default search action
10th SoCPaR 2018: Marrakech, Morocco
- Ana Maria Madureira, Ajith Abraham, Niketa Gandhi, Catarina Silva, Mário Antunes:
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, SoCPaR 2018, Porto, Portugal, December 13-15, 2018. Advances in Intelligent Systems and Computing 942, Springer 2020, ISBN 978-3-030-17064-6 - Michele Della Ventura:
Shaping the Music Perception of an Automatic Music Composition: An Empirical Approach for Modelling Music Expressiveness. 1-10 - Zamali Tarmudi, Norzanah Abd Rahman:
Diverse Ranking Approach in MCDM Based on Trapezoidal Intuitionistic Fuzzy Numbers. 11-21 - Houda Zaim, Mohammed Ramdani, Adil Haddi:
Decision Tree and MCDA Under Fuzziness to Support E-Customer Satisfaction Survey. 22-32 - Ibrahim Almarashdeh, Kamal Eldin Eldaw, Mutasem Alsmadi, Usama Badawi, Firas Haddad, Osama Ahmed Abdelkader, Ghaith M. Jaradat, Ayman Alkhaldi, Yousef Qawqzeh:
Search Convenience and Access Convenience: The Difference Between Website Shopping and Mobile Shopping. 33-42 - Marta Barbosa, Pedro Moreira, Rogério Ribeiro, Luís Coelho:
Automatic Classification and Segmentation of Low-Grade Gliomas in Magnetic Resonance Imaging. 43-50 - Vincent F. Adegoke, Daqing Chen, Ebad Banissi, Safia Barsikzai:
Enhancing Ensemble Prediction Accuracy of Breast Cancer Survivability and Diabetes Diagnostic Using Optimized EKF-RBFN Trained Prototypes. 51-65 - Luís Vilaça, Paula Viana, Pedro Carvalho, Maria Teresa Andrade:
Improving Audiovisual Content Annotation Through a Semi-automated Process Based on Deep Learning. 66-75 - Ana Patrícia Rocha, José Maria Fernandes, Hugo Miguel Pereira Choupina, Maria do Carmo Vilas-Boas, João Paulo Silva Cunha:
Subject Identification Based on Gait Using a RGB-D Camera. 76-85 - Young-Hun Kim, Jaeyoung Kim, Jong-Myon Kim:
Leakage Detection of a Boiler Tube Using a Genetic Algorithm-like Method and Support Vector Machines. 86-93 - Sachin Kumar, Marina I. Nezhurina:
Sentiment Analysis on Tweets for Trains Using Machine Learning. 94-104 - Ryu Fukushima, Kenichi Tamura, Junichi Tsuchiya, Keiichiro Yasuda:
A Genetic Algorithm for Superior Solution Set Search Problem. 105-115 - Marcos Pires, Petia Georgieva:
An Intelligent Tool for Detection of Phishing Messages. 116-125 - Molham Chikhalsouk, Balasubramanian Esakki, Khalid Zhouri, Yassin Nmir:
Discrete Wavelet Transform Application in Variable Displacement Pumps Condition Monitoring. 126-136 - Lígia Sousa, Diogo Braga, Ana Madureira, Luís Pinto Coelho, Francesco Renna:
Characterizing Parkinson's Disease from Speech Samples Using Deep Structured Learning. 137-146 - Yuta Obinata, Kenichi Tamura, Junichi Tsuchiya, Keiichiro Yasuda:
Combinatorial Optimization Method Considering Distance in Scheduling Problem. 147-157 - Se-Jong Kang, Jae-Young Kim, In-Kyu Jeong, M. M. Manjurul Islam, Kichang Im, Jong-Myon Kim:
An Improved Gas Classification Technique Using New Features and Support Vector Machines. 158-166 - Hongran Wang, Kenichi Tamura, Junichi Tsuchiya, Keiichiro Yasuda:
Superior Relation Based Firefly Algorithm in Superior Solution Set Search. 167-176 - Joana Cósta, Catarina Silva, Bernardete Ribeiro:
Learning in Twitter Streams with 280 Character Tweets. 177-184 - Nelson Oliveira, Joana Cósta, Catarina Silva, Bernardete Ribeiro:
Retweet Predictive Model for Predicting the Popularity of Tweets. 185-193 - Abderrazak Chahi, Youssef El Merabet, Yassine Ruichek, Raja Touahni:
Handcrafted Descriptors-Based Effective Framework for Off-line Text-Independent Writer Identification. 194-206 - Cláudio A. D. Silva, Carlos Grilo, Catarina Silva:
Server Load Prediction on Wikipedia Traffic: Influence of Granularity and Time Window. 207-216 - Paulo A. Salgado, Paulo Afonso:
Evolutionary Genes Algorithm to Path Planning Problems. 217-225 - Anouar Yatribi, Mostafa Belkasmi, Fouad Ayoub:
An Efficient and Secure Forward Error Correcting Scheme for DNA Data Storage. 226-237 - João Pedro Dias, Hugo Sereno Ferreira, Angelo Martins:
A Blockchain-Based Scheme for Access Control in e-Health Scenarios. 238-247 - Guilherme Vieira Pinto, João Pedro Dias, Hugo Sereno Ferreira:
Blockchain-Based PKI for Crowdsourced IoT Sensor Information. 248-257 - Shumian Yang, Lianhai Wang, Dawei Zhao, Guangqi Liu, Shuhui Zhang:
The Design of a Cloud Forensics Middleware System Base on Memory Analysis. 258-267 - Siham Arfaoui, Abdelhamid Belmekki, Abdellatif Mezrioui:
Privacy Enhancement of Telecom Processes Interacting with Charging Data Records. 268-277 - Timo Malderle, Matthias Wübbeling, Sven Knauer, Michael Meier:
Warning of Affected Users About an Identity Leak. 278-287 - Daniel José Franco, Rui Miguel Silva, Abdullah Muhammed, Omar Khasro Akram, Andreia Graça:
Network Security Evaluation and Training Based on Real World Scenarios of Vulnerabilities Detected in Portuguese Municipalities' Network Devices. 288-297 - Faouzi Jaïdi:
A Novel Concept of Firewall-Filtering Service Based on Rules Trust-Risk Assessment. 298-307 - Bruno Tavares, Filipe Figueiredo Correia, André Restivo, João Pascoal Faria, Ademar Aguiar:
A Survey of Blockchain Frameworks and Applications. 308-317 - Patrício Domingues, Miguel Frade, João Mota Parreira:
Filtering Email Addresses, Credit Card Numbers and Searching for Bitcoin Artifacts with the Autopsy Digital Forensics Software. 318-328 - Heini Ahde, Sampsa Rauti, Ville Leppänen:
A Survey on the Use of Data Points in IDS Research. 329-337 - Mário Antunes, Carlos Rabadão:
Cybersecurity and Digital Forensics - Course Development in a Higher Education Institution. 338-348 - Ivan Gaidarski, Zlatogor Minchev, Rumen Andreev:
Model Driven Architectural Design of Information Security System. 349-359 - Gonçalo Carnaz, Vítor Beires Nogueira, Mário Antunes, Nuno M. Fonseca Ferreira:
An Automated System for Criminal Police Reports Analysis. 360-369 - Ana Subtil, Maria Rosário de Oliveira, Rui Valadas, António Pacheco, Paulo Salvador:
Detecting Internet-Scale Traffic Redirection Attacks Using Latent Class Models. 370-380 - Kazuhiro Kono, Takaaki Yoshida, Shoken Ohshiro, Noboru Babaguchi:
Passive Video Forgery Detection Considering Spatio-Temporal Consistency. 381-391
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.