Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Vision Beyond the Visible Spectrum (Advances in Pattern Recognition)

Buy
Recently, there has been a dramatic increase in the use of sensors in the non-visible bands. As a result, there is a need for existing computer vision methods and algorithms to be adapted for use with non-visible sensors, or for the development of completely new methods and systems. Computer Vision Beyond the Visible Spectrum is the first book to bring together state-of-the-art work in this area. It presents new & pioneering research across the electromagnetic spectrum in the military, commercial, and medical domains. By providing a detailed examination of each of these areas, it focuses on the development of state-of-the-art algorithms and looks at how they can be used to solve existing & new challenges within computer vision. Essential reading for academics & industrial researchers working in the area of computer vision, image processing, and medical imaging, it will also be useful background reading for advanced undergraduate & postgraduate students.

Traditionally, computer vision has focused on the visible band for a variety of reasons. The visible band sensors are cheap and easily available. They are also sensitive in the same electromagnetic band as the human eye, which makes the produced data more interesting from the psychophysiology point of view. In fact, computer vision was pre-occupied for a long time with the problem of understanding and imitating the human visual system. Recently, this obsession subsided and computer vision research focused more on solving particular application problems with or without the help of the human visual paradigm. A case in point is the significant progress achieved in object tracking.

It so happens that many imaging applications cannot be addressed in the visible band. For example, visible sensors cannot see in the dark; thus, they are not very useful in military applications. Visible radiation cannot penetrate the human body and, therefore, cannot be a viable medical imaging modality. Other electromagnetic bands and sensor modalities have been identified and developed over the years that can solve all these problems, which are beyond the reach of the visible spectrum. Initially, it was primarily phenomenological and sensory work that was taking place. Later came algorithmic work, and with that computer vision beyond the visible spectrum was born.
(HTML tags aren't allowed.)

The Little Mac Book, Leopard Edition
The Little Mac Book, Leopard Edition
Mac OS 8.5 introduced definite changes to the operating system, and the latest edition of Robin Williams's immensely popular The Little Mac Book covers them all. Completely updated and revised, The Little Mac Book, Sixth Edition explains the new features of OS 8.5 in the same warm, jargon-free manner that made previous editions such a hit. With...
Surrealism at Play (Art History Publication Initiative)
Surrealism at Play (Art History Publication Initiative)
In Surrealism at Play Susan Laxton writes a new history of surrealism in which she traces the centrality of play to the movement and its ongoing legacy. For surrealist artists, play took a consistent role in their aesthetic as they worked in, with, and against a post-World War I world increasingly dominated by...
Why Does My Bird Do That: A Guide to Parrot Behavior
Why Does My Bird Do That: A Guide to Parrot Behavior

In this updated edition of the popular guide to parrot behavior, you’ll learn why your bird does strange things and discover positive techniques for modifying those behaviors. You'll get information on training and caring for your bird, normal behavior, and species-specific behavior. Don’t let your feathers get ruffled by a...


Authentication and Access Control: Practical Cryptography Methods and Tools
Authentication and Access Control: Practical Cryptography Methods and Tools
The advent of the Internet has allowed for many services and applications, most notably in communications between users, servers, and devices. Unfortunately, this has led to many security challenges and problems. Recent examples include password leakage on large social network sites and defacement of websites. It is, therefore,...
Deployment of Microsoft Azure Cloud Solutions: A complete guide to cloud development using Microsoft Azure
Deployment of Microsoft Azure Cloud Solutions: A complete guide to cloud development using Microsoft Azure

Master all the important and tough decision-making aspects involved in architecting an Azure public cloud for your organization.

Key Features

  • Deploy Azure Active Directory and implement synchronization
  • Manage storage solutions with Azure network services
  • ...
Wizards and Warriors: Massively Multiplayer Online Game Creation
Wizards and Warriors: Massively Multiplayer Online Game Creation

Welcome to the book Wizards and Warriors. This book is aimed at anyone who wishes to make an MMO (Massively Multiplayer Online) game. This book will show you what anMMOis comprised of, how to design your game ideas, and give you an extensive tour of an MMO creation package called Realm Crafter.

By the end of the book,...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy