![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Energy technology & engineering > Electrical engineering > General
This book covers the topic of data science in a comprehensive manner and synthesizes both fundamental and advanced topics of a research area that has now reached its maturity. The book starts with the basic concepts of data science. It highlights the types of data and their use and importance, followed by a discussion on a wide range of applications of data science and widely used techniques in data science. Key Features * Provides an internationally respected collection of scientific research methods, technologies and applications in the area of data science. * Presents predictive outcomes by applying data science techniques to real-life applications. * Provides readers with the tools, techniques and cases required to excel with modern artificial intelligence methods. * Gives the reader a variety of intelligent applications that can be designed using data science and its allied fields. The book is aimed primarily at advanced undergraduates and graduates studying machine learning and data science. Researchers and professionals will also find this book useful.
Unique selling point: * Systematically introduces the basic knowledge and state-of-the-art on UDHNs Core audience: * Researchers, engineers and postgraduates working on UDHNs Place in the market: * Includes the latest case studies and applications
This book provides a comprehensive overview of blockchain for 6G-enabled network-based applications. Following the key services of blockchain technology, this book will be instrumental to ideate and understand the necessities, challenges, and various case studies of different 6G-based applications. The emphasis is on understanding the contributions of blockchain technology in 6G-enabled applications, and its aim is to give insights into evolution, research directions, challenges, and the ways to empower 6G applications through blockchain. The book consistently emphasizes the missing connection between blockchain and 6G-enabled network applications. The entire ecosystem between these two futuristic technologies is explained in a comprehensive manner. The book constitutes a one-stop guide to students, researchers, and industry professionals. The book progresses from a general introduction toward more technical aspects while remaining easy to understand throughout. Comprehensive elaboration of material is supplemented with examples and diagrams, followed by easily understandable approaches with regard to technical information given thereon. Blockchain and its applications in 6G-enabled applications can drive many powerful solutions to real-world technical, scientific, and social problems. This book presents the most recent and exciting advances in blockchain for 6G-enabled network applications. Overall, this book is a complete outlet and is designed exclusively for professionals, scientists, technologists, developers, designers, and researchers in network technologies around blockchain integration with IoT, blockchain technology, information technology, and 6G-enabled industrial applications. Secondary readers include professionals involved in policy making and administration, security of public data and law, network policy developers, blockchain technology experts, regulators, and decision makers in government administrations.
An Image Processing Tour of College Mathematics aims to provide meaningful context for reviewing key topics of the college mathematics curriculum, to help students gain confidence in using concepts and techniques of applied mathematics, to increase student awareness of recent developments in mathematical sciences, and to help students prepare for graduate studies. The topics covered include a library of elementary functions, basic concepts of descriptive statistics, probability distributions of functions of random variables, definitions and concepts behind first- and second-order derivatives, most concepts and techniques of traditional linear algebra courses, an introduction to Fourier analysis, and a variety of discrete wavelet transforms - all of that in the context of digital image processing. Features Pre-calculus material and basic concepts of descriptive statistics are reviewed in the context of image processing in the spatial domain. Key concepts of linear algebra are reviewed both in the context of fundamental operations with digital images and in the more advanced context of discrete wavelet transforms. Some of the key concepts of probability theory are reviewed in the context of image equalization and histogram matching. The convolution operation is introduced painlessly and naturally in the context of naive filtering for denoising and is subsequently used for edge detection and image restoration. An accessible elementary introduction to Fourier analysis is provided in the context of image restoration. Discrete wavelet transforms are introduced in the context of image compression, and the readers become more aware of some of the recent developments in applied mathematics. This text helps students of mathematics ease their way into mastering the basics of scientific computer programming.
Lithium-ion batteries are the most promising among the secondary battery technologies, for providing high energy and high power required for hybrid electric vehicles (HEV) and electric vehicles (EV). Lithium-ion batteries consist of conventional graphite or lithium titanate as anode and lithium transition metal-oxides as cathode. A lithium salt dissolved in an aprotic solvent such as ethylene carbonate and diethylene carbonate is used as electrolyte. This rechargeable battery operates based on the principle of electrochemical lithium insertion/re-insertion or intercalation/de-intercalation during charging/discharging of the battery. It is essential that both electrodes have layered structure which should accept and release the lithium-ion. In advanced lithium-ion battery technologies, other than layered anodes are also considered. High cell voltage, high capacity as well as energy density, high Columbic efficiency, long cycle life, and convenient to fabricate any size or shape of the battery, are the vital features of this battery technology. Lithium-ion batteries are already being used widely in most of the consumer electronics such as mobile phones, laptops, PDAs etc. and are in early stages of application in HEV and EV, which will have far and wide implications and benefits to society. The book contains ten chapters, each focusing on a specific topic pertaining to the application of lithium-ion batteries in Electric Vehicles. Basic principles, electrode materials, electrolytes, high voltage cathodes, recycling spent Li-ion batteries and battery charge controller are addressed. This book is unique among the countable books focusing on the lithium-ion battery technologies for vehicular applications. It provides fundamentals and practical knowledge on the lithium-ion battery for vehicular application. Students, scholars, academicians, and battery and automobile industries will find this volume useful.
This book provides an interdisciplinary guide to quasicrystals, the 2011 Nobel Prize in Chemistry winning topic, by presenting an up-to-date and detailed introduction to the many fundamental aspects and applications of quasicrystals science. It reviews the most characteristic features of the peculiar geometric order underlying their structure and their reported intrinsic physical properties, along with their potential for specific applications. The role of quasiperiodic order in science and technology is also examined by focusing on the new design capabilities provided by this novel ordering of matter. This book is specifically devoted to promoting the very notion of quasiperiodic order, and to spur its physical implications and technological capabilities. It, therefore, explores the fundamental aspects of intermetallic, photonic, and phononic quasicrystals, as well as soft-matter quasicrystals, including their intrinsic physical and structural properties. In addition, it thoroughly discusses experimental data and related theoretical approaches to explain them, extending the standard treatment given in most current solid state physics literature. It also explores exciting applications in new technological devices of quasiperiodically ordered systems, including multilayered quasiperiodic systems, along with 2D and 3D designs, whilst outlining new frontiers in quasicrystals research. This book can be used as a reader-friendly introductory text for graduate students, in addition to senior scientists and researchers coming from the fields of physics, chemistry, materials science, and engineering. Key features: * Provides an updated and detailed introduction to the interdisciplinary field of quasicrystals in a tutorial style, considering both fundamental aspects and additional freedom degrees provided by designs based on quasiperiodically ordered materials. * Includes 50 fully worked out exercises with detailed solutions, motivating, and illustrating the different concepts and notions to provide readers with further learning opportunities. * Presents a complete compendium of the current state of the art knowledge of quasicrystalline matter, and outlines future next generation materials based on quasiperiodically ordered designs for their potential use in useful technological devices. Dr. Enrique Macia-Barber is Professor of condensed matter physics at the Universidad Complutense de Madrid. His research interests include the thermoelectric properties of quasicrystals and DNA biophysics. In 2010 he received the RSEF- BBVA Foundation Excellence Physics Teaching Award. His book Aperiodic Structures in Condensed Matter: Fundamentals and Applications (CRC Press, Boca-Raton, 2009) is one of the Top Selling Physics Books according to YBP Library Services.
This comprehensive overview of IoT systems architecture includes in-depth treatment of all key components: edge, communications, cloud, data processing, security, management, and uses. Internet of Things: Concepts and System Design provides a reference and foundation for students and practitioners that they can build upon to design IoT systems and to understand how the specific parts they are working on fit into and interact with the rest of the system. This is especially important since IoT is a multidisciplinary area that requires diverse skills and knowledge including: sensors, embedded systems, real-time systems, control systems, communications, protocols, Internet, cloud computing, large-scale distributed processing and storage systems, AI and ML, (preferably) coupled with domain experience in the area where it is to be applied, such as building or manufacturing automation. Written in a reader-minded approach that starts by describing the problem (why should I care?), placing it in context (what does this do and where/how does it fit in the great scheme of things?) and then describing salient features of solutions (how does it work?), this book covers the existing body of knowledge and design practices, but also offers the author's insights and articulation of common attributes and salient features of solutions such as IoT information modeling and platform characteristics.
As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.
A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.
This contributed volume tells the story of the establishment of a cybersecurity awareness framework for organizations, and how it was piloted in two public sector municipal contexts. It presents a clear picture of cybersecurity issues in municipalities and proposes a socio-technical solution for creating cybersecurity awareness, how to build the solution and what the impact is on the municipal contexts. The 9 chapters for this book also provide information regarding the design, the deployment and the evaluation of the technology. This book builds on the success of the European Horizon 2020 research and innovation project CS-AWARE. The research proposes the first cybersecurity situational awareness solution for local public administrations based on an analysis of the context, provides automatic incident detection and visualization, and enables information exchange with relevant national and EU level authorities involved in legislation and network security. Cybersecurity is one of the most challenging security problems for commercial companies, NGOs, governmental institutions as well as individuals. Reaching beyond the technology focused boundaries of classical information technology (IT) security, cybersecurity includes organizational and behavioral aspects of IT systems and that needs to comply to legal and regulatory framework for cybersecurity. While large corporations might have the resources to follow those developments and bring their IT infrastructure and services in line with the requirements, the burden for smaller organizations like local public administrations will be substantial and the required resources might not be available. New and innovative solutions that would help local public administration to ease the burden of being in line with cybersecurity requirements are needed. This book targets researchers working in cybersecurity, computer scientists, social scientists and advanced level students studying computer science and other related disciplines. Cybersecurity professionals as well as professionals working in local government contexts, including policy makers, communication experts and system administrators will also benefit from this book.
Semiconductors with optical characteristics have found widespread use in evolving semiconductor photovoltaics, where optical features are important. The industrialization of semiconductors and their allied applications have paved the way for optical measurement techniques to be used in new ways. Due to their unique properties, semiconductors are key components in the daily employed technologies in healthcare, computing, communications, green energy, and a range of other uses. This book examines the fundamental optical properties and applications of semiconductors. It summarizes the information as well as the optical characteristics and applicability of semiconductors through an in-depth review of the literature. Accomplished experts in the field share their knowledge and examine new developments. FEATURES Comprehensive coverage of all types of optical applications using semiconductors Explores relevant composite materials and devices for each application Addresses the optical properties of crystalline and amorphous semiconductors Describes new developments in the field and future potential applications Optical Properties and Applications of Semiconductors is a comprehensive reference and an invaluable resource for engineers, scientists, academics, and industry R&D teams working in applied physics.
Updated to integrated modular avionics, and cabin and aircraft information systems Ideal for students gaining EASA Part 66 licences, particularly the B1 or B2 licence One of Routledge's core aircraft maintenance titles.
Conceptually, as well as practically, digitalization is similar to the implementation of a modern computation model - the model may be a centralized setup using a mainframe or it may be extended to an N-tier architecture. Regardless of the specifics of the implementation, however, the conceptual model of data processing remains the same. Digitalization is nothing but a system relying on digital technologies to create, conduct and, potentially, expand a business activity of some sort. Digitalization can be used to create an e-commerce model for a small business or to create a global supply and distribution chain geared toward almost any kind of a business. It could also be used for non-profit purposes, such as on-line education and telemedicine or e-government. Digitalization: Contexts, Roles, and Outcomes is a contemplation and analysis of the socio-technical system that is known as digitalization. It considers the context of digitalization as well as the ways by which digitalization offers value to the context within which it operates. This book aims to offer readers an entry point to a path of inquiry into the different aspects of digitalization. The goal is to identify main directions for further inquiry as well as to outline the most obvious obstacles along the way. The book aims to guide readers on their own unique journeys using the basic ideas, principles, and concepts synthesized, developed, and presented in the book. It is beneficial to both practitioners and researchers. The book covers: The functionality of digitalization The significance of digitalization Identifying the context of digitalization Designing a control system A cognitive model for the theory of digitalization Designing a theory of digitalization The book helps readers to consider the subject of digitalization in a rigorous and rational way so their own perspectives can emerge stronger and be substantiated and reinforced by building an argument vis-a-vis perspectives and points examined in this book.
The proceeding is a collection of research papers presented at the 11th International Conference on Robotics, Vision, Signal Processing & Power Applications (RoViSP 2021). The theme of RoViSP 2021 "Enhancing Research and Innovation through the Fourth Industrial Revolution (IR 4.0)" served as a platform for researchers, scientists, engineers, academicians as well as industrial professionals from all around the globe to present and exchange their research findings and development activities through oral presentations. The book covers various topics of interest, including: Robotics, Control, Mechatronics and Automation Telecommunication Systems and Applications Electronic Design and Applications Vision, Image and Signal Processing Electrical Power, Energy and Industrial Applications Computer and Information Technology Biomedical Engineering and Applications Intelligent Systems Internet-of-things Mechatronics Mobile Technology
Perovskite is a well-known structure with the chemical formula ABX3, where A and B are cations coordinated with 12 and 6 anions, respectively, and X is an anion. When a halogen anion is used, the monovalent A and divalent B cations can be stabilized with respect to a tolerance factor ranging from ~0.8 to 1. Since the first report on ~10% efficiency and long-term stability of solid-state perovskite solar cells (PSCs) in 2012 and two subsequent seed reports on perovskite-sensitized solar cells in 2009 and 2011, PSCs have received increasing attention. The power conversion efficiency of PSCs was certified to be more than 25% in 2020, surpassing thin-film solar cell technologies. Methylammonium or formamidinium organic ion-based lead iodide perovskite has been used for high-efficiency PSCs. The first report on solid-state PSCs triggered perovskite photovoltaics, leading to more than 23,000 publications as of October 2021. In addition, halide perovskite has shown excellent performance when applied to light-emitting diodes (LEDs), photodetectors, and resistive memory, indicating that halide perovskite is multifunctional. This book explains the electro-optical and ferroelectric properties of perovskite and details the recent progress in scalable and tandem PSCs as well as perovskite LEDs and resistive memory. It is a useful textbook and self-help study guide for advanced undergraduate- and graduate-level students of materials science and engineering, chemistry, chemical engineering, and nanotechnology; for researchers in photovoltaics, LEDs, resistive memory, and perovskite-related opto-electronics; and for general readers who wish to gain knowledge about halide perovskite.
Blockchain technology has been penetrating every aspect of Information and Communications Technology (ICT), and its use has been growing rapidly in recent years. The interest and development of this technology has primarily been driven by the enormous value growth of cryptocurrencies and large investments of venture capital in blockchain start-ups. Blockchain for Smart Systems: Computing Technologies and Applications is intended to clarify and define, in simple terms, the technology behind blockchain. It provides a deep dive into the core fundamentals of blockchain: hashing algorithm behind each block, distributed technology, smart contracts, and private vs. public blockchain. Features Discusses fundamental theories of practical and sophisticated applications of blockchain technology Includes case studies Discusses the concepts with illustrations, appropriate figures, tables, and simple language This book is primarily aimed at undergraduates, graduates, research scholars, academicians, and industry and technology enthusiasts working in various aspects of blockchain technology.
The Internet of Things (IoT) is an interconnection of several devices, networks, technologies, and human resources to achieve a common goal. A variety of IoT-based applications are being used in different sectors and have succeeded in providing huge benefits to the users. As a revolution, IoT overtook the entire global landscape with its presence in almost every sector, including smart cities, smart grid, intelligent transportation, healthcare, education, and so on. This technological revolution also moved to the machines, converting them into intelligent computers that can make real-time decisions and communicate with each other, forming an Internet of Systems/Machines. The use of secure light-weight protocols will help us in developing environment-friendly and energy-efficient IoT systems. IoT is an emerging and recent area of research, adopted for many applications, and there is a need to investigate further challenges in all aspects of it. This book will provide information on fundamentals, architectures, communication protocols, use of AI, existing applications, and emerging research trends in IoT. It follows a theoretical approach to describe the fundamentals for beginners as well as a practical approach with the implementation of case studies for intermediate and advanced readers. The book will be beneficial for academicians, researchers, developers, and engineers who work in or are interested in fields related to IoT. This book serves as a reference for graduate and postgraduate courses in computer science, computer engineering, and information technology streams.
This book looks at the growing segment of Internet of Things technology (IoT) known as Internet of Medical Things (IoMT), an automated system that aids in bridging the gap between isolated and rural communities and the critical healthcare services that are available in more populated and urban areas. Many technological aspects of IoMT are still being researched and developed, with the objective of minimizing the cost and improving the performance of the overall healthcare system. This book focuses on innovative IoMT methods and solutions being developed for use in the application of healthcare services, including post-surgery care, virtual home assistance, smart real-time patient monitoring, implantable sensors and cameras, and diagnosis and treatment planning. It also examines critical issues around the technology, such as security vulnerabilities, IoMT machine learning approaches, and medical data compression for lossless data transmission and archiving. Internet of Medical Things is a valuable reference for researchers, students, and postgraduates working in biomedical, electronics, and communications engineering, as well as practicing healthcare professionals.
This book is the result of the extensive experience the authors gained through their year-long occupation at the Faculty of Electrical Engineering at the University of Banja Luka. Starting at the fundamental basics of electrical engineering, the book guides the reader into this field and covers all the relevant types of converters and regulators. Understanding is enhanced by the given examples, exercises and solutions. Thus this book can be used as a textbook for students, for self-study or as a reference book for professionals.
2D Materials for Infrared and Terahertz Detectors provides an overview of the performance of emerging detector materials, while also offering, for the first time, a comparison with traditional materials used in the fabrication of infrared and terahertz detectors. Since the discovery of graphene, its applications to electronic and optoelectronic devices have been intensively researched. The extraordinary electronic and optical properties allow graphene and other 2D materials to be promising candidates for infrared (IR) and terahertz (THz) photodetectors, and yet it appears that the development of new detectors using these materials is still secondary to those using traditional materials. This book explores this phenomenon, as well as the advantages and disadvantages of using 2D materials. Special attention is directed toward the identification of the most-effective hybrid 2D materials in infrared and terahertz detectors, as well as future trends. Written by one of the world's leading researchers in the field of IR optoelectronics, this book will be a must-read for researchers and graduate students in photodetectors and related fields. Features * Offers a comprehensive overview of the different types of 2D materials used in fabrication of IR and THz detectors, and includes their advantages/disadvantages * The first book to compare new detectors to a wide family of common, commercially available detectors that use traditional materials.
As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.
This book provides a collection of papers from the Ninth Workshop on Computing: Theory and Practice, WCTP 2019 devoted to theoretical and practical approaches to computation, which was organized by four top universities in Japan and the Philippines: Tokyo Institute of Technology, Osaka University, the University of the Philippines Diliman, and De La Salle University. The proceedings provide a broad overview of recent research trends in computer science research in Asia, particularly in these two countries. The papers included in the proceedings focus on both theoretical and practical aspects of computations, such as programming language theory, modeling of software systems, applications of machine learning, empathic computing, and various applications of information technology.
Consolidating recent research in the area, the Handbook on Mobile and Ubiquitous Computing: Status and Perspective illustrates the design, implementation, and deployment of mobile and ubiquitous systems, particularly in mobile and ubiquitous environments, modeling, database components, and wireless infrastructures. Supplying an overarching perspective, the book is ideal for researchers, graduate students, and industry practitioners in computer science and engineering interested in recent developments in mobile and ubiquitous computing. It discusses new trends in intelligent systems, reviews sensory input and multimedia information, and examines embedded real-time systems. With coverage that spans security, privacy, and trust, the book is divided into six parts: Mobile and Ubiquitous Computing-illustrates the concepts, design, implementation, and deployment of mobile and ubiquitous systems Smart Environments and Agent Systems-discusses a new trend toward intelligent systems that are completely connected, proactive, intuitive, and constantly available Human-Computer Interaction and Multimedia Computing-describes guidelines for designing multisensory input and output for mobile devices Security, Privacy, and Trust Management-presents an approach to dynamically establish trust between a system and its mobile client in a flexible manner using a multi-agent negotiation mechanism Embedded Real-Time Systems-introduces novel work on how mobile, ubiquitous, and intelligence computing can be realized Networking Sensing and Communications-covers challenges, designs, and prototype solutions for establishing, managing, and maintaining current sensor networks in mobile and ubiquitous computing environments Containing the contributions of more than 70 researchers, practitioners, and academics from around the world, the book brings together the latest research on the subject to provide an understanding of the issues being addressed in the field. Filled with extensive references in each chapter, it provides you with the tools to participate in the design, implementation, and deployment of systems that are connected, proactive, intuitive, and constantly available.
Image Processing and Acquisition using Python provides readers with a sound foundation in both image acquisition and image processing-one of the first books to integrate these topics together. By improving readers' knowledge of image acquisition techniques and corresponding image processing, the book will help them perform experiments more effectively and cost efficiently as well as analyze and measure more accurately. Long recognized as one of the easiest languages for non-programmers to learn, Python is used in a variety of practical examples. A refresher for more experienced readers, the first part of the book presents an introduction to Python, Python modules, reading and writing images using Python, and an introduction to images. The second part discusses the basics of image processing, including pre/post processing using filters, segmentation, morphological operations, and measurements. The second part describes image acquisition using various modalities, such as x-ray, CT, MRI, light microscopy, and electron microscopy. These modalities encompass most of the common image acquisition methods currently used by researchers in academia and industry. Features Covers both the physical methods of obtaining images and the analytical processing methods required to understand the science behind the images. Contains many examples, detailed derivations, and working Python examples of the techniques. Offers practical tips on image acquisition and processing. Includes numerous exercises to test the reader's skills in Python programming and image processing, with solutions to selected problems, example programs, and images available on the book's web page. New to this edition Machine learning has become an indispensable part of image processing and computer vision, so in this new edition two new chapters are included: one on neural networks and the other on convolutional neural networks. A new chapter on affine transform and many new algorithms. Updated Python code aligned to the latest version of modules.
- Detailed examples of new technology and its important applications for global security and defence, sufficient guidelines for immediate implementations. - Aimed at system theorists, distributed algorithms designers, NASA, DARPA, and SDA network managers, defence and security personnel, university students interested in advanced MSc and PhD projects, and many others. - The book offers a concrete and very practical management solution for many problems described in other books in this area, which were presented mostly on general descriptive and qualitative levels |
![]() ![]() You may like...
Loki; the Life of Charles Proteus…
Jonathan Norton 1903-1975 Leonard
Hardcover
R938
Discovery Miles 9 380
Data Reimagined - Building Trust One…
Jodi Daniels, Justin Daniels
Hardcover
Smart Sensors and MEMS - Intelligent…
S. Nihtianov, A. Luque
Paperback
Electrical Catechism - an Introductory…
George Defrees 1864- Shepardson
Hardcover
R1,040
Discovery Miles 10 400
Power System Analysis and Design, SI…
J. Duncan Glover, Mulukutla Sarma, …
Paperback
|