Search Results for - Narrowed by: Springer E-Book Collection - Chaki, Nabendu. editor. - Signal, Image and Speech Processing.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dAUTHOR$002509Yazar$002509Chaki$00252C$002bNabendu.$002beditor.$002509Chaki$00252C$002bNabendu.$002beditor.$0026qf$003dSUBJECT$002509Konu$002509Signal$00252C$002bImage$002band$002bSpeech$002bProcessing.$002509Signal$00252C$002bImage$002band$002bSpeech$002bProcessing.$0026ps$003d300?2024-05-19T08:38:23ZProgress in Advanced Computing and Intelligent Engineering Proceedings of ICACIE 2016, Volume 2ent://SD_ILS/0/SD_ILS:2234352024-05-19T08:38:23Z2024-05-19T08:38:23ZYazar Saeed, Khalid. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6875-1">https://doi.org/10.1007/978-981-10-6875-1</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Sixent://SD_ILS/0/SD_ILS:2223312024-05-19T08:38:23Z2024-05-19T08:38:23ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8183-5">https://doi.org/10.1007/978-981-10-8183-5</a><br/>Format: Electronic Resources<br/>Advanced Computational and Communication Paradigms Proceedings of International Conference on ICACCP 2017, Volume 2ent://SD_ILS/0/SD_ILS:2230702024-05-19T08:38:23Z2024-05-19T08:38:23ZYazar Bhattacharyya, Siddhartha. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8237-5">https://doi.org/10.1007/978-981-10-8237-5</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Fiveent://SD_ILS/0/SD_ILS:2237172024-05-19T08:38:23Z2024-05-19T08:38:23ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8180-4">https://doi.org/10.1007/978-981-10-8180-4</a><br/>Format: Electronic Resources<br/>Progress in Advanced Computing and Intelligent Engineering Proceedings of ICACIE 2016, Volume 1ent://SD_ILS/0/SD_ILS:2264612024-05-19T08:38:23Z2024-05-19T08:38:23ZYazar Saeed, Khalid. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6872-0">https://doi.org/10.1007/978-981-10-6872-0</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Threeent://SD_ILS/0/SD_ILS:2248192024-05-19T08:38:23Z2024-05-19T08:38:23ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3409-1">https://doi.org/10.1007/978-981-10-3409-1</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Fourent://SD_ILS/0/SD_ILS:2269122024-05-19T08:38:23Z2024-05-19T08:38:23ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3391-9">https://doi.org/10.1007/978-981-10-3391-9</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 1ent://SD_ILS/0/SD_ILS:187732024-05-19T08:38:23Z2024-05-19T08:38:23ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2650-5">http://dx.doi.org/10.1007/978-81-322-2650-5</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 2ent://SD_ILS/0/SD_ILS:187742024-05-19T08:38:23Z2024-05-19T08:38:23ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2653-6">http://dx.doi.org/10.1007/978-81-322-2653-6</a><br/>Format: Electronic Resources<br/>Applied Computation and Security Systems Volume Oneent://SD_ILS/0/SD_ILS:250672024-05-19T08:38:23Z2024-05-19T08:38:23ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-1985-9">http://dx.doi.org/10.1007/978-81-322-1985-9</a><br/>Format: Electronic Resources<br/>Applied Computation and Security Systems Volume Twoent://SD_ILS/0/SD_ILS:250682024-05-19T08:38:23Z2024-05-19T08:38:23ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-1988-0">http://dx.doi.org/10.1007/978-81-322-1988-0</a><br/>Format: Electronic Resources<br/>