Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Vision-Guided Virtual Craniofacial Surgery: A Graph-Theoretic and Statistical Perspective
Computer Vision-Guided Virtual Craniofacial Surgery: A Graph-Theoretic and Statistical Perspective
The monograph deals with an important application of computer vision and pattern recognition in the area of medical science, more specifically reconstructive craniofacial surgery. Craniofacial fractures are encountered very frequently in today’s fastpaced society; the major causes being gunshot wounds, motor vehicle...
Autonomous Intelligent Vehicles: Theory, Algorithms, and Implementation (Advances in Computer Vision and Pattern Recognition)
Autonomous Intelligent Vehicles: Theory, Algorithms, and Implementation (Advances in Computer Vision and Pattern Recognition)
Over the years, the field of intelligent vehicles has become a major research theme in intelligent transportation systems since traffic accidents are serious and growing problems all over the world. The goal of an intelligent vehicle is to augment vehicle autonomous driving either entirely or partly for the purposes of safety,...
Windows Server 2003 Weekend Crash Course
Windows Server 2003 Weekend Crash Course
Get Up to Speed on Windows Server 2003 – in a Weekend!

The big day is Monday. The day you get to show off what you know about Windows Server 2003. The problem is, you’re not really up to speed. Maybe it’s been a while since you administered a Windows network. Perhaps you’re new to .NET. Or maybe you just like a...

Multicast and Group Security
Multicast and Group Security
The area of networked group communications is by no means a new field of study. For several years now, researchers and engineers have been studying more efficient ways to harness the potential of Internet protocol (IP)-based networks as the basis for communications in multiparty scenarios. There are many possible approaches to multiparty or group...
Principles of Constraint Programming
Principles of Constraint Programming

This book is about constraint programming, an alternative approach to programming which relies on a combination of techniques that deal with reasoning and computing. It has been successfully applied in a number of fields including molecular biology, electrical engineering, operations research and numerical analysis. The central notion is that...

Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research
Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research

When I decided to do a sabbatical with Symantec Research Labs Europe in the beautiful French Riviera, I was asked to work on a project about Voice over IP (VoIP) security. The goal of the VAMPIRE Project1 was to understand the threats and vulnerabilities of VoIP systems, and to inform the direction of further research efforts....

Human Reliability Assessment Theory and Practice
Human Reliability Assessment Theory and Practice

A continually evolving discipline, Human Reliability Assessment (HRA) has elements of controversy from the definition of terms to the application of appropriate methods for the representation of human failure probability. The idea that human error is a random event is falling out of favor and the concept that humans can be set up to fail or...

Handbook of Automotive Power Electronics and Motor Drives (Electrical and Computer Enginee)
Handbook of Automotive Power Electronics and Motor Drives (Electrical and Computer Enginee)
Initially, the only electric loads encountered in an automobile were for lighting and the starter motor. Today, demands on performance, safety, emissions, comfort, convenience, entertainment, and communications have seen the working-in of seemingly innumerable advanced electronic devices. Consequently, vehicle electric systems require larger...
3D Model Recognition from Stereoscopic Cues (Artificial Intelligence Series)
3D Model Recognition from Stereoscopic Cues (Artificial Intelligence Series)
3D Model Recognition from Stereoscopic Cues provides a rich, integrated account of work done within a large-scale, multisite, Alvey-funded collaborative project in computer vision. It presents a variety of methods for deriving surface descriptions from stereoscopic data and for matching those descriptions to three-dimensional models...
System-Ergonomic Design of Cognitive Automation: Dual-Mode Cognitive Design of Vehicle Guidance and Control Work Systems
System-Ergonomic Design of Cognitive Automation: Dual-Mode Cognitive Design of Vehicle Guidance and Control Work Systems

Why this book? Simply because it is due. Cognitive automation and its system-ergonomic introduction into work systems have been advanced in the meantime to such a degree that already applications for operational work systems are slowly becoming reality. This book shall contribute to give system designers some more guidelines about designing work...

Wireless Sensor Networks (Artech House Mems and Sensors Library)
Wireless Sensor Networks (Artech House Mems and Sensors Library)
Our society is awash in “machine intelligence” of various kinds, from smart thermostats
in our homes, to expert systems and design aids in our workplaces, to jet
aircraft landing safely in treacherous weather under computer control. Over the last
century, we have witnessed more and more of the “drudgery” of
...
Building Smart Drones with ESP8266 and Arduino: Build exciting drones by leveraging the capabilities of Arduino and ESP8266
Building Smart Drones with ESP8266 and Arduino: Build exciting drones by leveraging the capabilities of Arduino and ESP8266

Leverage the WiFi chip to build exciting Quadcopters

Key Features

  • Learn to create a fully functional Drone with Arduino and ESP8266 and their modified versions of hardware.
  • Enhance your drone's functionalities by implementing smart features.
  • A...
unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy