Search Results - (( Defined (contribution OR contributors) ((pension plans) OR (pension plan)) ) OR ((( Defined distribution computational plane ) OR ( Defined distribution decision plans ))))

  1. 201

    Cybersecurity incident response : how to contain, eradicate, and recover from incidents by Thompson, Eric C.

    Published: Apress, 2018
    Description: 1 online resource (xv, 176 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  2. 202

    Virtual, augmented and mixed reality : 13th International Conference, VAMR 2021, held as part of the 23rd HCI International Conference, HCII 2021, Virtual event, July 24-29, 2021,... by VAMR (Conference) Online), SpringerLink (Online service), International Conference on Human-Computer Interaction

    Published: Springer, 2021
    Description: 1 online resource (xxi, 715 pages) : illustrations (some color).
    Contents: “…Designing and Evaluating VAMR Environments -- Narrative Cognition in Mixed Reality Systems: Towards an Empirical Framework -- Exploratory Study on the Use of Augmentation for Behavioural Control in Shared Spaces -- Pose Estimation and Video Annotation Approaches for Understanding Individual and Team Interaction during Augmented Reality-Enabled Mission Planning -- GazeXR: A General Eye-tracking System Enabling Invariable Gaze Data in Virtual Environment -- SpatialViewer: A Remote Work Sharing Tool that Considers Intimacy Among Workers -- A Review of Virtual Therapists in Anxiety and Phobias Alleviating Applications -- Designing Limitless Path in Virtual Reality Environment -- A Comparative Study of Conversational Proxemics for Virtual Agents -- Real-time Data Analytics of COVID Pandemic using Virtual Reality -- Design Considerations for Interacting and Navigating with 2 Dimensional and 3 Dimensional Medical Images in Virtual, Augmented and Mixed Reality Medical Applications -- Virtual Reality Sickness Evaluation in Exergames for Older Hypertensive Patients: A Comparative Study of Training Methods in a Virtual Environment -- Consistency in Multi-device Service including VR : A Case Study -- Multimodal and Natural Interaction in VAMR -- The Effect of Body-Based Haptic Feedback on Player Experience during VR Gaming -- User Defined Walking-in-place Gestures for Intuitive Locomotion in Virtual Reality -- Exploring Human-to-Human Telepresence and the Use of Vibro-Tactile Commands to Guide Human Streamers -- Pseudo-haptic Perception in Smartphones Graphical Interfaces: a Case Study -- A Research on Sensing Localization & Orientation of Objects in VR with Facial Vibrotactile Display -- HaptMR: Smart Haptic Feedback for Mixed Reality based on Computer Vision Semantic -- Position Estimation of Occluded Fingertip based on Image of Dorsal Hand from RGB Camera -- Head-mounted Displays and VR Glasses -- Usability and User Experience of Interactions on VR-PC, HoloLens 2, VR Cardboard and AR Smartphone in a Biomedical Application -- Simulation of the Field of View in AR and VR Headsets -- Exploring Perspective Switching in Immersive VR for Learning First Aid in Lower Secondary Education -- Beyond Visible Light: User and Societal Impacts of Egocentric Multispectral Vision -- No One is Superman: 3-D Safety Margin Profiles when Using Head-Up display (HUD) for Takeoff in Low Visibility and High Crosswind Conditions -- Robust Camera Motion Estimation for Point-of-View Video Stabilization -- Rendering Tree Roots Outdoors: A Comparison between Optical See Through Glasses and Smartphone Modules for Underground Augmented Reality Visualization -- Using Head-Mounted Displays for Virtual Reality: Investigating Subjective Reactions to Eye-Tracking Scenarios -- Omnidirectional Flick View -- VAMR Applications in Design, the Industry and the Military -- Virtual Fieldwork: Designing Augmented Reality Applications using Virtual Reality Worlds -- Contextually Adaptive Multimodal Mixed Reality Interfaces for Dismounted Operator Teaming with Unmanned System Swarms -- Virtual Solutions for Gathering Consumer Feedback on Food: A Literature Review and Analysis -- Modernizing Aircraft Inspection: Conceptual Design of an Augmented Reality Inspection Support Tool -- The Potential of Augmented Reality for Remote Support -- A Review of Distributed VR Co-Design Systems -- The Mobile Office: A Mobile AR Systems for Productivity Applications in Industrial Environments -- Virtual Reality Compensatory Aid for Improved Weapon Splash-Zone Awareness -- Mixed Reality Visualization of Friendly vs Hostile Decision Dynamics -- Doing versus Observing: Virtual Reality and 360-degree Video for Training Manufacturing Tasks -- VAMR in Learning and Culture -- Design and Research on the Virtual Simulation Teaching Platform of Shanghai Jade Carving Techniques Based on Unity 3d Technology -- IME VR: an MVC Framework for Military Training VR Simulators -- Extended Reality, Pedagogy, and Career Readiness: A Review of Literature -- Development of an AR Training Construction System using Embedded Information in a Real Environment -- LibrARy : Enriching the Cultural Physical Spaces with Collaborative AR Content -- Supporting Embodied and Remote Collaboration in Shared Virtual Environments -- A Survey on Applications of Augmented, Mixed and Virtual Reality for Nature and Environment -- Flexible Low-Cost Digital Puppet System -- Mixed Reality Technology Capabilities for Combat-Casualty Handoff Training.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  3. 203

    CRM fundamentals by Kostojohn, Scott, Johnson, Mathew, Paulen, Brian

    Published: Apress, 2011
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  4. 204

    Hospital and healthcare security Sixth edition. by York, Tony W.

    Published: Butterworth-Heinemann, 2015
    Description: 1 online resource (xxvii, 721 pages)
    Contents: “…Machine generated contents note: Categories of Healthcare -- Types of Hospitals -- Nonhospital Side of Healthcare -- Diverse Stakeholders -- Staffing the Medical Care Facility -- The Healthcare Security Administrator -- The Joint Commission -- Design and Implementation -- Organization Surveys -- Scoring of Standards -- The Environment of Care Committee -- The Sentinel Event -- The Centers for Medicare and Medicaid Services -- DNV -- Health Insurance Portability and Accountability Act -- References -- Defining Healthcare Security -- Basic Rationale of Healthcare Security -- Evolution of Healthcare Security -- Progression of Hospital Security in the United States -- Security, Risk Management, Safety -- Safety Services -- Risk Management -- Developing the Security System -- Psychological Deterrents -- Security Safeguards Relating to the Individual Decision-Making Process -- Security Patrols -- False Security Expectations -- Basic Security Program Objectives -- Internal Forces -- External Forces -- The Joint Commission -- National Center for Missing and Exploited Children -- Occupational Safety and Health Administration -- Centers for Medicare and Medicaid Services -- International Association for Healthcare Security and Safety -- ASIS International -- National Fire Protection Association -- Facility Guidelines Institute -- State Health Departments/Legislation/Ordinances -- External Influencing Agencies (Non-U.S.) -- Body of Knowledge -- Developing "The Knowledge" -- Accessing "The Knowledge" -- What Are Standards? …”
    Elsevier - Click here for access
    eBook
  5. 205

    Algorithms and architectures for parallel processing : 21st International Conference, ICA3PP 2021, Virtual event, December 3-5, 2021, Proceedings. Part I by International Conference on Algorithms and Architectures for Parallel Processing Online, SpringerLink (Online service)

    Published: Springer, 2022
    Description: 1 online resource (835 pages).
    Contents: “…Deep Learning Models and Applications -- CRFST-GCN :A Deeplearning Spital-Temporal Frame to Predict Traffic Flow -- BFR-RetinaNet: An Improved RetinaNet Model for Vehicle Detection in Aerial Images -- Learning Knowledge Graph Embeddings by Multi-Attention Mechanism for Link Prediction -- GlowImp: Combining GLOW and GAN for Multivariate Time Series Imputation -- Accurate Indoor Localization Using Magnetic Sequence Fingerprints with Deep Learning -- Wasserstein Graph Auto-Encoder -- Fine-grained Activity Recognition Based on Features of Action Subsegments and Incremental Broad Learning -- ADFA-LSTM: An Abnormal Trajectory Prediction Method Based On Bionic Neural Network -- Online Multiple Object Tracking Algorithm based on Heat Map Propagation -- Software Systems and Efficient Algorithms -- Spatio-temporal Topology Routing Algorithm for Opportunistic Network Based on Self-Attention Mechanism -- TSAEns: Ensemble Learning for KPI Anomaly Detection -- Towards Transferable Adversarial Examples using Meta Learning -- Temporal Convolution Network Based on Attention for Intelligent Anomaly Detection of Wind Turbine Blades -- Error Serial Episodes Discovery from Mobile Payment Log in Distributed ETC -- Parallel Cache Prefetching for LSM-Tree based Store: From Algorithm to Evaluation -- A Hybrid TLBO-TS Algorithm based Mobile Service Selection for Composite Services -- UPM-DMA: An Efficient Userspace DMA-Pinned Memory Management Strategy for NVMe SSD -- AHOA: Adaptively Hybrid Optimization Algorithm for Flexible Job-shop Scheduling Problem -- Trace-Navi: A High-Accuracy Indoor Navigation System based on Real-Time Activity Recognition and Discrete Trajectory Calibration -- Iterative Filling Incomplete Fingerprint Map Based on Multi-directional Signal Propagation in Large-scale Scene -- Dynamic Adjustment Policy of Search Driver Matching Distance via Markov Decision Process -- A Multi-Precision Quantized Super-Resolution Model Framework -- An Optimized GPU Implementation of Weakly-compressible SPH using CUDA-based strategies -- A Heterogeneous Multi-Core Network-on-Chip Mapping Optimization Algorithm -- A Novel 3D Intelligent Cluster Method for Malicious Traffic Fine-grained Classification -- Predicting Students Academic Performance Based on Improved PSO-Xgboost: A Campus Behavior Perspective -- Motion-sequence Authentication System: guard for smart phones -- Edge Computing and Edge Intelligence -- Joint Optimization Scheme of Multi-service Replication and Request Offloading in Mobile Edge Computing -- Flying MEC: Online Task Offloading, Trajectory Planning and Charging Scheduling for UAV-assisted MEC -- Multiple Workflows Offloading Based on Deep Reinforcement Learning in Mobile Edge Computing -- An Optimized Greedy-based Task Offloading Method for Mobile Edge Computing -- Location Aware Workflow Migration Based on Deep Reinforcement Learning in Mobile Edge Computing -- Recode-Decode-and-Compare: An Efficient Verification Scheme for Coded Edge Computing against Collusion Attack -- MGFL: Multi-granularity Federated Learning in Edge Computing Systems -- Energy Efficient Priority-Based Task Scheduling for Computation Offloading in Fog Computing -- Space-Heuristic Navigation and Occupancy Map Prediction for Robot Autonomous Exploration -- Service Dependability and Security Algorithms -- Edge DDoS attack detection method based on software defined networks -- GradMFL: Gradient Memory-based Federated Learning for Hierarchical Knowledge Transferring over Non-IID Data -- Linear Coded Federated Learning -- Verifiable Dynamic Searchable Symmetric Encryption with Forward Privacy in Cloud-assisted E-Healthcare Systems -- Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning -- A blockchain-based proxy oriented cloud storage public audit scheme for low-performance terminal devices -- Sunspot: A Decentralized Framework Enabling Privacy for Authorizable Data Sharing on Transparent Public Blockchains -- A Novel Protection method of continuous location sharing based on local differential privacy and conditional random field -- An Intelligent Allocation Mechanism Based on Ethereum Blockchain in Microgrid -- Data Science -- Multi-Layer Adaptive Sampling for Per-Flow Spread Measurement -- Transformer-based Rating-Aware Sequential Recommendation -- An effective single-pass approach for estimating the Z-quantile in data streams -- Fed-Tra: Improving Accuracy of Deep Learning Model on Non-IID Data in Federated Learning.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  6. 206

    Logic, rationality, and interaction : 7th International Workshop, LORI 2019, Chongqing, China, October 18-21, 2019, Proceedings by LORI (Workshop) Chongqing, China), SpringerLink (Online service)

    Published: Springer, 2019
    Description: 1 online resource (xxi, 441 pages) : illustrations (some color).
    SpringerLink - Click here for access
    Conference Proceeding eBook
  7. 207

    Teacher empowerment toward professional development and practices : perspectives across borders by SpringerLink (Online service)

    Published: This Springer imprint is published by Springer Nature, 2017
    Description: 1 online resource (xv, 307 pages)
    SpringerLink - Click here for access
    eBook
  8. 208

    Wireless algorithms, systems, and applications : 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015 : proceedings by WASA (Conference) Qufu Shi, China), SpringerLink (Online service)

    Published: Springer, 2015
    Description: 1 online resource (xvii, 858 pages) : illustrations.
    Contents: “…Privacy-Preserving Public Auditing Together with Efficient User Revocation in the Mobile Environments -- Multi-proxy Multi-signature Binding Positioning Protocol -- Efficient Network Structure of 5G Mobile Communications -- Optimal Channel Assignment Schemes in Underlay CRNs with Multi-PU and Multi-SU Transmission Pairs -- A Group Bandwidth Reservation Scheme for the Control Channel in IEEE 802.11p/1609 Networks -- k-Perimeter Coverage Evaluation and Deployment in Wireless Sensor Networks -- Modeling Flu Trends with Real-Time Geo-tagged Twitter Data Streams -- Radio Signal Based Device-Free Velocity Recognition -- Minimum-Cost Information Dissemination in Social Networks -- Finding Overlapping Communities with Random Walks on Line Graph and Attraction Intensity -- Computing an Optimal Path with the Minimum Number of Distinct Sensors -- ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device -- Soft Reservation Based Prioritized Access: Towards Performance Enhancement for VoIP over WLANs -- Impact of a Deterministic Delay in the DCA Protocol -- EBRS: Event Based Reputation System for Defensing Multi-source Sybil Attacks in VANET -- iSound: A Smartphone Based Intelligent Sound Fusion System for the Hearing Impaired -- Estimation Based Adaptive ACB Scheme for M2M Communications -- Optimal Power Allocations for Two-Users Spectrum Sharing Cognitive Radio with Interference Limit -- Adaptive Resource Allocation for Anti-money Laundering Based on SMDP -- Infrastructure Deployment and Optimization for Cloud-Radio Access Networks -- A Cluster Head Rotation Cooperative MIMO Scheme for Wireless Sensor Networks -- A Distributed Game-Theoretic Power Control Mechanism for Device-to-Device Communications Underlaying Cellular Network -- A Low Overhead and Stable Clustering Scheme for Crossroads in VANETs -- Online Channel Assignment, Transmission Scheduling, and Transmission Mode Selection in Multi-channel Full-duplex Wireless LANs -- Optimal Preference Detection Based on Golden Section and Genetic Algorithm for Affinity Propagation Clustering -- DRL: A New Mobility Model in Mobile Social Networks -- SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems -- A Bidder-Oriented Privacy-Preserving VCG Auction Scheme -- A Secure Multi-unit Sealed First-Price Auction Mechanism -- Flow-Level Performance of Device-to-Device Overlaid OFDM Cellular Networks -- Bernoulli Sampling Based (epsilon, delta)-Approximate Frequency Query in Mobile Ad Hoc Networks -- Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing -- A Dynamic Differentiated QoS Based Call Admission Control Service Model for Core Node in Wireless Sensor Network Topology Control -- Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks -- SDP: Separate Design Principle for Multichannel Scheduling in Priority-Aware Packet Collection -- On Computing Multi-agent Itinerary Planning in Distributed Wireless Sensor Networks -- FFDP: A Full-Load File Delivery Protocol in Satellite Network Communication -- Energy-Aware Clustering and Routing Scheme inWireless Sensor Network -- Serial Number Based Encryption and Its Application for Mobile Networks -- Fine-Grained Searchable Encryption over Encrypted Data in Multi-clouds -- Big-Little-Cell Based "Handprint" Positioning System -- Spectrum Sublet Game Among Secondary Users in Cognitive Radio Networks -- Delivering Content with Defined Priorities by Selective Agent and Relay Nodes in Content Centric Mobile Social Networks -- Rogue Access Point Detection in Vehicular Environments -- Information-Centric Resource Management for Air Pollution Monitoring with Multihop Cellular Network Architecture -- A Novel Location Privacy Mining Threat in Vehicular Internet Access Service -- iProtect: Detecting Physical Assault Using Smartphone -- Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework -- A Quasi-Dynamic Inter-Satellite Link Reassignment Method for LEO Satellite Networks -- Domatic Partition in Homogeneous Wireless Sensor Networks -- High Performance DDDT-CWT Based Compressed Sensing Recovery of Images via Structured Sparsity -- Influential Spatial Facility Prediction over Dynamic Objects -- A Heuristic Stream Order Scheduling Algorithm for Intra-Superframe Power Management in WPANs -- Minimum-Latency Broadcast and Data Aggregation Scheduling in Secure Wireless Sensor Networks -- Data-Driven Privacy Analytics: A WeChat Case Study in Location-Based Social Networks -- A Double Pulse Control Strategy for Misinformation Propagation in Human Mobile Opportunistic Networks -- Efficient Line K-Coverage Algorithms in Mobile Sensor Network -- A Trust Evolution Mechanism for Mobile Social Networks Based on Wright-Fisher -- A Localized Channel Allocation Approach for Realtime Reliable and High Throughput Communication in Multi-channel Networks -- An Efficient and Secure Delegated Multi-authentication Protocol for Mobile Data Owners in Cloud -- Cooperative Spectrum and Infrastructure Leasing on TV Bands -- Information Security Enhancement with Actual Access Statuses of Users in the Multi-user System -- Joint Secure Beamforming and User Selection for Multi-user MISO Systems with Confidential Messages -- Network Reachability Analysis on Temporally Varying Interaction Networks -- Performance of Target Tracking in Radar Network System Under Deception Attack -- Resource Allocation in Cooperative Cognitive Maritime Wireless Mesh/Ad Hoc Networks: An Game Theory View -- Security and Privacy Issues of Fog Computing: A Survey -- Mobile Data Gathering with Time-Constraints inWireless Sensor Networks -- A Poisson Distribution Based Topology Control Algorithm for Wireless Sensor Networks Under SINR Model -- PPSSER: Privacy-Preserving Based Scheduling Scheme for Emergency Response in Medical Social Networks -- Secrecy-Oriented Adaptive Clustering Scheme in Device-to-Device Communications -- Cooperative Beamforming and Artificial Noise Design for Secure Multi-pair Communications in Wireless Two-Way Relay Networks -- On the Stable Throughput in Wireless LANs -- Antenna Selection in Large-Scale Multiple Antenna Systems -- Energy-Balanced Backpressure Routing for Stochastic Energy Harvesting WSNs -- Motion Recognition by Using a Stacked Autoencoder-Based Deep Learning Algorithm with Smart Phones -- SDN-Based Routing for Efficient Message Propagation in VANET -- Critical Point Aware Data Acquisition Algorithm in Sensor Networks -- Constructing Virtual Backbone with Bounded Diameters in Cognitive Radio Networks -- A Simplified Attack-Defense Game Model for NSSA -- Hadoop-Based Analysis for Large-Scale Click-Through Patterns in 4G Network -- Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks -- Ant Colony-Based Energy Control Routing Protocol for Mobile Ad Hoc Networks.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  9. 209

    Geometric complex analysis : in honor of Kang-Tae Kim's 60th Birthday, Gyeongju, Korea, 2017 by Korean Conference on Several Complex Variables Kyŏngju-si, Korea, SpringerLink (Online service)

    Published: Springer, 2018
    Description: 1 online resource (xiii, 361 pages) : illustrations (some color).
    SpringerLink - Click here for access
    Conference Proceeding eBook
  10. 210

    Local government and the COVID-19 pandemic : a global perspective by SpringerLink (Online service)

    Published: Springer, 2022
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  11. 211

    Ubiquitous computing application and wireless sensor : UCAWSN-14 by FTRA International Conference on Ubiquitous Computing Application and Wireless Sensor Network Cheju-do, Korea, SpringerLink (Online service)

    Published: Springer, 2015
    Description: 1 online resource.
    Contents: “…-C. Wu, Y.-M. Chen -- Decision Tree Approach to Predict lung Cancer the Data Mining Technology; J.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  12. 212

    Beginning SQL Server for developers Fourth edition. by Dewson, Robin

    Published: Apress, 2015
    Description: 1 online resource (xxi, 684 pages) : illustrations.
    Contents: “…-- SQL Server Editions -- The Example -- Installation -- Install -- Setup Role -- Choosing the Features to Install -- Naming the Instance -- Service Accounts -- Authentication Mode -- Defining the Data Directories -- FILESTREAM Options -- Creating the Reporting Services Database -- Distributed Replay Options -- Security -- Services Accounts -- Looking at the Authentication Mode -- Windows Authentication Mode -- Administrators on a Machine -- Mixed Mode -- The sa Login -- Summary -- Chapter 2: SQL Server Management Studio -- A Quick Overview of SSMS -- Query Editor -- sqlcmd -- Summary -- Chapter 3: Database Design and Creation -- Defining a Database -- Prebuilt Databases Within SQL Server -- master -- tempdb -- model -- msdb -- AdventureWorks/AdventureWorksDW -- Choosing the Database System Type -- OLTP -- Backups -- Indexes -- In-memory data -- BI/OLAP -- Example System Choice -- Gathering the Data -- Determining the Information to Store in the Database -- Financial Products -- Customers -- Customer Addresses -- Shares -- Transactions -- External and Ignored Information -- Building Relationships -- Using Keys -- Primary Key -- Foreign/Referencing Key -- Candidate/Alternate Key -- A Unique Constraint Instead of a Primary Key -- Creating Relationships -- Relationships and Referential Integrity -- Types of Relationships -- One-to-One -- One-to-Many -- Many-to-Many -- More on Foreign Keys -- Normalization -- Assign Each Entity a Unique Identifier -- Store Only Information That Directly Relates to That Entity -- Avoid Repeating Values or Columns -- Normal Forms -- First Normal Form -- Customers -- Shares -- Second Normal Form -- Third Normal Form.…”
    SpringerLink - Click here for access
    eBook
  13. 213

    Marketing analytics roadmap : methods, metrics, and tools by Rackley, Jerry

    Published: Apress, 2015
    Description: 1 online resource (xiv, 300 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  14. 214

    AdvancED ActionScript 3.0 : design patterns by Smith, Ben (Software engineer)

    Published: Apress ; Distributed by Springer Science+Business Media, 2011
    Description: 1 online resource (xiv, 420 pages) : illustrations (some color).
    SpringerLink - Click here for access
    eBook
  15. 215

    Advanced ActionScript 3 : design patterns Second edition. by Smith, Ben (Software engineer)

    Published: Apress, 2015
    Description: 1 online resource (xvi, 408 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  16. 216

    New trends in computational vision and bio-inspired computing : selected works presented at the ICCVBIC 2018, Coimbatore, India by International Conference on Computational Vision and Bio Inspired Computing Coimbatore, India, SpringerLink (Online service)

    Published: Springer, 2020
    Description: 1 online resource.
    Contents: “…Chapter 1: Image Encryption based on 3 Dimensional Multi Linear (3D-MLT) Chaotic Transformation -- Chapter 2: A Computer Vision Based Approach for Object Recognition in Smart Buildings -- Chapter 3: A Cascade Color Image Retrieval Framework for Image Retrieval -- Chapter 4: Enhanced Geographical Information System Architecture for Geospatial Data -- Chapter 5: IoT Based Power Management and Condition Monitoring in Microgrid -- Chapter 6: A Comparative performance study of cloud resource scheduling techniques -- Chapter 7: Image Context Based Similarity Retrieval System -- Chapter 8: Emotions Recognition from Spoken Marathi Speech using LPC and PCA Technique -- Chapter 9: Implementation of Point Of Care system Using Bio-Medical Signal Stegano-graphy -- Chapter 10: Privacy assurance with content based access protocol to secure cloud storage -- Chapter 11: Leaf Recognition using Artificial Neural Network -- Chapter 12: Data Security in Cloud Using RSA and GNFS Algorithms -- An Integrated Approach -- Chapter 13: Machine Learning Supported Statistical Analysis of IoT Enabled Physical Location Monitoring Data -- Chapter 14: A Genetic Algorithm based System with Different Crossover Operators for Solving the Course Allocation Problem of Universities -- Chapter 15: Detecting Anomalies in Credit Card Transaction Using Efficient Techniques -- Chapter 16: Secure Data Processing System using Decision Tree Architecture -- Chapter 17: A Novel Framework for Detection of Morphed images using Deep Learning Techniques -- Chapter 18: A Novel Non-invasive Framework for Predicting Bilirubin Levels -- Chapter 19: A Comprehensive Study on the Load Assessment Techniques in Cloud Data Center -- Chapter 20: Multimodal biometric system using Ear and Palm Vein recognition based on GwPeSOA -- Multi-SVNN for security applications -- Chapter 21: E-Agriculture -- Chapter 22: Ultra Wide Band Monopole Antenna Design by Using Split Ring Resonator -- Chapter 23: Green supply chain management of chemical Industrial development for warehouse and its impact on the environment using artificial bee colony algorithm: A Review Articles -- Chapter 24: A Novel Dyno-Quick Reduct Algorithm For Heart Disease Prediction Using Supervised Learning Algorithm -- Chapter 25: Impact of Meltdown and Spectre Threats in Parallel Processing -- Chapter 26: Algorithm For Finding Minimum Dominating Set Using Sticker Based Model In Dna Computing -- Chapter 27: Assistive Technology Evolving as Intelligent System -- Chapter 28: A Bio Potential Sensor Circuit of AFE DesignWith CT ∑-∆ Modulator -- Chapter 29: Image Encryption based on Transformation and Chaotic Substitution -- Chapter 30: An Efficient Geographical Opportunistic Routing Algorithm Using Diffusion and Sparse Approximation Models for Cognitive Radio Ad Hoc Networks -- Chapter 31: Traffic Violation Tracker and Controller -- Chapter 32: PTCWA: Performance Testing of Cloud based Web Applications -- Chapter 33: Analysis of Regularized Echo State Networks on the Impact of Air Pollutants on Human Health -- Chapter 34: Detection of Cancer by Biosensor through Optical Lithography -- Chapter 35: Paradigms in Computer Vision: Biology Based Carbon Domain Postulates Nano Electronic Devices for Generation Next -- Chapter 36: A Secure Authenticated Bio-Cryptosystem Using Face Attribute Based On Fuzzy Extractor -- Chapter 37: Implementation of Scan logic and Pattern generation for RTL Design -- Chapter 38: Optimization Load Balancing Over Imbalance Datacenter Topology -- Chapter 39: Text Attentional Character Detection using Morphological Operations: A Survey -- Chapter 40: IoT Based Environment Monitoring System -- Chapter 41: Design & Development of Algorithms for Detection of Glaucoma Using Water Shed Algorithm -- Chapter 42: A novel development of glaucoma detection technique using the water shed algorithm -- Chapter 43: Solutions of Viral Dynamics in Hepatitis B Virus Infection using HPM -- Chapter 44: A Mathematıcal Modelıng Of Dengue Fever For The Dynamıcs System Usıng HAM -- Chapter 45: Vision-based Robot for Boiler Tube Inspection -- Chapter 46: Qualitative Study on Data Mining Algorithms for classification of Mammogram Images -- Chapter 47: Designing a framework for data migration of Odoo ERP PostgreSQL database into NoSQL database -- Chapter 48: Juxtaposition on classifiers in modeling Hepatitis Diagnosis Data -- Chapter 49: Voltage Stabilization By Using Buck Converters In The Integration Of Renewable Energy Into The Grid -- Chapter 50: OCR System For Recognition of Used Printed Com-ponents For Recycling -- Chapter 51: Modern WordNet: An Affective Extension of WordNet -- Chapter 52: Analysis of Computational Intelligence Techniques for Path Planning -- Chapter 53: Techniques for Analysis of the Effectiveness of Yoga through EEG Signals: A Review -- Chapter 54: Multiobjective integrated stochastic and deterministic search method for economic emission dispatch problem -- Chapter 55: Enhanced webpage prediction using Rank based Feedback Process -- Chapter 56: A study on distance based representation of molecules for statistical learning -- Chapter 57: Comparative Analysis of Evolutionary Approaches and computational methods for optimization in Data Clustering -- Chapter 58: Bringing Digital Transformation from a Traditional RDBMS Centric Solution to a Big Data Platform with Azure Data Lake Store -- Chapter 59: Smart Assist For Alzheimer's Patients And Elderly People -- Chapter 60: An Unconstrained Rotation Invariant Approach For Document Skew Estimation And Correction -- Chapter 61: Smart Assistive Shoes For Blind -- Chapter 62: Comparative study on Various techniques involved in designing a Computer Aided Diagnosis (CAD) System for mammogram classification -- Chapter 63: Traffic Flow Prediction Using Regression and Deep Learning Approach -- Chapter 64: A Comparative Study on Assessment of Carotid Artery Using various Techniques -- Chapter 65: Evaluation of Fingerprint Minutiae on Ridge Structure Using Gabor and Closed hull Filters -- Chapter 66: A Perspective View on Sybil Attack Defense Mechanisms in Online Social Networks -- Chapter 67: Minor Finger Knuckle Print Image Enhancement using CLAHE Technique -- Chapter 68: Learning Path Construction Based On Ant Colony Optimization and Genetic Algorithm -- Chapter 69: Pneumonia Detection And Classification Using Chest X-Ray Images With Convolutional Neural Network -- Chapter 70: Juxtaposition on classifiers in modeling Hepatitis Diagnosis Data -- Chapter 71: An Optimized Approach Of Outlier Detection Algorithm for Outlier Attributes on Data Streams -- Chapter 72: Indo -- Pak Sign Language Translator Using Kinect -- Chapter 73: Semantic interoperability for a defining Query -- Chapter 74: Gestational Diabetics prediction using Logisitic Regression in R -- Chapter 75: IOT Based Gas Pressure Detection for LPG with real time No SQL Database -- Chapter 76: Hybrid Steerable Pyramid with DWT for Multiple Medi-cal Image Watermarking and Extraction using ICA -- Chapter 77: Dimensional & Spatial Analysis of Ultrasound Imaging through Image Processing -- A Review -- Chapter 78: A Review on methods to handle Uncertainty -- Chapter 79: Identity-based Hashing and Light Weight Signature Scheme for IoT -- Chapter 80: Adaptive Particle Swarm Optimization Based Wire-length Minimization for Placement in FPGA -- Chapter 81: Clustering of Various Diseases by Collagen Gene Using the Positional Factor -- Chapter 82: Prediction Of Water Demand For Domestic Purpose Using Multiple Linear Regression -- Chapter 83: Implementation of Regression Analysis using Regression Algorithms for Decision Making In Business Domains -- Chapter 84: Blockchain Based System for Human Organ Transplantation Management -- Chapter 85: Identification of Melanoma using Convolutional Neural Networks for Non Dermoscopic Images -- Chapter 86: Exploitation Of Data Mining To Analyse Realistic Facts From Road Traffic Accident Data -- Chapter 87: A Deep Learning Approach for Segmenting Time-Lapse Phase Contrast Images of NIH 3T3 Fibroblast Cells -- Chapter 88: Flow distribution-aware load balancing for the data centre over cloud services with virtualization -- Chapter 89: Disease severity diagnosis for rice using Fuzzy Verdict Method -- Chapter 90: HELPI VIZ: A Semantic image Annotation and Visualization Platform for Visually Impaired -- Chapter 91: A Survey of Multi -- Abnormalities Disease Detection and Classification in WCE -- Chapter.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  17. 217
  18. 218

    Variational and level set methods in image segmentation by Mitiche, Amar

    Published: Springer, 2010
    Description: 1 online resource (viii, 190 pages) : illustrations (some color).
    SpringerLink - Click here for access
    eBook
  19. 219
  20. 220