You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This 2004 book is an accessible and comprehensive introduction to machine vision. It provides all the necessary theoretical tools and shows how they are applied in actual image processing and machine vision systems. A key feature is the inclusion of many programming exercises that give insights into the development of practical image processing algorithms. The authors begin with a review of mathematical principles and go on to discuss key issues in image processing such as the description and characterization of images, edge detection, restoration and feature extraction, segmentation, texture and shape. They also discuss image matching, statistical pattern recognition, clustering, and syntactic pattern recognition. Important applications are described, including optical character recognition and automatic target recognition. Software and data used in the book can be found at www.cambridge.org/9780521830461. A useful reference for practitioners, the book is aimed at graduate students in electrical engineering, computer science and mathematics.
An intimate examination of early Ch'ing China
This book intends to inculcate the innovative ideas for the scheduling aspect in distributed computing systems. Although the models in this book have been designed for distributed systems, the same information is applicable for any type of system. The book will dramatically improve the design and management of the processes for industry professionals. It deals exclusively with the scheduling aspect, which finds little space in other distributed operating system books. Structured for a professional audience composed of researchers and practitioners in industry, this book is also suitable as a reference for graduate-level students.
The field of Intelligent Systems and Applications has expanded enormously during the last two decades. Theoretical and practical results in this area are growing rapidly due to many successful applications and new theories derived from many diverse problems. This book is dedicated to the Intelligent Systems and Applications in many different aspects. In particular, this book is to provide highlights of the current research in Intelligent Systems and Applications. It consists of research papers in the following specific topics: l Authentication, Identification, and Signature l Intrusion Detection l Steganography, Data Hiding, and Watermarking l Database, System, and Communication Security l C...
The two-volume set LNAI 5711 and LNAI 5712 constitutes the refereed proceedings of the 13th International Conference on Knowledge-Based Intelligent Information and Engineering Sysetms, KES 2009, held in Santiago de Chile in September 2009. The 153 revised papers presented were carefully reviewed and selected from numerous submissions. The topics covered are: fuzzy and neuro-fuzzy systems, agent systems, knowledge based and expert systems, miscelleanous generic intelligent systems topics, intelligent vision and image processing, knowledge management, ontologies and data mining, web intelligence, text and multimedia mining and retrieval, other advanced knowledge-based systems, innovations in c...
The two volume set LNCS 6938 and LNCS 6939 constitutes the refereed proceedings of the 7th International Symposium on Visual Computing, ISVC 2011, held in Las Vegas, NV, USA, in September 2011. The 68 revised full papers and 46 poster papers presented together with 30 papers in the special tracks were carefully reviewed and selected from more than 240 submissions. The papers of part I (LNCS 6938) are organized in computational bioimaging, computer graphics, motion and tracking, segmentation, visualization; mapping modeling and surface reconstruction, biomedical imaging, computer graphics, interactive visualization in novel and heterogeneous display environments, object detection and recognition. Part II (LNCS 6939) comprises topics such as immersive visualization, applications, object detection and recognition, virtual reality, and best practices in teaching visual computing.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This fourth issue contains five contributions in the area of digital watermarking. The first three papers deal with robust watermarking. The fourth paper introduces a new least distortion linear gain model for halftone image watermarking and the fifth contribution presents an optimal histogram pair based image reversible data hiding scheme.
These proceedings contain papers presented at the 8th Discrete Geometry for Computer Imagery conference, held 17-19, March 1999 at ESIEE, Marne-la- Vall ee. The domains of discrete geometry and computer imagery are closely related. Discrete geometry provides both theoretical and algorithmic models for the p- cessing, analysis and synthesis of images; in return computer imagery, in its variety of applications, constitutes a remarkable experimentational eld and is a source of challenging problems. The number of returning participants, the arrival each year of contributions from new laboratories and new researchers, as well as the quality and originality of the results have contributed to the s...
This book constitutes the refereed proceedings of the 11th Biennial Conference of the Canadian Society for Computational Studies of Intelligence, AI 96, held in Toronto, Ontario, Canada, in May 1996. The 35 revised full papers presented in the book were carefully selected by the program committee. Although organized by a national society, AI 96 attracted contributions and participants with a significant geographic diversity. The issues addressed in this volume cover an electic range of current AI topics with a certain emphasis on various aspects of knowledge representation, natural language processing, and learning.
Reviews the literature of the Moth-Flame Optimization algorithm; Provides an in-depth analysis of equations, mathematical models, and mechanisms of the Moth-Flame Optimization algorithm; Proposes different variants of the Moth-Flame Optimization algorithm to solve binary, multi-objective, noisy, dynamic, and combinatorial optimization problems; Demonstrates how to design, develop, and test different hybrids of Moth-Flame Optimization algorithm; Introduces several applications areas of the Moth-Flame Optimization algorithm focusing in sustainability.