![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Artificial intelligence > Computer vision
The five volume set CCIS 224-228 constitutes the refereed proceedings of the International conference on Applied Informatics and Communication, ICAIC 2011, held in Xi'an, China in August 2011. The 446 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover a broad range of topics in computer science and interdisciplinary applications including control, hardware and software systems, neural computing, wireless networks, information systems, and image processing.
The five volume set CCIS 224-228 constitutes the refereed proceedings of the International conference on Applied Informatics and Communication, ICAIC 2011, held in Xi'an, China in August 2011. The 446 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover a broad range of topics in computer science and interdisciplinary applications including control, hardware and software systems, neural computing, wireless networks, information systems, and image processing.
Traditionally, say 15 years ago, three-dimensional image analysis (aka computer vi sion) and three-dimensional image synthesis (aka computer graphics) were separate fields. Rarely were expert"
The four-volume set LNCS 6492-6495 constitutes the thoroughly refereed post-proceedings of the 10th Asian Conference on Computer Vision, ACCV 2009, held in Queenstown, New Zealand in November 2010. All together the four volumes present 206 revised papers selected from a total of 739 Submissions. All current issues in computer vision are addressed ranging from algorithms that attempt to automatically understand the content of images, optical methods coupled with computational techniques that enhance and improve images, and capturing and analyzing the world's geometry while preparing the higher level image and shape understanding. Novel geometry techniques, statistical learning methods, and modern algebraic procedures are dealt with as well.
This work presents a full generic approach to the detection and recognition of traffic signs. The approach is based on the latest computer vision methods for object detection, and on powerful methods for multiclass classification. The challenge was to robustly detect a set of different sign classes in real time, and to classify each detected sign into a large, extensible set of classes. To address this challenge, several state-of-the-art methods were developed that can be used for different recognition problems. Following an introduction to the problems of traffic sign detection and categorization, the text focuses on the problem of detection, and presents recent developments in this field. The text then surveys a specific methodology for the problem of traffic sign categorization - Error-Correcting Output Codes - and presents several algorithms, performing experimental validation on a mobile mapping application. The work ends with a discussion on future research and continuing challenges.
Computer graphics is important in many areas including engineering design, architecture, education, and computer art and animation. This book examines a wide array of current methods used in creating real-looking objects in the computer, one of the main aims of computer graphics. Key features: * Good foundational mathematical introduction to curves and surfaces; no advanced math required * Topics organized by different interpolation/approximation techniques, each technique providing useful information about curves and surfaces * Exposition motivated by numerous examples and exercises sprinkled throughout, aiding the reader * Includes a gallery of color images, Mathematica code listings, and sections on curves & surfaces by refinement and on sweep surfaces * Web site maintained and updated by the author, providing readers with errata and auxiliary material This engaging text is geared to a broad and general readership of computer science/architecture engineers using computer graphics to design objects, programmers for computer gamemakers, applied mathematicians, and students majoring in computer graphics and its applications. It may be used in a classroom setting or as a general reference.
It givesus greatpleasureto presentthe proceedings of the 9th Asian Conference on Computer Vision (ACCV 2009), held in Xi'an, China, in September 2009. This was the ?rst ACCV conference to take place in mainland China. We received a total of 670 full submissions, which is a new record in the ACCV series. Overall, 35 papers were selected for oral presentation and 131 as posters, yielding acceptance rates of 5.2% for oral, 19.6% for poster, and 24.8% in total. In the paper reviewing, we continued the tradition of previous ACCVsbyconductingtheprocessinadouble-blindmanner.Eachofthe33Area Chairs received a pool of about 20 papers and nominated a number of potential reviewers for each paper. Then, Program Committee Chairs allocated at least three reviewers to each paper, taking into consideration any con?icts of interest and the balance of loads. Once the reviews were ?nished, the Area Chairs made summaryreportsforthepapersintheirpools, basedonthereviewers'comments and on their own assessments of the papers.
This book contains the proceedings of the International Symposium on Mathematical Morphology and its Applications to Image and Signal Processing IV, held June 3-5, 1998, in Amsterdam, The Netherlands. The purpose of the work is to provide the image analysis community with a sampling of recent developments in theoretical and practical aspects of mathematical morphology and its applications to image and signal processing. Among the areas covered are: digitization and connectivity, skeletonization, multivariate morphology, morphological segmentation, color image processing, filter design, gray-scale morphology, fuzzy morphology, decomposition of morphological operators, random sets and statistical inference, differential morphology and scale-space, morphological algorithms and applications. Audience: This volume will be of interest to research mathematicians and computer scientists whose work involves mathematical morphology, image and signal processing.
The five volume set CCIS 224-228 constitutes the refereed proceedings of the International conference on Applied Informatics and Communication, ICAIC 2011, held in Xi'an, China in August 2011. The 446 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover a broad range of topics in computer science and interdisciplinary applications including control, hardware and software systems, neural computing, wireless networks, information systems, and image processing.
Intimesofdecliningeconomicgrowth, companieshavetocontroltheircostsmore than ever to saveresources needed in the future. Regardless of the economic size of the company, the processes of production and logistics play a decisive role in stabilizing procedures and avoiding waste. Both are important cost drivers in manufacturing companies and therefore they o?er large potential savings. Pervasive networking in the last years has contributed to a hitherto unknown transparency of global markets. This harmonization opened up new possibilities of entering foreign markets for procurement and sales to the companies. The emerging global procurement strategy was understood as a chance to rethink the relocation of existing production facilities to pro't from existing di?erences in price and performance as a resource-saving factor. Many companies tended towards a reduction of their vertical integration by outsourcing sections of their value chain. These contracted services of production result in higher transport volumes, increased complexity of supply processes and new requirements on - gistic networks. This trend of outsourcing has not stopped, but is slowing down noticeably. Additionally, thereisanincreasingproportionofcompaniesrestoring business units that were outsourced before. Reasons for turning back decisions are often to be found in missed goals. It is not unusual that important cost f- tors were disregarded in the original basis of decision-making. In the meantime many companies have realized that it is easier to achieve stability of processes and therewith a control of costs by increasing their own contribution to p- duction. Especially in times of under-utilized capacities like in the current crisis, insourcingcanbeastrategicoptio
This book constitutes the refereed proceedings of the 8th International Workshop on Energy Minimization Methods in Computer Vision and Pattern Recognition, EMMCVPR 2011, held in St. Petersburg, Russia in July, 2011. The book presents 30 revised full papers selected from a total of 52 submissions. The book is divided in sections on discrete and continuous optimization, segmentation, motion and video, learning and shape analysis.
The two volume set LNCS 6854/6855 constitutes the refereed proceedings of the International Conference on Computer Analysis of Images and Patterns, CAIP 2011, which took place in Seville, Spain, August 29-31, 2011. The 138 papers presented together with 2 invited talks were carefully reviewed and selected from 286 submissions. The papers are organized in topical section on: motion analysis, image and shape models, segmentation and grouping, shape recovery, kernel methods, medical imaging, structural pattern recognition, Biometrics, image and video processing, calibration; and tracking and stereo vision.
Neural networks are members of a class of software that have the potential to enable intelligent computational systems capable of simulating characteristics of biological thinking and learning. Currently no standards exist to verify and validate neural network-based systems. NASA Independent Verification and Validation Facility has contracted the Institute for Scientific Research, Inc. to perform research on this topic and develop a comprehensive guide to performing V&V on adaptive systems, with emphasis on neural networks used in safety-critical or mission-critical applications. Methods and Procedures for the Verification and Validation of Artificial Neural Networks is the culmination of the first steps in that research. This volume introduces some of the more promising methods and techniques used for the verification and validation (V&V) of neural networks and adaptive systems. A comprehensive guide to performing V&V on neural network systems, aligned with the IEEE Standard for Software Verification and Validation, will follow this book.
Knowledge Discovery today is a significant study and research area. In finding answers to many research questions in this area, the ultimate hope is that knowledge can be extracted from various forms of data around us. This book covers recent advances in unsupervised and supervised data analysis methods in Computational Intelligence for knowledge discovery. In its first part the book provides a collection of recent research on distributed clustering, self organizing maps and their recent extensions. If labeled data or data with known associations are available, we may be able to use supervised data analysis methods, such as classifying neural networks, fuzzy rule-based classifiers, and decision trees. Therefore this book presents a collection of important methods of supervised data analysis. "Classification and Clustering for Knowledge Discovery" also includes variety of applications of knowledge discovery in health, safety, commerce, mechatronics, sensor networks, and telecommunications.
Recent progress in research, teaching and communication has arisen
from the use of new tools in visualization. To be fruitful,
visualization needs precision and beauty. This book is a source of
mathematical illustrations by mathematicians as well as artists. It
offers examples in many basic mathematical fields including
polyhedra theory, group theory, solving polynomial equations,
dynamical systems and differential topology.
This book approaches the realisation of digital terrain and landscape data through clear and practical examples. From data provision and the creation of revealing analyses to realistic depictions for presentation purposes, the reader is led through the world of digital 3-D graphics. The authors deep knowledge of the scientific fundamentals and many years of experience in 3-D visualization enable them to lead the reader through a complex subject and shed light on previously murky virtual landscapes.
The International Gesture Workshops (GW) are interdisciplinary events for those researching gesture-based communication across the disciplines. The focus of these events is a shared interest in understanding gestures and sign language in their many facets, and using them for advancing human-machine interaction. Since 1996, International Gesture Workshops have been held roughly every second year, with fully reviewed proceedings published by Springer. The International Gesture Workshop GW 2009 was hosted by Bielefeld University's Center for Interdisciplinary Research (ZiF - Zentrum fur interdisziplinare Forschung) during February 25-27, 2009. Like its predecessors, GW 2009 aimed to provide a platform for participants to share, discuss, and criticize recent and novel research with a multidisciplinary audience. More than 70 computer scientists, linguistics, psychologists, neuroscientists as well as dance and music scientists from 16 countries met to present and exchange their newest results under the umbrella theme "Gesture in Embodied Communication and Human-Computer Interaction. " Consistent with the steady growth of research activity in this area, a large number of high-quality submissions were received, which made GW 2009 an exciting and important event for anyone interested in gesture-related technological research relevant to human-computer interaction. In line with the practice of previous gesture workshops, presenters were invited to submit theirs papers for publication in a subsequent peer-reviewed publication of high quality. The present book is the outcome of this effort. Representing the research work from eight countries, it contains a selection of 28 thoroughly reviewed articles.
This book deals with various image processing and machine vision problems efficiently with splines and includes: the significance of Bernstein Polynomial in splines, detailed coverage of Beta-splines applications which are relatively new, Splines in motion tracking, various deformative models and their uses. Finally the book covers wavelet splines which are efficient and effective in different image applications.
This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.
One of the greatest scientific challenges of the 21st century is how to master, organize and extract useful knowledge from the overwhelming flow of information made available by today 's data acquisition systems and computing resources. Visualization is the premium means of taking up this challenge. This book is based on selected lectures given by leading experts in scientific visualization during a workshop held at Schloss Dagstuhl, Germany. Topics include user issues in visualization, large data visualization, unstructured mesh processing for visualization, volumetric visualization, flow visualization, medical visualization and visualization systems. The book contains more than 350 color illustrations.
This book constitutes the proceedings of the Second International Conference on Information Processing in Computer-Assisted Interventions IPCAI 2011, held in Berlin, Germany, on June 22, 2011. The 17 papers presented were carefully reviewed and selected from 29 submissions. The focus of the conference is the use of information technology in interventional medicine, including real-time modeling and analysis, technology, human-machine interfaces, and systems associated with operating rooms and interventional suites. It also covers the overall information flow associated with intervention planning, execution, follow-up, and outcome analysis; as well as training and skill assessment for such procedures.
Landmarks are preferred image features for a variety of computer vision tasks such as image mensuration, registration, camera calibration, motion analysis, 3D scene reconstruction, and object recognition. Main advantages of using landmarks are robustness w. r. t. lightning conditions and other radiometric vari ations as well as the ability to cope with large displacements in registration or motion analysis tasks. Also, landmark-based approaches are in general com putationally efficient, particularly when using point landmarks. Note, that the term landmark comprises both artificial and natural landmarks. Examples are comers or other characteristic points in video images, ground control points in aerial images, anatomical landmarks in medical images, prominent facial points used for biometric verification, markers at human joints used for motion capture in virtual reality applications, or in- and outdoor landmarks used for autonomous navigation of robots. This book covers the extraction oflandmarks from images as well as the use of these features for elastic image registration. Our emphasis is onmodel-based approaches, i. e. on the use of explicitly represented knowledge in image analy sis. We principally distinguish between geometric models describing the shape of objects (typically their contours) and intensity models, which directly repre sent the image intensities, i. e., the appearance of objects. Based on these classes of models we develop algorithms and methods for analyzing multimodality im ages such as traditional 20 video images or 3D medical tomographic images."
The recent development of intelligent surveillance systems has captured the interest of both academic research labs and industry. Automated Multi-Camera Surveillance addresses monitoring of people and vehicles, and detection of threatening objects and events in a variety of scenarios. In this book, techniques for development of an automated multi-camera surveillance system are discussed and proposed. The state-of-the-art in the automated surveillance systems is reviewed as well. Detailed explanation of sub-components of surveillance systems are provided, and enhancements to each of these components are proposed. The authors identify important challenges that such a system must address, and propose solutions. Development of a specific surveillance system called "KNIGHT" is described, along with the authors' experience using it. This book enables the reader to understand the mathematical models and algorithms underlying automated surveillance as well as the benefits and limitations of using such methods.
Identification Modeling and Characteristics of Miniature Rotorcraft introduces an approach to developing a simple and effective linear parameterized model of vehicle dynamics using the CIFERa identification tool created by the Army/NASA Rotorcraft Division. It also presents the first application of the advanced control system optimization tool CONDUITa to systematically and efficiently tune control laws for a model-scale UAV helicopter against multiple and competing dynamic response criteria. Identification Modeling and Characteristics of Miniature Rotorcraft presents the detailed account of how the theory was developed, the experimentation performed, and how the results were used. This book will serve as a basic and illustrative guide for all students that are interested in developing autonomous flying helicopters. "
In The Brain from 25,000 Feet, Mark A. Changizi defends a non-reductionist philosophy and applies it to a variety of problems in the brain sciences. Some of the key questions answered are as follows. Why do we see visual illusions, and why are illusions inevitable for any finite-speed vision machine? Why aren't brains universal learning machines, and what does the riddle of induction and its solution have to do with human learning and innateness? The author tackles such questions as why the brain is folded, and why animals have as many limbs as they do, explaining how these relate to principles of network optimality. He describes how most natural language words are vague and then goes on to explain the connection to the ultimate computational limits on machines. There is also a fascinating discussion of how animals accommodate greater behavioral complexity. This book is a must-read for researchers interested in taking a high-level, non-mechanistic approach to answering age-old fundamental questions in the brain sciences. |
You may like...
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain
Hardcover
R7,962
Discovery Miles 79 620
Advanced Methods and Deep Learning in…
E.R. Davies, Matthew Turk
Paperback
R2,578
Discovery Miles 25 780
Infrastructure Computer Vision
Ioannis Brilakis, Carl Thomas Michael Haas
Paperback
R3,039
Discovery Miles 30 390
Feature Extraction and Image Processing…
Mark Nixon, Alberto S. Aguado
Paperback
R1,874
Discovery Miles 18 740
Advanced Machine Vision Paradigms for…
Tapan K. Gandhi, Siddhartha Bhattacharyya, …
Paperback
R3,019
Discovery Miles 30 190
Computer Vision in Control Systems-4…
Margarita N. Favorskaya, Lakhmi C. Jain
Hardcover
R2,715
Discovery Miles 27 150
Deep Learning Models for Medical Imaging
K. C. Santosh, Nibaran Das, …
Paperback
R2,049
Discovery Miles 20 490
|