Home | Amazing | Today | Tags | Publishers | Years | Search 
Video Segmentation and Its Applications
Video Segmentation and Its Applications

Video segmentation has been a key technique for visual information extraction and plays an important role in digital video processing, pattern recognition, and computer vision. A wide range of video-based applications will benefit from advances in video segmentation including security and surveillance, bank transactions monitoring,...

Quantum Dynamic Imaging: Theoretical and Numerical Methods (CRM Series in Mathematical Physics)
Quantum Dynamic Imaging: Theoretical and Numerical Methods (CRM Series in Mathematical Physics)

Studying and using light or "photons" to image and then to control and transmit molecular information is among the most challenging and significant research fields to emerge in recent years. One of the fastest growing areas involves research in the temporal imaging of quantum phenomena, ranging from molecular dynamics in the femto...

Fixed-Point Algorithms for Inverse Problems in Science and Engineering (Springer Optimization and Its Applications)
Fixed-Point Algorithms for Inverse Problems in Science and Engineering (Springer Optimization and Its Applications)

"Fixed-Point Algorithms for Inverse Problems in Science and Engineering" presents some of the most recent work from top-notch researchers studying projection and other first-order fixed-point algorithms in several areas of mathematics and the applied sciences. The material presented provides a survey of the state-of-the-art...

Information Systems Development: Business Systems and Services: Modeling and Development
Information Systems Development: Business Systems and Services: Modeling and Development

This book is the outcome the 19th International Conference on Information Systems Development (ISD 2010), hosted by the faculty of Mathematics and Physics, Charles University in Prague during 25–27 August 2010.

The ISD conference evolved from the first Polish-Scandinavian Seminar on Current Trends in Information Systems...

Speech Processing and Soft Computing
Speech Processing and Soft Computing

Soft Computing (SC) techniques have been recognized nowadays as attractive solutions for modeling highly nonlinear or partially defined complex systems and processes. These techniques resemble biological processes more closely than conventional (more formal) techniques. However, despite its increasing popularity, soft computing lacks...

Information Security for Automatic Speaker Identification
Information Security for Automatic Speaker Identification
Speaker identification is a widely used technique in several security systems. In remote access systems, speaker utterances are recoded and communicated through a communication channel to a receiver that performs the identification process. Speaker identification is based on characterizing each speaker with a set of features...
Programming Many-Core Chips
Programming Many-Core Chips

Parallel computing has been confined, for much of its over 40 year history, to highly specialized, technology-wise advanced domains such as scientific computing or telecommunications. There were only a few experts who had the background and experience to write efficient, robust and scalable programs for these parallel machines.

...

Recent Trends of Mobile Collaborative Augmented Reality Systems
Recent Trends of Mobile Collaborative Augmented Reality Systems

Augmented reality (AR) is a direct or indirect view of real world scenes in which physical objects are annotated with, or overlaid by computer generated digital information. The past two decades have seen a fast growing body of research and development dedicated to techniques and technologies for AR. In particular, due to the recent...

Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research
Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research

When I decided to do a sabbatical with Symantec Research Labs Europe in the beautiful French Riviera, I was asked to work on a project about Voice over IP (VoIP) security. The goal of the VAMPIRE Project1 was to understand the threats and vulnerabilities of VoIP systems, and to inform the direction of further research efforts....

Hypernumbers and Extrafunctions: Extending the Classical Calculus (SpringerBriefs in Mathematics)
Hypernumbers and Extrafunctions: Extending the Classical Calculus (SpringerBriefs in Mathematics)

“Hypernumbers and Extrafunctions” presents a rigorous mathematical approach to operate with infinite values. First, concepts of real and complex numbers are expanded to include a new universe of numbers called hypernumbers which includes infinite quantities. This brief extends classical calculus based on real functions by...

Robust Data Mining (SpringerBriefs in Optimization)
Robust Data Mining (SpringerBriefs in Optimization)

Data uncertainty is a concept closely related with most real life applications that involve data collection and interpretation. Examples can be found in data acquired with biomedical instruments or other experimental techniques. Integration of robust optimization in the existing data mining techniques aim to create new algorithms resilient to...

Data Mining with Rattle and R: The Art of Excavating Data for Knowledge Discovery (Use R!)
Data Mining with Rattle and R: The Art of Excavating Data for Knowledge Discovery (Use R!)
Data Mining and Anlaytics are the foundation technologies for the new knowledge based world where we build models from data and databases to understand and explore our world. Data mining can improve our business, improve our government, and improve our life and with the right tools, any one can begin to explore this new technology, on the path...
Result Page: Previous 2028 2029 2030 2031 2032 2033 2034 2035 2036 2037 2038 2039 2040 2041 2042 2043 2044 2045 2046 2047 2048 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy