Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multimedia Information Extraction: Advances in Video, Audio, and Imagery Analysis for Search, Data Mining, Surveillance and Authoring
Multimedia Information Extraction: Advances in Video, Audio, and Imagery Analysis for Search, Data Mining, Surveillance and Authoring

The advent of increasingly large consumer collections of audio(e.g., iTunes), imagery (e.g., Flickr), and video (e.g., YouTube)is driving a need not only for multimedia retrieval but alsoinformation extraction from and across media. Furthermore,industrial and government collections fuel requirements for stockmedia access, media preservation,...

Machine Vision Beyond Visible Spectrum (Augmented Vision and Reality)
Machine Vision Beyond Visible Spectrum (Augmented Vision and Reality)

The material of this book encompasses many disciplines, including visible,

infrared, far infrared, millimeter wave, microwave, radar, synthetic aperture radar, and

electro-optical sensors as well as the very dynamic topics of image processing, computer

vision and pattern recognition.

This book is...

Analog Circuits Cookbook
Analog Circuits Cookbook
Analog Circuits Cookbook is a collection of tried and tested recipes form the masterchef of analog and RF design. Based on articles from Electronics World, this book provides a diet of high quality design techniques and applications, and proven ciruit designs, all concerned with the analog, RF and interface fields of electronics. Ian Hickman uses...
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter,...

BeagleBone for Secret Agents
BeagleBone for Secret Agents

Browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware

About This Book

  • Interface with cryptographic hardware to add security to your embedded project, securing you from external threats.
  • ...
Distributed Source Coding
Distributed Source Coding

Everything a signal and image processing engineer needs to know about distributed source coding - theorems, practical algorithms for design and the latest applications.

The advent of wireless sensor technology and ad-hoc networks has made DSC a major field of interest. Edited and written by the leading players in the field,
...

Infectious Disease Informatics
Infectious Disease Informatics

Infectious Diseases Informatics

Edited by

Vitali Sintchenko

The University of Sydney, Sydney, Australia

Preface.- List of contributors.- 1Informatics for Infectious Disease Research and Control.- 2 Bioinformatics of Microbial Sequences.- 3 Mining Databases for Microbial Gene Sequences.- 4 Comparative Genomics of...

Scalable Infrastructure for Distributed Sensor Networks
Scalable Infrastructure for Distributed Sensor Networks
Wireless sensor networks is a rapidly developing area. New applications are emerging and breakthroughs are being made in solving the underlying scientific problems.

The effectiveness of sensor networks depends largely on deployment strategies, self-organization capabilities, routing and information dissemination protocols, all of which...

Plan, Activity, and Intent Recognition: Theory and Practice
Plan, Activity, and Intent Recognition: Theory and Practice

Plan recognition, activity recognition, and intent recognition together combine and unify techniques from user modeling, machine vision, intelligent user interfaces, human/computer interaction, autonomous and multi-agent systems, natural language understanding, and machine learning.

Plan, Activity, and Intent Recognition...

Raspberry Pi for Secret Agents
Raspberry Pi for Secret Agents

Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects!

Overview

  • Detect an intruder on camera and set off an alarm
  • Listen in or record conversations from a distance
  • Find out what the other computers on your network are up to
  • ...
Understanding Surveillance Technologies: Spy Devices, Their Origins & Applications
Understanding Surveillance Technologies: Spy Devices, Their Origins & Applications
This is the first comprehensive text to cover this fascinating field from origins to present-day practices. Secret agents are no longer the only people using spycams, radio beacons, and tiny audio listening devices called 'bugs.' Spy devices are now an important part of almost every investigation, office environment, phone system, traffic...
The State of the Art in Intrusion Prevention and Detection
The State of the Art in Intrusion Prevention and Detection

The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in...

unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy