Suggested Topics within your search.
Suggested Topics within your search.
- Big data 1,565
- Artificial intelligence 1,365
- Computational intelligence 953
- Data mining 772
- Data processing 547
- Computer networks 479
- Application software 478
- Computer science 454
- Machine learning 389
- Management 360
- Engineering 334
- Internet of things 318
- Database management 302
- Information technology 246
- Technological innovations 246
- Business 221
- Cloud computing 204
- Telecommunication 204
- Engineering—Data processing 199
- Electrical engineering 184
- Computers 180
- Medical informatics 176
- Computer security 174
- Statistics 172
- Quantitative research 171
- Computer engineering 168
- Software engineering 167
- Management information systems 165
- Electronic data processing 143
- Computer vision 142
-
6981
-
6982
CYBER SECURITY FOR NEXT-GENERATION COMPUTING TECHNOLOGIES
Published 2024Full text (WIT users only)
Electronic eBook -
6983
Computational methods for next generation sequencing data analysis / edited by Ion Măndoiu, Alexander Zelikovsky.
Published 2016Table of Contents: “…Hallam 2.1 Introduction & Overview 2.2 Background 2.3 MetaPathways Processes 2.3.1 Open Reading Frame (ORF) Prediction 2.3.2 Functional Annotation 2.3.3 Analysis Modules 2.3.4 ePGDB construction 2.4 Big Data Processing 2.4.1 A Master-worker model for grid distribution 2.4.2 GUI and Data Integration 2.5 Downstream Analyses 2.5.1 Large Table Comparisons 2.5.2 Pathway Tools Cellular Overview 2.5.3 R Statistics 2.5.4 VennDiagram 2.5.5 Clustering and Relating Samples by Pathways 2.5.6 Faceting Variables with ggplot2 2.6 Conclusions References 3 Pooling Strategy for Massive Viral Sequencing; Pavel Skums, Alexander Artyomenko, Olga Glebova, Sumathi Ramachandran, David S. …”
Full text (Wentworth users only)
Electronic eBook -
6984
Statistics for Data Science.
Published 2017Table of Contents: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Transitioning from Data Developer to Data Scientist -- Data developer thinking -- Objectives of a data developer -- Querying or mining -- Data quality or data cleansing -- Data modeling -- Issue or insights -- Thought process -- Developer versus scientist -- New data, new source -- Quality questions -- Querying and mining -- Performance -- Financial reporting -- Visualizing -- Tools of the trade -- Advantages of thinking like a data scientist -- Developing a better approach to understanding data -- Using statistical thinking during program or database designing -- Adding to your personal toolbox -- Increased marketability -- Perpetual learning -- Seeing the future -- Transitioning to a data scientist -- Let's move ahead -- Summary -- Chapter 2: Declaring the Objectives -- Key objectives of data science -- Collecting data -- Processing data -- Exploring and visualizing data -- Analyzing the data and/or applying machine learning to the data -- Deciding (or planning) based upon acquired insight -- Thinking like a data scientist -- Bringing statistics into data science -- Common terminology -- Statistical population -- Probability -- False positives -- Statistical inference -- Regression -- Fitting -- Categorical data -- Classification -- Clustering -- Statistical comparison -- Coding -- Distributions -- Data mining -- Decision trees -- Machine learning -- Munging and wrangling -- Visualization -- D3 -- Regularization -- Assessment -- Cross-validation -- Neural networks -- Boosting -- Lift -- Mode -- Outlier -- Predictive modeling -- Big Data -- Confidence interval -- Writing -- Summary -- Chapter 3: A Developer's Approach to Data Cleaning -- Understanding basic data cleaning.…”
Full text (Wentworth users only)
Electronic eBook -
6985
Privacy Rights in the Digital Age / editors, Jane E. Kirtley, Michael Shally-Jensen.
Published 2019Table of Contents: “…., 532 U.S. 514 (2001) -- Beliefs, privacy of -- Big data -- Bioethics -- Biometric Center of Excellence -- Biometric Optical Surveillance System -- Biometrics -- Blockchain technologies -- Body, privacy of the -- Border security, immigration reform, and privacy -- Bots -- Boundless informant -- Brain-computer interfacing (BCI) -- Brandeis, Louis Dembitz -- Caller ID -- Cantrell v. …”
Full text (Wentworth users only)
Electronic eBook -
6986
Connect : how to use data and experience marketing to create lifetime customers / Lars Birkholm Petersen, Ron Person, Christopher Nash.
Published 2014Table of Contents: “…-- Notes -- Chapter 11 Stage 7-Lifetime Customers -- The Lifetime Customers Stage -- Objectives -- Amazon.com, an Example of Stage 7 Maturity -- Benefits of Lifetime Customers -- Benefits to Your Customers -- Benefits to Your Organization -- What You Need to Do to Capture Lifetime Customers -- How to Approach Marketing for Lifetime Customers -- Identifying Processes Critical to Engaging Lifetime Customers -- Cross-Channel Marketing Portfolios -- Data-Driven Marketing and Big Data -- Personalize All Touch Points -- Automatic Recommendations to Optimize Marketing and Forecasting -- Breaking Barriers -- Maintaining Lifetime Customers -- People -- Process -- Technology.…”
Full text (Wentworth users only)
Electronic eBook -
6987
Perspectives in Dynamical Systems I — Applications DSTA, Łódź, Poland, December 6–9, 2021 / edited by Jan Awrejcewicz.
Published 2024Table of Contents: “….) -- Nonlinear Dynamics, Stability and Control Strategies: Mathematical Modeling on the Big Data Analyses of Covid-19 in Poland (Batyuk, L., Kizilova,N.) -- Energy Pulse: Competitive and Accessible Application for Monitoring Electricity Consumption (Berciu, A. …”
Full text (Wentworth users only)
Electronic eBook -
6988
Integration of Heterogeneous Manufacturing Machinery in Cells and Systems : Policies and Practices.
Published 2024Full text (Wentworth users only)
Electronic eBook -
6989
MODERN TECHNOLOGIES AND TOOLS SUPPORTING THE DEVELOPMENT OF INDUSTRY 5.0
Published 2024Full text (Wentworth users only)
Electronic eBook -
6990
-
6991
Internet of things security : principles, applications, attacks, and countermeasures.
Published 2020Table of Contents: “…</p><p> 2.3.2 Components of Business Models</p><p> 2.3.3 Challenges in developing Business Model Frameworks for IoT</p><p> 2.3.4 IoT Business Models</p><p> 2.3.5 Technological Perspective on Business Models</p><p><strong>2.4 Chapter Summary</strong><strong></strong></p><p><strong> </strong></p><p><strong>3 </strong><strong>COMMUNICATION AND DEVELOPMENT PRIMITIVES IN IOT</strong></p><p><strong>3.1 Introduction </strong></p><p><strong>3.2 Communication Protocols, Standards and Policies</strong></p><p><strong>3.3 Design and Development Tools</strong></p><p><strong>3.4 Datasets</strong></p><p><strong>3.5 Chapter Summary</strong><strong></strong></p><p><strong> </strong></p><p><strong>4 </strong><strong>CHALLENGES IN IOT</strong></p><p><strong>4.1 Introduction </strong></p><p><strong>4.2 Challenges associated with IoT Architecture </strong></p><p><strong>4.3 Challenges associated with Entities </strong></p><p><strong>4.4 Technology-oriented Challenges </strong></p><p><strong>4.5 Challenges associated with Features </strong></p><p><strong>4.6 Challenges associated with Development Practices </strong></p><p><strong>4.7 Chapter Summary</strong><strong></strong></p><p><strong> </strong></p><p><strong>5 </strong><strong>DATA EXPLOSION IN IOT</strong></p><p><strong>5.1 Introduction </strong></p><p><strong>5.2 Big Data Definition </strong></p><p><strong>5.3 Underlying Factors for Data Explosion in IoT </strong></p><p><strong>5.4 Key Challenges associated with managing Data Explosion in IoT </strong></p><p><strong>5.5 Technological Support</strong></p><p>5.5.1 Machine Learning</p><p>5.5.2 Artificial Intelligence</p><p>5.5.3 Intelligent Edge Processing</p><p><strong>5.6 Chapter Summary</strong></p><p><strong> </strong></p><p><strong>6 </strong><strong>COMPUTING PARADIGMS AND SECURITY ISSUES IN CONNECTED AND AUTONOMOUS DRIVING VEHICLES</strong></p><p><strong>6.1 Introduction </strong></p><p><strong>6.2 Connected and Autonomous Driving Vehicle (CADV) -- A Technical Background </strong></p><p>6.2.1 Functional Blocks</p><p>6.2.2 Underlying Technologies</p><p>6.2.3 Potential Benefits and Forecasts</p><p><strong>6.3 Computing Paradigms </strong></p><p>6.3.1 Artificial Intelligence (AI)</p><p>6.3.2 Vehicular Cloud Computing (VCC) or Edge Computing</p><p>6.3.3 End-to-End Networking</p><p><strong>6.4 Security Issues and Existing Countermeasures</strong></p><p>6.4.1 Challenges and Countermeasures associated with Computing Paradigms</p><p>6.4.2 Challenges and Countermeasures associated with Participating Entities</p><p><strong>6.5 Ongoing Research Efforts</strong></p><p><strong>6.6 Open Research Challenges </strong></p><p>6.6.1 Deployment and Operational Costs</p><p>6.6.2 Security</p><p>6.6.3 Privacy</p><p>6.6.4 Legal and Ethical Aspects</p><p>6.6.5 Validation and Testing</p><p>6.6.6 Standardization</p><p>6.6.7 Other Aspects</p><p><strong>6.7 Chapter Summary</strong></p><p><strong> </strong></p>…”
Full text (Wentworth users only)
Electronic eBook -
6992
Portfolio construction and analytics / Frank J. Fabozzi, Dessislava Pachamanova.
Published 2016Full text (Wentworth users only)
Electronic eBook -
6993
Privacy Rights in the Digital Age / editors, Jane E. Kirtley, Michael Shally-Jensen.
Published 2019Table of Contents: “…., 532 U.S. 514 (2001) -- Beliefs, privacy of -- Big data -- Bioethics -- Biometric Center of Excellence -- Biometric Optical Surveillance System -- Biometrics -- Blockchain technologies -- Body, privacy of the -- Border security, immigration reform, and privacy -- Bots -- Boundless informant -- Brain-computer interfacing (BCI) -- Brandeis, Louis Dembitz -- Caller ID -- Cantrell v. …”
Full text (Wentworth users only)
Full text (Wentworth users only)
Electronic eBook -
6994
SMART ANTENNAS, ELECTROMAGNETIC INTERFERENCE AND MICROWAVE ANTENNAS FOR WIRELESS COMMUNICATIONS
Published 2023Full text (Wentworth users only)
Electronic eBook -
6995
-
6996
CLOUD OF THINGS foundations, applications, and challenges.
Published 2024Full text (Wentworth users only)
Electronic eBook -
6997
Fundamentals of 5G Communications : Connectivity for Enhanced Mobile Broadband and Beyond / Wanshi Chen, Peter Gaal, Juan Montojo, Haris Zisimopoulos.
Published 2021Table of Contents: “…-- 3.5 Main Functional Entities of the 5G Core -- 3.6 High-Level Features of 5G Core -- 3.7 Network Slicing -- 3.8 QoS -- 3.9 Interworking with Non-3GPP Access Technologies -- 3.10 Policy Control -- 3.11 5G Security -- 3.12 Access Control and Barring -- 3.13 Support for Operator and Regulatory Services -- 3.14 Interworking with EPC -- 3.15 EPC to 5GC Migration -- 4 Evolution of 5G Architecture -- 4.1 Introduction -- 4.2 Non-Public Networks -- 4.3 Cellular V2X -- 4.4 Cellular IoT -- 4.5 "Big Data" Collection (Enhanced Network Automation) -- 4.6 Enhancements to Interworking with Non-3GPP Accesses -- 4.7 URLLC -- 4.8 Slice Authentication -- 4.9 Other Release 16 Features -- 5 Numerology and Slot Structure -- 5.1 Numerology and Slot Structure in 4G LTE -- 5.2 Lessons Learned from 4G LTE and 5G Considerations -- 5.3 SCSs for 5G NR -- 5.4 Frequency Ranges, Bandwidths, and Bands for 5G NR -- 5.5 gNB Channel Bandwidth versus UE Channel Bandwidth -- 5.6 Symbol, Slot, Subframe, and Frame for 5G NR -- 5.7 Slot Structure for 5G NR and Forward Compatibility Considerations -- 6 Initial Access and Mobility -- 6.1 Overview -- 6.2 Initial Access -- 6.3 Random Access -- 6.4 Paging -- 6.5 Mobility -- 7 Downlink Control Operation -- 7.1 Downlink Control in 4G LTE -- 7.2 Control Region Management in 5G NR -- 7.3 PDCCH Structure in 5G NR -- 7.4 Search Space for NR PDCCH -- 7.5 DCI Formats for NR PDCCH -- 7.6 Physical Layer Block Diagram for NR PDCCH -- 7.7 Power Saving Considerations -- 8 Downlink Data Operation -- 8.1 Channel Coding for Data -- 8.2 Channel Code Rate Matching -- 8.3 DL Soft Buffer Management -- 8.4 DL MCS and TBS Determination -- 8.5 DL Resource Allocation in the Time Domain -- 8.6 DL Resource Allocation in the Frequency Domain -- 8.7 DL Rate Matching -- 8.8 DL HARQ Operation -- 8.9 DL Data Rate Capability -- 8.10 Processing Time for DL Data -- 8.11 Demodulation Reference Signals for Data -- 8.12 PDSCH DM-RS -- 8.13 DL Phase Tracking Reference Signal -- 8.14 Channel State Information Reference Signal -- 8.15 Tracking Reference Signal -- 8.16 DL MIMO Scheme -- 8.17 CSI Feedback -- 8.18 Beam Management for the PDSCH -- 8.19 Signal Quasi Co-Location -- 9 Uplink Control Operation -- 9.1 Uplink Control in 4G LTE -- 9.2 UCI Types and Payload Sizes in 5G NR -- 9.3 PUCCH Formats in 5G NR -- 9.4 PUCCH Resource Determination in 5G NR -- 9.5 UCI on PUSCH in 5G NR -- 9.6 Channel Coding for UCI -- 10 Uplink Data Operation -- 10.1 UL MCS and TBS Determination -- 10.2 UL Resource Allocation in the Time Domain -- 10.3 UL Resource Allocation in the Frequency Domain -- 10.4 UL Rate Matching -- 10.5 UL HARQ Operation -- 10.6 UL Soft Buffer Management -- 10.7 UL Data Rate Capability -- 10.8 Processing Time for UL Data -- 10.9 PUSCH DM-RS -- 10.10 UL Phase Tracking Reference Signal -- 10.11 Sounding Reference Signal -- 10.12 UL MIMO Scheme -- 10.13 Beam Management for the PUSCH -- 10.14 UL Power Control -- 10.15 UL Timing -- 11 Coexistence of 4G and 5G -- 11.1 Adjacent Channel Coexistence -- 11.2 Same Channel Coexistence -- 11.3 EN-DC Power Control -- 11.4 Switched EN-DC UL -- 12 5G in Unlicensed and Shared Spectrum -- 12.1 Unlicensed Operation in LTE -- 12.2 Overview -- 12.3 Channel Access -- 12.4 Discovery Burst -- 12.5 Physical Layer Extensions for Uplink -- 12.6 Increased Scheduling Flexibility -- 13 Vertical Expansion: URLLC -- 13.1 A Brief History of 3GPP Standardization Related to URLLC -- 13.2 Use Cases and Deployment Scenarios for 5G NR URLLC -- 13.3 Resource Management for URLLC -- 13.4 Optimizing Link Efficiency for URLLC -- 13.5 Downlink Resource Sharing for Distinct Service Types -- 13.6 Uplink Resource Sharing for Distinct Service Types -- 13.7 Handling Distinct Services at the UE -- 13.8 Other Related Aspects -- 14 Vertical Expansion: MTC -- 14.1 A Brief History of MTC in 3GPP -- 14.2 Key Technical Enablers for eMTC -- 14.3 Key Technical Enablers for NB-IoT -- 14.4 Integration of eMTC and NB-IoT into 5G NR -- 14.5 Future Trends -- 15 5G Vertical Expansion: V2X -- 15.1 Overview -- 15.2 Background: LTE V2X -- 15.3 NR V2X -- 16 Vertical Expansion: Broadcast and Multicast -- 17 Miscellaneous Topics for 5G -- 17.1 Overview -- 17.2 Interference Management -- 17.3 UE Power Savings -- 17.4 NR Positioning -- 17.5 Two-Step RACH -- 17.6 Multi-RAT DC/CA Enhancements -- 17.7 Mobility Enhancements -- 17.8 Integrated Access and Backhaul -- 18 A Look at Typical 5G Commercial Deployments -- 19 5G: What?…”
Full text (Wentworth users only)
Electronic eBook -
6998
-
6999
Mathematical Analysis and Numerical Methods IACMC 2023, Zarqa, Jordan, May 10–12 / edited by Aliaa Burqan, Rania Saadeh, Ahmad Qazza, Osama Yusuf Ababneh, Juan C. Cortés, Kai Dieth...
Published 2024Table of Contents: “…D. Al-Nasser, Fitting Big Data using Structural Measurement Error Model -- S. …”
Full text (Wentworth users only)
Electronic eBook -
7000
Artificial Intelligence and Computational Intelligence 4th International Conference, AICI 2012, Chengdu, China, October 26-28, 2012. Proceedings / edited by Jingsheng Lei, Fu Lee W...
Published 2012Table of Contents: “…Expressive Secondo Performances of a Realtime Person-Computer Ensemble System -- Different-Level Schemes’ Equivalence for Self-Motion Planning of Robot Manipulators -- Grey Incidence Optimization Model Based on Hybrid Differential Evolution Algorithm -- A Data Mining Based Approach to Research the Relationship between Kansei and Usability: A Case Study of Mobile Phones -- Making Use of the Big Data: Next Generation of Algorithm Trading -- Dynamic Causality Analysis on Default Mode Network -- The Canny Edge Detection and Its Improvement -- Multi-modality Medical Image Registration Based on Improved I-alpha Information (SNI) with Gradient -- Design of Smart Home Control System Based on ZigBee and Embedded Web Technology -- Using Gaussian Potential Function for Underdetermined Blind Sources Separation Based on DUET -- A New Balancing Type of Wireless Sensor Network Routing Algorithm -- Development of Portable Gait Analysis System Based on a DSP -- Improved Neural Networks Based Method for Infrared Focal Plane Arrays Nonuniformity Correction -- Images Classifications Based on Color-Texture Feature -- A Synchronization Strengthen RFID Authentication Protocol Based on Key Array -- Study of a Fuzzy Comprehensive Evaluation Problem in Cloud Computing -- Knowledge-Guided Clustering of Large-Scale Time Series under Wavelet Transformation -- A Significance-Driven Framework for Characterizing and Finding Evolving Patterns of News Networks -- Analysis of Association Rule Mining on Quantitative Concept Lattice -- Composite Rough Sets -- Analysis of Requirement and Constrained Model of Inter-Satellite-Link TT&C Scheduling Problem on Navigation Constellation -- NHFCNNC: A New Fuzzy Neural Network Algorithm Based on Matrix and Its Application -- Research of Emergency Logistics Distribution Routing Optimization Based on Simulated Annealing Ant Colony Optimization -- A Spatial Structure Analysis of Candidate Chinese Hyponymy Based on Concept Space -- Prediction of Energy Consumption Based on Grey Model - GM (1,1) -- Fuzzy Decision Making Based on Fuzzy Logic with Contradictory Negation, Opposite Negation and Medium Negation -- An Approach of Affection Thinking Based on Ant Colony Strategy -- Studies on the Covering Rough Set and Its Matrix Description -- Yard Allocation for Outbound Containers Based on the Unified Neutral Theory of Biodiversity and Biogeography -- An Auto-Adapted Method to Generate Pairwise Test Data Set -- The Application of Evolutionary Algorithm in B-Spline Curved Surface Ffitting -- Self-adaptive Optimization for Traffic Flow Model Based on Evolvable Hardware -- An Improved Decision Tree Algorithm Using Rough Set Theory in Clinical Decision Support System -- An AHP-Based Assessment Model for Clinical Diagnosis and Decision -- The Solution of Smart Home Indoor Positioning Based on WiFi -- Modified Cosine Similarity Measure between Intuitionistic Fuzzy Sets -- An Equipment Failure Prediction Accuracy Improvement Method Based on the Gray GM(1,1) Model -- A Group Decision Making Procedure for Selecting Data Warehouse Systems -- An Architecture for Cloud Computing and Human Immunity Based Network Intrusion Detection -- Robust Algorithm for Detection of Copy-Move Forgery in Digital Images Based on Ridgelet Transform -- Function Projective Synchronization and Parameters Identification of Different Hyperchaotic Systems Based on Adaptive Control -- A General Construction for Multi-authority Attribute-Based Encryption -- GIS-Based Urban Land Development Intensity Impact Factors Analysis -- Application of Adaptive Fuzzy Control in the Variable Speed Wind Turbines -- Short-Term Traffic Flow Forecasting Based on Grey Delay Model -- A Novel Color Image Segmentation Method Based on Improved Region Growing -- A Self-adaptive Segmentation Method by Fusion of Multi-color Space Components -- Traffic Vehicle Behavior Prediction Using Hidden Markov Models -- Efficient Visual Tracking by Using LBP Descriptor -- Trilateral Filtering-Based Retinex for Image Enhancement -- Face Recognition Using a Modified Fuzzy Linear Discriminant Analysis Method -- Progressive Image Registration Based on Probability Boosting Tree -- Rapid Image Segmentation Using Color, Texture and Syntactic Visual Features -- Multi-resolution Image Fusion Algorithm Based on Regional Cross Entropy and Regional Priority -- Graph-Cut Optimization for Video Moving Objects Detection with Geodesic Active Contour -- A Video Copy Detection Algorithm Based on Two-Level Features Measure -- Analyzing Feature Selection of Chromatographic Fingerprints for Oil Production Allocation -- Studies on Wheat Pests Image Segmentation Based on Variational Level Set -- Video Quality Assessment Combining Structural Distortion and Human Visual System -- A Novel Ocean Wind Field Estimation Method SAR Images Based -- Research of Decentralized Collaborative Target Tracking Architecture in the Sea Battlefield for the Complex Sensor Networks -- The Application of Intuitionistic Fuzzy MADM Based on Projection Model in Threat Assessment -- Fault Analysis of Condenser Based on RBF Network and D-S Evidence Theory -- Simulation Research on Singularity Detection of Transient Power Disturbance -- CMMB Image Sequences Measurement Based on Computation in High-Dimension Space -- Two-Dimensional Gibbs Phenomenon for Fractional Fourier Series and Its Resolution -- Horizontally UCA DOA Estimation Performance via Spatial Averaging -- Automatic Object Extraction in Nature Scene Based on Visual Saliency and Super Pixels -- Learning a Ground Object Manifold for Interpreting High-Resolution Sensor Image -- Robust Adaptive Beamforming with Null Widening under Quadratic Constraint -- Conceptual Analysis of Chinese Query of the Interrogative Sentence -- Measuring Information Transmission in Izhikevich Neuron -- Color Image Segmentation Using Centroid Neural Network -- Zhang Fractals Yielded via Solving Time-Varying Nonlinear Complex Equations by Discrete-Time Complex-Valued ZD -- Sub-optimal Multiuser Detector Using a Chaotic Neural Network with Decaying Chaotic Noise -- A Formal Method for Testing Reactive System from Symbolic Model -- Study on the Medium and Long Term of Fishery Forecasting Based on Neural Network -- Application of Wavelet Neural Network in the Fault Diagnosis of Turbine Generator Unit -- Density Based Grid Clustering Partition of the Input Space for RBF Neural Network -- Research of the Urban Air Quality Forecast Method Based on Resource Allocation Network -- A Novel Neural Network Approach for Computing Eigen-Pairs of Real Antisymmetric Matrices -- Pavement Distress Image Recognition Based on Multilayer Autoencoders -- MPSO-Based Operational Conditions Optimization in Chemical Process: A Case Study -- Velocity-Free Multi-Objective Particle Swarm Optimizer with Centroid for Wireless Sensor Network Optimization -- The Improved Particle Swarm Optimization Based on Swarm Distribution Characteristics -- An Analysis of Nonlinear Acceleration Coefficients Adjustment for PSO -- Acoustic Sensor Network Node Self-localization Based on Adaptive Particle Swarm Optimization -- Bimodal Biometrics Based on a Two-Stage Test Sample Representation -- Sparse Discriminating Neighborhood Preserving Embedding -- Complex-Matrix-Based Horizontal and Vertical Discriminant Analysis for Feature Fusion -- Segmentation of CAPTCHAs Based on Complex Networks -- A Robust Kernel-Based Fuzzy C-Means Algorithm by Incorporating Suppressed and Magnified Membership for MRI Image Segmentation -- Quantitative and Qualitative Coordination for Multi-robot Systems -- Image Edge Detection Based on Relative Degree of Grey Incidence and Sobel Operator -- Background Modeling from Surveillance Video Using Rank Minimization -- A Complete Set of Pseudo-Zernike Moment Invariants by Image Shape Description.…”
Full text (Wentworth users only).
Electronic eBook