{"title":"Template Matching for Kinship Verification in the Wild","authors":"Aarti Goyal, T. Meenpal","doi":"10.1007/978-981-13-9042-5_22","DOIUrl":"https://doi.org/10.1007/978-981-13-9042-5_22","url":null,"abstract":"","PeriodicalId":189728,"journal":{"name":"Computational Intelligence in Pattern Recognition","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116807003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Energy Management in Microgrids Using Flower Pollination Algorithm","authors":"M. De, G. Das, K. Mandal","doi":"10.1007/978-981-13-9042-5_47","DOIUrl":"https://doi.org/10.1007/978-981-13-9042-5_47","url":null,"abstract":"","PeriodicalId":189728,"journal":{"name":"Computational Intelligence in Pattern Recognition","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116144514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Q-Learning Approach for Sales Prediction in Heterogeneous Information Networks","authors":"Sadhana Kodali, Madhavi Dabbiru, B. T. Rao","doi":"10.1007/978-981-13-9042-5_72","DOIUrl":"https://doi.org/10.1007/978-981-13-9042-5_72","url":null,"abstract":"","PeriodicalId":189728,"journal":{"name":"Computational Intelligence in Pattern Recognition","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115273298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Das, A. Tabassum, Sayema Sadaf, Ditipriya Sinha
{"title":"Attack Prevention Scheme for Privacy Preservation (APSP) Using K Anonymity in Location Based Services for IoT","authors":"A. Das, A. Tabassum, Sayema Sadaf, Ditipriya Sinha","doi":"10.1007/978-981-13-9042-5_23","DOIUrl":"https://doi.org/10.1007/978-981-13-9042-5_23","url":null,"abstract":"","PeriodicalId":189728,"journal":{"name":"Computational Intelligence in Pattern Recognition","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115659516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Reversible Image Watermarking Using Xilinx System Generator","authors":"Subhajit Das, A. Sunaniya","doi":"10.1007/978-981-13-9042-5_19","DOIUrl":"https://doi.org/10.1007/978-981-13-9042-5_19","url":null,"abstract":"","PeriodicalId":189728,"journal":{"name":"Computational Intelligence in Pattern Recognition","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123114313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Shuffled Differential Evolution Algorithm Based Combined Heat and Power Emission Dispatch","authors":"S. Nagaraju, A. Srinivasreddy, K. Vaisakh","doi":"10.1007/978-981-13-9042-5_36","DOIUrl":"https://doi.org/10.1007/978-981-13-9042-5_36","url":null,"abstract":"","PeriodicalId":189728,"journal":{"name":"Computational Intelligence in Pattern Recognition","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123674368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Gamma-Levy Hybrid MetaHeuristic for HyperParameter Tuning of Deep Q Network","authors":"Abhijit Banerjee, D. Ghosh, Suvrojit Das","doi":"10.1007/978-981-13-9042-5_54","DOIUrl":"https://doi.org/10.1007/978-981-13-9042-5_54","url":null,"abstract":"","PeriodicalId":189728,"journal":{"name":"Computational Intelligence in Pattern Recognition","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125330296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fast Approach for Text Region Detection from Images on Online Social Media","authors":"Ashish Kumar Layek, Sekhar Mandal, Saptarshi Ghosh","doi":"10.1007/978-981-13-9042-5_31","DOIUrl":"https://doi.org/10.1007/978-981-13-9042-5_31","url":null,"abstract":"","PeriodicalId":189728,"journal":{"name":"Computational Intelligence in Pattern Recognition","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126064053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}