As the popularity of the Internet continues growing, there are more and more services appeared, security measures are expected to become all the most important on the Internet. Pe...
In this application of artificial intelligence to a real-world problem, the constrained scheduling of employee resourcing for a mall type shop is solved by means of a genetic algo...
In this paper we provide an adaptive modulation approach that uses adaptive pilot symbols which both pilot spacing and power allocation on pilot symbols are optimized in single in...
Foveation principles suggested by natural vision systems enable the construction of a proper mask that may modulate the coefficients given by the Discrete Wavelet Transform of an ...
This paper presents a discussion concerning EEG signals compression using the basis pursuit (BP) approach applied for several overcomplete wavelet dictionaries. The compression is...
The stereo matching algorithms for binocular vision are very popular and widely applied. However, the algorithms may have lower matching quality or higher time complexity. To impr...
The identification of source camera is useful to improve the capability of evidence in the digital image such as distinguish the photographer taking illegal images and adopting di...
Middleware facilitates the development of distributed systems by accommodating heterogeneity, hiding distribution details and providing a set of common and domain specific service...