Search Results - "2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR)"

Refine Results
  1. 1

    An innovative approach for feature selection based on chicken swarm optimization by Hafez, Ahmed Ibrahem, Zawbaa, Hossam M., Emary, E., Mahmoud, Hamdi A., Hassanien, Aboul Ella

    “…In this paper, a system for feature selection based on chicken swarm optimization (CSO) algorithm is proposed. Datasets ordinarily includes a huge number of…”
    Get full text
    Conference Proceeding
  2. 2

    Water quality classification approach based on bio-inspired Gray Wolf Optimization by Sweidan, Asmaa Hashem, El-Bendary, Nashwa, Hassanien, Aboul Ella, Hegazy, Osman Mohammed, Mohamed, Abd El-karim

    “…This paper presents a bio-inspired optimized classification approach for assessing water quality. As fish liver histopathology is a good biomarker for…”
    Get full text
    Conference Proceeding
  3. 3

    Ward method of hierarchical clustering for non-Euclidean similarity measures by Miyamoto, Sadaaki, Abe, Ryosuke, Endo, Yasunori, Takeshita, Jun-ichi

    “…The Ward linkage method in agglomerative hierarchical clustering is sometimes used for non-Euclidean similarity, i.e., non-positive definite matrix of…”
    Get full text
    Conference Proceeding
  4. 4

    Global, local and embedded architectures for multiclass classification with foreign elements rejection: An overview by Homenda, Wladyslaw, Jastrzebska, Agnieszka

    “…In the paper we look closely at the issue of contaminated data sets, where apart from proper elements we may have garbage. In a typical scenario, further…”
    Get full text
    Conference Proceeding
  5. 5

    A wrapper approach for feature selection based on swarm optimization algorithm inspired from the behavior of social-spiders by Zawbaa, Hossam M., Emary, E., Hassanien, Aboul Ella, Parv, B.

    “…In this paper, a proposed system for feature selection based on social spider optimization (SSO) is proposed. SSO is used in the proposed system as searching…”
    Get full text
    Conference Proceeding
  6. 6

    Welcome message from program chairs

    “…Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the…”
    Get full text
    Conference Proceeding
  7. 7

    Welcome message from general chair

    “…Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the…”
    Get full text
    Conference Proceeding
  8. 8

    Vertical collaborative clustering using generative topographic maps by Sublime, Jeremie, Grozavu, Nistor, Bennani, Younes, Cornuejols, Antoine

    “…Collaborative clustering is a recent field of Machine Learning that shows similarities with both transfer learning and ensemble learning. It uses two-step…”
    Get full text
    Conference Proceeding
  9. 9

    Hybrid technique for steganography-based on DNA with n-bits binary coding rule by Hamed, Ghada, Marey, Mohammed, El-Sayed, Safaa Amin, Tolba, Mohamed Fahmy

    “…The information capacity is growing significantly as well as its level of importance and its transformation rate. In this paper, a blind data hiding hybrid…”
    Get full text
    Conference Proceeding
  10. 10

    Grey wolf optimization for one-against-one multi-class support vector machines by Elhariri, Esraa, El-Bendary, Nashwa, Hassanien, Aboul Ella, Abraham, Ajith

    “…Grey Wolf Optimization (GWO) algorithm is a new meta-heuristic method, which is inspired by grey wolves, to mimic the hierarchy of leadership and grey wolves…”
    Get full text
    Conference Proceeding
  11. 11

    FTIP: A tool for an image plagiarism detection by Hurtik, Petr, Hodakova, Petra

    “…The goal of this paper is to introduce a task of image plagiarism detection. More specifically, we propose a method of searching for a plagiarized image in a…”
    Get full text
    Conference Proceeding
  12. 12

    Incremental learning of reach-to-grasp behavior: A PSO-based Inverse optimal control approach by El-Hussieny, Haitham, Assal, Samy F. M., Abouelsoud, A. A., Megahed, Said M., Ogasawara, Tsukasa

    “…In recent years, there has been an increasing interest in modeling natural human movements. The main question to be addressed is: what is the optimality…”
    Get full text
    Conference Proceeding
  13. 13

    Detecting spliced face in a group photo using PCA by Vidyadharan, Divya S., Thampi, Sabu M.

    “…Digital image tampering detection has become an active research area in the recent decade. Among the different types of image tampering, manipulation involving…”
    Get full text
    Conference Proceeding
  14. 14

    Face sketch recognition using local invariant features by Tharwat, Alaa, Mahdi, Hani, Hennawy, Adel El, Hassanien, Aboul Ella

    “…Face sketch recognition is one of the recent biometrics, which is used to identify criminals. In this paper, a proposed model is used to identify face sketch…”
    Get full text
    Conference Proceeding
  15. 15

    Leaf shape identification of medicinal leaves using curvilinear shape descriptor by Herdiyeni, Yeni, Lubis, Dicky Iqbal, Douady, Stephane

    “… This study proposes a new algorithm for leaf shape identification of medicinal leaves based on curvilinear shape descriptor. Leaf shape is a very…”
    Get full text
    Conference Proceeding
  16. 16

    Clustering of moving vectors for evolutionary computation by Jun Yu, Takagi, Hideyuki

    “…We propose a method for clustering moving vectors oriented around two different local optima and some methods for improving the clustering performance…”
    Get full text
    Conference Proceeding
  17. 17

    MedLeaf: Mobile biodiversity informatics tool for mapping and identifying Indonesian medicinal Plants by Herdiyeni, Yeni, Ginanjar, Asep Rahmat, Anggoro, M. Rake Linggar, Douady, Stephane, Zuhud, Ervizal A. M.

    “…We presents a mobile biodiversity informatics tools for identifying and mapping Indonesian medicinal plants. The system - called MedLeaf - has been developed…”
    Get full text
    Conference Proceeding
  18. 18

    Automated generation of fuzzy rules from large-scale network traffic analysis in digital forensics investigations by Shalaginov, Andrii, Franke, Katrin

    “…This paper describes ongoing study and first results on the application of Neuro-Fuzzy (NF) to support large-scale forensics investigation in the domain of…”
    Get full text
    Conference Proceeding
  19. 19
  20. 20

    Image encryption scheme for secure digital images based on 3D cat map and Turing machine by Mohamed, Nehal A., El-Azeim, Mostafa A., Zaghloul, Alaa, Abd El-Latif, Ahmed A.

    “…In present time, in order to provide security of multimedia data while transmission and storage processes, the protection of image data can be accomplished…”
    Get full text
    Conference Proceeding