Search Results for Signal, Image and Speech Processing. - Narrowed by: Saeed, Khalid. editor. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dSignal$00252C$002bImage$002band$002bSpeech$002bProcessing.$0026qf$003dAUTHOR$002509Yazar$002509Saeed$00252C$002bKhalid.$002beditor.$002509Saeed$00252C$002bKhalid.$002beditor.$0026ps$003d300$0026isd$003dtrue? 2024-08-30T19:03:52Z Progress in Advanced Computing and Intelligent Engineering Proceedings of ICACIE 2016, Volume 2 ent://SD_ILS/0/SD_ILS:223435 2024-08-30T19:03:52Z 2024-08-30T19:03:52Z Yazar&#160;Saeed, Khalid. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6875-1">https://doi.org/10.1007/978-981-10-6875-1</a><br/>Format:&#160;Electronic Resources<br/> Progress in Advanced Computing and Intelligent Engineering Proceedings of ICACIE 2016, Volume 1 ent://SD_ILS/0/SD_ILS:226461 2024-08-30T19:03:52Z 2024-08-30T19:03:52Z Yazar&#160;Saeed, Khalid. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6872-0">https://doi.org/10.1007/978-981-10-6872-0</a><br/>Format:&#160;Electronic Resources<br/> Applied Computation and Security Systems Volume One ent://SD_ILS/0/SD_ILS:25067 2024-08-30T19:03:52Z 2024-08-30T19:03:52Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-1985-9">http://dx.doi.org/10.1007/978-81-322-1985-9</a><br/>Format:&#160;Electronic Resources<br/> Applied Computation and Security Systems Volume Two ent://SD_ILS/0/SD_ILS:25068 2024-08-30T19:03:52Z 2024-08-30T19:03:52Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-1988-0">http://dx.doi.org/10.1007/978-81-322-1988-0</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Four ent://SD_ILS/0/SD_ILS:226912 2024-08-30T19:03:52Z 2024-08-30T19:03:52Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3391-9">https://doi.org/10.1007/978-981-10-3391-9</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Three ent://SD_ILS/0/SD_ILS:224819 2024-08-30T19:03:52Z 2024-08-30T19:03:52Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3409-1">https://doi.org/10.1007/978-981-10-3409-1</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume 1 ent://SD_ILS/0/SD_ILS:18773 2024-08-30T19:03:52Z 2024-08-30T19:03:52Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2650-5">http://dx.doi.org/10.1007/978-81-322-2650-5</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume 2 ent://SD_ILS/0/SD_ILS:18774 2024-08-30T19:03:52Z 2024-08-30T19:03:52Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2653-6">http://dx.doi.org/10.1007/978-81-322-2653-6</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Five ent://SD_ILS/0/SD_ILS:223717 2024-08-30T19:03:52Z 2024-08-30T19:03:52Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8180-4">https://doi.org/10.1007/978-981-10-8180-4</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Six ent://SD_ILS/0/SD_ILS:222331 2024-08-30T19:03:52Z 2024-08-30T19:03:52Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8183-5">https://doi.org/10.1007/978-981-10-8183-5</a><br/>Format:&#160;Electronic Resources<br/>