Outlier correction method of telemetry data based on wavelet transformation and Wright criterion (Englisch)
- Neue Suche nach: Ma, Z.
- Neue Suche nach: Ma, Z.
In:
MULTIMEDIA TOOLS AND APPLICATIONS
;
75
, 22
;
14477-14489
;
2016
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Outlier correction method of telemetry data based on wavelet transformation and Wright criterion
-
Beteiligte:Ma, Z. ( Autor:in )
-
Erschienen in:MULTIMEDIA TOOLS AND APPLICATIONS ; 75, 22 ; 14477-14489
-
Verlag:
- Neue Suche nach: Springer Science + Business Media
-
Erscheinungsdatum:01.01.2016
-
Format / Umfang:13 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 005.3 / 004.6
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 75, Ausgabe 22
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 14015
-
Guest Editorial: Pervasive Multimedia Computing—Systems Applications and ServicesLing, Nam / Chen, Shu-Ching / Park, Doo-Soon et al. | 2016
- 14019
-
Towards robust and reliable multimedia analysis through semantic integration of servicesDe Meester, Ben / Verborgh, Ruben / Pauwels, Pieter / De Neve, Wesley / Mannens, Erik / Van de Walle, Rik et al. | 2015
- 14039
-
The disclosure of evaporating digital trails respecting the combinations of Gmail and IE for pervasive multimediaChu, Hai-Cheng / Yin, Ming-Hao / Hsu, Ching-Hsien / Park, Jong Hyuk et al. | 2014
- 14057
-
Vertex relocation: a feature-preserved terrain rendering method for pervasive computing environmentsLee, Eun-Seok / Lee, Jin-Hee / Shin, Byeong-Seok et al. | 2015
- 14075
-
A mobile authentication system resists to shoulder-surfing attacksLuo, Jia-Ning / Yang, Ming-Hour et al. | 2015
- 14089
-
DRM cloud framework to support heterogeneous digital rights management systemsLee, Hyejoo / Park, Suwan / Seo, Changho / Shin, Sang Uk et al. | 2015
- 14111
-
An efficient expression technique for promotional video production based on IoT(the internet of things) in cultural art institutionsChoi, Hak-Hyun / Lim, Seung-Ae / Kim, Jung-Hee et al. | 2014
- 14125
-
A sensor-based feet motion recognition of graphical user interface controlsChiang, Hua-Pei / Lai, Chin-Feng / Lai, Ying-Hsun / Huang, Yueh-Min et al. | 2015
- 14143
-
Secure code design against collusion attacks for protecting digital content rightsKim, Youngmo et al. | 2016
- 14161
-
Comparison of OpenCL and RenderScript for mobile devicesKim, SeongKi / Kim, Seok-Kyoo et al. | 2016
- 14181
-
Design of database for evaluating 3D audio core algorithmsKang, Sanggil / Hwang, Jaemin / Kim, Jeonghyuk / Heo, Nojeong et al. | 2015
- 14197
-
Guest Editorial: Multimedia Medical Device (MMD) Designing and Clinical ApplicationsYang, Jiachen / Lv, Zhihan / Yin, Tengfei et al. | 2016
- 14203
-
TCM clinic records data mining approaches based on weighted-LDA and multi-relationship LDA modelLin, Fan / Xiahou, Jianbing / Xu, Zhuxiang et al. | 2016
- 14233
-
Overlapping boundary based multimedia slice transcoding method and its system for medical video and traffic videoZhu, Dingju et al. | 2016
- 14247
-
Robot-assisted mirror ultrasound scanning for deep venous thrombosis detection using RGB-D sensorMeng, Bo / Zhao, Ying-ying / Chen, Lei / Aalamifar, Fereshteh / Liu, Xue-jun / Boctor, Emad et al. | 2016
- 14263
-
A fine-grained context-aware access control model for health care and life science linked dataLiu, Zhengtao / Wang, Jiandong et al. | 2016
- 14281
-
A traffic anomaly detection approach in communication networks for applications of multimedia medical devicesJiang, Dingde / Yuan, Zhen / Zhang, Peng / Miao, Lei / Zhu, Ting et al. | 2016
- 14307
-
QoS constraints-based energy-efficient model in cloud computing networks for multimedia clinical issuesJiang, Dingde / Shi, Lei / Zhang, Peng / Ge, Xiongzi et al. | 2016
- 14329
-
An evolutionary game theory-based channel access mechanism for wireless multimedia sensor network with rate-adaptive applicationsZhu, Jiang / Jiang, Dingde / Yuan, Ying-hui / Li, Fang-wei et al. | 2016
- 14351
-
Study of medical device innovation design strategy based on demand analysis and process case baseGuo, Xin / Wang, Jie / Zhao, Wu / Zhang, Kai / Wang, Chen et al. | 2015
- 14367
-
Study on medical image enhancement based on IFOA improved grayscale image adaptive enhancementXie, Yuxi / He, Yonggui / Cheng, Aibin / Zhang, Junwei et al. | 2016
- 14381
-
Iris based secure NROI multiple eye image watermarking for teleophthalmologyPandey, Richa / Singh, Amit Kumar / Kumar, Basant / Mohan, Anand et al. | 2016
- 14399
-
Error-correcting output codes for multi-label emotion classificationLi, Chao / Feng, Zhiyong / Xu, Chao et al. | 2016
- 14417
-
Statistical modeling in the shearlet domain for blind image quality assessmentLu, Wen / Xu, Tianjiao / Ren, Yuling / He, Lihuo et al. | 2016
- 14433
-
Autonomy in individual behavior under multimedia informationZhu, Guiyan / Huang, Chuanchao / Hu, Bin / Li, Guangyu et al. | 2016
- 14451
-
Ant colony optimization based polymorphism-aware routing algorithm for ad hoc UAV networkYu, Yunlong / Ru, Le / Chi, Wensheng / Liu, Yaqing / Yu, Qiangqiang / Fang, Kun et al. | 2016
- 14477
-
Outlier correction method of telemetry data based on wavelet transformation and Wright criterionMa, Zhigang / Liu, Wenyi et al. | 2016
- 14491
-
The foundation of a color-chip evaluation system of jadeite-jade green with color difference control of medical deviceGuo, Ying / Wang, Huan / Du, Hongmei et al. | 2016
- 14503
-
Guest Editorial: Information and Communication Security in Multimedia ApplicationsCho, Jaeik / Wang, Shiuh-Jeng et al. | 2016
- 14507
-
Evaluate mobile video quality in hybrid spatial and temporal domainChen, Chao / Ji, Wen / Rho, Seungmin / Chen, Bo-Wei / Chen, Yiqiang et al. | 2015
- 14525
-
Improved preimage attacks on hash modes of 8-round AES-256Hong, Deukjo / Kim, Dong-Chan / Kwon, Daesung / Kim, Jongsung et al. | 2015
- 14541
-
Design of USIM-based secure user authentication scheme in a mobile office environmentKim, Jun-Sub / Kwak, Jin et al. | 2015
- 14557
-
Application of sensor network system to prevent suicide from the bridgeLee, Julak / Lee, Chang-Moo / Park, Nam-Kwun et al. | 2015
- 14569
-
A conceptual device-rank based resource sharing and collaboration of smart thingsKang, Hyunjoong / Kim, Marie / Bae, MyungNam / Bang, Hyo-Chan / Yoe, Hyun et al. | 2015
- 14583
-
IoT as a applications: cloud-based building management systems for the internet of thingsYu, Jaehak / Kim, Marie / Bang, Hyo-Chan / Bae, Sang-Hyun / Kim, Se-Jin et al. | 2015
- 14597
-
Enhancing industrial security management system for multimedia environmentLee, Chi-Seok / Park, Wonhyung et al. | 2015
- 14617
-
Abnormal event detection in crowded scenes based on deep learningFang, Zhijun / Fei, Fengchang / Fang, Yuming / Lee, Changhoon / Xiong, Naixue / Shu, Lei / Chen, Sheng et al. | 2016
- 14641
-
The protocol design and New approach for SCADA security enhancement during sensors broadcasting systemShahzad, Aamir / Lee, Malrey / Lee, Changhoon / Xiong, Naixue / Kim, Suntae / Lee, Young-Keun / Kim, Kangmin / Woo, Seon-mi / Jeong, Gisung et al. | 2015
- 14669
-
Early width estimation of fragmented JPEG with corrupted headerAyalneh, Dessalegn Atnafu / Choi, YongSoo / Kim, Hyoung Joong et al. | 2015
- 14685
-
A fast ARX model-based image encryption schemeChoi, Jongseok / Seok, Seonhee / Seo, Hwajeong / Kim, Howon et al. | 2016
- 14707
-
Location-oriented multiplexing transmission for capillary machine-to-machine systemsPark, Hyunhee / Kim, Eui-Jik et al. | 2015
- 14721
-
Data investigation based on XFS file system metadataPark, Yongmin / Chang, Hyunsoo / Shon, Taeshik et al. | 2015
- 14745
-
Network protocol fuzz testing for information systems and applications: a survey and taxonomyMunea, Tewodros Legesse / Lim, Hyunwoo / Shon, Taeshik et al. | 2015
- 14759
-
Evaluating the significance of error checksums for wireless video streamingShaheen, Saima / Khannum, Aasia / Akram, M. Usman / Khan, Shoab A. / Seo, SangHyun / Javed, M Younas et al. | 2015
- 14783
-
Context-Aware Recommendation Model based on Mobile Application Analysis PlatformKim, Ahyoung / Lee, Junwoo / Kim, Mucheol et al. | 2015
- 14795
-
Information security research classification for future multimedia environmentKim, Hyeri / Kim, Yanghoon / Chang, Hangbae et al. | 2015
- 14807
-
Research on android malware permission pattern using permission monitoring systemJu, Seung-hwan / Seo, Hee-suk / Kwak, Jin et al. | 2016
- 14819
-
Faster elliptic curve arithmetic for triple-base chain by reordering sequences of field operationsCho, Sung Min / Gwak, Seung Gyu / Kim, Chang Han / Hong, Seokhie et al. | 2016
- 14833
-
Hardware-assisted credential management scheme for preventing private data analysis from cloning attacksChoi, Jongwon / Na, Geonbae / Yi, Jeong Hyun et al. | 2016
- 14849
-
Cross-layer quality enhancement scheme for video transmission over multi-hop wireless networksKe, Chih-Heng / Lin, Kawuu W. / Huang, Chih-Ang / Chen, Yeong-Sheng / Park, Sang Oh et al. | 2015
- 14867
-
A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an imageMuhammad, Khan / Sajjad, Muhammad / Mehmood, Irfan / Rho, Seungmin / Baik, Sung Wook et al. | 2015
- 14895
-
A greedy steganographic SMVQ approach of greedy-USBIRDS using secret bits for image-block repairing based on differencesWang, Wei-Jen / Huang, Cheng-Ta / Tsuei, Shiau-Rung / WANG, Shiuh-Jeng et al. | 2015
- 14917
-
Collusion attack-resistant watermarking scheme using correlation peak position modulationNah, Jihah / Kim, Jongweon et al. | 2014
- 14927
-
Collaborative privacy framework for minimizing privacy risks in an IPTV social recommender serviceElmisery, Ahmed M. / Rho, Seungmin / Botvich, Dmitri et al. | 2014
- 14959
-
An artistic photographic collage on a mobile deviceKang, Dongwann / Seo, Sanghyun et al. | 2014
- 14971
-
A study of user relationships in smartphone forensicsChoi, Jisung / Lee, Sangjin et al. | 2016
- 14985
-
Guest Editorial: Analysis and Retrieval of Events/Actions and Workflows in Video StreamsDoulamis, Anastasios / Doulamis, Nikolaos / Bertini, Marco / Gonzalez, Jordi / Moeslund, Thomas et al. | 2016
- 14991
-
Hand gesture recognition with jointly calibrated Leap Motion and depth sensorMarin, Giulio / Dominio, Fabio / Zanuttigh, Pietro et al. | 2015
- 15017
-
3D measures exploitation for a monocular semi-supervised fall detection systemMakantasis, Konstantinos / Protopapadakis, Eftychios / Doulamis, Anastasios / Doulamis, Nikolaos / Matsatsinis, Nikolaos et al. | 2015
- 15051
-
Semi-supervised vision-based maritime surveillance system using fused visual attention mapsMakantasis, Konstantinos / Protopapadakis, Eftychios / Doulamis, Anastasios / Matsatsinis, Nikolaos et al. | 2015
- 15079
-
Complex video event detection via pairwise fusion of trajectory and multi-label hypergraphsChen, Xiao-jun / Zhan, Yong-zhao / Ke, Jia / Chen, Xiao-bo et al. | 2015
- 15101
-
An efficient subsequence search for video anomaly detection and localizationCheng, Kai-Wen / Chen, Yie-Tarng / Fang, Wen-Hsien et al. | 2015
- 15123
-
An automatic event-complementing human life summarization scheme based on a social computing method over social media contentNtalianis, Klimis / Doulamis, Nikolaos et al. | 2015