![]() |
![]() |
Your cart is empty |
||
Showing 1 - 12 of 12 matches in All Departments
Monitoring of public and private sites is increasingly becoming a very important and critical issue, especially after the recent flurry of terrorist attacks including the one on the Word Trade Center in September 2001. It is, therefore, imperative that effective multisensor surveillance systems be developed to protect the society from similar attacks in the future. The new generation of surveillance systems to be developed have a specific requirement: they must be able to automatically identify criminal and terrorist activity without sacrificing individual privacy to the extent possible. Privacy laws concerning monitoring and surveillance systems vary from country to country but, in general, they try to protect the privacy of their citizens. Monitoring and visual surveillance has numerous other applications. It can be employed to help invalids or handicapped and to monitor the activities of elderly people. It can be used to monitor large events such as sporting events, as well. Nowadays, monitoring is employ d in several different contexts including transport applications, such as monitoring of railway stations and airports, dangerous environments like nuclear facilities or traffic flows on roads and bridges. The latest generation of surveillance systems mainly rely on hybrid analog-digital, or completely digital video communications and processing methods and take advantage of the greater of flexibility offered by video processing algorithms that are capable focusing a human operator's attention on a set of interesting situations.
The first of its kind, this book reviews image processing tools and techniques including Independent Component Analysis, Mutual Information, Markov Random Field Models and Support Vector Machines. The book also explores a number of experimental examples based on a variety of remote sensors. The book will be useful to people involved in hyperspectral imaging research, as well as by remote-sensing data like geologists, hydrologists, environmental scientists, civil engineers and computer scientists.
The series "Studies in Computational Intelligence" (SCI) publishes new developments and advances in the various areas of computational intelligence quickly and with a high quality. The intent is to cover the theory, applications, and design methods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life science, as well as the methodologies behind them. The series contains monographs, lecture notes and edited volumes in computational intelligence spanning the areas of neural networks, connectionist systems, genetic algorithms, evolutionary computation, artificial intelligence, cellular automata, self-organizing systems, soft computing, fuzzy systems and hybrid intelligent systems. Critical to both contributors and readers are the short publication time and world-wide distribution this permits a rapid and broad dissemination of research results. The field of Artificial Intelligence developed important concepts for simulating human intelligence. Its sister field, Applied Intelligence, has focused on techniques for developing intelligent systems for solving real life problems in all disciplines including science, social science, art, engineering, and finance. The objective of the International Conference on Industrial, Engineering & Other Applications of Applied Intelligent Systems (IEA-AIE) is to promote and disseminate research in Applied Intelligence. It seeks quality papers on a wide range of topics in applied intelligence that are employed in developing intelligent systems for solving real life problems in all disciplines. Every year this conference brings together scientists, engineers and practitioners, who work on designing and developing applications that use intelligent techniques or work on intelligent techniques and apply them to application domains. The book is comprised of seventeen chapters providing up-to-date and state-of-the-art research on the applications of applied Intelligence techniques."
The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference.
This book provides an introduction to decision making in a distributed computational framework. Classical detection theory assumes a centralized configuration. All observations are processed by a central processor to produce the decision. In the decentralized detection system, distributed detectors generate decisions based on locally available observations; these decisions are then conveyed to the fusion center that makes the global decision. Using numerous examples throughout the book, the author discusses such distributed detection processes under several different formulations and in a wide variety of network topologies.
Taking another lesson from nature, the latest advances in image processing technology seek to combine image data from several diverse types of sensors in order to obtain a more accurate view of the scene: very much the same as we rely on our five senses. Multi-Sensor Image Fusion and Its Applications is the first text dedicated to the theory and practice of the registration and fusion of image data, covering such approaches as statistical methods, color-related techniques, model-based methods, and visual information display strategies. After a review of state-of-the-art image fusion techniques, the book provides an overview of fusion algorithms and fusion performance evaluation. The following chapters explore recent progress and practical applications of the proposed techniques to solving problems in such areas as medical diagnosis, surveillance and biometric systems, remote sensing, nondestructive evaluation, blurred image restoration, and image quality assessment. Recognized leaders from industry and academia contribute the chapters, reflecting the latest research trends and providing useful algorithms to aid implementation. Supplying a 28-page full-color insert, Multi-Sensor Image Fusion and Its Applications clearly demonstrates the benefits and possibilities of this revolutionary development. It provides a solid knowledge base for applying these cutting-edge techniques to new challenges and creating future advances.
The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference.
The series "Studies in Computational Intelligence" (SCI) publishes new developments and advances in the various areas of computational intelligence quickly and with a high quality. The intent is to cover the theory, applications, and design methods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life science, as well as the methodologies behind them. The series contains monographs, lecture notes and edited volumes in computational intelligence spanning the areas of neural networks, connectionist systems, genetic algorithms, evolutionary computation, artificial intelligence, cellular automata, self-organizing systems, soft computing, fuzzy systems and hybrid intelligent systems. Critical to both contributors and readers are the short publication time and world-wide distribution this permits a rapid and broad dissemination of research results. The field of Artificial Intelligence developed important concepts for simulating human intelligence. Its sister field, Applied Intelligence, has focused on techniques for developing intelligent systems for solving real life problems in all disciplines including science, social science, art, engineering, and finance. The objective of the International Conference on Industrial, Engineering & Other Applications of Applied Intelligent Systems (IEA-AIE) is to promote and disseminate research in Applied Intelligence. It seeks quality papers on a wide range of topics in applied intelligence that are employed in developing intelligent systems for solving real life problems in all disciplines. Every year this conference brings together scientists, engineers and practitioners, who work on designing and developing applications that use intelligent techniques or work on intelligent techniques and apply them to application domains. The book is comprised of seventeen chapters providing up-to-date and state-of-the-art research on the applications of applied Intelligence techniques."
Monitoring of public and private sites is increasingly becoming a very important and critical issue, especially after the recent flurry of terrorist attacks including the one on the Word Trade Center in September 2001. It is, therefore, imperative that effective multisensor surveillance systems be developed to protect the society from similar attacks in the future. The new generation of surveillance systems to be developed have a specific requirement: they must be able to automatically identify criminal and terrorist activity without sacrificing individual privacy to the extent possible. Privacy laws concerning monitoring and surveillance systems vary from country to country but, in general, they try to protect the privacy of their citizens. Monitoring and visual surveillance has numerous other applications. It can be employed to help invalids or handicapped and to monitor the activities of elderly people. It can be used to monitor large events such as sporting events, as well. Nowadays, monitoring is employ d in several different contexts including transport applications, such as monitoring of railway stations and airports, dangerous environments like nuclear facilities or traffic flows on roads and bridges. The latest generation of surveillance systems mainly rely on hybrid analog-digital, or completely digital video communications and processing methods and take advantage of the greater of flexibility offered by video processing algorithms that are capable focusing a human operator's attention on a set of interesting situations.
This book provides an introductory treatment of the fundamentals of decision-making in a distributed framework. Classical detection theory assumes that complete observations are available at a central processor for decision-making. More recently, many applications have been identified in which observations are processed in a distributed manner and decisions are made at the distributed processors, or processed data (compressed observations) are conveyed to a fusion center that makes the global decision. Conventional detection theory has been extended so that it can deal with such distributed detection problems. A unified treatment of recent advances in this new branch of statistical decision theory is presented. Distributed detection under different formulations and for a variety of detection network topologies is discussed. This material is not available in any other book and has appeared relatively recently in technical journals. The level of presentation is such that the hook can be used as a graduate-level textbook. Numerous examples are presented throughout the book. It is assumed that the reader has been exposed to detection theory. The book will also serve as a useful reference for practicing engineers and researchers. I have actively pursued research on distributed detection and data fusion over the last decade, which ultimately interested me in writing this book. Many individuals have played a key role in the completion of this book.
The two volume set LNAI 6703 and LNAI 6704 constitutes the
thoroughly refereed conference proceedings of the 24th
International Conference on Industrial Engineering and Other
Applications of Applied Intelligent Systems, IEA/AIE 2011, held in
Syracuse, NY, USA, in June/July 2011.
The two volume set LNAI 6703 and LNAI 6704 constitutes the
thoroughly refereed conference proceedings of the 24th
International Conference on Industrial Engineering and Other
Applications of Applied Intelligent Systems, IEA/AIE 2011, held in
Syracuse, NY, USA, in June/July 2011.
|
![]() ![]() You may like...
Atlas - The Story Of Pa Salt
Lucinda Riley, Harry Whittaker
Paperback
Mission Impossible 6: Fallout
Tom Cruise, Henry Cavill, …
Blu-ray disc
![]()
|