"Due to increasing potential in real-world applications such as visual communications, computer assisted biomedical imaging, and video surveillance, image and video interpretations have become an area of growing interest.Intelligent Image and Video Interpretation: Algorithms and Applications covers all aspects of image and video analysis from low-level early visions to high-level recognition. This publication highlights how these techniq ..."
"Algorithms and Applications Tian, Jing ... IEEE Transactions on Circuits System
Video Technology, 15(6), 953–958. doi:10.1109/TCSVT.2005.848304 Wu, H., ...
Paper presented at the IEEE Computer Society Conference on Computer Vision
and Pattern Recognition. New York, NY. Yang, X. S. (2005). ... Peng, Y., & Hong,
H. Y. (2001). ... tampering methods and countermeasures using digital
watermarking. ... ACM Computing Surveys, 38(4). doi:1 ..."
"An advanced level examination of the latest developments in power transformer protection This book addresses the technical challenges of transformer malfunction analysis as well as protection. One of the current research directions is the malfunction mechanism analysis due to nonlinearity of transformer core and comprehensive countermeasures on improving the performance of transformer differential protection. Here, the authors summariz ..."
Physical Inorganic Chemistry Principles, Methods & Applications [Hardcover] [Jan 01, 2016] Ting Tian, Jing Hu by TING TIAN AND JING TU , Hardcover, Published 2017 by G E-Learning ISBN-13: 978-1-68251-095-7, ISBN: 1-68251-095-6
"A porous materials is a solid that is saturated by an interconnected network of pores filled with liquid or gas. It is inorganic or organic, cross-linked or uncross-linked, containing pores of all sizes. The pore network is assumed to be continuous, forming two interpenetrating containua such as in a sponge. Examples of porous media range from porous silicon which is porous on the subnanometer scale to limestone caves and underground ri ..."
"This book aims to pose one major research question, i.e. why and how to use knowledge management methods in order to enhance knowledge creation in academia ? at universities and research institutes? Two surveys and case studies were carried out to achieve the research purpose at a Japanese research university. The first survey focused on knowledge management in academia and investigated the current KM situations, special and diverse req ..."
"This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium pap ..."
"Acknowledgements I gratefully acknowledge the contributions and advice
provided by my dissertation committee members: Dr. Nancy Atkinson, Assistant
Professor, Department of Public and Community Health; Dr. Barry Portnoy,
Senior ..."
"Of the nine RGD-dependent, fibronectin-binding integrins, α5β1 and αvβ3 are
important for fibronectin-mediated cell adhesion and are upregulated during
angiogenesis. A recent collaboration with E. Helene Sage and Sarah E. Funk,
indicates ..."
Private Education in China(1st Edition) Achievement and Challenge (Perspectives on Rethinking and Reforming Education) by Qiang Liu, Haitao Zhou, JingTian Hardcover, 216 Pages, Published 2018 by Springer ISBN-13: 978-981-10-4408-3, ISBN: 981-10-4408-2
"This book takes an in-depth look at the development of the private education sector in modern China. Readers will find valuable data and materials never before presented in such an accessible and transparent way, together with analyses of the major changes and challenges in the course of this development. The book is organized both chronologically and by topic: it employs a past-present-future order that unites the general arrangement ..."
"This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium pap ..."
Critical Thinking of Chinese Students The influence of undergraduate learning contexts on Chinese graduate students' argumentation and critical thinking by JingTian Paperback, Published 2013 by Lap Lambert Academic Pub 01/02/2013 ISBN-13: 978-3-659-21320-5, ISBN: 3-659-21320-9
人类行为与社会环境 by JINGTIAN KUI DENG Paperback, 323 Pages, Published 2011 by 高等教育出版社 ISBN-13: 978-7-5087-3408-8, ISBN: 7-5087-3408-4