Showing 61 - 80 results of 235 for search '((((radical architectural) OR (capital architecture))) OR (naval architecture)) (network OR networks)', query time: 0.28s Refine Results
  1. 61
  2. 62

    Building Globalization : Transnational Architecture Production in Urban China. by Ren, Xuefei

    Published 2011
    Table of Contents: “…Olympic Spectacles, Critical Architecture, and New State Spaces; Chapter 6. The Power of Symbol; Appendix: A Methodological Note on Network Analysis; Notes; Bibliography; Index.…”
    Full text (Wentworth users only)
    Electronic eBook
  3. 63
  4. 64
  5. 65

    Data Mining and Big Data 7th International Conference, DMBD 2022, Beijing, China, November 21–24, 2022, Proceedings, Part I / edited by Ying Tan, Yuhui Shi.

    Published 2022
    Table of Contents: “…. - SMPG: Adaptive Soft Update for Masked MADDPG -- Attentive Relational State Representation for Intelligent Joint Operation Simulation -- Graph Neural Networks -- Flow Prediction via Multi-view Spatial-temporal Graph Neural Network -- RotatSAGE: A Scalable Knowledge Graph Embedding Model based on Translation Assumptions and Graph Neural Networks -- Denoise Network Structure for User Alignment across Networks via Graph Structure Learning -- OLPGP: An optimized label propagation-based distributed graph partitioning algorithm -- Deep Neural Networks -- DRGS: Low-Precision Full Quantization of Deep Neural Network with Dynamic Rounding and Gradient Scaling for Object Detection -- Emotion Recognition Based on Multi-scale Convolutional Neural Network -- Pose Sequence Model Using the Encoder-decoder Structure for 3d Pose Estimation -- Research and Analysis of Video-Based Human Pose Estimation -- Action Recognition for Solo-militant Based on ResNet and Rule Matching -- Multiple Residual Quantization of Pruning -- Clustering Methods -- Deep Structured Graph Clustering Network -- Improved Clustering Strategies for Learning Style Identification in Massive Open Online Courses -- CSHEM - A Compressed Sensing Based Secure Data Processing Method for Electrical Data -- Prediction Methods -- An Improved Multi-Source Spatiotemporal Data Fusion Model based on the Nearest Neighbor Grids for PM2.5 Concentration Interpolation and Prediction -- Study on the Prediction of Rice Noodle Raw Material Index Content by Deep Feature Fusion -- GAP: Goal-Aware Prediction with Hierarchical Interactive Representation for Vehicle Trajectory -- Multi-Cause Learning for Diagnosis Prediction -- Prediction of Postoperative Survival Level of Esophageal Cancer Patients Based on Kaplan-Meier(K-M) Survival Analysis and Gray Wolf Optimization (GWO)-BP Model -- Classification Methods -- Possibilistic Reject-Classification based on Contrastive Learning in Vector Quantization Networks -- A Classification Method for Imbalanced Data Based on Ant Lion Optimizer -- Learnable Relation With Triplet Formulation For Semi-supervised Medical Image Classification -- Multi-view Classification via Twin Projection Vector Machine with Application to EEG-based Driving Fatigue Detection -- An Interpretable Conditional Augmentation Classification Approach for Imbalanced EHRs Mortality Prediction -- Combining Statistical and Semantic Features For Trajectory Point Classification -- Identification and Recognition Methods -- Complementary Convolutional Restricted Boltzmann Machine and Its Applications in Image Recognition -- Text-independent Speaker Identification Using a Single-scale SincNet-DCGAN Model -- Genome-wide Feature Selection of Robust mRNA Biomarkers for Body Fluid Identification -- HOS-YOLOv5: An Improved High-precision Remote Sensing Image Target Detection Algorithm Based on YOLOv5 -- A Multi-Module 3D U-Net Learning Architecture for Brain Tumor Segmentation -- Problems with Regression-line in Data-mining Applications and A Better Alternate Linear-model -- Research on Hot Spot Mining Technology for Network Public Opinion -- Research Hotspots, Emerging Trend and Front of Fraud Detection Rearch: A Scientometric Analysis (1984 - 2021) -- Optimization Methods -- An Algorithm of Set-Based Differential Evolution for Discrete Optimization Problem -- Multi-objective Optimization Technique for RSU Deployment -- Knowledge Learning-based Brain Storm Optimization Algorithm for Multimodal Optimization -- Market Investment Methods -- Non-Local Graph Aggregation for Diversified Stock Recommendation -- Novel Sentiment Analysis from Twitter for Stock Change Prediction -- A Novel Investment Strategy for Mixed Asset Allocation Based on Entropy-based Time Series Prediction -- The Framework of Hammer Credit Rating System for Enterprises in Capital Markets of China with International Standards -- Community Detection and Diagnosis Systems -- A Self-Adaptive Two-Stage Local Expansion Algorithm for Community Detection on Complex Networks -- Supervised Prototypical Variational Autoencdoer for Shilling Attack Detection in Recommender Systems -- Knowledge Graph based Chicken Disease Diagnosis Question Answering System -- Therapeutic effects of corticosteroids for critical and severe COVID-19 patients -- Big Data Analysis -- Secure Cross-User Fuzzy Deduplication for Images in Cloud Storage -- Blockchain-based Integrity Auditing with Secure Deduplication in Cloud Storage -- Name Disambiguation Based on Entity Relationship Graph in Big Data -- Ontology-based metadata model design of data governance system -- Ontology-based Combat Force Modeling and Its Intelligent Planning Using Genetic Algorithm -- Research on Multi-channel Retrieve Mechanism Based on Heuristic -- Big-Model Methods -- PoetryBERT: Pre-Training with Sememe Knowledge for Classical Chinese Poetry -- Image hide with Invertible Network and Swin Transformer -- Modeling and Analysis of Combat System Confrontation Based on Large-scale Knowledge Graph Network -- Generating Aversarial Exmaples and Other Applications -- Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN -- Defending Adversarial Examples by Negative Correlation Ensemble -- Accurate Decision-Making Method for Air Combat Pilots based on Data-Driven -- Establishment of Empirical Expression of Atmospheric Scattering Coefficient for Line-of-sight Ultraviolet Propagation in Coastal Area.…”
    Full text (Wentworth users only)
    Electronic eBook
  6. 66

    The Sniper's Log Architectural Chronicles of Generation-X. by Zaera-Polo, Alejandro

    Published 2013
    Table of Contents: “…. -- AZP Crib Sheets Glossary -- Mediating Between Ideas and Matters: Icons, Indexes, Diagrams, Drawings, and Graphs -- Architectural Education in a Global World -- Ecotectonics -- Localizing Networks: Physical Terminals for Web 2.0 Engines -- Theory of Excuse…”
    Full text (Wentworth users only)
    Electronic eBook
  7. 67
  8. 68

    Building globalization : transnational architecture production in urban China / Xuefei Ren. by Ren, Xuefei

    Published 2011
    Book
  9. 69
  10. 70
  11. 71
  12. 72
  13. 73
  14. 74

    Frontier Computing Theory, Technologies and Applications / edited by Jason C Hung, Neil Y. Yen, Kuan-Ching Li.

    Published 2016
    Table of Contents: “…- 99 Effect of We-intention on Adoption of Information System Embedding Social Networking Technology: A Case of Cloud Drive -- 100 Improving Project Risk Management of Cloud CRM Using DANP Approach -- 101 Improving Project Risk Management by a Hybrid MCDM Model Combining DEMATEL with DANP and VIKOR Methods – An Example of Cloud CRM -- 102 Using VIKOR to Improve E-Service Quality Performance in E-Store -- 103 Study on the Intellectual Capital and Firm Performance -- 104 Voluntary Disclosure and Future Earnings -- 105 A Smart Design of Pre-processing Classifier for Impulse Noises on Digital Images -- 106 An Effective Machine Learning Approach for Refining the Labels of Web Facial Images -- 107 Using the Data-Service Framework to Design a Distributed Multi-Levels Computer Game for Insect Education -- 108 Financial Diagnosis System (FDS) For Food Industry Listed In The Taiwan Stock Exchange (TWSE) -- 109 Classification rule discovery for housing purchase life cycle -- 110 The mediating role of knowledge integration mechanisms on fostering product innovation performance -- 111 Algorithms of AP+ Tree Operations for IoT System -- 112 Dynamic Storage Method of Big Data Based on Layered and Configurable Technology -- 113 MIC-based preconditioned conjungate gradient method for Sloving Large Sparse Linear Equations -- 114 Modeling and Assessing the Helpfulness of Chinese Online Reviews based on Writing Behavior -- 115 The average Path Length of Association Link Network -- 116 The Intelligent Big Data Analytics Framework for Surveillance Video System -- 117 The Intelligent Video Processing Platform using Video Structural Description Technology for the Highway Traffic -- 118 The Scheme of the Cooperative Gun-Dome Face Image Acquisition in Surveillance Sensors -- 119 Vehicle Color Recognition Based on CUDA Acceleration -- 120 Video Retargeting for Intelligent Sensing of Surveillance Devices -- 121 Web Knowledge Acquisition Model based on Human Cognitive Process. .…”
    Full text (Wentworth users only)
    Electronic eBook
  15. 75

    Information and Communicatiaon Technology International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings / edited by Khabib Mustofa, Erich J. Neu... by Mustofa, Khabib

    Published 2013
    Table of Contents: “….- Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.- Early-Detection System for Cross-Language (Translated) Plagiarism.- TransWiki: Supporting Translation Teaching.- Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability – Motivation - Opportunity Framework -- Software Development Methods in the Internet of Things.- SAT–Based Bounded Strong Satisfiability Checking of Reactive System Specifications.- OSMF: A Framework for OSS Process Measurement.- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.- On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.- Semantic-Aware Obfuscation for Location Privacy at Database Level.- Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.- CAPTCHA Suitable for Smartphones.- Code Based KPD Scheme with Full Connectivity: Deterministic Merging.- Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.- End-to-End Delay Performance for VoIP on LTE System in Access Network.- Mobile Collaboration Technology in Engineering Asset Maintenance – What Technology, Organisation and People Approaches Are Required.- A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.- Information Systems Strategic Planning for a Naval Hospital.- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.- A Data-Driven Approach toward Building Dynamic Ontology.- Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement -- Secure and Verifiable Outsourcing of Sequence Comparisons.- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.- On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.- On Identifying Proper Security Mechanisms.- A Recovery Approach for SQLite History Recorders from YAFFS2.- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.- SA4WSs: A Security Architecture for Web Services.- Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation.- A Test Case Generation Technique for VMM Fuzzing.- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.- A Proposal on Security Case Based on Common Criteria.- An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors -- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks -- Anonymous Lattice-Based Broadcast Encryption.- Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance.- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.- Provably Secure and Subliminal-Free Variant of Schnorr Signature.- A Block Cipher Mode of Operation with Two Keys.- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.- Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme -- A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.- Confidentiality-Preserving Query Execution of Fragmented Outsourced Data -- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.- A Real-Time Privacy Amplification Scheme in Quantum Key Distribution -- CSP-Based General Detection Model of Network Covert Storage Channels.- Trustworthy Opportunistic Access to the Internet of Services.- Architecture of Network Environment for High-Risk Security Experimentation.- Emulation on the Internet Prefix Hijacking Attack Impaction.- Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.- Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge -- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.- A Review of Security Attacks on the GSM Standard -- An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.- Image Watermarking Using Psychovisual Threshold over the Edge.- A Data Structure for Efficient Biometric Identification.- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System.- Shifting Primes on OpenRISC Processors with Hardware Multiplier -- Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.- Early-Detection System for Cross-Language (Translated) Plagiarism.- TransWiki: Supporting Translation Teaching.- Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability – Motivation - Opportunity Framework -- Software Development Methods in the Internet of Things.- SAT–Based Bounded Strong Satisfiability Checking of Reactive System Specifications.- OSMF: A Framework for OSS Process Measurement.- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.- On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.- Semantic-Aware Obfuscation for Location Privacy at Database Level.- Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.- CAPTCHA Suitable for Smartphones.- Code Based KPD Scheme with Full Connectivity: Deterministic Merging.- Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.- End-to-End Delay Performance for VoIP on LTE System in Access Network.- Mobile Collaboration Technology in Engineering Asset Maintenance – What Technology, Organisation and People Approaches Are Required.- A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.- Information Systems Strategic Planning for a Naval Hospital.- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.- A Data-Driven Approach toward Building Dynamic Ontology.- Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement -- Secure and Verifiable Outsourcing of Sequence Comparisons.- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.- On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.- On Identifying Proper Security Mechanisms.- A Recovery Approach for SQLite History Recorders from YAFFS2.- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.- SA4WSs: A Security Architecture for Web Services.- Verifying Data Authenticity and Integrity in Server-Aided Confidentia Forensic Investigation.- A Test Case Generation Technique for VMM Fuzzing.- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.- A Proposal on Security Case Based on Common Criteria.- An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors -- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks -- Anonymous Lattice-Based Broadcast Encryption.- Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance.- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.- Provably Secure and Subliminal-Free Variant of Schnorr Signature.- A Block Cipher Mode of Operation with Two Keys.- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.- Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme -- A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.- Confidentiality-Preserving Query Execution of Fragmented Outsourced Data -- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.- A Real-Time Privacy Amplification Scheme in Quantum Key Distribution -- CSP-Based General Detection Model of Network Covert Storage Channels.- Trustworthy Opportunistic Access to the Internet of Services.- Architecture of Network Environment for High-Risk Security Experimentation.- Emulation on the Internet Prefix Hijacking Attack Impaction.- Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.- Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge -- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.- A Review of Security Attacks on the GSM Standard -- An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.- Image Watermarking Using Psychovisual Threshold over the Edge.- A Data Structure for Efficient Biometric Identification.- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System.- Shifting P.…”
    Full text (Wentworth users only).
    Electronic eBook
  16. 76

    Bangkok utopia : modern architecture and Buddhist felicities, 1910-1973 / Lawrence Chua. by Chua, Lawrence

    Published 2021
    Book
  17. 77
  18. 78

    DISCRETE reappraising the digital in architecture / guest-edited by Gilles Retsin.

    Table of Contents: “…The Architect as Optimist: Carl TurnerThe Architect as Client/Developer; Design, Construct and Manage; Taking Risks and Pushing the Boundaries; The Power of Localism: Architectural Localism as Damage Control in the Face of Globalism and Digitisation; Located; Dislocated; Relocated; Occupy; Global Localism; Notes; Co-produced Urban Resilience: A Framework for Bottom-Up Regeneration; R-Urban Principles; Urban Resilience Hubs; Network Expansion and Development; Co-produced Resilience at the Macro Scale; Notes; Collective Intelligences: The Future is Hybrid; Technological Transfers: Manila…”
    Full text (Wentworth users only)
    Electronic eBook
  19. 79
  20. 80