LEADER 08350nam a22005295i 4500001 99125540896106421 005 20200630005345.0 006 m o d | 007 cr cnu|||||||| 008 200525s2021 si | o |||| 0|eng d 020 981-15-3383-0 024 7 10.1007/978-981-15-3383-9 |2doi 035 (CKB)4100000011268040 035 (MiAaPQ)EBC6209955 035 (DE-He213)978-981-15-3383-9 035 (PPN)248395858 035 (EXLCZ)994100000011268040 040 MiAaPQ |beng |erda |epn |cMiAaPQ |dMiAaPQ 050 4 Q325.5 |b.A383 2020 072 7 UYQ |2bicssc 072 7 TEC009000 |2bisacsh 072 7 UYQ |2thema 082 0 006.31 |223 245 10 Advanced Machine Learning Technologies and Applications : |bProceedings of AMLTA 2020 / |cedited by Aboul Ella Hassanien, Roheet Bhatnagar, Ashraf Darwish. 250 1st ed. 2021. 264 1 Singapore : |bSpringer Singapore : |bImprint: Springer, |c2021. 300 1 online resource (xxi, 757 pages) : |billustrations 336 text |btxt |2rdacontent 337 computer |bc |2rdamedia 338 online resource |bcr |2rdacarrier 490 1 Advances in Intelligent Systems and Computing, |x2194-5357 ; |v1141 520 This book presents the refereed proceedings of the 5th International Conference on Advanced Machine Learning Technologies and Applications (AMLTA 2020), held at Manipal University Jaipur, India, on February 13 – 15, 2019, and organized in collaboration with the Scientific Research Group in Egypt (SRGE). The papers cover current research in machine learning, big data, Internet of Things, biomedical engineering, fuzzy logic and security, as well as intelligence swarms and optimization. 505 0 Segregating and Recognizing Human Actions from Video Footages using LRCN Technique -- Fall Alert: A Novel Approach to Detect Fall -- Evaluation of Automatic Text Visualization Systems: A Case Study -- Face Recognition Based Attendance System using Real Time Computer Vision Algorithms -- The Impact of Knowledge Management Adoption on the Government Sector’s Performance: The Case of Bahrain -- Video Surveillance for the Crime Detection using Features -- Real-time Neural-net Driven Optimized Inverse-kinematics for a Robotic Manipulator -- A Deep Learning Technique to Countermeasure Video Based Presentation Attacks -- Optimization of Loss Functions for Predictive Soil Mapping -- Natural Language Information Extraction through Non Factoid Question and Answering System -- An Enhanced Differential Evolution Algorithm with New Environmental-based Parameters for Solving Optimization Problems -- Reactive Power Optimization Approach based on Chaotic Particle Swarm Optimization -- Data Mining Model for Better Admissions in Higher Educational Institutions (HEIs) – A Case Study of Bahrain -- The Effectiveness of Renewable Energies Projects in Kuwait - PAAET Solar Energy Project -- Skin Lesion Analyser: An Efficient Seven-Way Multi-Class Skin Cancer Classification Using Mobile Net -- Real-Time Object Detection in Remote Sensing Images using Deep Learning -- Malaria Detection using Convolutional Neural Network -- Drone-Based Face Recognition using Deep Learning -- Traffic Sign Recognition for Self-Driving Cars with Deep Learning -- Identifying the Association Rule to Determine the Possibilities of Cardio Vascular Diseases(CVD) -- Prediction of Service Level Agreement Violation in Cloud Computing using Bayesian Regularization -- A New Methodology for Language Identification in Social Media Code-mixed Text -- Detecting Influencers in Social Networks Through Machine Learning Techniques -- Application and Analysis of K-Means Algorithms on a Decision Support Framework for Municipal Solid Waste Management -- Android Rogue Application Detection using Image Resemblance and Reduced LDA -- An Indexed Non-Probability Skyline Query Processing Framework for Uncertain Data -- Analysis of Operational Control Mode of Intelligent Distribution Grids with Multi-microgrid -- Technical Present Situation based on Micro Grid Operation Control -- Skin Lesion Classification: A Transfer Learning Approach Using Efficient Nets -- Change Footprint Pattern Analysis of Crime Hotspot of Indian Districts -- Itemset Mining based Episode Profiling of Terrorist Attacks using Weighted Ontology -- Enabling Technologies in Banking Industry, Regulatory Technology RegTech and Money Laundering Prevention -- A Cognitive Knowledge Base for Learning Disabilities using Concept Analysis -- Native Monkey Detection using Deep Convolution Neural Network -- Evaluation and Summarization of Student Feedbacks Using Sentiment Analysis -- Predicting Competitive Weight Lifting Performance using Regression and Tree-based Algorithms -- Predicting the Primary Dominant Personality Trait of Perceived Leaders by Mapping Linguistic Cues from Social Media Data onto the Big-Five Model -- Analysis of Users behaviour on Micro Blogging Site using a Topic -- Machine Learning Techniques for Short Term Forecasting of Wind Power Generation -- Integrated Process Management System of Smart Substation Secondary Side based on Practical Scheme -- Research on Forms and Strategies of Alternative Energy Achieved -- Lightweight Access Control Algorithm for Internet of Things -- Named Entity Recognition for Legal Documents -- Visual Speech Processing and Recognition -- Predictive Analytics for Cardiovascular Disease Diagnosis using Machine Learning Techniques -- A Novel Approach for Smart Health Care Recommender System -- Heart Disorder Prognosis employing KNN, ANN, ID3 and SVM -- IoT based Home Security System with Wireless Communication -- Implementation of Internet of Things IoT in Small Business Industry: Case of Bahrain -- A Comparative Study of Model-Free Reinforcement Learning Approaches -- Location Aware Security System for Smart Cities using IoT -- An Assessment Study of Gait Biometric Recognition using Machine Learning -- A Study on Risk Management Practices in Online Banking in Bahrain -- Deep Learning Techniques: An Overview -- A Multilayer Deep Learning Framework For Auto-Content Tagging -- Case Based Reasoning (CBR) based Anemia Severity Detection System (ASDS) Using Machine Learning Algorithm -- ECG Signal Analysis, Diagnosis and Transmission -- The Effect of Real-Time Feedback on Consumer’s Behaviour in the Energy Management Sector: Empirical study -- Synchronization Control in Fractional Discrete-Time Systems with Chaotic Hidden Attractors -- Employment of Cryptographic Modus Operandi based on Trigonometric Algorithm and Resistor Color Code -- Experimental & Dimensional Analysis Approach for Human Energy Required In Wood Chipping Process -- Impact of High-k gate dielectric and Workfunctions Variation on Electrical Characteristics of VeSFET -- Correlating Personality Traits to Different Aspects of Facebook Usage -- Fractional Order control of a Fuel Cell-boost Converter System -- Battery Pack Construction Scheme based on UPS System Reliability -- Study on Land Compensation for High Voltage Transmission Lines in Power Grid based on Easement -- Study on the Terrain of Power Network Construction Expropriation and Legal Risk Prevention. 650 0 Computational intelligence. 650 0 Artificial intelligence. 650 0 Big data. 650 14 Computational Intelligence. |0https://scigraph.springernature.com/ontologies/product-market-codes/T11014 650 24 Artificial Intelligence. |0https://scigraph.springernature.com/ontologies/product-market-codes/I21000 650 24 Big Data. |0https://scigraph.springernature.com/ontologies/product-market-codes/I29120 776 |z981-15-3382-2 700 1 Hassanien, Aboul Ella. |eeditor. |0(orcid)0000-0002-9989-6681 |1https://orcid.org/0000-0002-9989-6681 |4edt |4http://id.loc.gov/vocabulary/relators/edt 700 1 Bhatnagar, Roheet. |eeditor. |4edt |4http://id.loc.gov/vocabulary/relators/edt 700 1 Darwish, Ashraf. |eeditor. |4edt |4http://id.loc.gov/vocabulary/relators/edt 830 0 Advances in Intelligent Systems and Computing, |x2194-5357 ; |v1141 906 BOOK