Home > Computing and Information Technology > Computer science > Artificial intelligence > Computer vision > Intelligent Computing Theories and Application: 15th International Conference, ICIC 2019, Nanchang, China, August 3–6, 2019, Proceedings, Part I(11643 Lecture Notes in Computer Science)
36%
Intelligent Computing Theories and Application: 15th International Conference, ICIC 2019, Nanchang, China, August 3–6, 2019, Proceedings, Part I(11643 Lecture Notes in Computer Science)

Intelligent Computing Theories and Application: 15th International Conference, ICIC 2019, Nanchang, China, August 3–6, 2019, Proceedings, Part I(11643 Lecture Notes in Computer Science)

          
5
4
3
2
1

Available


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

This two-volume set of LNCS 11643 and LNCS 11644 constitutes - in conjunction with the volume LNAI 11645 - the refereed proceedings of the 15th International Conference on Intelligent Computing, ICIC 2019, held in Nanchang, China, in August 2019. The 217 full papers of the three proceedings volumes were carefully reviewed and selected from 609 submissions. The ICIC theme unifies the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. The theme for this conference is “Advanced Intelligent Computing Methodologies and Applications.” Papers related to this theme are especially solicited, including theories, methodologies, and applications in science and technology.

Table of Contents:
Solving Symmetric and Asymmetric Traveling Salesman Problems Through Probe Machine with Local Search.- An Evolutionary Algorithm based on Multi-operator Ensemble for Multi-objective Optimization.- Water Evaporation Optimization Algorithm based on Classification and Unbiased Search.- A discrete sine cosine algorithm for community detection.- Automatical Pulmonary Nodule Detection by Feature Contrast Learning.- Unsupervised Cross-Domain Person Re-Identification Based on Style Transfer.- Improving Object Detection by Deep Networks with Class-related Features.- Dynamic Neural Network for Business and Market Analysis.- ψ-type synchronization of memristor-based competitive neural networks with time-varying delays via nonlinear feedback control.- A Computer Immune Optimization Algorithm Based on Group Evolutionary Strategy*.- Sound field reproduction in reverberant room using the Alternating Direction Method of Multipliers based Lasso and regularized Least-Square.- Improvement of Image Reconstruction Algorithm Based on CS.- Automatic Badminton Action Recognition Using CNN with Adaptive Feature Extraction on Sensor Data.- A Deep Learning Model for Multi-Label Classification Using Capsule Networks.- Bundled Round Bars Counting Based on Iteratively Trained SVM.- Combining LSTM Network Model and Wavelet Transform for Predicting Self-interacting Proteins.- Coarse-to-Fine Supervised Descent Method for Face Alignment.- Prediction of Chemical Oxygen Demand in Sewage Based on Support Vector Machine and Neural Network.- Relaxed 2-D Principal Component Analysis By Lp Norm For Face Recognition.- Palm Recognition Using the Adaptive LWT Based Sparse Representation Method.- Dislocation Theory Based Level Set Image Segmentation.- Out-of-stock Detection Based on Deep Learning.- A Fractional-order Variational Residual CNN for Low Dose CT Image Denoising.- CNN-SIFT Consecutive Searching and Matching for Wine Label Retrieval.- Image Denoising via Multiple Images Nonlocally Means and Residual Tensor Decomposition.- Identification of apple tree trunk diseases based on improved convolutional neural network with fused loss functions.- Mirror PCA: exploiting facial symmetry for feature extraction.- Face Image Super-Resolution via Sparse Representation and Local Texture Constraints.- Convolutional Capsule-based Network for Person Re-Identification.- Plant Leaf Recognition Based on Conditional Generative Adversarial Nets.- Leaf Recognition Based on Capsule Network.- Image Segmentation Based on Local Chan-Vese Model Combined with Fractional Order Derivative.- Deep learning based fluid segmentation in retinal optical coherence tomography images.- An Authentication Scheme in VANETs Based on Group Signature.- Malware Detection in Android System Based on Change Perception.- Model Analysis and Prediction of People’s Travel Behaviors Under No Shared Bicycles.- Research on Security Vulnerabilities Based on Artificial Intelligence.- Privacy Preservation Based on Key Attribute and Structure Generalization of Social Network for Medical Data Publication.- EmoSens – the Proposal of System for Recognition of Emotion with SDK Affectiva and various sensors.- Smart-Scrolling: Improving Information Access Performance in Linear Layout Views for Small-Screen Devices.- Scalable Distributed Genetic Algorithm using Apache Spark (S-GA).- EEG-based Seizure Diagnosis Using Discriminative Fractal Features From Feature Selection.- Classifying Mixed Patterns of Proteins in High-throughput Microscopy Images Using Deep Neural Networks.- Integration of Multimodal Data for Breast Cancer Classification Using a Hybrid Deep Learning Method.- Liver Segmentation in CT Images with Adversarial Learning.- Cascade Dense-unet for Prostate Segmentation in MR Images.- A Percolation Algorithm to Discover Emerging Research Topics.- Designing and Implementing Mobile Robot Navigation Based on Behavioral Programming.- Weed Recognition in Wheat Field based on Sparse Representation Classification.- AutomaticCloud Segmentation Based on Fused Fully Convolutional Networks.- Label Propagation Based Semi-supervised Feature Selection to Decode Clinical Phenotype of Huntington’s Disease.- Urine Sediment Detection Based on Deep Learning.- Identification of Apple Leaf Diseases Based on Convolutional Neural Network.- Multiomics data analysis using tensor decomposition based unsupervised feature extraction.- Sequence-based prediction of hot spots in protein-RNA complexes using an ensemble approach.- Realtime Computer Vision-based Accurate Vehicle Counting and Speed Estimation for Highways.- Comparison of Various Weighted K-Nearest Neighbor Methods for Positioning Systems Using Visible LED Lights.- Parameters Optimization for Support Vector Regression based Indoor Visible Light Localization.- A Novel Mechanism of Position Update in Multi-objective Particle Swarm Optimization.- A New Multi-objective Particle Swarm Optimization Based on Linear Decreasing Velocity Update Mechanism.- Cluster-head Selection for Energy-harvesting IoT Devices in Multi-tier 5G Cellular Networks.- Segmenting Crop Disease Leaf Image by Modified Fully-Convolutional Networks.- A Recognition Method for Italian Alphabet Gestures Based on Convolutional Neural Network.- Two-stage Algorithm for Solving Multi-Depot Green Vehicle Routing Problem with Time Window.- Hybrid Cross-entropy Algorithm for Mixed Model U-shaped Assembly Line Balancing Problem.- Study on medical image report generation based on improved encoding-decoding method.- Multi-verse Optimization Algorithm for Solving Two-dimensional TSP.- A quaternion’s encoding sine cosine algorithm.- A Complex-valued Encoding Moth-flame Optimization Algorithm for Global Optimization.- An Enhanced Whale Optimization Algorithm with Simplex Method.- BFPA: Butterfly Strategy Flower Pollination Algorithm.- Artificial Neural Network Hyperparameter Optimisation for Network Intrusion Detection.


Best Sellers


Product Details
  • ISBN-13: 9783030267629
  • Publisher: Springer Nature Switzerland AG
  • Publisher Imprint: Springer Nature Switzerland AG
  • Height: 235 mm
  • No of Pages: 768
  • Series Title: 11643 Lecture Notes in Computer Science
  • Spine Width: 41 mm
  • Weight: 1105 gr
  • ISBN-10: 3030267628
  • Publisher Date: 24 Jul 2019
  • Binding: Paperback
  • Language: English
  • Returnable: Y
  • Series Title: Information Systems and Applications, incl. Internet/Web, and HCI
  • Sub Title: 15th International Conference, ICIC 2019, Nanchang, China, August 3–6, 2019, Proceedings, Part I
  • Width: 155 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Intelligent Computing Theories and Application: 15th International Conference, ICIC 2019, Nanchang, China, August 3–6, 2019, Proceedings, Part I(11643 Lecture Notes in Computer Science)
Springer Nature Switzerland AG -
Intelligent Computing Theories and Application: 15th International Conference, ICIC 2019, Nanchang, China, August 3–6, 2019, Proceedings, Part I(11643 Lecture Notes in Computer Science)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Intelligent Computing Theories and Application: 15th International Conference, ICIC 2019, Nanchang, China, August 3–6, 2019, Proceedings, Part I(11643 Lecture Notes in Computer Science)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA