 |
|
 Linkage in Evolutionary Computation (Studies in Computational Intelligence)In recent years, the issue of linkage in GEAs has garnered greater attention and recognition from researchers. Conventional approaches that rely much on ad hoc tweaking of parameters to control the search by balancing the level of exploitation and exploration are grossly inadequate. As shown in the work reported here, such parameters tweaking based... |  |  Color Constancy (The Wiley-IS&T Series in Imaging Science and Technology)A human observer is able to recognize the color of objects irrespective of the light used to illuminate the objects. This ability is called color constancy. In photography, color constancy is known under the name white balance. Most amateur photographers have probably experienced the following problem at one time or another when a photograph is... |  |  IP Routing Primer PlusIP Routing Primer Plus takes the reader on a methodical journey through the OSI model and shows the relationship of the different IP protocol suite. It gives the readers a "big picture view" design to equip them to use the protocols, or to prepare for a certification exam. Topics covered include a review of the OSI model as well as:
... |
|
|
 Multilingual Speech ProcessingTanja Schultz and Katrin Kirchhoff have compiled a comprehensive overview of speech processing from a multilingual perspective. By taking this all-inclusive approach to speech processing, the editors have included theories, algorithms, and techniques that are required to support spoken input and output in a large variety of languages. This book... |  |  |  |  Learning OpenCV: Computer Vision with the OpenCV LibraryLearning OpenCV puts you right in the middle of the rapidly expanding field of computer vision. Written by the creators of OpenCV, the widely used free open-source library, this book introduces you to computer vision and demonstrates how you can quickly build applications that enable computers to "see" and make decisions based on the... |
|
 Multimedia Forensics and SecurityAs information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research and development agendas for researchers,... |  |  Biometric System and Data Analysis: Design, Evaluation, and Data MiningBiometric systems are being used in more places and on a larger scale than ever before. As these systems mature, it is vital to ensure the practitioners responsible for development and deployment, have a strong understanding of the fundamentals of tuning biometric systems. The focus of biometric research over the past four decades has... |  |  Computer Telephony Integration, Second EditionSince the publication of the first edition, the CTI world has changed significantly. Where it was once focused on the integration of voice systems with computers, the focus is now on IP-based voice, or converged networks and services. Today, the telcos are upgrading their systems from circuit-switched to IP-based packet-switched networks. Companies... |
|
| Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 |