Handbook of research on machine learning techniques for pattern recognition and information security
"This book examines the impact of machine learning techniques on pattern recognition and information security"--
| Other Authors: | , |
|---|---|
| Format: | eBook |
| Language: | English |
| Published: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
IGI Global,
2020.
|
| Subjects: | |
| Online Access: | EBSCOhost Перейти в каталог НБ ТГУ |
Table of Contents:
- Chapter 1. Intelligent vision-based systems for public safety and protection via machine learning techniques
- Chapter 2. Comparative analysis of various soft computing technique-based automatic licence plate recognition systems
- Chapter 3. Impact of syntactical and statistical pattern recognition on prognostic reasoning
- Chapter 4. Challenges and issues in plant disease detection using deep learning
- Chapter 5. Automatic animal detection and collision avoidance system (ADCAS) using thermal camera
- Chapter 6. Distracted driver detection system using deep learning technique
- Chapter 7. Application of deep learning model convolution neural network for effective web information retrieval
- Chapter 8. Cosine transformed chaos function and block scrambling-based image encryption
- Chapter 9. An improved approach for multiple image encryption using alternate multidimensional chaos and Lorenz attractor
- Chapter 10. Simple linear iterative clustering (SLIC) and graph theory-based image segmentation
- Chapter 11. COVID-19 detection using chest x-ray and transfer learning
- Chapter 12. COVID-19-related predictions using NER on news headlines
- Chapter 13. Security issues in fog computing and ML-based solutions
- Chapter 14. Intrusion detection systems: current trends and future challenges
- Chapter 15. Vulnerability assessment and malware analysis of android apps using machine learning
- Chapter 16. Locally-adaptive naïve bayes framework design via density-based clustering for large scale datasets
- Chapter 17. RFID security issues, defenses, and security schemes.
