Sciweavers

919 search results - page 165 / 184
» Improved analysis methods for crossover-based algorithms
Sort
View
148
Voted
AMC
2007
134views more  AMC 2007»
15 years 3 months ago
An image fragile watermark scheme based on chaotic image pattern and pixel-pairs
Fragile watermarking techniques for digital content have been studied in the past few years. Fragile watermarks are used to determine if a piece of watermarked digital content has...
Shaohui Liu, Hongxun Yao, Wen Gao, Yongliang Liu
128
Voted
JCIT
2008
124views more  JCIT 2008»
15 years 3 months ago
A Knowledge based Approach Using Fuzzy Inference Rules for Vowel Recognition
Automatic speech recognition by machine is one of the most efficient methods for man-machine communications. Because speech waveform is nonlinear and variant. Speech recognition r...
Hrudaya K. Tripathy, B. K. Tripathy, Pradip K. Das
132
Voted
IAJIT
2007
146views more  IAJIT 2007»
15 years 3 months ago
Adaptive Optimizing of Hello Messages in Wireless Ad-Hoc Networks
: Routing is an important functional aspect in wireless ad-hoc networks that handles discovering and maintaining the paths between nodes within a network. Due to nodes mobility, th...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...
151
Voted
SMA
2008
ACM
154views Solid Modeling» more  SMA 2008»
15 years 3 months ago
Consistent computation of first- and second-order differential quantities for surface meshes
Differential quantities, including normals, curvatures, principal directions, and associated matrices, play a fundamental role in geometric processing and physics-based modeling. ...
Xiangmin Jiao, Hongyuan Zha
148
Voted
IPM
2007
158views more  IPM 2007»
15 years 3 months ago
Validation and interpretation of Web users' sessions clusters
Understanding users’ navigation on the Web is important towards improving the quality of information and the speed of accessing large-scale Web data sources. Clustering of users...
George Pallis, Lefteris Angelis, Athena Vakali