Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ranking Queries on Uncertain Data (Advances in Database Systems)
Ranking Queries on Uncertain Data (Advances in Database Systems)

Uncertain data is inherent in many important applications, such as environmental surveillance, market analysis, and quantitative economics research. Due to the importance of those applications and rapidly increasing amounts of uncertain data collected and accumulated, analyzing large collections of uncertain data has become an important task....

Vision Based Systemsfor UAV Applications (Studies in Computational Intelligence)
Vision Based Systemsfor UAV Applications (Studies in Computational Intelligence)

This monograph is motivated by a significant number of vision based algorithms for Unmanned Aerial Vehicles (UAV) that were developed during research and development projects. Vision information is utilized in various applications like visual surveillance, aim systems, recognition systems, collision-avoidance systems and navigation. This book...

Handbook of Remote Biometrics: for Surveillance and Security (Advances in Pattern Recognition)
Handbook of Remote Biometrics: for Surveillance and Security (Advances in Pattern Recognition)
This comprehensive and innovative handbook covers aspects of biometrics from the perspective of recognizing individuals at a distance, in motion, and under a surveillance scenario. Features: Starts with a thorough introductory chapter; Provides topics from a range of different perspectives offered by an international collection of leading...
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
Forensics in Telecommunications, Information and Multimedia: Second International Conference, e-Forensics 2009
Forensics in Telecommunications, Information and Multimedia: Second International Conference, e-Forensics 2009
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Forensics in Telecommunications, Information and Multimendia, e-Forensics 2009, held in Adelaide, Australia, in January 2009.

The focus of this year's conference has shifted to the legal rather than the deeply technical especially...

The Healthy Programmer: Get Fit, Feel Better, and Keep Coding (Pragmatic Programmers)
The Healthy Programmer: Get Fit, Feel Better, and Keep Coding (Pragmatic Programmers)

Printed in full color.

To keep doing what you love, you need to maintain your own systems, not just the ones you write code for. Regular exercise and proper nutrition help you learn, remember, concentrate, and be creative--skills critical to doing your job well. Learn how to change your work habits, master exercises
...

Kalman Filtering: Theory and Practice Using MATLAB
Kalman Filtering: Theory and Practice Using MATLAB

From Reviews of the First Edition

"An authentic magnum opus worth much more than its weight in gold!"
IEEE Transactions on Automatic Control

The proven textbook on Kalman filtering—now fully updated, revised, and expanded

...

OpenCV By Example
OpenCV By Example

Enhance your understanding of Computer Vision and image processing by developing real-world projects in OpenCV 3

About This Book

  • Get to grips with the basics of Computer Vision and image processing
  • This is a step-by-step guide to developing several real-world Computer Vision projects...
Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

Multi-Sensor Image Fusion and Its Applications (Signal Processing and Communica)
Multi-Sensor Image Fusion and Its Applications (Signal Processing and Communica)
Imaging sensors are an important resource in today’s world. Further, a single sensor cannot provide a complete view of the environment in many applications. Just as humans use all five senses to great advantage, computers use image fusion algorithms to gain similar advantages. The resulting fused image, if suitably obtained from a set of...
Streaming Media: Building and Implementing a Complete Streaming System
Streaming Media: Building and Implementing a Complete Streaming System
A complete toolkit to successfully develop and implement streaming media on the Web

From hands-on training and distance learning to teleconferencing and product demonstrations, streaming media is providing businesses with a whole new world of opportunity. Written by one of the leading experts in the field, this book will provide you with all...

For Better or for Worse
For Better or for Worse
The development of an American science establishment -- today an amalgam of scientists, engineers, universities, industrial laboratories, and federal science agencies -- began early in the twentieth century when the federal government began to invest in a national scientific infrastructure. During World War II this investment swelled to colossal...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy