![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
INTAP 2020: Gjøvik, Norway
- Sule Yildirim Yayilgan
, Imran Sarwar Bajwa
, Filippo Sanfilippo
:
Intelligent Technologies and Applications - Third International Conference, INTAP 2020, Gjøvik, Norway, September 28-30, 2020, Revised Selected Papers. Communications in Computer and Information Science 1382, Springer 2021, ISBN 978-3-030-71710-0 - Syed Taimoor Hussain Shah, Shahzad Ahmad Qureshi
, Aziz ul Rehman
, Syed Adil Hussain Shah, Jamal Hussain:
Classification and Segmentation Models for Hyperspectral Imaging - An Overview. 3-16 - Frode Eika Sandnes
:
Exploring Circular Hough Transforms for Detecting Hand Feature Points in Noisy Images from Ghost-Circle Patterns. 17-26 - Dimitra Triantafyllou, Alexandros Kanlis, Stelios Krinidis
, Georgios Stavropoulos, Dimosthenis Ioannidis, Iraklis Chatziparasidis
, Dimitrios Tzovaras
:
Occupancy Flow Control - Case Study: Elevator Cabin. 27-38 - Filip Holík
:
Protecting IoT Devices with Software-Defined Networks. 41-52 - Alexander D. Forfot
, Grethe Østby
:
Digital Forensic Readiness in IoT - A Risk Assessment Model. 53-64 - Filip Holík
:
System Requirements of Software-Defined IoT Networks for Critical Infrastructure. 65-77 - Wajeeha Nasar
, Anniken Susanne Thoresen Karlsen
, Ibrahim A. Hameed, Saumitra Dwivedi
:
An Optimized IoT-Based Waste Collection and Transportation Solution: A Case Study of a Norwegian Municipality. 78-90 - Emaduddin Shah, Muhammad Kamran Ahsan, Ibtesam Mazahir:
Machine Learning Based Methodology for Depressive Sentiment Analysis. 93-99 - Michael Osadebey, Marius Pedersen, Dag Waaler:
Simultaneous Artefact-Lesion Extraction for Skin Cancer Diagnosis. 100-112 - Ayan Chatterjee, Martin W. Gerdes, Andreas Prinz, Santiago Martinez
:
A Statistical Study to Analyze the Impact of External Weather Change on Chronic Pulmonary Infection in South Norway with Machine Learning Algorithms. 113-124 - Per-Arne Andersen, Morten Goodwin, Ole-Christoffer Granmo:
Interpretable Option Discovery Using Deep Q-Learning and Variational Autoencoders. 127-138 - Patrick Ribu Gorton
, Kai Olav Ellefsen
:
Evaluating Predictive Deep Learning Models. 139-150 - Sule Yildirim Yayilgan
, Blend Arifaj, Masoomeh Rahimpour, Jon Yngve Hardeberg, Lule Ahmedi
:
Pre-trained CNN Based Deep Features with Hand-Crafted Features and Patient Data for Skin Lesion Classification. 151-162 - Yen-Ting Lee, Thitinun Pengying, Sule Yildirim Yayilgan
, Ogerta Elezaj:
Data-Driven Machine Learning Approach for Human Action Recognition Using Skeleton and Optical Flow. 163-175 - Hareesh Mandalapu, Raghavendra Ramachandra, Christoph Busch:
Multilingual Voice Impersonation Dataset and Evaluation. 179-188 - Jag Mohan Singh, Ahmed Madhun, Guoqiang Li, Raghavendra Ramachandra:
A Survey on Unknown Presentation Attack Detection for Fingerprint. 189-202 - Jag Mohan Singh, Raghavendra Ramachandra, Christoph Busch:
Hierarchical Interpolation of Imagenet Features for Cross-Dataset Presentation Attack Detection. 203-214 - Hareesh Mandalapu, Thomas Møller Elbo, Raghavendra Ramachandra, Christoph Busch:
Cross-lingual Speaker Verification: Evaluation on X-Vector Method. 215-226 - Jag Mohan Singh, Raghavendra Ramachandra, Patrick Bours:
Fusion of Texture and Optical Flow Using Convolutional Neural Networks for Gender Classification in Videos. 227-236 - Muhammad Adrezo
, Yo-Ping Huang, Frode Eika Sandnes
:
A PM 2.5 Forecasting Model Based on Air Pollution and Meteorological Conditions in Neighboring Areas. 239-250 - Filippo Sanfilippo
, Min Tang, Sam Steyaert:
The Aquatic Surface Robot (AnSweR), a Lightweight, Low Cost, Multipurpose Unmanned Research Vessel. 251-265 - Reza Soufizadeh
, Jamshid Bagherzadeh
:
Empirical Analysis of Data Mining Techniques in Network Intrusion Detection Systems. 269-279 - Ferhat Özgür Çatak
, Sule Yildirim Yayilgan
:
Deep Neural Network Based Malicious Network Activity Detection Under Adversarial Machine Learning Attacks. 280-291 - Berrak Alara Baransel, Alper Peker, Hilmi Omer Balkis, Ismail Ari
:
Towards Low Cost and Smart Load Testing as a Service Using Containers. 292-302 - Yasir Javed
, Qasim Ali Arain
, Mamdouh Alenezi
:
SecurityGuard: An Automated Secure Coding Framework. 303-310 - Anahita Golrang
, Sule Yildirim Yayilgan
, Ogerta Elezaj:
The Multi-objective Feature Selection in Android Malware Detection System. 311-322 - Georgios Stavropoulos, Dimitra Triantafyllou, Elpiniki Makri, Zoltán Székely, Dimitrios Tzovaras
:
Border Management Systems: How Can They Help Against Pandemics. 325-334 - Zachary J. Goldberg
:
Translating Ethical Theory into Ethical Action: An Ethic of Responsibility Approach to Value-Oriented Design. 335-343 - Mohamed Abomhara
, Sule Yildirim Yayilgan
:
An Example of Privacy and Data Protection Best Practices for Biometrics Data Processing in Border Control: Lesson Learned from SMILE. 344-358 - Kalpesh Prajapati, Vishal M. Chudasama, Heena Patel, Kishor P. Upla, Raghavendra Ramachandra, Kiran B. Raja, Christoph Busch:
Unsupervised Single Image Super-Resolution Using Cycle Generative Adversarial Network. 359-370 - Ogerta Elezaj, Sule Yildirim Yayilgan
, Edlira Kalemi:
Criminal Network Community Detection in Social Media Forensics. 371-383 - Athar Khodabakhsh
, Sule Yildirim Yayilgan
:
Data Privacy in IoT Equipped Future Smart Homes. 384-391 - Iva Kostov
:
Machine Learning and the Legal Framework for the Use of Passenger Name Record Data. 392-403 - Erick Elejalde
, Damianos Galanopoulos, Claudia Niederée
, Vasileios Mezaris:
Migration-Related Semantic Concepts for the Retrieval of Relevant Video Content. 404-416 - Sule Yildirim Yayilgan, Imran Sarwar Bajwa, Filippo Sanfilippo:
Correction to: Intelligent Technologies and Applications.
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.