Showing 137,841 - 137,860 results of 142,970 for search '(("right" OR (((((("sright" OR "straight") OR "bright") OR "srights") OR "fight") OR (("frights" OR ("frightsss" OR ("frightsss" OR "nightsss"))) OR ("wright" OR ("wrights" OR "rights")))) OR ("flightly" OR "flight"))) OR ("eight" OR "light"))', query time: 1.37s Refine Results
  1. 137841

    The eyes of the dragon : a story by King, Stephen, 1947-

    New York, NY : Viking, 1987
    Format: Book


  2. 137842

    I see a song by Carle, Eric

    New York : Scholastic, 1995
    Format: Book


  3. 137843

    The girl with a donkey tail by Rockwell, Anne F.

    New York : Dutton, 1979
    First edition.
    Format: Book


  4. 137844

    White serpent castle by Namioka, Lensey

    New York : David McKay, 1976
    Format: Book


  5. 137845

    Have you ever heard of a kangaroo bird? : Fascinating facts about unusual birds by Brenner, Barbara

    New York : Coward, McCann & Geoghegan, 1980
    Format: Book


  6. 137846

    Photoshop Elements 13 All-in-One For Dummies by Obermeier, Barbara

    For Dummies, 2014
    1st edition.
    Format: Electronic eBook
    Full text (Wentworth users only)
  7. 137847

    Marvel Comics : the untold story by Howe, Sean

    New York : Harper, 2012
    1st ed.
    Format: Book


  8. 137848

    Addams Family values

    Hollywood, Calif. : Paramount Pictures, 1999
    Widescreen version.
    Format: Video


  9. 137849

    Business communication : speaking

    New York, N.Y. : Films Media Group, 2005
    Format: Electronic Video
    Streaming video (Emerson users only)
  10. 137850

    Making your presentation

    New York, N.Y. : Films Media Group, 2005
    Format: Electronic Video
    Streaming video (Emerson users only)
  11. 137851

    I named her Angel by Dinç, Nefin

    New York, NY : Filmakers Library, 2007
    Format: Electronic Video
    View Streaming Video
  12. 137852

    Own the Room Business Presentations that Persuade, Engage, and Get Results by Booth, David, Shames, Deborah, Desberg, Peter

    McGraw-Hill, 2009
    1st edition.
    Format: Electronic eBook
    Full text (Wentworth users only)
  13. 137853

    How To Present To Absolutely Anyone by Rhodes, Mark

    Ascent Audio, 2019
    1st edition.
    Format: Electronic Audio
    Streaming audio (Wentworth users only)
  14. 137854

    The Agatha Christie Miss Marple movie collection. Agatha Christie's Murder at the gallop

    Burbank, CA : Warner Home Video, 2006
    Format: Video

    This item is not available through FLO. Please contact your home library for further assistance.
  15. 137855

    Addams family values

    [Hollywood, CA] : Paramount Pictures, 1993
    Format: Electronic Video
    Streaming video (Wentworth users only)
  16. 137856

    Computer Engineering and Networking Proceedings of the 2013 International Conference on Computer Engineering and Network (CENet2013) by Wong, W. Eric

    Cham : Springer International Publishing : Imprint: Springer, 2014
    Table of Contents: “…-An Algorithm for Bayesian Networks Structure Learning Based on Simulated Annealing with Adaptive Selection Operator -- Static Image Segmentation Using Polar Space Transformation Technique -- Image Restoration Via Non-local P-Laplace Regularization -- Analysis and Application of Computer Technology on Architectural Space Lighting Visual Design -- Improving Online Gesture Recognition with WarpingLCSS by Multi-Sensor Fusion -- The Lane Mark Identifying and Tracking in Intense Illumination -- Classification Modeling of Multi-featured Remote Sensing Images Based on Sparse Representation -- A Parallel and Convergent Support Vector Machine Based on MapReduce -- Vehicle Classification Based on Hierarchical Support Vector Machine -- Image Splicing Detection Based on Machine Learning Algorithm -- A Lane Detection Algorithm Based on Hyperbola Model -- Comparisons and Analyses of Image Softproofing under Different Profile Rendering Intents -- An Improved Dense Matching Algorithm for Face Based on Region Growing -- An Improved Feature Selection Method for Chinese Short Texts Clustering Based on HowNet -- Internet Worm Detection and Classification Based on Support Vector Machine -- Real-time Fall Detection Based on Global Orientation and Human Shape -- The Classification of Synthetic Aperture Radar Oil Spill Images Based on the Texture Features and Deep Belief Network -- The Ground Objects Identification for Digital Remote Sensing Image Based on the BP Neural Network -- Detection of Image Forgery Based on Improved PCA-SIFT -- A Thinning Model for Handwriting-like Image Skeleton -- Discrimination of the White Wine Based on Sparse Principal Component Analysis and Support Vector Machine -- Volume II -- Part IV: Cloud Computing -- Design of Mobile Electronic Payment System -- Power-saving Based Radio Resource Scheduling in Long Term Evolution Advanced Network -- Dispatching and Management Model Based on Safe Performance Interface for Improving Cloud Efficiency -- A Proposed Methodology for an E-health Monitoring System Based on a Fault-tolerant Smart Mobile -- Design And Application of Indoor Geographical Information System -- Constructing Cloud Computing Infrastructure Platform of the Digital Library Base on Virtualization Technology -- A New Single Sign-on Solution in Cloud -- A Collaborative Load Control Scheme for Hierachical Mobile IPv6 Network -- A High-efficient Selective Content Encryption Method Suitable for Satellite Communication System -- Network Design of a Low-power Parking Guidance System -- Strategy of Domain and Cross-domain Access Control Based on Trust in Cloud Computing Environment -- Detecting Unhealthy Cloud System Status -- Scoring System of Simulation Training Platform Based on Expert System -- Analysis of Distributed File Systems on Virtualized Cloud Computing Environment -- A Decision Support System with Dynamic Probability Adjustment for Fault Diagnosis in Critical Systems -- Design and Implementation of an SD Interface to Multiple-target Interface Bridge -- Cloud Storage Management Technology for Small File Based on Two-Dimensional Packing Algorithm -- Advertising Media Selection and Delivery Decision-making Using Influence Diagram -- The Application of Trusted Computing Technology in the Cloud Security -- The Application Level of E-commerce in Enterprises in China -- Toward a Trinity Model of Digital Education Resources Construction and Management -- Geographic Information System in the Cloud Computing Environment -- Part V: Embedded Systems -- Memory Controller Design Based on Quadruple Modular Redundant Architecture -- Computer Power Management System Based On the Face Detection -- Twist Rotation Deformation of Titanium Sheet Metal in Laser Curve Bending Based on Finite Element Analysis -- Voltage Transient Stability Analysis by Changing the Control Modes of the Wind Generator -- The Generator Stator Fault Analysis Based on the Multi-loop Theory -- An Improved Edge Flag Algorithm Suitable for Hardware Implementation -- A Handheld Controller with Embedded Real-time Video Transmission Based on TCP/IP Protocol.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  17. 137857

    The little SAS book : a primer : a programming approach by Delwiche, Lora D.

    Cary, NC : SAS Institute, 2012
    5th ed.
    Table of Contents: “…Machine generated contents note: ch. 1 Getting Started Using SAS Software -- 1.1.The SAS Language -- 1.2.SAS Data Sets -- 1.3.DATA and PROC Steps -- 1.4.The DATA Step's Built-in Loop -- 1.5.Choosing a Mode for Submitting SAS Programs -- 1.6.Windows and Commands in the SAS Windowing Environment -- 1.7.Submitting a Program in the SAS Windowing Environment -- 1.8.Reading the SAS Log -- 1.9.Viewing Your Results -- 1.10.SAS Data Libraries -- 1.11.Viewing Data Sets in the Viewtable Window -- 1.12.Viewing the Properties of Data Sets with SAS Explorer -- 1.13.Using SAS System Options -- ch. 2 Getting Your Data into SAS -- 2.1.Methods for Getting Your Data into SAS -- 2.2.Entering Data with the Viewtable Window -- 2.3.Reading Files with the Import Wizard -- 2.4.Telling SAS Where to Find Your Raw Data -- 2.5.Reading Raw Data Separated by Spaces -- 2.6.Reading Raw Data Arranged in Columns -- 2.7.Reading Raw Data Not in Standard Format -- 2.8.Selected Informats -- 2.9.Mixing Input Styles -- 2.10.Reading Messy Raw Data -- 2.11.Reading Multiple Lines of Raw Data per Observation -- 2.12.Reading Multiple Observations per Line of Raw Data -- 2.13.Reading Part of a Raw Data File -- 2.14.Controlling Input with Options in the INFILE Statement -- 2.15.Reading Delimited Files with the DATA Step -- 2.16.Reading Delimited Files with the IMPORT Procedure -- 2.17.Reading Excel Files with the IMPORT Procedure -- 2.18.Temporary versus Permanent SAS Data Sets -- 2.19.Using Permanent SAS Data Sets with LIBNAME Statements -- 2.20.Using Permanent SAS Data Sets by Direct Referencing -- 2.21.Listing the Contents of a SAS Data Set -- ch. 3 Working with Your Data -- 3.1.Creating and Redefining Variables -- 3.2.Using SAS Functions -- 3.3.Selected SAS Character Functions -- 3.4.Selected SAS Numeric Functions -- 3.5.Using IF-THEN Statements -- 3.6.Grouping Observations with IF-THEN/ELSE Statements -- 3.7.Subsetting Your Data -- 3.8.Working with SAS Dates -- 3.9.Selected Date Informats, Functions, and Formats -- 3.10.Using the RETAIN and Sum Statements -- 3.11.Simplifying Programs with Arrays -- 3.12.Using Shortcuts for Lists of Variable Names -- ch. 4 Sorting, Printing, and Summarizing Your Data -- 4.1.Using SAS Procedures -- 4.2.Subsetting in Procedures with the WHERE Statement -- 4.3.Sorting Your Data with PROC SORT -- 4.4.Changing the Sort Order for Character Data -- 4.5.Printing Your Data with PROC PRINT -- 4.6.Changing the Appearance of Printed Values with Formats -- 4.7.Selected Standard Formats -- 4.8.Creating Your Own Formats Using PROC FORMAT -- 4.9.Writing Simple Custom Reports -- 4.10.Summarizing Your Data Using PROC MEANS -- 4.11.Writing Summary Statistics to a SAS Data Set -- 4.12.Counting Your Data with PROC FREQ -- 4.13.Producing Tabular Reports with PROC TABULATE -- 4.14.Adding Statistics to PROC TABULATE Output -- 4.15.Enhancing the Appearance of PROC TABULATE Output -- 4.16.Changing Headers in PROC TABULATE Output -- 4.17.Specifying Multiple Formats for Data Cells in PROC TABULATE Output -- 4.18.Producing Simple Output with PROC REPORT -- 4.19.Using DEFINE Statements in PROC REPORT -- 4.20.Creating Summary Reports with PROC REPORT -- 4.21.Adding Summary Breaks to PROC REPORT Output -- 4.22.Adding Statistics to PROC REPORT Output -- 4.23.Adding Computed Variables to PROC REPORT Output -- 4.24.Grouping Data in Procedures with User-Defined Formats -- ch. 5 Enhancing Your Output with ODS -- 5.1.Concepts of the Output Delivery System -- 5.2.Tracing and Selecting Procedure Output -- 5.3.Creating SAS Data Sets from Procedure Output -- 5.4.Creating Text Output -- 5.5.Creating HTML Output -- 5.6.Creating RTF Output -- 5.7.Creating PDF Output -- 5.8.Customizing Titles and Footnotes -- 5.9.Customizing PROC PRINT with the STYLE= Option -- 5.10.Customizing PROC REPORT with the STYLE= Option -- 5.11.Customizing PROC TABULATE with the STYLE= Option -- 5.12.Adding Traffic-Lighting to Your Output -- 5.13.Selected Style Attributes -- ch. 6 Modifying and Combining SAS Data Sets -- 6.1.Modifying a Data Set Using the SET Statement -- 6.2.Stacking Data Sets Using the SET Statement -- 6.3.Interleaving Data Sets Using the SET Statement -- 6.4.Combining Data Sets Using a One-to-One Match Merge -- 6.5.Combining Data Sets Using a One-to-Many Match Merge -- 6.6.Merging Summary Statistics with the Original Data -- 6.7.Combining a Grand Total with the Original Data -- 6.8.Updating a Master Data Set with Transactions -- 6.9.Writing Multiple Data Sets Using the OUTPUT Statement -- 6.10.Making Several Observations from One Using the OUTPUT Statement -- 6.11.Using SAS Data Set Options -- 6.12.Tracking and Selecting Observations with the IN= Option -- 6.13.Selecting Observations with the WHERE= Option -- 6.14.Changing Observations to Variables Using PROC TRANSPOSE -- 6.15.Using SAS Automatic Variables -- ch. 7 Writing Flexible Code with the SAS Macro Facility -- 7.1.Macro Concepts -- 7.2.Substituting Text with Macro Variables -- 7.3.Concatenating Macro Variables with Other Text -- 7.4.Creating Modular Code with Macros -- 7.5.Adding Parameters to Macros -- 7.6.Writing Macros with Conditional Logic -- 7.7.Writing Data-Driven Programs with CALL SYMPUT -- 7.8.Debugging Macro Errors -- ch. 8 Visualizing Your Data -- 8.1.Concepts of ODS Graphics -- 8.2.Creating Bar Charts -- 8.3.Creating Histograms and Density Curves -- 8.4.Creating Box Plots -- 8.5.Creating Scatter Plots -- 8.6.Creating Series Plots -- 8.7.Creating Fitted Curves -- 8.8.Controlling Axes and Reference Lines -- 8.9.Controlling Legends and Insets -- 8.10.Customizing Graph Attributes -- 8.11.Creating Paneled Graphs -- 8.12.Specifying Image Properties and Saving Graphics Output -- ch. 9 Using Basic Statistical Procedures -- 9.1.Examining the Distribution of Data with PROC UNIVARIATE -- 9.2.Creating Statistical Graphics with PROC UNIVARIATE -- 9.3.Producing Statistics with PROC MEANS -- 9.4.Testing Means with PROC TTEST -- 9.5.Creating Statistical Graphics with PROC TTEST -- 9.6.Testing Categorical Data with PROC FREQ -- 9.7.Creating Statistical Graphics with PROC FREQ -- 9.8.Examining Correlations with PROC CORR -- 9.9.Creating Statistical Graphics with PROC CORR -- 9.10.Using PROC REG for Simple Regression Analysis -- 9.11.Creating Statistical Graphics with PROC REG -- 9.12.Using PROC ANOVA for One-Way Analysis of Variance -- 9.13.Reading the Output of PROC ANOVA -- ch. 10 Exporting Your Data -- 10.1.Methods for Exporting Your Data -- 10.2.Writing Files Using the Export Wizard -- 10.3.Writing Delimited Files with the EXPORT Procedure -- 10.4.Writing Microsoft Excel Files with the EXPORT Procedure -- 10.5.Writing Raw Data Files with the DATA Step -- 10.6.Writing Delimited and HTML Files Using ODS -- ch. 11 Debugging Your SAS Programs -- 11.1.Writing SAS Programs That Work -- 11.2.Fixing Programs That Don't Work -- 11.3.Searching for the Missing Semicolon -- 11.4.Note: INPUT Statement Reached Past the End of a Line -- 11.5.Note: Lost Card -- 11.6.Note: Invalid Data -- 11.7.Note: Missing Values Were Generated -- 11.8.Note: Numeric Values Have Been Converted to Character (or Vice Versa) -- 11.9.DATA Step Produces Wrong Results but No Error Message -- 11.10.Error: Invalid Option, Error: The Option Is Not Recognized, or Error: Statement Is Not Valid -- 11.11.Note: Variable Is Uninitialized or Error: Variable Not Found -- 11.12.SAS Truncates a Character Variable -- 11.13.SAS Stops in the Middle of a Program -- 11.14.SAS Runs Out of Memory or Disk Space.…”
    Format: Book


  18. 137858

    A.M. Klein : Part I: Original poems 1926-1934 ; Part II: Original Poems 1937-1955 and Poetry Translations. by Klein, A. M.

    Toronto : University of Toronto Press, 1990
    Table of Contents: “…Intro -- Contents -- PART 1 -- Contents -- Introduction -- Textual Chronology -- Editorial Procedures -- Acknowledgments -- Biographical Chronology -- ORIGINAL POEMS, 1926-1934 -- 1926 -- The Shechinah of Shadows -- To Keats -- Life and Eternity -- A Kiss -- Auto-da-fé -- Discovery of Spring -- Dissolution -- Last Will and Testament [Version 1] -- Last Will and Testament [Version 2 (1926/c. 1928)] -- Midnight Awakening -- Oracles of the Clock -- Pathetic Fallacy -- Symbols -- Winter -- c. 1927/1927 -- Five Characters -- The Monkey -- Epitaph Forensic -- La Belle Dame sans Merci -- The Lay of the Lady -- Boredom -- Obituary Notices -- 1927 -- Threnody -- Escape -- Protest -- c. 1928/1928 -- Autumn -- Ballad of Signs and Wonders -- Conjectures -- Haunted House -- Joseph -- Mattathias -- A Sequence of Songs -- A Song That the Ships of Jaffa Did Sing in the Night -- These Candle Lights -- To the Jewish Poet -- 1928 -- Five Weapons against Death -- Where Shall I Find Choice Words -- Coward in Consolation -- A Prayer against the Witnessing of Grief -- c. 1926/c. 1928 -- Advice to the Young -- Advice to Young Virgins -- April Disappointments -- April Fool -- April Fulfilment -- Arbiter Bibendi -- Assurance -- Astrologer -- Autumn -- Autumn Night -- Bion in His Old Age -- Blind Girl's Song -- Bounty Royal -- Business -- A Coloured Gentleman -- Composition -- Dark Cleopatra on a Gilded Couch -- Discord of the Crow -- Divine Titillation -- Elegy -- Fable -- February Morning -- Figure -- Finis -- Fragment on the Death of Shelley -- Frankly -- Gargoyle -- Histrionic Sonnet -- Homage -- Invitation -- Letters to One Absent -- Litany -- Lothario -- Manuscript: Thirteenth Century -- Momus -- Nocturne -- October Heresy -- An Old Dame Prates in Galilee -- Orders -- Out of a Pit of Perpendiculars -- The Poet to the Big Business Man -- Preface -- Probabilities.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  19. 137859

    The arts in the Middle Ages and the Renaissance by Jacob, P. L., 1806-1884

    New York : F. Ungar Pub. Co., 1964
    Table of Contents: “…--Benches -- Sideboards -- Dinner Services -- Goblets -- Brassware -- Casks -- Lighting -- Beds -- Carved-wood Furniture -- Locksmith's Work -- Glass and Mirrors -- Room of a Feudal Seigneur -- Costliness of Furniture used for Ecclesiastical Purposes -- Altars -- Censers -- Shrines and Reliquaries -- Gratings and Iron-mountings -- TAPESTRY -- Scriptural Origin of Tapestry -- Needlework Embroidery in Ancient Greek and Roman Times -- Attalic Carpets -- Manufacture of Carpets in Cloisters -- Manufactory at Poitiers in the Twelfth Century -- Bayenx Tapestry, named " De la Roine Mathilde" -- Arras Carpets -- Inventory of the Tapestries of Charles V.; enormous Value of these Embroidered Hangings -- Manufactory at Fontainebleau, under Francis I -- The Manufacture of the Hopital de la Trinite, at Paris -- The Tapestry Workers, Dubourg and Laurent, in the reign of Henry IV -- Factories of Savonnerie and Gobelins -- CERAMIC ART -- Pottery Workshops in the Gallo-Romano Period -- Ceramic Art disappears for several Centuries in Gaul: is again found in the Tenth and Eleventh Centuries -- Probable Influence of Arabian Art in Spain -- Origin of Majolica -- Luca della Robbia and his Successors -- Enamelled Tiles in France, dating from the Twelfth Century -- The Italian Manufactories of Faenza, Rimini, Pesaro, & c -- Beauvais Pottery -- Invention and Works of Bernard Palissy; his History; his Chefs-d'auvre -- The Faience of Thouars, called " Henri II" -- ARMS AND ARMOUR -- Arms of the Time of Charlemagne -- Arms of the Normans at the Time of the Conquest of England -- Progress of Armoury under the Influence of the Crusades -- The Coat of Mail -- The Crossbow -- The Hauberk and the Hoqueton -- The Helmet, the Hat of Iron, the Cervoliere, the Greaves, and the Gauntlet; the Breastplate and the Cuish -- The Casque with Vizor -- Plain Armour and Ribbed Armour -- The Salade Helmet -- Costliness of Armour -- Invention of Gunpowder -- Bombards -- Hand-Cannons -- The Culverin, the Falconet -- The Arquebus with Metal-holder, with Match, and with Wheel -- The Gun and the Pistol -- CARRIAGES AND SADDLERY -- Horsemanship among the Ancients -- The Riding-horse and the Carriage-horse -- Chariots armed with Scythes -- Vehicles of the Romans, the Gauls, and the Franks: Carruca, the Petoritum, the Cisium, the Plastrum, the Basterna, the Carpentum -- Different kinds of Saddle-horses in the Days of Chivalry -- The Spur a distinctive Sign of Nobility: its Origin -- The Saddle, its Origin and its Modifications -- The Tilter -- Carriages -- The Mules of Magistrates -- Corporations of Saddlers and Harness-makers, Lorimors, Coachmakers, Chapuiteurs, Blazonniers, and Saddle-coverers -- GOLD AND SILVER WORK -- Its Antiquity -- The Tresor do Guarrazar -- The Merovingian and Carlovingian Periods. …”
    Format: Book


  20. 137860

    Intelligent Computing, Networking, and Informatics Proceedings of the International Conference on Advanced Computing, Networking, and Informatics, India, June 2013 by Mohapatra, Durga Prasad

    New Delhi : Springer India : Imprint: Springer, 2014
    Table of Contents: “…Image and Template Security for Palmprint -- Extending Network Lifetime by Time Constrained Data Aggregation in Wireless Sensor Networks -- The Complex Network Analysis of Power Grid: A Case Study of the West Bengal Power Network -- Comparison and Analysis of Node Deployment for Efficient Coverage in Sensor Network -- Performance Analysis of Routing Protocols for VANETs with Real Vehicular Traces -- A Bluetooth Based Autonomous Mining System -- Transistor Representation of a Low Power Reversible 32-Bit Comparator -- Performance Enhancement of Brillouin Distributed Temperature Sensor Using Optimized Fiber -- To Study the Architectural Designs of a Proposed Comprehensive Software Extractor for Re-Engineering Tool: A Literature Survey -- Detection of Web Based Attacks by Analyzing Web Server Log Files -- A Survey of Energy Aware Routing Protocols and Mechanisms for Mobile Ad hoc Networks -- Lexical Ontology Based Computational Model to Find Semantic Similarity -- Energy Efficient Cluster Based Aggregation Protocol (EECAP) for Heterogeneous Wireless Sensor Networks -- Digital Watermarking Based on Magic Square and Ridgelet Transform Techniques -- Circle of Trust - One-Hop Trust Based Security Paradigm for Resource Constraint MANET -- Design of a Biometric Security System Using Support Vector Machine Classifier -- Impact of Distance Measures on the Performance of Clustering Algorithms -- Gender Identification Using Gait Biometrics -- A Survey on Business Context -- Enhanced Caching for Geocast Routing in Vehicular Ad hoc Network -- Cooperation Enforcement and Collaboration Inducement in Mobile Ad hoc Networks -- Uncoupling of Mobile Cloud Computing Services: An Architectural Perspective -- Nonsubsampled Contourlet Transform Based Image Denoising in Ultrasound Images Using Elliptical Directional Windows and Block Based Noise Estimation -- Marathi Part of Speech Tagger Using Supervised Learning -- Design and Evaluation of N-module Reconfigurable Systems -- Genre Based Classification of Song Using Perceptual Features -- Novel Distributed Dual Beamforming for Randomly Distributed Sensor by Phase Tracking using Bilateral Probability Function -- Electrical Network Modeling of Amino Acid String and its Application in Cancer Cell Prediction -- Generation of AES-like 8-bit Random S-Box and Comparative Study on Randomness of Corresponding Ciphertexts with other 8-bit AES S-Boxes -- BCube-IP: BCube with IP Address Hierarchy -- Image Retrieval Using Fuzzy Color Histogram and Fuzzy String Matching -- A Multi-objective Optimization Approach for Lifetime and Coverage Problem in Wireless Sensor Network -- Evaluation of English to Urdu Machine Translation -- A Novel Edge Detection Technique for Multi-focus Images Using Image Fusion -- Event Detection Refinement Using External Tags for Flickr Collections -- Proposed Threshold Based Certificate Revocation in Mobile Ad hoc Networks -- “Bin SDR”: Effective Algorithm for Wireless Sensor-Actor Network -- An Elliptic Curve Based Hierarchical Cluster Key Management in Wireless Sensor Network -- Probabilistic Approach Based Congestion Aware Swarm Inspired Load Balancing Multipath Data Routing in MANETs -- Integration of Eco-friendly POF Based Splitter and Optical Filter for Low-cost WDM Network Solutions -- Sensor Cloud: The Scalable Architecture for Future Generation Computing -- Partial Fingerprint Matching Using Minutiae Subset -- Genetic Algorithm Based Approach for Adequate Test Data Generation -- ISA: An Intelligent Search Algorithm for Peer-to-Peer Networks -- Modified Graph Cut Algorithm with Adaptive Shape Prior -- Analysis on Optimization of Energy Consumption in Mobile Ad hoc Networks -- Accuracy of Atomic Transaction Scenario for Heterogeneous Distributed Column-oriented Databases -- Implantable CPW Fed Double Crossed Type Triangular Slot Antenna for ISM Band -- Training a Feed-forward Neural Network Using Artificial Bee Colony with Back-propagation Algorithm -- Navigation of Autonomous Mobile Robot Using Adaptive Neuro-fuzzy Controller -- Performance Estimation of Fuzzy Logic Based Mobile Relay Nodes in Dense Multi-hop Cellular Networks -- Local Binary Pattern as a Texture Feature Descriptor in Object Tracking Algorithm -- A Sensor based Technique for Speed Invariant Human Gait Classification -- High Speed 100Gbps/channel DWDM System Design and Simulation -- Performance Analysis of Contention Based Ranging Mechanism for Idle Mode Mobility -- A Novel Approach to Face Detection Using Advanced Support Vector Machine -- Concept Based Clustering of Documents with Missing Semantic Information -- Theoretical Validation of New Class Cohesion Metric against Briand Properties -- RF-SEA Based Feature Selection for Data Classification in Medical Domain -- Optimizing Delay for MAC in Randomly Distributed Wireless Sensor Networks -- An Ontology Based Software Development Environment Using Upgraded Functionalities of Clojure -- Using a Cluster for Efficient Scalability Evaluation of Multithreaded and Event-driven Web Servers -- An Overview of Detection Techniques for Metamorphic Malware -- Temporal Forensics of MPEG Video using Discrete Wavelet Transform and Support Vector Machine -- Securing the Root through SELinux -- Automatic Ontology Extraction from Heterogeneous Documents for E-Learning Applications -- An Appraisal of Service Based Virtual Networks and Virtualization Tools Paves the Way towards Future Internet -- Comparative Analysis and Research Issues in Classification Techniques for Intrusion Detection -- An Apriori Based Vertical Fragmentation Technique for Heterogeneous Distributed Database Transactions -- A Speech Recognition Technique Using MFCC with DWT in Isolated Hindi Words -- Mechanism for Preventing Registration Flooding Attack in SIP -- A Combined Approach: Proactive and Reactive Failure Handling for Efficient Job Execution in Computational Grid -- A Comparative Analysis of Keyword Based and Semantic Based Search Engines -- Slicing MATLAB Simulink/Stateflow Models -- Link Mining Using Strength of Frequent Pattern of Interaction -- Integration of HSV Color Histogram and LMEBP Joint Histogram for Multimedia Image Retrieval -- DBC Co-occurrence Matrix for Texture Image Indexing and Retrieval -- M-Band and Rotated M-Band Dual Tree Complex Wavelet Transform for Texture Image Retrieval -- A Rank-Based Hybrid Algorithm for Scheduling Data- and Computation-Intensive Jobs in Grid Environments -- Performance Evaluation of Video Communications Over 4G Network -- Online Hybrid Model for Online Fraud Prevention and Detection -- An Efficient Approach to Analyze Users’ Interest on Significant Web Access Patterns with Period Constraint -- Efficient Privacy Preserving Distributed Association Rule Mining Protocol Based on Random Number -- Directional Local Quinary Patterns: A New Feature Descriptor for Image Indexing and Retrieval -- Data Mining Approach for Developing Various Models Based on Types of Attack and Feature Selection as Intrusion Detection Systems (IDS) -- Facial Expression Recognition Using Local Binary Patterns with Different Distance Measures -- Cluster Based Routing for Optimal Communication in Port Logistics -- Secure Adaptive Traffic Lights System for VANETs -- Analysis of Image Segmentation Techniques on Morphological and Clustering -- Performance Impact of TCP and UDP on the Mobility Models and Routing Protocols in MANET -- A Survey on Video Segmentation -- A New Paradigm for Open Source Software Development -- A Real Time Signature Verification Technology Using Clustering & Statistical Analysis -- Component-aspect Separation Based Slicing of Aspect-oriented Programs -- Evaluation of Software Understandability Using Rough Sets -- HCDLST: An Indexing Technique for Current and Recent Past Sliding Window Spatiotemporal Data -- Solving Planar Graph Coloring Problem Using PSO with SPV Rule -- Weather Prediction Using Error Minimization Algorithm on Feed Forward Artificial Neural Network -- Mining Association Rules Using Adaptive Particle Swarm Optimization -- Study of Framework of Mobile IP and MANET Integration -- Delay Analysis Various Links Using OPNET Simulator -- GenSeeK: A Novel Parallel Multiple Pattern Recognition Algorithm for DNA Sequences -- Improvement of PAPR in OFDM Systems Using SLM Technique and Digital Modulation Schemes -- Radioactive Pollution Monitoring Using Triangular Deployment in Wireless Sensor Network -- Securing Networks Using Situation Based Firewalls Policies Computations -- Color Image Quantization Scheme Using DBSCAN with K-Means Algorithm -- A Novel Approach to Text Steganography Using Font Size of Invisible Space Characters in Microsoft Word Document -- Personalizing News Documents Using Modified Page Rank Algorithms -- Understanding Query Vulnerabilities for Various SQL Injection Techniques -- Effective Ontology Alignment: An Approach for Resolving the Ontology Heterogeneity Problem for Semantic Information Retrieval -- Classification Technique for Improving User Access on Web Log Data -- A Review on Methods for Query Personalisation -- A Wide Band Compact Microstrip Antenna for DCS/PCS/WLAN Applications -- Analysis of Type-2 Fuzzy Systems for WSN: A Survey -- Fusion of Entropy Based Color Space Selection and Statistical Color Features for Ripeness Classification of Guavas -- Optimal Positioning of Base Station in Wireless Sensor Networks: A Survey -- Testing and Implementation Process in Automation of a University -- Performance of Spectral Efficiency and Blocking Probability Using Distributed Dynamic Channel Allocation -- An Effective Content Based Image Retrieval Using Color, Texture and Shape Feature -- Underwater Communication with IDMA Scheme -- M-ARY PSK Modulation Technique for IDMA Scheme -- A Novel Approach for Eye Gaze and Tilt Estimation -- Enhanced Single Pass Algorithm for Efficient Indexing Using Hashing in Map Reduce Paradigm -- Data Structures for IP Lookups, a Comparative Analysis with Scalability to IPV6 -.…”
    Format: Electronic eBook
    Full text (Wentworth users only)