Listing 1 - 4 of 4 |
Sort by
|
Choose an application
This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India. The Volume I of this double-volume book contains fourteen high quality book chapters in three different parts. Part 1 is on Pattern Recognition and it presents four chapters. Part 2 is on Imaging and Healthcare Applications contains four more book chapters. The Part 3 of this volume is on Wireless Sensor Networking and it includes as many as six chapters. Volume II of the book has three Parts presenting a total of eleven chapters in it. Part 4 consists of five excellent chapters on Software Engineering ranging from cloud service design to transactional memory. Part 5 in Volume II is on Cryptography with two book chapters in it. Part 6 of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers.
Engineering. --- Signal, Image and Speech Processing. --- Computational Intelligence. --- Communications Engineering, Networks. --- Telecommunication. --- Ingénierie --- Télécommunications --- Computer architecture -- Congresses. --- Image processing -- Digital techniques -- Congresses. --- Pattern recognition systems -- Congresses. --- Wireless sensor networks -- Congresses. --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Telecommunications --- Electrical Engineering --- Applied Physics --- Computer networks --- Computers --- Security measures. --- Access control. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computational intelligence. --- Electrical engineering. --- Electric engineering --- Engineering --- Intelligence, Computational --- Artificial intelligence --- Construction --- Industrial arts --- Technology --- Soft computing --- Computer security --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Communication --- Information theory --- Telecommuting --- Signal processing. --- Image processing. --- Speech processing systems. --- Computational linguistics --- Electronic systems --- Modulation theory --- Oral communication --- Speech --- Telecommunication --- Singing voice synthesizers --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Processing, Signal --- Information measurement --- Signal theory (Telecommunication)
Choose an application
This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India. The Volume I of this double-volume book contains fourteen high quality book chapters in three different parts. Part 1 is on Pattern Recognition and it presents four chapters. Part 2 is on Imaging and Healthcare Applications contains four more book chapters. The Part 3 of this volume is on Wireless Sensor Networking and it includes as many as six chapters. Volume II of the book has three Parts presenting a total of eleven chapters in it. Part 4 consists of five excellent chapters on Software Engineering ranging from cloud service design to transactional memory. Part 5 in Volume II is on Cryptography with two book chapters in it. Part 6 of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers.
Engineering. --- Signal, Image and Speech Processing. --- Computational Intelligence. --- Communications Engineering, Networks. --- Telecommunication. --- Ingénierie --- Télécommunications --- Artificial intelligence -- Congresses. --- Artificial intelligence -- Industrial applications -- Congresses. --- Soft computing -- Congresses. --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Electrical Engineering --- Applied Physics --- Pattern recognition systems --- Image processing --- Wireless sensor networks --- Digital techniques --- WSNs (Sensor networks) --- Computational intelligence. --- Electrical engineering. --- Electric engineering --- Engineering --- Intelligence, Computational --- Artificial intelligence --- Construction --- Industrial arts --- Technology --- Soft computing --- Computer networks --- Low voltage systems --- Sensor networks --- Wireless communication systems --- Context-aware computing --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Communication --- Information theory --- Telecommuting --- Signal processing. --- Image processing. --- Speech processing systems. --- Computational linguistics --- Electronic systems --- Modulation theory --- Oral communication --- Speech --- Telecommunication --- Singing voice synthesizers --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Processing, Signal --- Information measurement --- Signal theory (Telecommunication)
Choose an application
This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India. The Volume I of this double-volume book contains fourteen high quality book chapters in three different parts. Part 1 is on Pattern Recognition and it presents four chapters. Part 2 is on Imaging and Healthcare Applications contains four more book chapters. The Part 3 of this volume is on Wireless Sensor Networking and it includes as many as six chapters. Volume II of the book has three Parts presenting a total of eleven chapters in it. Part 4 consists of five excellent chapters on Software Engineering ranging from cloud service design to transactional memory. Part 5 in Volume II is on Cryptography with two book chapters in it. Part 6 of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers.
Electrical engineering --- Applied physical engineering --- Mass communications --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- neuronale netwerken --- DIP (documentimage processing) --- beeldverwerking --- fuzzy logic --- cybernetica --- spraaktechnologie --- KI (kunstmatige intelligentie) --- elektrotechniek --- communicatietechnologie --- signaalverwerking --- AI (artificiële intelligentie)
Choose an application
This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India. The Volume I of this double-volume book contains fourteen high quality book chapters in three different parts. Part 1 is on Pattern Recognition and it presents four chapters. Part 2 is on Imaging and Healthcare Applications contains four more book chapters. The Part 3 of this volume is on Wireless Sensor Networking and it includes as many as six chapters. Volume II of the book has three Parts presenting a total of eleven chapters in it. Part 4 consists of five excellent chapters on Software Engineering ranging from cloud service design to transactional memory. Part 5 in Volume II is on Cryptography with two book chapters in it. Part 6 of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers.
Electrical engineering --- Applied physical engineering --- Mass communications --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- neuronale netwerken --- DIP (documentimage processing) --- beeldverwerking --- fuzzy logic --- cybernetica --- spraaktechnologie --- KI (kunstmatige intelligentie) --- elektrotechniek --- communicatietechnologie --- signaalverwerking --- AI (artificiële intelligentie)
Listing 1 - 4 of 4 |
Sort by
|