Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Multisensor Data Fusion: Theory and Practice, Second Edition (Electrical Engineering and Applied Signal Processing)
Handbook of Multisensor Data Fusion: Theory and Practice, Second Edition (Electrical Engineering and Applied Signal Processing)
In the years since the bestselling first edition, fusion research and applications have adapted to service-oriented architectures and pushed the boundaries of situational modeling in human behavior, expanding into fields such as chemical and biological sensing, crisis management, and intelligent buildings.

Handbook of Multisensor Data...

Mastering OpenCV 4 with Python: A practical guide covering topics from image processing, augmented reality to deep learning with OpenCV 4 and Python 3.7
Mastering OpenCV 4 with Python: A practical guide covering topics from image processing, augmented reality to deep learning with OpenCV 4 and Python 3.7

Create advanced applications with Python and OpenCV, exploring the potential of facial recognition, machine learning, deep learning, web computing and augmented reality.

Key Features

  • Develop your computer vision skills by mastering algorithms in Open Source Computer Vision 4 (OpenCV 4)and...
Discrete Fourier Analysis and Wavelets: Applications to Signal and Image Processing
Discrete Fourier Analysis and Wavelets: Applications to Signal and Image Processing

A thorough guide to the classical and contemporary mathematical methods of modern signal and image processing

Discrete Fourier Analysis and Wavelets presents a thorough introduction to the mathematical foundations of signal and image processing. Key concepts and applications are addressed in a thought-provoking...

Fault-tolerant Flight Control and Guidance Systems: Practical Methods for Small Unmanned Aerial Vehicles (Advances in Industrial Control)
Fault-tolerant Flight Control and Guidance Systems: Practical Methods for Small Unmanned Aerial Vehicles (Advances in Industrial Control)
Unmanned aerial vehicles (UAVs) offer an incomparable means of gathering intelligence and carrying out missions without needing an onboard human pilot. The benefits are considerable in terms of cost, efficiency, and reduced pilot risk.

In order to complete a mission efficiently and with a high level of safety and security, the following key...

Applied Security Visualization
Applied Security Visualization
APPLIED SECURITY VISUALIZATION

 

“Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a...

Practical Computer Vision: Extract insightful information from images using TensorFlow, Keras, and OpenCV
Practical Computer Vision: Extract insightful information from images using TensorFlow, Keras, and OpenCV

A practical guide designed to get you from basics to current state of art in computer vision systems.

Key Features

  • Master the different tasks associated with Computer Vision and develop your own Computer Vision applications with ease
  • Leverage the power of Python,...
Digital Signal Processing Techniques and Applications in Radar Image Processing (Information and Communication Technology Series,)
Digital Signal Processing Techniques and Applications in Radar Image Processing (Information and Communication Technology Series,)
A self-contained approach to DSP techniques and applications in radar imaging

The processing of radar images, in general, consists of three major fields: Digital Signal Processing (DSP); antenna and radar operation; and algorithms used to process the radar images. This book brings together material from these different areas to allow readers to...

The InfoSec Handbook: An Introduction to Information Security
The InfoSec Handbook: An Introduction to Information Security

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.

It is intended mainly for beginners to the field of...

Deep Learning with Applications Using Python: Chatbots and Face, Object, and Speech Recognition With TensorFlow and Keras
Deep Learning with Applications Using Python: Chatbots and Face, Object, and Speech Recognition With TensorFlow and Keras
Explore deep learning applications, such as computer vision, speech recognition, and chatbots, using frameworks such as TensorFlow and Keras. This book helps you to ramp up your practical know-how in a short period of time and focuses you on the domain, models, and algorithms required for deep learning applications....
Counterfeit Integrated Circuits: Detection and Avoidance
Counterfeit Integrated Circuits: Detection and Avoidance

This timely and exhaustive study offers a much-needed examination of the scope and consequences of the electronic counterfeit trade.  The authors describe a variety of shortcomings and vulnerabilities in the electronic component supply chain, which can result in counterfeit integrated circuits (ICs).  Not only does this book provide...

Cuckoo Malware Analysis
Cuckoo Malware Analysis

Analyze malware using Cuckoo Sandbox

Overview

  • Learn how to analyze malware in a straightforward way with minimum technical skills
  • Understand the risk of the rise of document-based malware
  • Enhance your malware analysis concepts through illustrations, tips and tricks,...
Kalman Filter Recent Advances and Applications
Kalman Filter Recent Advances and Applications
The discussion about the manned spacecraft program was initiated at NASA in 1959. Only one year later, Dr. Kalman and Dr. Schmidt linked the linear Kalman filter and the perturbation theory in order to obtain the Kalman-Schmidt filter, currently known as the extended Kalman filter. This approach would be implemented in 1961 using an...
Result Page: 68 67 66 65 64 63 62 61 60 59 58 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy