Sciweavers

70 search results - page 13 / 14
» A Neural Network Approach for Visual Cryptography
Sort
View
IJPRAI
2000
135views more  IJPRAI 2000»
13 years 6 months ago
Towards Unrestricted Lip Reading
Lip reading provides useful information in speech perception and language understanding, especially when the auditory speech is degraded. However, many current automatic lip readi...
Uwe Meier, Rainer Stiefelhagen, Jie Yang, Alex Wai...
GECCO
2006
Springer
147views Optimization» more  GECCO 2006»
13 years 9 months ago
Evolving a real-world vehicle warning system
Many serious automobile accidents could be avoided if drivers were warned of impending crashes before they occur. Creating such warning systems by hand, however, is a difficult an...
Nate Kohl, Kenneth O. Stanley, Risto Miikkulainen,...
ICASSP
2007
IEEE
14 years 15 days ago
Eigentongue Feature Extraction for an Ultrasound-Based Silent Speech Interface
The article compares two approaches to the description of ultrasound vocal tract images for application in a “silent speech interface,” one based on tongue contour modeling, a...
Thomas Hueber, Guido Aversano, Gérard Choll...
JCNS
2011
87views more  JCNS 2011»
13 years 1 months ago
Information-geometric measure of 3-neuron firing patterns characterizes scale-dependence in cortical networks
To understand the functional connectivity of neural networks, it is important to develop simple and incisive descriptors of multineuronal firing patterns. Analysis at the pairwise...
Ifije E. Ohiorhenuan, Jonathan D. Victor
HAIS
2009
Springer
13 years 10 months ago
Pareto-Based Multi-output Model Type Selection
In engineering design the use of approximation models (= surrogate models) has become standard practice for design space exploration, sensitivity analysis, visualization and optimi...
Dirk Gorissen, Ivo Couckuyt, Karel Crombecq, Tom D...