|
|
|
|
| | Digital Color Image ProcessingColor information is gaining an ever-greater importance in digital image processing. Nevertheless, the leap to be mastered by the transition from scalar to vector-valued image functions is not yet generally addressed in most textbooks on digital image processing. The main goal of this book is to clarify the significance of vector-valued color image... | | Optical Sources, Detectors, and SystemsOptical Sources, Detectors, and Systems presents a unified approach, from the applied engineering point of view, to radiometry, optical devices, sources, and receivers. One of the most important and unique features of the book is that it combines modern optics, electric circuits, and system analysis into a unified, comprehensive... |
|
Cancer Precursors: Epidemiology, Detection, and Prevention
Dramatic advances in our understanding of cancer causation have
come from epidemiologic and laboratory research, particularly
over the past two decades. These developments have included
a broadening interest in the critical events that take place during
the early stages of the dynamic multistep process leading to invasive... | | Intrusion Detection and Correlation: Challenges and SolutionsIntrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and... | | Network Security: A Beginner's Guide, Second EditionEssential Skills--Made Easy!
Protect your digital knowledge, data, and capabilities from misuse or tampering. This fully updated guidebook provides step-by-step instruction on implementing firewalls, wireless security, desktop protection, biometrics, and many of today's essential security measures. Understand the four primary forms of attack... |
|
| | | | Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Instagram, GitHub, and More
Mine the rich data tucked away in popular social websites such as Twitter, Facebook, LinkedIn, and Instagram. With the third edition of this popular guide, data scientists, analysts, and programmers will learn how to glean insights from social media—including who’s connecting with whom, what they’re... |
|
Developing Games in JavaIf you already have experience programming games with Java, this book is for you. David Brackeen, along with co-authors Bret Barker and Lawrence Vanhelsuwe, show you how to make fast, full-screen action games such as side scrollers and 3D shooters. Key features covered in this book include Java 2 game programming techniques, including latest 2D... | | Survey of Text Mining II: Clustering, Classification, and RetrievalThe proliferation of digital computing devices and their use in communication has resulted in an increased demand for systems and algorithms capable of mining textual data. Thus, the development of techniques for mining unstructured, semi-structured, and fully-structured textual data has become increasingly important in both academia and industry.... | | |
|
|
Result Page: 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 |