- Abnormality, 184
- Aerial dataset,
- Antiphishing, 221
- Artificial intelligence, 119, 146
- Attribute data,
- Australia, 126–127
- Avocado,
- Benchmark, 183, 193, 195–196
- Bilateral filtering,
- Bivariate frequency histogram, 154, 158–159
- Blindness, 183–184
- Blood vessel, 192
- Bridge, 126, 142, 166, 167, 175, 176, 178
- Browser, 218, 225
- Built-up area, 12–14, 19, 21, 23
- Chain codes, 91, 92, 93
- Character recognition, 201
- Characteristic, 183
- Classification, –3, –9, 12, 13, 16–21, 25–28, 31–36, 218, 221
- Clinical, 183, 185, 188–191, 195–196
- Clustering, 14, 19
- Color,
- Computed PSNR value, 77, 78
- Computed PT, 78, 79
- Computed SNR value, 77, 78
- Computer vision, 151–152, 159–161
- Convolutional neural network, 203–2012
- Coverage, –3, –7, 21, 23, 30, 33, 34
- Damage, 119, 121, 122, 126, 142, 143, 147, 163, 164
- Data acquisition, 72
- Datamining, 221–223
- Decision tree, 26, 35
- Defects, 162, 163, 164, 166, 168, 170, 172, 177, 178
- Diabetes, 183–196
- Diabetic retinopathy, 183–186, 194
- Diagnose, 183, 185, 196
- Disaster, 164, 165, 168
- Disaster in Pakistan, 120, 122, 123
- Dynamic security skins, 220
- Edge detection, 72
- Edge enhancement,
- E-mail, 222, 223, 225
- Enhancement, 186, 190, 194, 195, 197
- Feature extraction, 73
- Felzenszwalb’s method, 22
- Floods, 119–146
- Food,
- industry, 151
- science, 159–162
- Fourier descriptors, 102, 103
- Foursquare data, , , , , , 11, 20–22, 31–33, 35
- Gaussian noise, , 11
- GIS,
- GLCM matrix, 16
- Handwritten character recognition, 202
- Hu invariant moments, 100
- Image, 152, 154–156, 160
- acquisition, 152–153
- analysis, 151–152
- Image processing, 119, 132, 141, 142, 143, 147, 153–154, 162, 163, 164, 166, 168, 170, 172, 177, 178
- Kappa coefficient, 30
- K-means,
- Land-cover, –8, 10, 12, 18, 25, 28, 32–36
- Landmarks, 182, 185–186, 195
- Land-use, –8, 10, 11, 20, 21, 23–25, 28, 31–35
- Lesions, 183–197
- Lightness a* b* (L*a*b*), 152, 154–156, 160
- Machine learning, 218, 220–224, 227
- MATLAB codes, 106–118
- Microwave treatment, 151, 162
- Moments, 96, 97, 98, 99, 100
- Naïve Bayesian, 25, 26
- Noise, 132, 133, 142, 146, 166, 167, 174, 177
- Pakistan, 120, 122, 123
- Password, 218, 225, 227
- Pest detection model, 73
- Pest identification, 73
- Pests, 71
- Phishing,
- avoidance, 226
- blacklist-based approaches, 219
- CANTINA-based approaches, 220
- content-based approaches, 218
- detection, 223
- heuristics-based approaches, 219
- image-based approaches, 220
- prevention, 224
- recovery, 226
- visual methods, 227
- whitelist-based approaches, 220
- Phishtank, 219, 223, 224
- Point data,
- Polygonal approximation, 93, 94, 95
- Pre-processing, , 11
- Processing of CFB, 76
- Processing of GW, 76
- Processing of LGB, 75
- Processing of RRFB, 75
- Processing of RW, 74
- Random forest, , 13, 16–19, 25
- Red green blue (RGB), 152–155
- Referenced data,
- Retina, 183–197
- Roads, 126, 143, 144, 147, 166, 167, 175, 176, 178
- Satellite images, , –11, 13, 21, 24, 25, 28, 33
- Screening, 185 –191, 197
- SED methods, 70
- Segmentation, 14, 36
- SG, 70
- Spatially referenced data,
- SVM, 25, 26
- VGI, , , 11, 32, 33
- Visualization, –4, , 23, 24, 25, 31, 34
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.