000 08347nam a22006735i 4500
001 978-3-031-42430-4
003 DE-He213
005 20240423130247.0
007 cr nn 008mamaa
008 230928s2023 sz | s |||| 0|eng d
020 _a9783031424304
_9978-3-031-42430-4
024 7 _a10.1007/978-3-031-42430-4
_2doi
050 4 _aQ334-342
050 4 _aTA347.A78
072 7 _aUYQ
_2bicssc
072 7 _aCOM004000
_2bisacsh
072 7 _aUYQ
_2thema
082 0 4 _a006.3
_223
245 1 0 _aRecent Challenges in Intelligent Information and Database Systems
_h[electronic resource] :
_b15th Asian Conference, ACIIDS 2023, Phuket, Thailand, July 24–26, 2023, Proceedings /
_cedited by Ngoc Thanh Nguyen, Siridech Boonsang, Hamido Fujita, Bogumiła Hnatkowska, Tzung-Pei Hong, Kitsuchart Pasupa, Ali Selamat.
250 _a1st ed. 2023.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2023.
300 _aXXVI, 623 p. 211 illus., 168 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aCommunications in Computer and Information Science,
_x1865-0937 ;
_v1863
505 0 _aComputer Vision -- Fast Camera Motion Compensation Based Kalman Filter And Cascade Association For Multi-object Tracking -- Image-based Reliable Object Localization of UAV Cooperating with Ground Vehicle -- Images Retrieval and Classification for Acute Myeloid Leukemia Blood Cell Using Deep Metric Learning -- Superior automatic screening for human helminthic ova by using self-supervised learning approach-based object classification -- Cybersecurity and Fraud Detection -- Obfuscated Malware Detection: Impacts on Detection Methods -- Estimating Post-OCR Denoising Complexity on Numerical Texts -- Reciprocal Points Learning based Unknown DDoS Attacks Detection -- An Approach To Prevent DDOS Attack Using Real-Time Access Logs Analysis -- A novel method for spam call detection using graph convolutional networks -- The completion of a smart factory research project by concluding a DAO -- An Approach for Tamper-Proof QR Code Using Deep Learning Based-Data Hiding -- Data Analysis, Modeling, and Processing -- Enhanced Energy Characterization and Feature Selection using explainable Non-parametric AGGMM -- Hybrid Method for Short Text Topic Modeling -- AWS: GNNs that Aggregate and add With Self-node representation for Dehydrogenation Enthalpy Prediction -- Utilising Unet3+ for Tooth Segmentation on X-Ray Image -- Group Trip Planning Approach with Travel Time and Ratio Constraints -- When are Latent Topics Useful for Text Mining? Enriching Bag-of- Words Representations with Information Extraction in Thai News Articles -- Assessing Data Quality: An Approach for the Spread of COVID-19 -- Improved U-Net based on Dual Attention Mechanism for Glottis Segmentation and Dysphagia Auxiliary Diagnosis -- The Application of Machine Learning Technique to Soil Salinity Mapping in South of Kazakhstan -- Principal Components Analysis based frameworks for efficient missing data imputation algorithms -- An Integration of Big Data and Blockchain for Strategic Analysis for Schools in Thailand -- Federated Deep Reinforcement Learning - based Bitrate Adaptation for Dynamic Adaptive Streaming over HTTP -- A Multi-Criteria Framework Supporting Sustainability Assessment Considering SDG 7 Targets -- A Novel Software Tool for Fast Multiview Visualization of High-Dimensional Datasets -- A Distilled 2D CNN-LSTM Framework with Temporal Attention Mechanism for Action Recognition -- Data Mining and Machine Learning -- Goal-oriented Classification Measure Based on the Game Theory Concepts -- Comparative Study on Customer Churn Prediction by Using Machine Learning Techniques -- Improving the Expected Goal value in football using Multilayer Perceptron Networks -- A Projected Upper Bound for Mining High Utility Patterns from Interval-Based Event Sequences -- Mitigating Catastrophic Forgetting in Neural Machine Translation through Teacher-Student Distillation with Attention Mechanism -- The Achilles Heel of Artificial Intelligence -- Using machine learning algorithms to explore listeners musical tastes -- Forecasting and Optimization Techniques -- Forecasting performance of GARCH, EGARCH and SETAR non-linear models: an application on the MASI index of the Casablanca stock exchange -- Forecasting of Energy Consumption in the Philippines Using Machine Learning Algorithms -- A Deep Reinforcement Learning-based Multi-Objective Optimization for Crowdsensing-based Air Quality Monitoring Systems -- Healthcare and Medical Applications -- Crime Scene Detection in Surveillance Videos Using Variational AutoEncoder-Based Support Vector Data Description -- Cervical Spine Fracture Detection via Computed Tomography Scan -- Healthcare 4.0 for the improvement of the surgical monitoring Business Process -- Improvement of the Process of Diagnosing Patient’s Condition via Computer Tomography Lung Scans using Neural Networks -- Novel machine learning pipeline for real-time oculometry -- Elitism-based Genetic Algorithm Hyper-heuristic for Solving Real-life Surgical Scheduling Problem -- Speech and Text Processing -- Generation of Arabic Commonsense Explanations -- Automatic Speech Recognition improvement for Kazakh language with Enhanced Language Model -- Relationship Between Linguistic Complexity and MT Errors in the Context of Inflectional Languages -- Differential-Privacy Preserving Trajectory Data Publishing for Road Networks -- Using Text Mining and Tokenization Analysis to Identify Job Performance for Human Resource Management at the University of Phayao -- The task of generating text based on a semantic approach for a low-resource Kazakh language -- Nested Semisupervised Learning for Cross-Note Abbreviation Detection in Vietnamese Clinical Texts -- An Effectiveness of Repeating a Spoken Digit for Speaker Verification.
520 _aThis book constitutes the second part of the proceedings of the 15th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2023, held in Phuket, Thailand, during July 24–26, 2023. The 50 full papers included in this book were carefully reviewed and selected from 224 submissions. They were organized in topical sections as follows: Computer Vision, Cybersecurity and Fraud Detection, Data Analysis, Modeling, and Processing, Data Mining and Machine Learning, Forecasting and Optimization Techniques, Healthcare and Medical Applications, Speech and Text Processing. .
650 0 _aArtificial intelligence.
650 0 _aComputer engineering.
650 0 _aComputer networks .
650 0 _aImage processing
_xDigital techniques.
650 0 _aComputer vision.
650 0 _aSocial sciences
_xData processing.
650 1 4 _aArtificial Intelligence.
650 2 4 _aComputer Engineering and Networks.
650 2 4 _aComputer Imaging, Vision, Pattern Recognition and Graphics.
650 2 4 _aComputer Communication Networks.
650 2 4 _aComputer Application in Social and Behavioral Sciences.
700 1 _aNguyen, Ngoc Thanh.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aBoonsang, Siridech.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aFujita, Hamido.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aHnatkowska, Bogumiła.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aHong, Tzung-Pei.
_eeditor.
_0(orcid)
_10000-0001-7305-6492
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aPasupa, Kitsuchart.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aSelamat, Ali.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031424298
776 0 8 _iPrinted edition:
_z9783031424311
830 0 _aCommunications in Computer and Information Science,
_x1865-0937 ;
_v1863
856 4 0 _uhttps://doi.org/10.1007/978-3-031-42430-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c186721
_d186721