Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Applications of computing > Artificial intelligence > Computer vision
This edited book explores the use of technology to enable us to visualize the life sciences in a more meaningful and engaging way. It will enable those interested in visualization techniques to gain a better understanding of the applications that can be used in visualization, imaging and analysis, education, engagement and training. The reader will also be able to learn about the use of visualization techniques and technologies for the historical and forensic settings. The reader will be able to explore the utilization of technologies from a number of fields to enable an engaging and meaningful visual representation of the biomedical sciences. We have something for a diverse and inclusive audience ranging from healthcare, patient education, animal health and disease and pedagogies around the use of technologies in these related fields. The first four chapters cover healthcare and detail how technology can be used to illustrate emergency surgical access to the airway, pressure sores, robotic surgery in partial nephrectomy, and respiratory viruses. The last six chapters in the education section cover augmented reality and learning neuroanatomy, historical artefacts, virtual reality in canine anatomy, holograms to educate children in cardiothoracic anatomy, 3D models of cetaceans, and the impact of the pandemic on digital anatomical educational resources.
This book presents original research into language teacher education (LTE) activities in digital spaces, making use of a multimodal Conversation Analysis (CA) approach to examine multiple datasets and bring new insights into the theory, research, and practice of second/foreign language teacher education. The author conceptualizes a model of Conversation Analytic Language Teacher Education (CALTE), proposing a new knowledge base for LTE, identifying research-informed defining features, mapping the scope of an original praxis base, and providing research evidence from the implementation of this approach in and for digital spaces. The result is an argument for wide implementation and on-going improvement of the CALTE approach, and the book will be of interest to language teacher education professionals, multimodal CA researchers, and applied linguists.
This book presents new results on applications of geometric algebra. The time when researchers and engineers were starting to realize the potential of quaternions for - plications in electrical, mechanic, and control engineering passed a long time ago. Since the publication of Space-Time Algebra by David Hestenes (1966) and Clifford Algebra to Geometric Calculus: A Uni?ed Language for Mathematics and Physics by David Hestenes and Garret Sobczyk (1984), consistent progress in the app- cations of geometric algebra has taken place. Particularly due to the great dev- opments in computer technology and the Internet, researchers have proposed new ideas and algorithms to tackle a variety of problems in the areas of computer science and engineering using the powerful language of geometric algebra. In this process, pioneer groups started the conference series entitled "Applications of Geometric Algebra in Computer Science and Engineering" (AGACSE) in order to promote the research activity in the domain of the application of geometric algebra. The ?rst conference, AGACSE'1999, organized by Eduardo Bayro-Corrochano and Garret Sobczyk, took place in Ixtapa-Zihuatanejo, Mexico, in July 1999. The contri- tions were published in Geometric Algebra with Applications in Science and En- neering, Birkhauser, 2001. The second conference, ACACSE'2001, was held in the Engineering Department of the Cambridge University on 9-13 July 2001 and was organizedbyLeoDorst,ChrisDoran,andJoanLasenby. Thebestconferencecont- butions appeared as a book entitled Applications of Geometric Algebra in Computer Science and Engineering, Birkhauser, 2002. The third conference, AGACSE'2008, took place in August 2008 in Grimma, Leipzig, Germany.
This book tackles the 6G odyssey, providing a concerted technology roadmap towards the 6G vision focused on the interoperability between the wireless and optical domain, including the benefits that are introduced through virtualization and software defined radio. The authors aim to be at the forefront of beyond 5G technologies by reflecting the integrated works of several major European collaborative projects (H2020-ETN-SECRET, 5GSTEPFWD, and SPOTLIGHT). The book is structured so as to provide insights towards the 6G horizon, reporting on the most recent developments on the international 6G research effort. The authors address a variety of telecom stakeholders, which includes practicing engineers on the field developing commercial solutions for 5G and beyond products; postgraduate researchers that require a basis on which to build their research by highlighting the current challenges on radio, optical and cloud-based networking for ultra-dense networks, including novel approaches; and project managers that could use the principles and applications for shaping new research proposals on this highly dynamic field.
Presenting the latest technological developments in arts and culture, this volume demonstrates the advantages of a union between art and science. Electronic Visualisation in Arts and Culture is presented in five parts: Imaging and Culture New Art Practice Seeing Motion Interaction and Interfaces Visualising Heritage Electronic Visualisation in Arts and Culture explores a variety of new theory and technologies, including devices and techniques for motion capture for music and performance, advanced photographic techniques, computer generated images derived from different sources, game engine software, airflow to capture the motions of bird flight and low-altitude imagery from airborne devices. The international authors of this book are practising experts from universities, art practices and organisations, research centres and independent research. They describe electronic visualisation used for such diverse aspects of culture as airborne imagery, computer generated art based on the autoimmune system, motion capture for music and for sign language, the visualisation of time and the long term preservation of these materials. Selected from the EVA London conferences from 2009-2012, held in association with the Computer Arts Society of the British Computer Society, the authors have reviewed, extended and fully updated their work for this state-of-the-art volume.
Machine vision systems offer great potential in a large number of areas of manufacturing industry and are used principally for Automated Visual Inspection and Robot Vision. This publication presents the state of the art in image processing. It discusses techniques which have been developed for designing machines for use in industrial inspection and robot control, putting the emphasis on software and algorithms. A comprehensive set of image processing subroutines, which together form the basic vocabulary for the versatile image processing language IIPL, is presented. This language has proved to be extremely effective, working as a design tool, in solving numerous practical inspection problems. The merging of this language with Prolog provides an even more powerful facility which retains the benefits of human and machine intelligence. The authors bring together the practical experience and the picture material from a leading industrial research laboratory and the mathematical foundations necessary to understand and apply concepts in image processing. Interactive Image Processing is a self-contained reference book that can also be used in graduate level courses in electrical engineering, computer science and physics.
This textbook provides a progressive approach to the teaching of software engineering. First, readers are introduced to the core concepts of the object-oriented methodology, which is used throughout the book to act as the foundation for software engineering and programming practices, and partly for the software engineering process itself. Then, the processes involved in software engineering are explained in more detail, especially methods and their applications in design, implementation, testing, and measurement, as they relate to software engineering projects. At last, readers are given the chance to practice these concepts by applying commonly used skills and tasks to a hands-on project. The impact of such a format is the potential for quicker and deeper understanding. Readers will master concepts and skills at the most basic levels before continuing to expand on and apply these lessons in later chapters.
Mathematical Nonlinear Image Processing deals with a fast growing research area. The development of the subject springs from two factors: (1) the great expansion of nonlinear methods applied to problems in imaging and vision, and (2) the degree to which nonlinear approaches are both using and fostering new developments in diverse areas of mathematics. Mathematical Nonlinear Image Processing will be of interest to people working in the areas of applied mathematics as well as researchers in computer vision. Mathematical Nonlinear Image Processing is an edited volume of original research. It has also been published as a special issue of the Journal of Mathematical Imaging and Vision. (Volume 2, Issue 2/3).
Since computer vision¿s humble beginnings in the 1960s, a substantial amount of related research has been biologically inspired, using the human eye and visual perception as a model from which to work. Panoramic vision is a subset of computer vision that focuses on the creation and analysis of images with unusually wide fields of view that extend far beyond a single camera snapshot. It has broad implications for commercial and web-based multimedia applications, such as games, virtual reality, surveillance, and teleconferencing. This volume collects the works of researchers who have worked extensively in the field and covers a wide array of topics in this promising new area. In addition to providing a concise historical perspective on panoramic imaging, the book features representative sections on the design of panoramic image capturing systems, the theory involved in the imaging process, software techniques for creating panoramic images, and applications that use panoramic images. It will help readers to understand the more technical aspects of panoramic vision, such as sensor design and imaging techniques. Interest in panoramic vision will only increase over time, as faster computers and larger bandwidth become available and as specialized cameras become cheaper through economies of scale. Researchers and professionals in computer vision, imaging and robotics (machine vision) will find the book an authoritative and indispensable resource for panoramic vision concepts and methods.
A collection of original contributions by researchers who work at the forefront of a new field, lying at the intersection of computer vision and computer graphics. Several original approaches are presented to the integration of computer vision and graphics techniques to aid in the realistic modelling of objects and scenes, interactive computer graphics, augmented reality, and virtual studios. Numerous applications are also discussed, including urban and archaeological site modelling, modelling dressed humans, medical visualisation, figure and facial animation, real-time 3D teleimmersion telecollaboration, augmented reality as a new user interface concept, and augmented reality in the understanding of underwater scenes.
This book covers current technological innovations and applications in image processing, introducing analysis techniques and describing applications in remote sensing and manufacturing, among others. The authors include new concepts of color space transformation like color interpolation, among others. Also, the concept of Shearlet Transform and Wavelet Transform and their implementation are discussed. The authors include a perspective about concepts and techniques of remote sensing like image mining, geographical, and agricultural resources. The book also includes several applications of human organ biomedical image analysis. In addition, the principle of moving object detection and tracking - including recent trends in moving vehicles and ship detection - is described. Presents developments of current research in various areas of image processing; Includes applications of image processing in remote sensing, astronomy, and manufacturing; Pertains to researchers, academics, students, and practitioners in image processing.
1) Learn how to develop computer vision application algorithms 2) Learn to use software tools for analysis and development 3) Learn underlying processes need for image analysis 4) Learn concepts so that the reader can develop their own algorithms 5) Software tools provided
One of the most natural representations for modelling spatial objects in computers is discrete representations in the form of a 2D square raster and a 3D cubic grid, since these are naturally obtained by segmenting sensor images. However, the main difficulty is that discrete representations are only approximations of the original objects, and can only be as accurate as the cell size allows. If digitisation is done by real sensor devices, then there is the additional difficulty of sensor distortion. To overcome this, digital shape features must be used that abstract from the inaccuracies of digital representation. In order to ensure the correspondence of continuous and digital features, it is necessary to relate shape features of the underlying continuous objects and to determine the necessary resolution of the digital representation. This volume gives an overview and a classification of the actual approaches to describe the relation between continuous and discrete shape features that are based on digital geometric concepts of discrete structures. Audience: This book will be of interest to researchers and graduate students whose work involves computer vision, image processing, knowledge representation or representation of spatial objects.
This book constitutes the refereed proceedings of the 6th International Conference on Computer, Communication, and Signal Processing, ICCSP 2022, held in Chennai, India, in February 2022.* The 21 full and 2 short papers presented in this volume were carefully reviewed and selected from 111 submissions. The papers are categorized into topical sub-headings: artificial intelligence and machine learning; Cyber security; and internet of things. *The conference was held as a virtual event due to the COVID-19 pandemic.
PREVIOUS EDITIONThis textbook introduces the "Fundamentals of Multimedia", addressing real issues commonly faced in the workplace. The essential concepts are explained in a practical way to enable students to apply their existing skills to address problems in multimedia. Fully revised and updated, this new edition now includes coverage of such topics as 3D TV, social networks, high-efficiency video compression and conferencing, wireless and mobile networks, and their attendant technologies. Features: presents an overview of the key concepts in multimedia, including color science; reviews lossless and lossy compression methods for image, video and audio data; examines the demands placed by multimedia communications on wired and wireless networks; discusses the impact of social media and cloud computing on information sharing and on multimedia content search and retrieval; includes study exercises at the end of each chapter; provides supplementary resources for both students and instructors at an associated website.
This book presents theories and techniques for perception of textures by computer. Texture is a homogeneous visual pattern that we perceive in surfaces of objects such as textiles, tree barks or stones. Texture analysis is one of the first important steps in computer vision since texture provides important cues to recognize real-world objects. A major part of the book is devoted to two-dimensional analysis of texture patterns by extracting statistical and structural features. It also deals with the shape-from-texture problem which addresses recovery of the three-dimensional surface shapes based on the geometry of projection of the surface texture to the image plane. Perception is still largely mysterious. Realizing a computer vision system that can work in the real world requires more research and ex periment. Capability of textural perception is a key component. We hope this book will contribute to the advancement of computer vision toward robust, useful systems. vVe would like to express our appreciation to Professor Takeo Kanade at Carnegie Mellon University for his encouragement and help in writing this book; to the members of Computer Vision Section at Electrotechni cal Laboratory for providing an excellent research environment; and to Carl W. Harris at Kluwer Academic Publishers for his help in preparing the manuscript."
Object Detection with Deep Learning Models discusses recent advances in object detection and recognition using deep learning methods, which have achieved great success in the field of computer vision and image processing. It provides a systematic and methodical overview of the latest developments in deep learning theory and its applications to computer vision, illustrating them using key topics, including object detection, face analysis, 3D object recognition, and image retrieval. The book offers a rich blend of theory and practice. It is suitable for students, researchers and practitioners interested in deep learning, computer vision and beyond and can also be used as a reference book. The comprehensive comparison of various deep-learning applications helps readers with a basic understanding of machine learning and calculus grasp the theories and inspires applications in other computer vision tasks. Features: A structured overview of deep learning in object detection A diversified collection of applications of object detection using deep neural networks Emphasize agriculture and remote sensing domains Exclusive discussion on moving object detection
Presents a strategic perspective and design methodology that guide the process of developing digital products and services that provide 'real experience' to users. Only when the material experienced runs its course to fulfilment is it then regarded as 'real experience' that is distinctively senseful, evaluated as valuable, and harmoniously related to others. Based on the theoretical background of human experience, the book focuses on these three questions: How can we understand the current dominant designs of digital products and services? What are the user experience factors that are critical to provide the real experience? What are the important HCI design elements that can effectively support the various UX factors that are critical to real experience? Design for Experience is intended for people who are interested in the experiences behind the way we use our products and services, for example designers and students interested in interaction, visual graphics and information design or practitioners and entrepreneurs in pursuit of new products or service-based start-ups.
This book, divided in two volumes, originates from Techno-Societal 2020: the 3rd International Conference on Advanced Technologies for Societal Applications, Maharashtra, India, that brings together faculty members of various engineering colleges to solve Indian regional relevant problems under the guidance of eminent researchers from various reputed organizations. The focus of this volume is on technologies that help develop and improve society, in particular on issues such as sensor and ICT based technologies for the betterment of people, Technologies for agriculture and healthcare, micro and nano technological applications. This conference aims to help innovators to share their best practices or products developed to solve specific local problems which in turn may help the other researchers to take inspiration to solve problems in their region. On the other hand, technologies proposed by expert researchers may find applications in different regions. This offers a multidisciplinary platform for researchers from a broad range of disciplines of Science, Engineering and Technology for reporting innovations at different levels.
Traditionally, scientific fields have defined boundaries, and scientists work on research problems within those boundaries. However, from time to time those boundaries get shifted or blurred to evolve new fields. For instance, the original goal of computer vision was to understand a single image of a scene, by identifying objects, their structure, and spatial arrangements. This has been referred to as image understanding. Recently, computer vision has gradually been making the transition away from understanding single images to analyzing image sequences, or video understanding. Video understanding deals with understanding of video sequences, e. g., recognition of gestures, activities, facial expressions, etc. The main shift in the classic paradigm has been from the recognition of static objects in the scene to motion-based recognition of actions and events. Video understanding has overlapping research problems with other fields, therefore blurring the fixed boundaries. Computer graphics, image processing, and video databases have obvious overlap with computer vision. The main goal of computer graphics is to gener ate and animate realistic looking images, and videos. Researchers in computer graphics are increasingly employing techniques from computer vision to gen erate the synthetic imagery. A good example of this is image-based rendering and modeling techniques, in which geometry, appearance, and lighting is de rived from real images using computer vision techniques. Here the shift is from synthesis to analysis followed by synthesis."
Face recognition has been actively studied over the past decade and continues to be a big research challenge. Just recently, researchers have begun to investigate face recognition under unconstrained conditions. Unconstrained Face Recognition provides a comprehensive review of this biometric, especially face recognition from video, assembling a collection of novel approaches that are able to recognize human faces under various unconstrained situations. The underlying basis of these approaches is that, unlike conventional face recognition algorithms, they exploit the inherent characteristics of the unconstrained situation and thus improve the recognition performance when compared with conventional algorithms. Unconstrained Face Recognition is structured to meet the needs of a professional audience of researchers and practitioners in industry. This volume is also suitable for advanced-level students in computer science.
This updated and revised edition of a classic work provides a summary of methods for numerical computation of high resolution conventional and scanning transmission electron microscope images. At the limits of resolution, image artifacts due to the instrument and the specimen interaction can complicate image interpretation. Image calculations can help the user to interpret and understand high resolution information in recorded electron micrographs. The book contains expanded sections on aberration correction, including a detailed discussion of higher order (multipole) aberrations and their effect on high resolution imaging, new imaging modes such as ABF (annular bright field), and the latest developments in parallel processing using GPUs (graphic processing units), as well as updated references. Beginning and experienced users at the advanced undergraduate or graduate level will find the book to be a unique and essential guide to the theory and methods of computation in electron microscopy.
This book offers a systematic and comprehensive introduction to the visual simultaneous localization and mapping (vSLAM) technology, which is a fundamental and essential component for many applications in robotics, wearable devices, and autonomous driving vehicles. The book starts from very basic mathematic background knowledge such as 3D rigid body geometry, the pinhole camera projection model, and nonlinear optimization techniques, before introducing readers to traditional computer vision topics like feature matching, optical flow, and bundle adjustment. The book employs a light writing style, instead of the rigorous yet dry approach that is common in academic literature. In addition, it includes a wealth of executable source code with increasing difficulty to help readers understand and use the practical techniques. The book can be used as a textbook for senior undergraduate or graduate students, or as reference material for researchers and engineers in related areas.
This volume assesses approaches to the construction of computer vision systems. It shows that there is a spectrum of approaches with different degrees of maturity and robustness. The useful exploitation of computer vision in industry and elsewhere and the development of the discipline itself depend on understanding the way these approaches influence one another. The chief topic discussed is autonomy.True autonomy may not be achievable in machines in the near future, and the workshop concluded that it may be more desirable - and is certainly more pragmatic - to leave a person in the processing loop. The second conclusion of the workshop concerns the manner in which a system is designedfor an application. It was agreed that designers should first specify the required functionality, then identify the knowledge appropriate to that task, and finally choose the appropriate techniques and algorithms. The third conclusion concerns the methodologies employed in developing vision systems: craft, engineering, and science are mutually relevant and contribute to one another. The contributors place heavy emphasis on providing the reader with concrete examples of operational systems. The book is based on a workshop held as part of the activities of an ESPRIT Basic Research Action.
This book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently. Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks. For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law. Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today's organizations. On the one hand, it helps to learn the details of external attacks ensuring similar future attacks are thwarted. Additionally, network forensics is essential for investigating insiders' abuses that constitute the second costliest type of attack within organizations. Finally, law enforcement requires network forensics for crimes in which a computer or digital system is either being the target of a crime or being used as a tool in carrying a crime. Network security protects the system against attack while network forensics focuses on recording evidence of the attack. Network security products are generalized and look for possible harmful behaviors. This monitoring is a continuous process and is performed all through the day. However, network forensics involves post mortem investigation of the attack and is initiated after crime notification. There are many tools which assist in capturing data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Similarly, various network forensic frameworks are proposed in the literature. |
You may like...
Advanced Signal Processing for Industry…
Irshad Ahmad Ansari, Varun Bajaj
Hardcover
R3,230
Discovery Miles 32 300
Gaze Interaction and Applications of Eye…
Paivi Majaranta, Hirotaka Aoki, …
Hardcover
R6,431
Discovery Miles 64 310
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain
Hardcover
R8,415
Discovery Miles 84 150
Cybernetics, Cognition and Machine…
Vinit Kumar Gunjan, P.N Suganthan, …
Hardcover
R5,503
Discovery Miles 55 030
Advances in Human and Machine Navigation…
Rastislav Roka
Hardcover
|