Video segmentation has been a key technique for visual information extraction and
plays an important role in digital video processing, pattern recognition, and computer
vision. A wide range of video-based applications will benefit from advances
in video segmentation including security and surveillance, bank transactions monitoring,...
Studying and using light or "photons" to image and then to control and transmit molecular information is among the most challenging and significant research fields to emerge in recent years. One of the fastest growing areas involves research in the temporal imaging of quantum phenomena, ranging from molecular dynamics in the femto...
"Fixed-Point Algorithms for Inverse Problems in Science and Engineering" presents some of the most recent work from top-notch researchers studying projection and other first-order fixed-point algorithms in several areas of mathematics and the applied sciences. The material presented provides a survey of the state-of-the-art...
This book is the outcome the 19th International Conference on Information Systems
Development (ISD 2010), hosted by the faculty of Mathematics and Physics, Charles
University in Prague during 25–27 August 2010.
The ISD conference evolved from the first Polish-Scandinavian Seminar on Current
Trends in Information Systems...
Soft Computing (SC) techniques have been recognized nowadays as attractive
solutions for modeling highly nonlinear or partially defined complex systems
and processes. These techniques resemble biological processes more closely than
conventional (more formal) techniques. However, despite its increasing popularity,
soft computing lacks...
Speaker identification is a widely used technique in several security
systems. In remote access systems, speaker utterances are recoded and
communicated through a communication channel to a receiver that performs the
identification process. Speaker identification is based on characterizing each
speaker with a set of features...
Parallel computing has been confined, for much of its over 40 year history, to highly
specialized, technology-wise advanced domains such as scientific computing or
telecommunications. There were only a few experts who had the background and
experience to write efficient, robust and scalable programs for these parallel machines.
Augmented reality (AR) is a direct or indirect view of real world scenes in which
physical objects are annotated with, or overlaid by computer generated digital information.
The past two decades have seen a fast growing body of research and development
dedicated to techniques and technologies for AR. In particular, due to the
recent...
When I decided to do a sabbatical with Symantec Research Labs Europe in the
beautiful French Riviera, I was asked to work on a project about Voice over IP
(VoIP) security. The goal of the VAMPIRE Project1 was to understand the threats
and vulnerabilities of VoIP systems, and to inform the direction of further research
efforts....
“Hypernumbers and Extrafunctions” presents a rigorous mathematical approach to operate with infinite values. First, concepts of real and complex numbers are expanded to include a new universe of numbers called hypernumbers which includes infinite quantities. This brief extends classical calculus based on real functions by...
Data uncertainty is a concept closely related with most real life applications that involve data collection and interpretation. Examples can be found in data acquired with biomedical instruments or other experimental techniques. Integration of robust optimization in the existing data mining techniques aim to create new algorithms resilient to...
Data Mining and Anlaytics are the foundation technologies for the new knowledge based world where we build models from data and databases to understand and explore our world. Data mining can improve our business, improve our government, and improve our life and with the right tools, any one can begin to explore this new technology, on the path...