Distributed Development Environment -- Semantic Description of Healthcare Devices to Enable Data Integration -- Applying transfer learning to QSAR regression models -- Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine -- A Complete Diabetes Management and Care System -- On the use of van der Pauw Technique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim Monitoring -- Part X Potpourri -- Smart Lighting Controlling System: Case Study of Yarmouk University Museum -- Incremental Topology Generated for ANN A Case Study on a Helicopter's Flight Simulation -- Degree Aware Triangulation of Annular Regions -- Heuristic Approaches for the Open-Shop Scheduling Problem -- Continuous State Power-down Systems for Renewable Energy Management -- Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded Systems -- Part XI Short Papers -- Customer services management and satisfaction of Internet-related banking of First National Bank -- BIG IoT - Interconnecting IoT Platforms from different domains - First success story -- Cross-Cultural Perspective of E-Commerce -- Website Usability Requirements: Through the Lens of…”

    Get full text
    Electronic eBook
  5. 5

    Recent Developments in Data Science and Business Analytics Proceedings of the International Conference on Data Science and Business Analytics (ICDSBA- 2017) /

    ISBN: 9783319727455
    ISSN: 2198-7246
    Published: Cham : Springer International Publishing, 2018.
    Table of Contents: “…Part I Marketing and Supply Chain Analytics: Chapter1: Research on Differential Pricing and Coordination Mechanism of Second-Class Supply Chain of New Products and Remanufactured Products -- Chapter2: A study on Cooperation Strategies of Dual Channel Supply Chain Based on Service Level -- Chapter3: The Quality Management of Food Supply Chain in Perspective of Food Safety -- Chapter4: Strategic Customer Behavior with Risk Preference for a Supply Chain Management Based on Double Channel -- Chapter5: Competition and Coordination in Single-supplier Multiple-retailer Supply Chain -- Chapter6: Research on the Construction of Enterprise Brand Competitiveness Evaluation System Based on the Integration of SWOT and AHP Model -- Chapter7: Reflections on the Training Mode of E-commerce Professionals with improved Practical Exercises and Innovative Ability -- Chapter8: Research on Evaluating Marketing Ability of Traditional Chinese Medicine Enterprises in Gansu Province -- Part II: Logistics and Operations Analytics: Chapter9: The Impact of the Relationship between Operational Cost and Oil Prices on Economic Assessment in Oil and Gas Industry -- Chapter10: The Construction of University Students' Entrepreneurship Competency Model in Application-Oriented Universities -- Chapter11: Improving Airport Security Screening System in Terms of Efficiency and Fairness Via Network Model -- Chapter12: Study on the Choice of Strategic Emerging Industries in Gansu Province Based on Multi-level Grey Model -- Chapter13: The Study of "Big Quality" Satisfaction Evaluation -- Chapter14: Research on Evaluation Index System of Enterprise Brand Competitiveness - Taking Liquor Industry as an Example -- Chapter15: Simulation of Stochastic Volatility Variance Swap -- Chapter16: Empirical Research of the Contribution Rate of University Science and Technology to the Regional Economic Development -- Chapter17: Research on Incentive Strategy of Logistics Outsourcing about Manufacturing Enterprises -- Chapter18: Research on External Quality Inspection Technology of Tropical Fruits Based on Computer Vision -- Chapter19: Wholesale Price Contract and Quantity Discount Contract under Competition with Various Games -- Chapter20: Evaluation of Science and Technology Service Industry in Shandong Province -- Part III: Financial Analytics: Chapter21: CEO's Background Characteristics, Financing Preference and Firm Performance-----Empirical Evidence from China's A-share Listed Companies -- Chapter22: Security Risk Management Approach for Improving Information Security Return of Investment -- Chapter23: Comparative Analysis on Investment and Financing Models of Urban Rail Transportation -- Chapter24: Measuring Systemic Risk in the Chinese Financial System Based on Asymmetric Exponential Power Distribution -- Chapter25: Research on Liquidity Preferences of Mutual Fund -- Chapter26: Relationship of the Financial Agglomeration and Fiscal Expenditure Scale of Yangtze River Delta -- Chapter27: Applying Data Processing Method for Relationship Discovery in the Stock Market -- Chapter28: A Study on Assets Categorizations and Optimal Allocation via an Improved Algorithm -- Chapter29: Forecasting Stock Price Index Volatility with LSTM Deep Neural Network -- Chapter30: Improvement of Hedging Effect Based on the Average Hedging Ratio -- Chapter31: Finding the Lenders of Bad Credit Score Based on the Classification Method -- Part IV: Chapter32: Research Status and Prospect of Data Extraction and Cleaning Technology in Large Environment -- Chapter33: Research on Intelligent Sales Platform of Automobile Industry Based on Large Data Mining -- Chapter34: A Local Neighborhood Constraint Method for SIFT Features Matching -- Chapter35: A Wine Consumption Prediction Model Based on L-DAGLSSVM -- Chapter36: Fuzzy Control and Network System Design for Time Series Prediction Model -- Chapter37: Research on Data Storage Based on Cloud Platform -- Chapter38: An Automatic Multi-Objective Clustering based on Hierarchical Method -- Chapter39: Big Data Analytics for High Frequency Trading Volatility Estimation -- Chapter40: A Simulation of Sample Variance Calculation in the Teaching of Business Statistics to English Majors -- Chapter41: Application of Clinical Diagnosis and Treatment Data of Coronary Heart Disease Based on Association Rules -- Chapter42: Bibliometric Analysis of Spatial Econometrics -- Chapter43: Using Diagnostic Analysis to Discover Offensive Patterns in a Football Game -- Chapter44: Fuzzy Game Based on Fuzzy Comparison Operator -- Chapter45: An Analysis of Business English Translation Research in China -- Part V: Chapter46: Optimum Design And Function Improvement Of Mobile Nursing System -- Chapter47: Technology Development and Networking Application of a Mobile Passive Optical Access Network System -- Chapter48: Improvement of E-MIMLSVM+ Algorithm Based on Semi-Supervised Learning -- Chapter49: The Method of Improving Learning Ability of "C Language Programming Design" Course -- Chapter50: Implementation of Koch Curves Based on Html5 -- Chapter51: The Proposal of Centralization Deployment of Cadre Management Information System of SGCC -- Chapter52: Research and Designing of Grounding Fault Diagnosis for Small Current System Based on DsPIC33 and MCP3903 -- Chapter53: Mobile Phone Addiction in Youngsters: Concept and Measurement -- Chapter54: Measurement and Empirical Research of High Technology Industry Development for Mainland China Region -- Chapter55: Sina Weibo User Influence Research.…”

    Get full text
    Electronic eBook