Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging
Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging

The Workshop on Medical Computer Vision (MICCAI-MCV 2010) was held in conjunction with the 13th International Conference on Medical Image Computing and Computer – Assisted Intervention (MICCAI 2010) on September 20, 2010 in Beijing, China. The one-day workshop focused on recognition techniques and applications in medical imaging. The...

Nutrigenomics and Nutrigenetics in Functional Foods and Personalized Nutrition
Nutrigenomics and Nutrigenetics in Functional Foods and Personalized Nutrition

While functional foods have become a reasonably well-established concept, personalized nutrition is still treated with skepticism by many. The recognition that people would have different nutrient requirements, or perceive foods in different ways, raises several concerns―some real, some not so real. Nutrigenomics and...

Automatic Speech and Speaker Recognition: Large Margin and Kernel Methods
Automatic Speech and Speaker Recognition: Large Margin and Kernel Methods
This book discusses large margin and kernel methods for speech and speaker recognition

Speech and Speaker Recognition: Large Margin and Kernel Methods is a collation of research in the recent advances in large margin and kernel methods, as applied to the field of speech and speaker recognition. It presents...

Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric user authentication techniques have evoked an enormous interest by science, industry and society in the recent past. Scientists and developers have constantly pursued the technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Many biometric...
Multimedia Forensics and Security
Multimedia Forensics and Security
As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research and development agendas for researchers,...
Thinking Fluid Dynamics With Dolphins (Stand Alone)
Thinking Fluid Dynamics With Dolphins (Stand Alone)
This small volume is the English edition of a Japanese book entitled "Learning fluid dynamics from dolphins". The title is derived from the fact that "Dolphins swim too fast to be explained scientifically". The first person to clearly describe this phenomenon was the English biologist Sir James Gray (J.Gray, 1936), and...
Information Visualization in Data Mining and Knowledge Discovery
Information Visualization in Data Mining and Knowledge Discovery

Mainstream data mining techniques significantly limit the role of human reasoning and insight. Likewise, in data visualization, the role of computational analysis is relatively small. The power demonstrated individually by these approaches to knowledge discovery suggests that somehow uniting the two could lead to increased efficiency and more...

Learn Robotics Programming: Build and control autonomous robots using Raspberry Pi 3 and Python
Learn Robotics Programming: Build and control autonomous robots using Raspberry Pi 3 and Python

Gain experience of building a next-generation collaboration robot

Key Features

  • Get up and running with the fundamentals of robotic programming
  • Program a robot using Python and the Raspberry Pi 3
  • Learn to build a smart robot with interactive and AI-enabled...
Kinect Hacks: Tips & Tools for Motion and Pattern Detection
Kinect Hacks: Tips & Tools for Motion and Pattern Detection
The way we interact with machines is always changing. As technology evolves, new ways of interacting with computers become available to us, one innovative breakthrough after the next. If we go back 10 years, RIM was just starting to implement phone capabilities into their line of Blackberry mobile devices. Now we...
Neural Networks and Pattern Recognition
Neural Networks and Pattern Recognition
This book is one of the most up-to-date and cutting-edge texts available on the rapidly growing application area of neural networks. Neural Networks and Pattern Recognition focuses on the use of neural networksin pattern recognition, a very important application area for neural networks technology. The contributors are widely known...
Foundations of Soft Case-Based Reasoning (Wiley Series on Intelligent Systems)
Foundations of Soft Case-Based Reasoning (Wiley Series on Intelligent Systems)
A breakthrough on today’s fastest growing artificial intelligence technique

Many of today’s engineering and business computer applications require decisions to be made on the basis of uncertain or incomplete information, a phenomenon that has resulted in the development of case-based reasoning, a powerful computing technique by...

Soft Computing for Recognition based on Biometrics (Studies in Computational Intelligence)
Soft Computing for Recognition based on Biometrics (Studies in Computational Intelligence)
We describe in this book, bio-inspired models and applications of hybrid intelligent systems using soft computing techniques for image analysis and pattern recognition based on biometrics and other information sources. Soft Computing (SC) consists of several intelligent computing paradigms, including fuzzy logic, neural networks,...
unlimited object storage image
Result Page: 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy