01846nam 2200385 n 450 99639647170331620221108083842.0(CKB)4330000000354092(EEBO)2248501871(UnM)99854776(EXLCZ)99433000000035409219920804d1612 uy |engurbn||||a|bb|A moderate defence of the Oath of Allegiance[electronic resource] vvherein the author proueth the said Oath to be most lawful, notwithstanding the Popes breues prohibiting the same; and solueth the chiefest obiections that are vsually made against it; perswading the Catholickes not to resist souerainge authoritie in refusing it. Together with the oration of Sixtus 5. in the Consistory at Rome, vpon the murther of Henrie 3. the French King by a friar. Whereunto also is annexed strange reports or newes from Rome. By William Warmington Catholicke priest, and oblate of the holy congregation of S. Ambrose[London Printed by Richard Field] Permissu superiorumAn. Dom. 1612[12], 170, [2] pThe translation of the oration of Sixtus is reprinted from STC 14002.Printer's name from STC.With a final errata leaf.Reproduction of the original in the Henry E. Huntington Library and Art Gallery.eebo-0113Oath of allegiance, 1606Early works to 1800Oath of allegiance, 1606Warmington Williamb. 1555 or 6.1020985SixtusPope,1520-1590.1002444Cu-RivESCu-RivESUk-ESCStRLINWaOLNBOOK996396471703316A moderate defence of the Oath of Allegiance2417602UNISA05497nam 2201621z- 450 991055743340332120210501(CKB)5400000000043389(oapen)https://directory.doabooks.org/handle/20.500.12854/69161(oapen)doab69161(EXLCZ)99540000000004338920202105d2020 |y 0engurmn|---annantxtrdacontentcrdamediacrrdacarrierEntropy in Image Analysis IIBasel, SwitzerlandMDPI - Multidisciplinary Digital Publishing Institute20201 online resource (394 p.)3-03943-160-9 3-03943-161-7 Image analysis is a fundamental task for any application where extracting information from images is required. The analysis requires highly sophisticated numerical and analytical methods, particularly for those applications in medicine, security, and other fields where the results of the processing consist of data of vital importance. This fact is evident from all the articles composing the Special Issue "Entropy in Image Analysis II", in which the authors used widely tested methods to verify their results. In the process of reading the present volume, the reader will appreciate the richness of their methods and applications, in particular for medical imaging and image security, and a remarkable cross-fertilization among the proposed research areas.History of engineering and technologybicsscAMBTCart historyart statisticsatmosphere backgroundbackscattered signalsbalancebit cubeblind image quality assessmentbrain-computer interface (BCI)chaotic systemchaotic systemschiaroscurochildrenchosen plaintext attackcomplexitycompound chaotic systemcomputer visioncontinuous wavelet transform (CWT)convolution neural networkconvolutional neural networkconvolutional neural network (CNN)crowd behavior analysiscrowd motion detectioncryptographydata expansiondata hidingdeclining qualitydeep neural networkdetectabilitydictionary-based codingdiffusiondirection entropyDNA codingDNA computingDuchenne muscular dystrophyelectroencephalography (EEG)engine flameentropyfeature distribution entropyfeature fusionfilteringGolomb-Rice codeshuman visual systemhyperchaotic systemimage binarizationimage chaotic encryptionimage encryptionimage entropyimage information entropyimage preprocessingimage processingimage quality evaluationimage retrievalimage segmentationinfrared radiationIoUKeraskey space calculationkey-point detectionLatin cubelocal entropy filterlossless compressionmachine learningmagnetic resonance imagesmalaria infectionmedical color imagesmedical imagemedical imagingMordell elliptic curvemotor imagery (MI)MXNetneural engineeringneuroaestheticsnode strengthnon-maximum suppressionnormalized entropynuclear spin generatorobject detectionoptical character recognitionpattern classificationpeak signal-to-noise ratiopixel value adjustingPompe diseasepooling methodportrait paintingspseudo-random numbersPythonquantitative muscle ultrasoundquasi-resonant Rossby/drift wave triadsrenaissancerepulsive forceRGBRSNNSS-boxsaliency and distortionsalient crowd motion detectionsecuritysecurity analysissteganographystego imagesubstitution boxsymmetrytexture-feature parametric imagingthresholdingultrasoundweld evaluationweld segmentationHistory of engineering and technologySparavigna Amelia Carolinaedt1304455Sparavigna Amelia CarolinaothBOOK9910557433403321Entropy in Image Analysis II3027435UNINA