Index

  • Abnormality, 184
  • Aerial dataset, 5
  • Antiphishing, 221
  • Artificial intelligence, 119, 146
  • Attribute data, 4
  • Australia, 126–127
  • Avocado,
    • dip, 151–160
  • Chain codes, 91, 92, 93
  • Character recognition, 201
  • Characteristic, 183
  • Classification, 1–3, 6–9, 12, 13, 16–21, 25–28, 31–36, 218, 221
  • Clinical, 183, 185, 188–191, 195–196
  • Clustering, 14, 19
  • Color,
    • analysis, 151–152, 154
    • distribution, 154–157
    • evolution, 155–156
    • invariance, 154, 159–160
    • plots, 156–157
    • space, 152–156, 159
  • Computed PSNR value, 77, 78
  • Computed PT, 78, 79
  • Computed SNR value, 77, 78
  • Computer vision, 151–152, 159–161
  • Convolutional neural network, 203–2012
  • Coverage, 1–3, 5–7, 21, 23, 30, 33, 34
  • Feature extraction, 73
  • Felzenszwalb’s method, 22
  • Floods, 119–146
  • Food,
    • industry, 151
    • science, 159–162
  • Fourier descriptors, 102, 103
  • Foursquare data, 1, 3, 5, 6, 8, 11, 20–22, 31–33, 35
  • Gaussian noise, 9, 11
  • GIS, 4
  • GLCM matrix, 16
  • Handwritten character recognition, 202
  • Hu invariant moments, 100
  • Image, 152, 154–156, 160
    • acquisition, 152–153
    • analysis, 151–152
  • Kappa coefficient, 30
  • K-means, 9
  • Openstreetmap data, 4
  • Pakistan, 120, 122, 123
  • Password, 218, 225, 227
  • Pest detection model, 73
  • Pest identification, 73
  • Pests, 71
  • Phishing,
    • avoidance, 226
    • blacklist-based approaches, 219
    • CANTINA-based approaches, 220
    • content-based approaches, 218
    • detection, 223
    • heuristics-based approaches, 219
    • image-based approaches, 220
    • prevention, 224
    • recovery, 226
    • visual methods, 227
    • whitelist-based approaches, 220
  • Phishtank, 219, 223, 224
  • Point data, 4
  • Polygonal approximation, 93, 94, 95
  • Pre-processing, 7, 11
  • Processing of CFB, 76
  • Processing of GW, 76
  • Processing of LGB, 75
  • Processing of RRFB, 75
  • Processing of RW, 74
  • Satellite images, 1, 5–11, 13, 21, 24, 25, 28, 33
  • Screening, 185 –191, 197
  • SED methods, 70
  • Segmentation, 14, 36
  • SG, 70
  • Spatially referenced data, 4
  • SVM, 25, 26
  • YUY2 color space, 153
  • Zernike moments, 101
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.219.96.188