Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication
Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication
"Counterterrorism is an important research area for national security and defense, and an area where statisticians can provide insights and tools to improve the standard practice. As funding and governmental interest in these areas continues to grow, this book will provide a stepping stone for those interested in this emerging area of...
Air and Spaceborne Radar Systems (Radar, Sonar, Navigation and Avionics)
Air and Spaceborne Radar Systems (Radar, Sonar, Navigation and Avionics)

The history of airborne radar is almost as old as that of radar itself. The improvement in detection range provided by an airborne platform was realised early during the Second World War, and the development of the cavity magnetron at almost the same time allowed higher radar frequencies and, hence, directive antennas to be used. Nowadays,...

Computational Vision and Medical Image Processing: Recent Trends
Computational Vision and Medical Image Processing: Recent Trends

Nowadays, computationalmethodologies of signal processing and imaging analysis for 2D, 3D and even 4D data are commonly used for various applications in society. For example, Computational Vision systems are progressively used for surveillance tasks, traffic analysis, recognition process, inspection purposes, human-machine interfaces, 3D...

CEA-CompTIA DHTI+ Digital Home Technology Integrator All-In-One Exam Guide, Second Edition
CEA-CompTIA DHTI+ Digital Home Technology Integrator All-In-One Exam Guide, Second Edition
A CEA-CompTIA DHTI+ Exam Guide and Desktop Reference--All in One!.

Get complete coverage of all the material included on the CEA-CompTIA DHTI+ Digital Home Technology Integrator exam inside this comprehensive resource. Written by industry experts, this definitive exam guide features learning objectives at the beginning of each...

Information Operations Planning
Information Operations Planning
Information operations involve the use of military information and how it is gathered, manipulated, and fused. It includes such critical functions asintelligence, surveillance, reconnaissance, command and control, communications, and precision navigation. Separating myth from reality, this authoritative resource provides military professionals with...
Laparoscopic Urologic Surgery in Malignancies
Laparoscopic Urologic Surgery in Malignancies
The era of endo-oncology has arrived. Endo-oncology is now firmly en- trenched in the diagnosis and management of urologic cancers. From its early days with transurethral resection of bladder tumors, to the more recent de- cades with establishment of techniques for percutaneous resection of transi- tional cell carcinoma,...
Survey of Text Mining II: Clustering, Classification, and Retrieval
Survey of Text Mining II: Clustering, Classification, and Retrieval
The proliferation of digital computing devices and their use in communication has resulted in an increased demand for systems and algorithms capable of mining textual data. Thus, the development of techniques for mining unstructured, semi-structured, and fully-structured textual data has become increasingly important in both academia and industry....
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations
The escalating demand for ubiquitous computing along with the complementary and flexible natures of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) have sparked an increase in the integration of these two dynamic technologies. Although a variety of applications can be observed under development and in practical use, there...
Augmented Vision Perception in Infrared: Algorithms and Applied Systems (Advances in Pattern Recognition)
Augmented Vision Perception in Infrared: Algorithms and Applied Systems (Advances in Pattern Recognition)
Spurred by security and safety challenges, research efforts in thermographic sensors have advanced greatly, resulting in better performance in remote surveillance, object recognition, guidance and so on.

 

This comprehensive survey provides a thorough account of the recent deployment of infrared sensors in modern applications of...

Intelligent Video Event Analysis and Understanding (Studies in Computational Intelligence)
Intelligent Video Event Analysis and Understanding (Studies in Computational Intelligence)

With the vast development of Internet capacity and speed, as well as wide adoptation of media technologies in people’s daily life, a large amount of videos have been surging, and need to be efficiently processed or organized based on interest. The human visual perception system could, without difficulty, interpret and recognize...

Bayesian Reasoning and Machine Learning
Bayesian Reasoning and Machine Learning
We live in a world that is rich in data, ever increasing in scale. This data comes from many di erent sources in science (bioinformatics, astronomy, physics, environmental monitoring) and commerce (customer databases, nancial transactions, engine monitoring, speech recognition, surveillance, search). Possessing the knowledge as to...
Wireless Sensor Networks: Signal Processing and Communications
Wireless Sensor Networks: Signal Processing and Communications

A wireless sensor network (WSN) uses a number of autonomous devices to cooperatively monitor physical or environmental conditions via a wireless network. Since its military beginnings as a means of battlefield surveillance, practical use of this technology has extended to a range of civilian applications including environmental monitoring,...

unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy