Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
OpenCV By Example
OpenCV By Example

Enhance your understanding of Computer Vision and image processing by developing real-world projects in OpenCV 3

About This Book

  • Get to grips with the basics of Computer Vision and image processing
  • This is a step-by-step guide to developing several real-world Computer Vision projects...
Computational Vision and Medical Image Processing: Recent Trends
Computational Vision and Medical Image Processing: Recent Trends

Nowadays, computationalmethodologies of signal processing and imaging analysis for 2D, 3D and even 4D data are commonly used for various applications in society. For example, Computational Vision systems are progressively used for surveillance tasks, traffic analysis, recognition process, inspection purposes, human-machine interfaces, 3D...

Bayesian Reasoning and Machine Learning
Bayesian Reasoning and Machine Learning
We live in a world that is rich in data, ever increasing in scale. This data comes from many di erent sources in science (bioinformatics, astronomy, physics, environmental monitoring) and commerce (customer databases, nancial transactions, engine monitoring, speech recognition, surveillance, search). Possessing the knowledge as to...
Closed Circuit Television, Second Edition: CCTV Installation, Maintenance and Operation
Closed Circuit Television, Second Edition: CCTV Installation, Maintenance and Operation

Closed Circuit Television (CCTV) surveillance is one of the fastest growing areas in the security industry. This book is an essential guide for professionals involved the installation and maintenance of CCTV systems, system design, specification and purchasing and the management of CCTV systems. Unlike most existing books on CCTV, this title...

Introduction to Airborne Radar, Second Edition (Aerospace & Radar Systems)
Introduction to Airborne Radar, Second Edition (Aerospace & Radar Systems)

The completely rewritten and revised Second Edition updates a famous work originally published by the Hughes Aircraft Company. Much more than a simple introduction, the book is actually a history, reference, tech manual, and textbook rolled into one beautiful illustrated volume, packed with full color photos, drawings, tables and charts, plus...

Scientific Methods in Mobile Robotics: Quantitative Analysis of Agent Behaviour
Scientific Methods in Mobile Robotics: Quantitative Analysis of Agent Behaviour
Mobile robots are widely applied in a range of applications from transportation, surveillance through to health care. In all these applications it is clearly important to be able to analyse and control the performance of the mobile robot and it is therefore surprising that formalised methods to achieve this are not readily available. This book...
15 Dangerously Mad Projects for the Evil Genius
15 Dangerously Mad Projects for the Evil Genius

UNLEASH YOUR INNER MAD SCIENTIST!

"Wonderful. I learned a lot reading the detailed but easy to understand instructions."--BoingBoing

This wickedly inventive guide explains how to design and build 15 fiendishly fun electronics projects. Filled with photos and illustrations, 15 Dangerously Mad Projects for...

Cognitive Superiority: Information to Power
Cognitive Superiority: Information to Power

In a world of accelerating unending change, perpetual surveillance, and increasing connectivity, conflict has become ever more complex. Wars are no longer limited to the traditional military conflict domains?land, sea, air; even space and cyber space. The new battlefield will be the cognitive domain and the new conflict a larger...

RFID Handbook: Applications, Technology, Security, and Privacy
RFID Handbook: Applications, Technology, Security, and Privacy
Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the worlds largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwide, organizations must harness a clear understanding of this technology in order to maximize its potential and protect against the potential risks it...
Intelligent Network Video: Understanding Modern Video Surveillance Systems
Intelligent Network Video: Understanding Modern Video Surveillance Systems
This is the first resource to provide detailed coverage of advanced digital networking and intelligent video capabilities and optimization. It addresses general concepts, explains why IP-based systems provide better image quality and more scalable and flexible systems at a lower cost, and provides current information on cameras and DVRs. It also...
Privacy at Risk: The New Government Surveillance and the Fourth Amendment
Privacy at Risk: The New Government Surveillance and the Fourth Amendment
"The discussion of surveillance techniques is excellent, the legal analysis is sound, and the case for Fourth Amendment reform compelling. Recommended."-Choice (D. E. Smith Choice )

Without our consent and often without our knowledge, the government can constantly...
A Unified Framework for Video Summarization, Browsing & Retrieval: with Applications to Consumer and Surveillance Video
A Unified Framework for Video Summarization, Browsing & Retrieval: with Applications to Consumer and Surveillance Video
Large volumes of video content can only be easily accessed by the use of rapid browsing and retrieval techniques. Constructing a video table of contents (ToC) and video highlights to enable end users to sift through all this data and find what they want, when they want are essential. This reference puts forth a unified framework to integrate these...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy