Home | Amazing | Today | Tags | Publishers | Years | Search 
Machine vision – applications and systems
Machine vision – applications and systems

Vision plays a fundamental role for living beings by allowing them to interact with the environment in an effective and efficient way. The Machine Vision goal is to endow computing devices, and more generally artificial systems, with visual capabilities in order to cope with not a priori predetermined situations. To this end, we have to take...

Supply Chain Optimization, Design, and Management: Advances and Intelligent Methods (Premier Reference Source)
Supply Chain Optimization, Design, and Management: Advances and Intelligent Methods (Premier Reference Source)
The supply chain of both manufacturing and commercial enterprises comprises a highly distributed environment, in which complex processes evolve in a network of companies (see Figure 1). Such processes include materials procurement and storage, production of intermediate and final products, warehousing, sales, customer service, and...
Cloud Computing Best Practices for Managing and Measuring Processes for On-demand Computing, Applications and Data Centers in the Cloud with SLAs
Cloud Computing Best Practices for Managing and Measuring Processes for On-demand Computing, Applications and Data Centers in the Cloud with SLAs
The evolution of managing Cloud Computing Services in principles and practices provided by the best practices IT Service Management framework provides the more holistic guidance needed for an industry that continues to mature and develop at a rapid pace.

Many organizations and individuals who had previously struggled
...
Kinect Hacks: Tips & Tools for Motion and Pattern Detection
Kinect Hacks: Tips & Tools for Motion and Pattern Detection
The way we interact with machines is always changing. As technology evolves, new ways of interacting with computers become available to us, one innovative breakthrough after the next. If we go back 10 years, RIM was just starting to implement phone capabilities into their line of Blackberry mobile devices. Now we...
Adaptive Control Approach for Software Quality Improvement (Series on Software Engineering & Knowledge Engineering)
Adaptive Control Approach for Software Quality Improvement (Series on Software Engineering & Knowledge Engineering)
The expansion of our reliance on software in many aspects of modern society has coincided with a number of incidents in aeronautics, astronautics, transportation, medical devices, energy generation, banking and finance. Failures caused by software have introduced more than just inconvenience, but significant property damage,...
Managing and Optimizing VMware vSphere Deployments
Managing and Optimizing VMware vSphere Deployments

In our experience as consultants, VMware vSphere is the most robust virtualization

solution on the market. The technology is proven and the user base is large.

Although the benefits of virtualization using vSphere are many, proper planning is required to gain these benefits from a vSphere
...
Moodle 2 Administration
Moodle 2 Administration
Moodle has evolved from an academic project to the world's most popular Virtual Learning Environment (VLE). During this evolution, its complexity has risen dramatically and so have the skills that are required to administer the system.

Moodle 2 Administration is a complete, practical guide for administering Moodle
...
What's New in Adobe AIR 3
What's New in Adobe AIR 3
This book will detail the various enhancements, new functionalities, and general improvements available in this version of the Adobe AIR runtime. Each item is explained in detail, and when possible, a series of screen captures and a full code example will be provided, enabling you to both grasp the new feature in a visual way, and...
Computer Networks, Fifth Edition: A Systems Approach (The Morgan Kaufmann Series in Networking)
Computer Networks, Fifth Edition: A Systems Approach (The Morgan Kaufmann Series in Networking)
Once again, this now-classic textbook has been revised to keep it up-to-date with our evolving field. While the Internet and its protocols now dominate networking everywhere, we see continued evolution in the technology used to support the Internet, with switching at “layer 2” providing rich functionality and...
Cryptography and Network Security
Cryptography and Network Security
The Internet, as a worldwide communication network, has changed our daily life in many ways. A new paradigm of commerce allows individuals to shop online. The World Wide Web (WWW) allows people to share information. The E-mail technology conned people in far-flung corners of the world. 'ITiis inevitable evolution has also cre-...
UMTS Networks: Architecture, Mobility and Services
UMTS Networks: Architecture, Mobility and Services
The world's first public GSM call was made on 1st July 1991 in a city park of Helsinki, Finland. That event is now regarded as the birthday of the second generation mobile telephony. GSM has been an overwhelming success, which was difficult to predict at that early stage. In the past 10 years GSM has become a truly global...
JUNOS OS For Dummies (Computer/Tech)
JUNOS OS For Dummies (Computer/Tech)

Welcome to Junos OS For Dummies. This book provides you with a handy reference for configuring and running Junos software on Juniper Networks products. (We won’t bore you with how Junos got here, but you can discover more about Juniper Networks and the evolution of Junos software at www.juniper.net/company.)

...

Result Page: 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy