Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Mahbubur. R. Syed"'
Publikováno v:
International Journal of Computer Network and Information Security. 7:1-9
Speech synthesis is the process of producing natural-sounding, highly intelligible synthetic speech simulated by a machine in such a way that it sounds as if it was produced by a human vocal system. A text-to-speech (TTS) synthesis system is a comput
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::60cd41b00630259f08e3824214dffcb2
https://doi.org/10.4018/978-1-59140-561-0.ch135
https://doi.org/10.4018/978-1-59140-561-0.ch135
In recent years the Internet has become the most popular and useful medium for information interchange due to its wide availability, flexibility, universal standards, and distributed architecture. As an outcome of increased dependency on the Internet
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1ecd6461cbbc6a27170db5d1de5e0e7b
https://doi.org/10.4018/978-1-59140-561-0.ch106
https://doi.org/10.4018/978-1-59140-561-0.ch106
Publikováno v:
Agent Supported Cooperative Work ISBN: 9781461348344
Computer Supported Collaborative Work (CSCW) has led to many advances in both the study of cooperative work groups and the development of collaboration technologies. CSCW can be automated by having autonomous agents to assist or simulate people. This
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6c6fd18430e7b6d3b5748f7fd81350fd
https://doi.org/10.1007/978-1-4419-9200-0_12
https://doi.org/10.1007/978-1-4419-9200-0_12
By developing an inter-scheme text conversion utility, we have established in (Murshed et al., 1998) that use of non-lossy transformation instead of lossy transformation for sorting Bengali texts in linguistic order has some extra benefit. In this pa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3a819d91870e6654674336a99b7709aa
https://doi.org/10.4018/978-1-931777-07-0.ch014
https://doi.org/10.4018/978-1-931777-07-0.ch014
The security of multimedia data is important for multimedia commerce. The encryption algorithms with high security, such as DES and IDEA, may not be suitable for multimedia applications because of large data sizes and real time constraint. This paper
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e1ed21edf92f37300eb97cd25247267c
https://doi.org/10.4018/978-1-931777-07-0.ch016
https://doi.org/10.4018/978-1-931777-07-0.ch016
This chapter provides a comprehensive overview of various methods of fuzzy logic-based image segmentation techniques. Fuzzy image segmentation techniques outperform conventional techniques, as they are able to evaluate imprecise data as well as being
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9857ddf7e6f5b3b478e6cdf2c569af62
https://doi.org/10.4018/978-1-930708-00-6.ch014
https://doi.org/10.4018/978-1-930708-00-6.ch014