Search alternatives:
"sright" » "sight" (Expand Search), "slight" (Expand Search)
"srights" » "sights" (Expand Search), "slights" (Expand Search)
"fight" » "night" (Expand Search), "might" (Expand Search)
"frights" » "fights" (Expand Search)
"frightsss" » "fightsss" (Expand Search)
"wrights" » "weights" (Expand Search)
"flightly" » "slightly" (Expand Search)
"sright" » "sight" (Expand Search), "slight" (Expand Search)
"srights" » "sights" (Expand Search), "slights" (Expand Search)
"fight" » "night" (Expand Search), "might" (Expand Search)
"frights" » "fights" (Expand Search)
"frightsss" » "fightsss" (Expand Search)
"wrights" » "weights" (Expand Search)
"flightly" » "slightly" (Expand Search)
-
137841
The eyes of the dragon : a story
New York, NY : Viking, 1987Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
137842
I see a song
New York : Scholastic, 1995Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
137843
The girl with a donkey tail
New York : Dutton, 1979
First edition.Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
137844
White serpent castle
New York : David McKay, 1976Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
137845
Have you ever heard of a kangaroo bird? : Fascinating facts about unusual birds
New York : Coward, McCann & Geoghegan, 1980Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
137846
Photoshop Elements 13 All-in-One For Dummies
For Dummies, 2014
1st edition.Format: Electronic eBookFull text (Wentworth users only)
-
137847
Marvel Comics : the untold story
New York : Harper, 2012
1st ed.Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
137848
Addams Family values
Hollywood, Calif. : Paramount Pictures, 1999
Widescreen version.Format: Video
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
137849
Business communication : speaking
New York, N.Y. : Films Media Group, 2005Format: Electronic VideoStreaming video (Emerson users only)
-
137850
Making your presentation
New York, N.Y. : Films Media Group, 2005Format: Electronic VideoStreaming video (Emerson users only)
-
137851
I named her Angel
New York, NY : Filmakers Library, 2007Format: Electronic VideoView Streaming Video
-
137852
Own the Room Business Presentations that Persuade, Engage, and Get Results
McGraw-Hill, 2009
1st edition.Format: Electronic eBookFull text (Wentworth users only)
-
137853
How To Present To Absolutely Anyone
Ascent Audio, 2019
1st edition.Format: Electronic AudioStreaming audio (Wentworth users only)
-
137854
The Agatha Christie Miss Marple movie collection. Agatha Christie's Murder at the gallop
Burbank, CA : Warner Home Video, 2006Format: Video
This item is not available through FLO. Please contact your home library for further assistance. -
137855
Addams family values
[Hollywood, CA] : Paramount Pictures, 1993Format: Electronic VideoStreaming video (Wentworth users only)
-
137856
Computer Engineering and Networking Proceedings of the 2013 International Conference on Computer Engineering and Network (CENet2013)
Cham : Springer International Publishing : Imprint: Springer, 2014Table of Contents: “…-An Algorithm for Bayesian Networks Structure Learning Based on Simulated Annealing with Adaptive Selection Operator -- Static Image Segmentation Using Polar Space Transformation Technique -- Image Restoration Via Non-local P-Laplace Regularization -- Analysis and Application of Computer Technology on Architectural Space Lighting Visual Design -- Improving Online Gesture Recognition with WarpingLCSS by Multi-Sensor Fusion -- The Lane Mark Identifying and Tracking in Intense Illumination -- Classification Modeling of Multi-featured Remote Sensing Images Based on Sparse Representation -- A Parallel and Convergent Support Vector Machine Based on MapReduce -- Vehicle Classification Based on Hierarchical Support Vector Machine -- Image Splicing Detection Based on Machine Learning Algorithm -- A Lane Detection Algorithm Based on Hyperbola Model -- Comparisons and Analyses of Image Softproofing under Different Profile Rendering Intents -- An Improved Dense Matching Algorithm for Face Based on Region Growing -- An Improved Feature Selection Method for Chinese Short Texts Clustering Based on HowNet -- Internet Worm Detection and Classification Based on Support Vector Machine -- Real-time Fall Detection Based on Global Orientation and Human Shape -- The Classification of Synthetic Aperture Radar Oil Spill Images Based on the Texture Features and Deep Belief Network -- The Ground Objects Identification for Digital Remote Sensing Image Based on the BP Neural Network -- Detection of Image Forgery Based on Improved PCA-SIFT -- A Thinning Model for Handwriting-like Image Skeleton -- Discrimination of the White Wine Based on Sparse Principal Component Analysis and Support Vector Machine -- Volume II -- Part IV: Cloud Computing -- Design of Mobile Electronic Payment System -- Power-saving Based Radio Resource Scheduling in Long Term Evolution Advanced Network -- Dispatching and Management Model Based on Safe Performance Interface for Improving Cloud Efficiency -- A Proposed Methodology for an E-health Monitoring System Based on a Fault-tolerant Smart Mobile -- Design And Application of Indoor Geographical Information System -- Constructing Cloud Computing Infrastructure Platform of the Digital Library Base on Virtualization Technology -- A New Single Sign-on Solution in Cloud -- A Collaborative Load Control Scheme for Hierachical Mobile IPv6 Network -- A High-efficient Selective Content Encryption Method Suitable for Satellite Communication System -- Network Design of a Low-power Parking Guidance System -- Strategy of Domain and Cross-domain Access Control Based on Trust in Cloud Computing Environment -- Detecting Unhealthy Cloud System Status -- Scoring System of Simulation Training Platform Based on Expert System -- Analysis of Distributed File Systems on Virtualized Cloud Computing Environment -- A Decision Support System with Dynamic Probability Adjustment for Fault Diagnosis in Critical Systems -- Design and Implementation of an SD Interface to Multiple-target Interface Bridge -- Cloud Storage Management Technology for Small File Based on Two-Dimensional Packing Algorithm -- Advertising Media Selection and Delivery Decision-making Using Influence Diagram -- The Application of Trusted Computing Technology in the Cloud Security -- The Application Level of E-commerce in Enterprises in China -- Toward a Trinity Model of Digital Education Resources Construction and Management -- Geographic Information System in the Cloud Computing Environment -- Part V: Embedded Systems -- Memory Controller Design Based on Quadruple Modular Redundant Architecture -- Computer Power Management System Based On the Face Detection -- Twist Rotation Deformation of Titanium Sheet Metal in Laser Curve Bending Based on Finite Element Analysis -- Voltage Transient Stability Analysis by Changing the Control Modes of the Wind Generator -- The Generator Stator Fault Analysis Based on the Multi-loop Theory -- An Improved Edge Flag Algorithm Suitable for Hardware Implementation -- A Handheld Controller with Embedded Real-time Video Transmission Based on TCP/IP Protocol.…”
Format: Electronic eBookFull text (Wentworth users only)
-
137857
The little SAS book : a primer : a programming approach
Cary, NC : SAS Institute, 2012Table of Contents: “…Machine generated contents note: ch. 1 Getting Started Using SAS Software -- 1.1.The SAS Language -- 1.2.SAS Data Sets -- 1.3.DATA and PROC Steps -- 1.4.The DATA Step's Built-in Loop -- 1.5.Choosing a Mode for Submitting SAS Programs -- 1.6.Windows and Commands in the SAS Windowing Environment -- 1.7.Submitting a Program in the SAS Windowing Environment -- 1.8.Reading the SAS Log -- 1.9.Viewing Your Results -- 1.10.SAS Data Libraries -- 1.11.Viewing Data Sets in the Viewtable Window -- 1.12.Viewing the Properties of Data Sets with SAS Explorer -- 1.13.Using SAS System Options -- ch. 2 Getting Your Data into SAS -- 2.1.Methods for Getting Your Data into SAS -- 2.2.Entering Data with the Viewtable Window -- 2.3.Reading Files with the Import Wizard -- 2.4.Telling SAS Where to Find Your Raw Data -- 2.5.Reading Raw Data Separated by Spaces -- 2.6.Reading Raw Data Arranged in Columns -- 2.7.Reading Raw Data Not in Standard Format -- 2.8.Selected Informats -- 2.9.Mixing Input Styles -- 2.10.Reading Messy Raw Data -- 2.11.Reading Multiple Lines of Raw Data per Observation -- 2.12.Reading Multiple Observations per Line of Raw Data -- 2.13.Reading Part of a Raw Data File -- 2.14.Controlling Input with Options in the INFILE Statement -- 2.15.Reading Delimited Files with the DATA Step -- 2.16.Reading Delimited Files with the IMPORT Procedure -- 2.17.Reading Excel Files with the IMPORT Procedure -- 2.18.Temporary versus Permanent SAS Data Sets -- 2.19.Using Permanent SAS Data Sets with LIBNAME Statements -- 2.20.Using Permanent SAS Data Sets by Direct Referencing -- 2.21.Listing the Contents of a SAS Data Set -- ch. 3 Working with Your Data -- 3.1.Creating and Redefining Variables -- 3.2.Using SAS Functions -- 3.3.Selected SAS Character Functions -- 3.4.Selected SAS Numeric Functions -- 3.5.Using IF-THEN Statements -- 3.6.Grouping Observations with IF-THEN/ELSE Statements -- 3.7.Subsetting Your Data -- 3.8.Working with SAS Dates -- 3.9.Selected Date Informats, Functions, and Formats -- 3.10.Using the RETAIN and Sum Statements -- 3.11.Simplifying Programs with Arrays -- 3.12.Using Shortcuts for Lists of Variable Names -- ch. 4 Sorting, Printing, and Summarizing Your Data -- 4.1.Using SAS Procedures -- 4.2.Subsetting in Procedures with the WHERE Statement -- 4.3.Sorting Your Data with PROC SORT -- 4.4.Changing the Sort Order for Character Data -- 4.5.Printing Your Data with PROC PRINT -- 4.6.Changing the Appearance of Printed Values with Formats -- 4.7.Selected Standard Formats -- 4.8.Creating Your Own Formats Using PROC FORMAT -- 4.9.Writing Simple Custom Reports -- 4.10.Summarizing Your Data Using PROC MEANS -- 4.11.Writing Summary Statistics to a SAS Data Set -- 4.12.Counting Your Data with PROC FREQ -- 4.13.Producing Tabular Reports with PROC TABULATE -- 4.14.Adding Statistics to PROC TABULATE Output -- 4.15.Enhancing the Appearance of PROC TABULATE Output -- 4.16.Changing Headers in PROC TABULATE Output -- 4.17.Specifying Multiple Formats for Data Cells in PROC TABULATE Output -- 4.18.Producing Simple Output with PROC REPORT -- 4.19.Using DEFINE Statements in PROC REPORT -- 4.20.Creating Summary Reports with PROC REPORT -- 4.21.Adding Summary Breaks to PROC REPORT Output -- 4.22.Adding Statistics to PROC REPORT Output -- 4.23.Adding Computed Variables to PROC REPORT Output -- 4.24.Grouping Data in Procedures with User-Defined Formats -- ch. 5 Enhancing Your Output with ODS -- 5.1.Concepts of the Output Delivery System -- 5.2.Tracing and Selecting Procedure Output -- 5.3.Creating SAS Data Sets from Procedure Output -- 5.4.Creating Text Output -- 5.5.Creating HTML Output -- 5.6.Creating RTF Output -- 5.7.Creating PDF Output -- 5.8.Customizing Titles and Footnotes -- 5.9.Customizing PROC PRINT with the STYLE= Option -- 5.10.Customizing PROC REPORT with the STYLE= Option -- 5.11.Customizing PROC TABULATE with the STYLE= Option -- 5.12.Adding Traffic-Lighting to Your Output -- 5.13.Selected Style Attributes -- ch. 6 Modifying and Combining SAS Data Sets -- 6.1.Modifying a Data Set Using the SET Statement -- 6.2.Stacking Data Sets Using the SET Statement -- 6.3.Interleaving Data Sets Using the SET Statement -- 6.4.Combining Data Sets Using a One-to-One Match Merge -- 6.5.Combining Data Sets Using a One-to-Many Match Merge -- 6.6.Merging Summary Statistics with the Original Data -- 6.7.Combining a Grand Total with the Original Data -- 6.8.Updating a Master Data Set with Transactions -- 6.9.Writing Multiple Data Sets Using the OUTPUT Statement -- 6.10.Making Several Observations from One Using the OUTPUT Statement -- 6.11.Using SAS Data Set Options -- 6.12.Tracking and Selecting Observations with the IN= Option -- 6.13.Selecting Observations with the WHERE= Option -- 6.14.Changing Observations to Variables Using PROC TRANSPOSE -- 6.15.Using SAS Automatic Variables -- ch. 7 Writing Flexible Code with the SAS Macro Facility -- 7.1.Macro Concepts -- 7.2.Substituting Text with Macro Variables -- 7.3.Concatenating Macro Variables with Other Text -- 7.4.Creating Modular Code with Macros -- 7.5.Adding Parameters to Macros -- 7.6.Writing Macros with Conditional Logic -- 7.7.Writing Data-Driven Programs with CALL SYMPUT -- 7.8.Debugging Macro Errors -- ch. 8 Visualizing Your Data -- 8.1.Concepts of ODS Graphics -- 8.2.Creating Bar Charts -- 8.3.Creating Histograms and Density Curves -- 8.4.Creating Box Plots -- 8.5.Creating Scatter Plots -- 8.6.Creating Series Plots -- 8.7.Creating Fitted Curves -- 8.8.Controlling Axes and Reference Lines -- 8.9.Controlling Legends and Insets -- 8.10.Customizing Graph Attributes -- 8.11.Creating Paneled Graphs -- 8.12.Specifying Image Properties and Saving Graphics Output -- ch. 9 Using Basic Statistical Procedures -- 9.1.Examining the Distribution of Data with PROC UNIVARIATE -- 9.2.Creating Statistical Graphics with PROC UNIVARIATE -- 9.3.Producing Statistics with PROC MEANS -- 9.4.Testing Means with PROC TTEST -- 9.5.Creating Statistical Graphics with PROC TTEST -- 9.6.Testing Categorical Data with PROC FREQ -- 9.7.Creating Statistical Graphics with PROC FREQ -- 9.8.Examining Correlations with PROC CORR -- 9.9.Creating Statistical Graphics with PROC CORR -- 9.10.Using PROC REG for Simple Regression Analysis -- 9.11.Creating Statistical Graphics with PROC REG -- 9.12.Using PROC ANOVA for One-Way Analysis of Variance -- 9.13.Reading the Output of PROC ANOVA -- ch. 10 Exporting Your Data -- 10.1.Methods for Exporting Your Data -- 10.2.Writing Files Using the Export Wizard -- 10.3.Writing Delimited Files with the EXPORT Procedure -- 10.4.Writing Microsoft Excel Files with the EXPORT Procedure -- 10.5.Writing Raw Data Files with the DATA Step -- 10.6.Writing Delimited and HTML Files Using ODS -- ch. 11 Debugging Your SAS Programs -- 11.1.Writing SAS Programs That Work -- 11.2.Fixing Programs That Don't Work -- 11.3.Searching for the Missing Semicolon -- 11.4.Note: INPUT Statement Reached Past the End of a Line -- 11.5.Note: Lost Card -- 11.6.Note: Invalid Data -- 11.7.Note: Missing Values Were Generated -- 11.8.Note: Numeric Values Have Been Converted to Character (or Vice Versa) -- 11.9.DATA Step Produces Wrong Results but No Error Message -- 11.10.Error: Invalid Option, Error: The Option Is Not Recognized, or Error: Statement Is Not Valid -- 11.11.Note: Variable Is Uninitialized or Error: Variable Not Found -- 11.12.SAS Truncates a Character Variable -- 11.13.SAS Stops in the Middle of a Program -- 11.14.SAS Runs Out of Memory or Disk Space.…”
5th ed.
Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
137858
A.M. Klein : Part I: Original poems 1926-1934 ; Part II: Original Poems 1937-1955 and Poetry Translations.
Toronto : University of Toronto Press, 1990Table of Contents: “…Intro -- Contents -- PART 1 -- Contents -- Introduction -- Textual Chronology -- Editorial Procedures -- Acknowledgments -- Biographical Chronology -- ORIGINAL POEMS, 1926-1934 -- 1926 -- The Shechinah of Shadows -- To Keats -- Life and Eternity -- A Kiss -- Auto-da-fé -- Discovery of Spring -- Dissolution -- Last Will and Testament [Version 1] -- Last Will and Testament [Version 2 (1926/c. 1928)] -- Midnight Awakening -- Oracles of the Clock -- Pathetic Fallacy -- Symbols -- Winter -- c. 1927/1927 -- Five Characters -- The Monkey -- Epitaph Forensic -- La Belle Dame sans Merci -- The Lay of the Lady -- Boredom -- Obituary Notices -- 1927 -- Threnody -- Escape -- Protest -- c. 1928/1928 -- Autumn -- Ballad of Signs and Wonders -- Conjectures -- Haunted House -- Joseph -- Mattathias -- A Sequence of Songs -- A Song That the Ships of Jaffa Did Sing in the Night -- These Candle Lights -- To the Jewish Poet -- 1928 -- Five Weapons against Death -- Where Shall I Find Choice Words -- Coward in Consolation -- A Prayer against the Witnessing of Grief -- c. 1926/c. 1928 -- Advice to the Young -- Advice to Young Virgins -- April Disappointments -- April Fool -- April Fulfilment -- Arbiter Bibendi -- Assurance -- Astrologer -- Autumn -- Autumn Night -- Bion in His Old Age -- Blind Girl's Song -- Bounty Royal -- Business -- A Coloured Gentleman -- Composition -- Dark Cleopatra on a Gilded Couch -- Discord of the Crow -- Divine Titillation -- Elegy -- Fable -- February Morning -- Figure -- Finis -- Fragment on the Death of Shelley -- Frankly -- Gargoyle -- Histrionic Sonnet -- Homage -- Invitation -- Letters to One Absent -- Litany -- Lothario -- Manuscript: Thirteenth Century -- Momus -- Nocturne -- October Heresy -- An Old Dame Prates in Galilee -- Orders -- Out of a Pit of Perpendiculars -- The Poet to the Big Business Man -- Preface -- Probabilities.…”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
137859
The arts in the Middle Ages and the Renaissance
New York : F. Ungar Pub. Co., 1964Table of Contents: “…--Benches -- Sideboards -- Dinner Services -- Goblets -- Brassware -- Casks -- Lighting -- Beds -- Carved-wood Furniture -- Locksmith's Work -- Glass and Mirrors -- Room of a Feudal Seigneur -- Costliness of Furniture used for Ecclesiastical Purposes -- Altars -- Censers -- Shrines and Reliquaries -- Gratings and Iron-mountings -- TAPESTRY -- Scriptural Origin of Tapestry -- Needlework Embroidery in Ancient Greek and Roman Times -- Attalic Carpets -- Manufacture of Carpets in Cloisters -- Manufactory at Poitiers in the Twelfth Century -- Bayenx Tapestry, named " De la Roine Mathilde" -- Arras Carpets -- Inventory of the Tapestries of Charles V.; enormous Value of these Embroidered Hangings -- Manufactory at Fontainebleau, under Francis I -- The Manufacture of the Hopital de la Trinite, at Paris -- The Tapestry Workers, Dubourg and Laurent, in the reign of Henry IV -- Factories of Savonnerie and Gobelins -- CERAMIC ART -- Pottery Workshops in the Gallo-Romano Period -- Ceramic Art disappears for several Centuries in Gaul: is again found in the Tenth and Eleventh Centuries -- Probable Influence of Arabian Art in Spain -- Origin of Majolica -- Luca della Robbia and his Successors -- Enamelled Tiles in France, dating from the Twelfth Century -- The Italian Manufactories of Faenza, Rimini, Pesaro, & c -- Beauvais Pottery -- Invention and Works of Bernard Palissy; his History; his Chefs-d'auvre -- The Faience of Thouars, called " Henri II" -- ARMS AND ARMOUR -- Arms of the Time of Charlemagne -- Arms of the Normans at the Time of the Conquest of England -- Progress of Armoury under the Influence of the Crusades -- The Coat of Mail -- The Crossbow -- The Hauberk and the Hoqueton -- The Helmet, the Hat of Iron, the Cervoliere, the Greaves, and the Gauntlet; the Breastplate and the Cuish -- The Casque with Vizor -- Plain Armour and Ribbed Armour -- The Salade Helmet -- Costliness of Armour -- Invention of Gunpowder -- Bombards -- Hand-Cannons -- The Culverin, the Falconet -- The Arquebus with Metal-holder, with Match, and with Wheel -- The Gun and the Pistol -- CARRIAGES AND SADDLERY -- Horsemanship among the Ancients -- The Riding-horse and the Carriage-horse -- Chariots armed with Scythes -- Vehicles of the Romans, the Gauls, and the Franks: Carruca, the Petoritum, the Cisium, the Plastrum, the Basterna, the Carpentum -- Different kinds of Saddle-horses in the Days of Chivalry -- The Spur a distinctive Sign of Nobility: its Origin -- The Saddle, its Origin and its Modifications -- The Tilter -- Carriages -- The Mules of Magistrates -- Corporations of Saddlers and Harness-makers, Lorimors, Coachmakers, Chapuiteurs, Blazonniers, and Saddle-coverers -- GOLD AND SILVER WORK -- Its Antiquity -- The Tresor do Guarrazar -- The Merovingian and Carlovingian Periods. …”
Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
137860
Intelligent Computing, Networking, and Informatics Proceedings of the International Conference on Advanced Computing, Networking, and Informatics, India, June 2013
New Delhi : Springer India : Imprint: Springer, 2014Table of Contents: “…Image and Template Security for Palmprint -- Extending Network Lifetime by Time Constrained Data Aggregation in Wireless Sensor Networks -- The Complex Network Analysis of Power Grid: A Case Study of the West Bengal Power Network -- Comparison and Analysis of Node Deployment for Efficient Coverage in Sensor Network -- Performance Analysis of Routing Protocols for VANETs with Real Vehicular Traces -- A Bluetooth Based Autonomous Mining System -- Transistor Representation of a Low Power Reversible 32-Bit Comparator -- Performance Enhancement of Brillouin Distributed Temperature Sensor Using Optimized Fiber -- To Study the Architectural Designs of a Proposed Comprehensive Software Extractor for Re-Engineering Tool: A Literature Survey -- Detection of Web Based Attacks by Analyzing Web Server Log Files -- A Survey of Energy Aware Routing Protocols and Mechanisms for Mobile Ad hoc Networks -- Lexical Ontology Based Computational Model to Find Semantic Similarity -- Energy Efficient Cluster Based Aggregation Protocol (EECAP) for Heterogeneous Wireless Sensor Networks -- Digital Watermarking Based on Magic Square and Ridgelet Transform Techniques -- Circle of Trust - One-Hop Trust Based Security Paradigm for Resource Constraint MANET -- Design of a Biometric Security System Using Support Vector Machine Classifier -- Impact of Distance Measures on the Performance of Clustering Algorithms -- Gender Identification Using Gait Biometrics -- A Survey on Business Context -- Enhanced Caching for Geocast Routing in Vehicular Ad hoc Network -- Cooperation Enforcement and Collaboration Inducement in Mobile Ad hoc Networks -- Uncoupling of Mobile Cloud Computing Services: An Architectural Perspective -- Nonsubsampled Contourlet Transform Based Image Denoising in Ultrasound Images Using Elliptical Directional Windows and Block Based Noise Estimation -- Marathi Part of Speech Tagger Using Supervised Learning -- Design and Evaluation of N-module Reconfigurable Systems -- Genre Based Classification of Song Using Perceptual Features -- Novel Distributed Dual Beamforming for Randomly Distributed Sensor by Phase Tracking using Bilateral Probability Function -- Electrical Network Modeling of Amino Acid String and its Application in Cancer Cell Prediction -- Generation of AES-like 8-bit Random S-Box and Comparative Study on Randomness of Corresponding Ciphertexts with other 8-bit AES S-Boxes -- BCube-IP: BCube with IP Address Hierarchy -- Image Retrieval Using Fuzzy Color Histogram and Fuzzy String Matching -- A Multi-objective Optimization Approach for Lifetime and Coverage Problem in Wireless Sensor Network -- Evaluation of English to Urdu Machine Translation -- A Novel Edge Detection Technique for Multi-focus Images Using Image Fusion -- Event Detection Refinement Using External Tags for Flickr Collections -- Proposed Threshold Based Certificate Revocation in Mobile Ad hoc Networks -- “Bin SDR”: Effective Algorithm for Wireless Sensor-Actor Network -- An Elliptic Curve Based Hierarchical Cluster Key Management in Wireless Sensor Network -- Probabilistic Approach Based Congestion Aware Swarm Inspired Load Balancing Multipath Data Routing in MANETs -- Integration of Eco-friendly POF Based Splitter and Optical Filter for Low-cost WDM Network Solutions -- Sensor Cloud: The Scalable Architecture for Future Generation Computing -- Partial Fingerprint Matching Using Minutiae Subset -- Genetic Algorithm Based Approach for Adequate Test Data Generation -- ISA: An Intelligent Search Algorithm for Peer-to-Peer Networks -- Modified Graph Cut Algorithm with Adaptive Shape Prior -- Analysis on Optimization of Energy Consumption in Mobile Ad hoc Networks -- Accuracy of Atomic Transaction Scenario for Heterogeneous Distributed Column-oriented Databases -- Implantable CPW Fed Double Crossed Type Triangular Slot Antenna for ISM Band -- Training a Feed-forward Neural Network Using Artificial Bee Colony with Back-propagation Algorithm -- Navigation of Autonomous Mobile Robot Using Adaptive Neuro-fuzzy Controller -- Performance Estimation of Fuzzy Logic Based Mobile Relay Nodes in Dense Multi-hop Cellular Networks -- Local Binary Pattern as a Texture Feature Descriptor in Object Tracking Algorithm -- A Sensor based Technique for Speed Invariant Human Gait Classification -- High Speed 100Gbps/channel DWDM System Design and Simulation -- Performance Analysis of Contention Based Ranging Mechanism for Idle Mode Mobility -- A Novel Approach to Face Detection Using Advanced Support Vector Machine -- Concept Based Clustering of Documents with Missing Semantic Information -- Theoretical Validation of New Class Cohesion Metric against Briand Properties -- RF-SEA Based Feature Selection for Data Classification in Medical Domain -- Optimizing Delay for MAC in Randomly Distributed Wireless Sensor Networks -- An Ontology Based Software Development Environment Using Upgraded Functionalities of Clojure -- Using a Cluster for Efficient Scalability Evaluation of Multithreaded and Event-driven Web Servers -- An Overview of Detection Techniques for Metamorphic Malware -- Temporal Forensics of MPEG Video using Discrete Wavelet Transform and Support Vector Machine -- Securing the Root through SELinux -- Automatic Ontology Extraction from Heterogeneous Documents for E-Learning Applications -- An Appraisal of Service Based Virtual Networks and Virtualization Tools Paves the Way towards Future Internet -- Comparative Analysis and Research Issues in Classification Techniques for Intrusion Detection -- An Apriori Based Vertical Fragmentation Technique for Heterogeneous Distributed Database Transactions -- A Speech Recognition Technique Using MFCC with DWT in Isolated Hindi Words -- Mechanism for Preventing Registration Flooding Attack in SIP -- A Combined Approach: Proactive and Reactive Failure Handling for Efficient Job Execution in Computational Grid -- A Comparative Analysis of Keyword Based and Semantic Based Search Engines -- Slicing MATLAB Simulink/Stateflow Models -- Link Mining Using Strength of Frequent Pattern of Interaction -- Integration of HSV Color Histogram and LMEBP Joint Histogram for Multimedia Image Retrieval -- DBC Co-occurrence Matrix for Texture Image Indexing and Retrieval -- M-Band and Rotated M-Band Dual Tree Complex Wavelet Transform for Texture Image Retrieval -- A Rank-Based Hybrid Algorithm for Scheduling Data- and Computation-Intensive Jobs in Grid Environments -- Performance Evaluation of Video Communications Over 4G Network -- Online Hybrid Model for Online Fraud Prevention and Detection -- An Efficient Approach to Analyze Users’ Interest on Significant Web Access Patterns with Period Constraint -- Efficient Privacy Preserving Distributed Association Rule Mining Protocol Based on Random Number -- Directional Local Quinary Patterns: A New Feature Descriptor for Image Indexing and Retrieval -- Data Mining Approach for Developing Various Models Based on Types of Attack and Feature Selection as Intrusion Detection Systems (IDS) -- Facial Expression Recognition Using Local Binary Patterns with Different Distance Measures -- Cluster Based Routing for Optimal Communication in Port Logistics -- Secure Adaptive Traffic Lights System for VANETs -- Analysis of Image Segmentation Techniques on Morphological and Clustering -- Performance Impact of TCP and UDP on the Mobility Models and Routing Protocols in MANET -- A Survey on Video Segmentation -- A New Paradigm for Open Source Software Development -- A Real Time Signature Verification Technology Using Clustering & Statistical Analysis -- Component-aspect Separation Based Slicing of Aspect-oriented Programs -- Evaluation of Software Understandability Using Rough Sets -- HCDLST: An Indexing Technique for Current and Recent Past Sliding Window Spatiotemporal Data -- Solving Planar Graph Coloring Problem Using PSO with SPV Rule -- Weather Prediction Using Error Minimization Algorithm on Feed Forward Artificial Neural Network -- Mining Association Rules Using Adaptive Particle Swarm Optimization -- Study of Framework of Mobile IP and MANET Integration -- Delay Analysis Various Links Using OPNET Simulator -- GenSeeK: A Novel Parallel Multiple Pattern Recognition Algorithm for DNA Sequences -- Improvement of PAPR in OFDM Systems Using SLM Technique and Digital Modulation Schemes -- Radioactive Pollution Monitoring Using Triangular Deployment in Wireless Sensor Network -- Securing Networks Using Situation Based Firewalls Policies Computations -- Color Image Quantization Scheme Using DBSCAN with K-Means Algorithm -- A Novel Approach to Text Steganography Using Font Size of Invisible Space Characters in Microsoft Word Document -- Personalizing News Documents Using Modified Page Rank Algorithms -- Understanding Query Vulnerabilities for Various SQL Injection Techniques -- Effective Ontology Alignment: An Approach for Resolving the Ontology Heterogeneity Problem for Semantic Information Retrieval -- Classification Technique for Improving User Access on Web Log Data -- A Review on Methods for Query Personalisation -- A Wide Band Compact Microstrip Antenna for DCS/PCS/WLAN Applications -- Analysis of Type-2 Fuzzy Systems for WSN: A Survey -- Fusion of Entropy Based Color Space Selection and Statistical Color Features for Ripeness Classification of Guavas -- Optimal Positioning of Base Station in Wireless Sensor Networks: A Survey -- Testing and Implementation Process in Automation of a University -- Performance of Spectral Efficiency and Blocking Probability Using Distributed Dynamic Channel Allocation -- An Effective Content Based Image Retrieval Using Color, Texture and Shape Feature -- Underwater Communication with IDMA Scheme -- M-ARY PSK Modulation Technique for IDMA Scheme -- A Novel Approach for Eye Gaze and Tilt Estimation -- Enhanced Single Pass Algorithm for Efficient Indexing Using Hashing in Map Reduce Paradigm -- Data Structures for IP Lookups, a Comparative Analysis with Scalability to IPV6 -.…”
Format: Electronic eBookFull text (Wentworth users only)