Search Results - java (progress OR process) - base analysis

Search alternatives:

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    Sensors and Image Processing Proceedings of CSI 2015 /

    ISBN: 9789811066146
    ISSN: 2194-5357 ;
    Published: Singapore : Springer Singapore , 2018.
    Table of Contents: “…A Comparative Study of Various Color Texture Features for Skin Cancer Detection -- Pattern Classification and Retrieval of Content Based Images - A Step Towards Amelioration -- Novel Threshold Formulation for Energy Detection Method to Efficient Spectrum Sensing in Cognitive Radio -- Advanced technique to Crawl the images -- A Novel Web Page Change Detection Technique for Migrating Crawlers -- Developing Prototype for Prosopagnosia Using PCA -- Implementation of Smart Video Surveillance System Using Motion Detection Technique -- Intelligent Algorithm for Automatic Multistoried Parking System Using Image Processing, with Vehicle Tracking and Monitoring from Different Locations in the Building -- Computer Aided Detection of Breast Cancer Using Pseudo Zernike Moment as a Texture Descriptors -- Analysis of Leukoderma Images using Neuro-Fuzzy Hybrid Technique -- Texture and Clustering-Based Skin Disease Classification -- Melanoma Skin Cancer Detection Using Image Processing -- Performance Assessment for Clustering Techniques for Image Segmentation -- Automatic Seed Point Selection in B-Mode Breast Ultrasound Images -- EEA-LEACH - Trustworthy Enhanced Algorithm for Energy Optimization in Wireless Sensor Networks -- Secure Cluster Based Data Integrity Routing for Wireless Sensor Networks -- Objects Detection and Tracking Strategies -- Road Accident Informer System -- Hybrid Intelligent Algorithm for Energy Efficient Routing in WSN -- A Method for Secret Image Transmission to Preserve Privacy -- Text Retrieval from Scanned Forms Using Optical Character Recognition -- Combined Approach of Fuzzy Image Blocking Implementation for Medical Image Fusion -- A Systematic Review on Image Enhancement Techniques -- Virtual Field and Wave Laboratory Using Scilab and JAVA -- Classification and Comparative Study of IRS LISS-III Satellite Images Using RBFN and Decision Tree -- An Analytic Review on Image Enhancement Techniques Based on Soft Computing Approach -- An Auto-Threshold Control for Isolating False Shadow from High-Resolution Images.…”

    Get full text
    Electronic eBook
  2. 2

    Quality, IT and Business Operations Modeling and Optimization /

    ISBN: 9789811055775
    ISSN: 2198-7246
    Published: Singapore : Springer Singapore , 2018.
    Table of Contents: “…A Conceptual Architectural Design For Intelligent Health Information System: Case Study On India -- A General Framework For Modeling Of Multiple Version Software With Change Point -- An Improved Scoring System For Software Vulnerability Prioritization -- Analysis Of Feature Ranking Techniques For Defect Prediction Software Systems -- Analysis Of Impediments To Sustainability In Food Supply Chain: An Interpretive Structural Modeling Approach -- Analysis Of Module Based Software Reliability Growth Model Incorporating Imperfect Debugging And Fault Reduction Factor -- Analytics For Maintenance Of Transportation In Smart Cities -- Business Strategy Prediction System For Market Basket Analysis -- Defending the OSN-Based Web Applications from XSS Attacks using Dynamic JavaScript Code and Content Isolation -- Defending The Osn-Based Web Applications From Xss Attacks Using Dynamic Javascript Code And Content Isolation -- Development Of Qfd Methodology -- Discrete-Time Framework For Determining Optimal Software Release And Patching Time -- Efa-Ftopsis Based Assessment Of Service Quality: Case Of Shopping Websites -- Finding Efficiency In Data Envelopment Analysis Using Variable Reduction Technique -- Fire Safety Experimental Investigations Of Time To Flashover As A Function Of Humidity In Wood -- Fixing Of Faults And Vulnerabilities Via Single Patch -- Lc-Elm Based Gray Scale Image Watermarking In Wavelet Domain -- Implementing And Evaluating R-Tree Techniques On Concurrency Control And Recovery With Modifications On Non-Spatial Domains -- Inventory Decisions For Imperfect Quality Deteriorating Items With Exponential Declining Demand Under Trade Credit And Partially Backlogged Shortages -- Maintenance In The Era Of Industry 4.0: -- Issues And Challenges -- Modeling Fault Detection Phenomenon In Multiple Sprints For Agile Software Environment -- Optimal Price And Warranty Length For Profit Determination: An Evaluation Based On Preventive Maintenance -- Six Sigma Implementation In Cutting Process Of Apparel Industry -- Forecasting Of Major World Stock Exchanges Using Rule Based Forward And Backward Chaining Expert Systems -- Performance Enhancement Of Aodv Routing Protocol Using Anfis Technique -- Preservation Of Qos And Energy Consumption Based Performance Metrics Routing Protocols In Wireless Sensor Networks -- Reliability Analysis For Up-Graded Software With Up-Dates -- Quantitative Software Process Improvement Program Using Lean Methodology -- Selection Of Optimal Software Reliability Growth Models: A Fuzzy Dea Ranking Approach -- Significance Of Parallel Computation Over Serial Computation Using Openmp, Mpi And Cuda -- Software Release And Patching Time With Warranty Using Change Point -- Two-Dimensional Framework To Optimize Release Time & Warranty -- Technological Capabilities Impacting Business Intelligence Success In Organizations -- Testing Time And Effort Based Successive Release Modeling Of A Software In The Presence Of Imperfect Debugging -- The Role Of Educational Erp In The Isomorphic Development Of The Newly Started Higher Education Institutions -- When to Start Remanufacturing Using Adopter Categorization.…”

    Get full text
    Electronic eBook
  3. 3

    Computer and Network Security Essentials

    ISBN: 9783319584249
    Published: Cham : Springer International Publishing, 2018.
    Table of Contents: “…Part I.COMPUTER SECURITY -- Chapter 1.Computer Security -- Chapter 2.A Survey and Taxonomy of Classifiers of Intrusion Detection Systems -- Chapter 3.A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics -- Chapter 4.Information-theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining -- Chapter 5.A Postmortem Forensic Analysis for a JavaScript Based Attack -- Part II. …”

    Get full text
    Electronic eBook
  4. 4

    Dynamical Systems with Applications using Python by Lynch, Stephen

    ISBN: 9783319781457
    Published: Cham : Springer International Publishing, 2018.

    Get full text
    Electronic eBook