Description |
1 online resource (498 pages) |
Series |
Lecture Notes in Computer Science ; 12133 |
|
LNCS Sublibrary, SL3, Information systems and applications, incl. internet/web, and HCI |
|
Lecture notes in computer science ; 12133
|
|
LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI
|
Contents |
Intro -- Preface -- Organization -- Keynotes -- NSP and Its Application Towards Increasing Patient Satisfaction in Assisted Living -- Adaptive and Reliable Decision Making for Multi-modal Biometric Systems -- Explainable AI: From Data to Symbols and Information Granules -- Artificial Intelligence and Image Understanding -- Chosen Challenges of Imbalanced Data Classification -- Contents -- Biometrics and Pattern Recognition Applications -- Transfer Learning Approach in Classification of BCI Motor Imagery Signal -- Abstract -- 1 Introduction -- 2 Materials and Methods |
|
2.1 Transfer Learning for CNNs -- 2.2 Data Sets -- 2.3 Equipment Characteristic -- 2.4 Experiment Construction -- 3 Description of the Data Analysis Procedure -- 3.1 Preprocessing and Training Process -- 3.2 Neural Network Architecture -- 3.3 Comparison of Model Training Process with and Without Transfer Leaning Approach -- 4 Results -- 5 Discussion and Conclusions -- References -- Time Removed Repeated Trials to Test the Quality of a Human Gait Recognition System -- Abstract -- 1 Introduction -- 2 Materials and Method -- 2.1 Materials -- 2.2 Method -- 3 Results and Discussion -- 4 Conclusions |
|
Acknowledgments -- References -- Spiral-Based Model for Software Architecture in Bio-image Analysis: A Case Study in RSV Cell Infection -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed Framework -- 4 Adapted Methodology for Biological Image Analysis -- 4.1 Stages for the Biological Image Processing Component -- 5 Service-Oriented Architecture -- 6 Case Study: Analysis of Cell-to-Cell Variability in RSV Infection -- 7 Conclusions -- References -- Artificial Intelligence System for Drivers Fatigue Detection -- 1 Introduction -- 2 Face Detection and Landmark Discovery |
|
3 Open and Closed Eyes Analysis -- 4 Sample Application Pseudocode -- 5 Summary -- References -- Automatic Marking of Allophone Boundaries in Isolated English Spoken Words -- Abstract -- 1 Introduction -- 2 Database -- 2.1 Phonetic Material -- 2.2 Reference Database Description -- 3 Algorithm for Automatic Marking of Allophones -- 3.1 Combining Reference and Analyzed Signals -- 4 The Cost of Allophone Matching -- 5 Tests and Evaluation of Results -- 6 Conclusions -- Acknowledgments -- References -- Computer Information Systems and Security |
|
Combined State Splitting and Merging for Implementation of Fast Finite State Machines in FPGA -- Abstract -- 1 Introduction -- 2 State of the Art -- 3 Idea of the Approach -- 4 State Merging Procedure -- 5 Estimation of Speed of FSM -- 6 State Splitting Procedure -- 7 Experimental Results -- 8 Conclusion -- Acknowledgements -- References -- Securing Event Logs with Blockchain for IoT -- Abstract -- 1 Introduction -- 1.1 Motivation -- 2 Related Works -- 3 Blockchain-Based Secure Log Solution for IoT -- 3.1 The Proposed Blockchain-Based Secure Log Solution for IoT -- 3.2 Implementation |
Summary |
This book constitutes the proceedings of the 19th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2020, held in Bialystok, Poland, in October 2020. Due to the COVID-19 pandemic the conference has been postponed to October 2020. The 40 full papers presented together with 5 abstracts of keynotes were carefully reviewed and selected from 62 submissions. The main topics covered by the chapters in this book are biometrics, security systems, multimedia, classification and clustering, industrial management. Besides these, the reader will find interesting papers on computer information systems as applied to wireless networks, computer graphics, and intelligent systems. The papers are organized in the following topical sections: biometrics and pattern recognition applications; computer information systems and security; industrial management and other applications; machine learning and high performance computing; modelling and optimization |
Notes |
International conference proceedings |
|
3.3 Results and Discussion |
|
Includes author index |
|
Print version record |
Subject |
Computer networks -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Database management -- Congresses
|
|
Computer networks
|
|
Computer networks -- Security measures
|
|
Database management
|
Genre/Form |
Electronic books
|
|
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Saeed, Khalid (Computer scientist)
|
|
Dvorský, Jiří
|
ISBN |
9783030476793 |
|
3030476790 |
|
3030476782 |
|
9783030476786 |
|
9783030476809 |
|
3030476804 |
|