Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Color Image Processing: Methods and Applications
Color Image Processing: Methods and Applications
Over the last two decades, we have witnessed an explosive growth in both the diversity of techniques and the range of applications of image processing. However, the area of color image processing is still sporadically covered, despite having become commonplace, with consumers choosing the convenience of color imaging over traditional grayscale...
Practical MythTV: Building a PVR and Media Center PC
Practical MythTV: Building a PVR and Media Center PC
MythTV is a powerful open source personal video recorder (PVR) application that runs on Linux. Developed for several years by volunteers, it offers a stable and extensible platform for automating all of the things you would expect from a PVR, and much more.

Practical MythTV: Building a PVR and Media Center PC takes a project-based...

Interactive Segmentation Techniques: Algorithms and Performance Evaluation (SpringerBriefs in Electrical and Computer Engineering)
Interactive Segmentation Techniques: Algorithms and Performance Evaluation (SpringerBriefs in Electrical and Computer Engineering)

This book focuses on interactive segmentation techniques, which have been extensively studied in recent decades. Interactive segmentation emphasizes clear extraction of objects of interest, whose locations are roughly indicated by human interactions based on high level perception. This book will first introduce classic graph-cut segmentation...

Fundamentals of Digital Imaging in Medicine
Fundamentals of Digital Imaging in Medicine
There was a time not so long ago, well within the memory of many of us, when medical imaging was an analog process in which X-rays, or reflected ultrasound signals, exiting from a patient were intercepted by a detector, and their intensity depicted as bright spots on a fluorescent screen or dark areas in a photographic film. The...
Biomedical Image Analysis: Tracking (Synthesis Lectures on Image, Video, & Multimedia Processing)
Biomedical Image Analysis: Tracking (Synthesis Lectures on Image, Video, & Multimedia Processing)
In biological and medical imaging applications, tracking objects in motion is a critical task. This book describes the state-of-the-art in biomedical tracking techniques. We begin by detailing methods for tracking using active contours, which have been highly successful in biomedical applications. The book next covers the major probabilistic...
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...

Handbook of Security and Networks
Handbook of Security and Networks
As computing and networking technologies are gradually integrated with every aspect of human lives and activities, computer and network security has become a critical issue. The Handbook of Security and Networks presents a collection of recent advances in computer networking and security areas. These include applied...
Digital Signal Transmission
Digital Signal Transmission

This book provides an up-to-date and thorough grounding in the concepts of modern digital transmission. It is written in a pedagogic style, aimed at enabling readers to understand the fundamental concepts and processes. System descriptions are included, however the text also explains the basic techniques of transmission, and includes the...

Microsoft XNA Game Studio Creator's Guide, Second Edition
Microsoft XNA Game Studio Creator's Guide, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Bring your PC, Zune, and Xbox gaming visions to life with Microsoft XNA Game Studio

Develop...

Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Protect your network with Snort: the high-performance, open source IDS

Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all...

Make an Arduino-Controlled Robot (Make: Projects)
Make an Arduino-Controlled Robot (Make: Projects)

Building robots that sense and interact with their environment used to be tricky. Now, Arduino makes it easy. With this book and an Arduino microcontroller and software creation environment, you’ll learn how to build and program a robot that can roam around, sense its environment, and perform a wide variety of tasks. All you to...

Combating Spyware in the Enterprise
Combating Spyware in the Enterprise
Spyware is a term that in many ways has become a commonly used substitute for many other types of intrusions on a host.To compare it to something in the nontechnical world, it would be similar to asking someone for some aspirin, but in return getting acetaminophen, ibuprofen, or some other pain...
unlimited object storage image
Result Page: 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy