Home | Amazing | Today | Tags | Publishers | Years | Search 
OpenCV for Secret Agents
OpenCV for Secret Agents

Use OpenCV in six secret projects to augment your home, car, phone, eyesight, and any photo or drawing

About This Book

  • Build OpenCV apps for the desktop, the Raspberry Pi, Android, and the Unity game engine
  • Learn real-time techniques that can be used to classify images, detecting and...
Raspberry Pi for Secret Agents - Second Edition
Raspberry Pi for Secret Agents - Second Edition

Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects

About This Book

  • Turn your Raspberry Pi into a multipurpose secret agent gadget for audio/video surveillance, Wi-Fi exploration, or playing pranks on your friends
  • Detect an intruder on camera...
Machine Vision Beyond Visible Spectrum (Augmented Vision and Reality)
Machine Vision Beyond Visible Spectrum (Augmented Vision and Reality)

The material of this book encompasses many disciplines, including visible,

infrared, far infrared, millimeter wave, microwave, radar, synthetic aperture radar, and

electro-optical sensors as well as the very dynamic topics of image processing, computer

vision and pattern recognition.

This book is...

Face Geometry and Appearance Modeling: Concepts and Applications
Face Geometry and Appearance Modeling: Concepts and Applications

Human faces are familiar to our visual systems. We easily recognize a person's face in arbitrary lighting conditions and in a variety of poses; detect small appearance changes; and notice subtle expression details. Can computer vision systems process face images as well as human vision systems can? Face image processing has potential...

Nothing to Hide: The False Tradeoff between Privacy and Security
Nothing to Hide: The False Tradeoff between Privacy and Security

"If you've got nothing to hide," many people say, "you shouldn't worry about government surveillance." Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this important book, these arguments and many others are flawed. They are based on mistaken views about what it means to...

Statistics for Veterinary and Animal Science
Statistics for Veterinary and Animal Science

Banish your fears of statistical analysis using this clearly written and highly successful textbook.  Statistics for Veterinary and Animal Science Third Edition is an introductory text which assumes no previous knowledge of statistics.  It starts with very basic methodology and builds on it to encompass some of the more...

Kernel Learning Algorithms for Face Recognition
Kernel Learning Algorithms for Face Recognition

Kernel Learning Algorithms for Face Recognition covers the framework of kernel based face recognition. This book discusses the advanced kernel learning algorithms and its application on face recognition. This book also focuses on the theoretical deviation, the system framework and experiments involving kernel based face recognition. Included...

Vision Based Systemsfor UAV Applications (Studies in Computational Intelligence)
Vision Based Systemsfor UAV Applications (Studies in Computational Intelligence)

This monograph is motivated by a significant number of vision based algorithms for Unmanned Aerial Vehicles (UAV) that were developed during research and development projects. Vision information is utilized in various applications like visual surveillance, aim systems, recognition systems, collision-avoidance systems and navigation. This book...

Imbalanced Learning: Foundations, Algorithms, and Applications
Imbalanced Learning: Foundations, Algorithms, and Applications

The first book of its kind to review the current status and future direction of the exciting new branch of machine learning/data mining called imbalanced learning

Imbalanced learning focuses on how an intelligent system can learn when it is provided with imbalanced data. Solving imbalanced learning problems is critical in...

Expressive Processing: Digital Fictions, Computer Games, and Software Studies
Expressive Processing: Digital Fictions, Computer Games, and Software Studies

What matters in understanding digital media? Is looking at the external appearance and audience experience of software enough--or should we look further? In Expressive Processing, Noah Wardrip-Fruin argues that understanding what goes on beneath the surface, the computational processes that make digital media function, is...

Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard
Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard

Investigative Case Management is a "first look" excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Investigative case management is more than just organizing your case files. It includes the analysis of all evidence collected through digital examinations, interviews,...

RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication

This is the third revised edition of the established and trusted RFID Handbook; the most comprehensive introduction to radio frequency identification (RFID) available.

This essential new edition contains information on electronic product code (EPC) and the EPC global network, and explains near-field communication (NFC) in...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy