This book offers a broad overview of distributed video coding (DVC) and multiple description coding (MDC), novel techniques which address problems of conventional image and video compression coding. Coverage ranges from basic principles to the latest research.
This unique text brings together into a single framework current research in the three areas of discrete calculus, complex networks, and algorithmic content extraction. Many example applications from several fields of computational science are provided.
This up-to-date and authoritative book surveys the most promising Kinect-based research activities, discussing current challenges to the adaptation of consumer depth cameras, and showcasing exciting applications that extend far beyond entertainment and gaming.
Here is the latest on intelligent vehicles, covering object and obstacle detection and recognition and vehicle motion control. Includes a navigation approach using global views; introduces algorithms for lateral and longitudinal motion control and more.
Examining the full range of a document’s lifetime, this volume reviews the issues involved in handling and processing digital documents. Topics include acquisition, representation, security, pre-processing, layout analysis and analysis of single components.
This practical text offers researchers and software engineers a thorough understanding of how core low-level building blocks of machine perception systems are implemented. It includes in-depth coverage of state-of-the-art perception algorithms and experiments.
This text/reference provides a comprehensive introduction to object recognition (OR). The book presents an overview of the diverse applications for OR and highlights important algorithm classes, presenting representative example algorithms for each class.
This book addresses why the wearable ECG recorder, due to recent developments, constitutes a significant innovation in the healthcare field. It examines the viability of the wearable ECG in cardiac monitoring and details in depth the hardware involved.
This is the first book dedicated to modern steganography and steganalysis. The author offers a proposal to structure approaches to provably secure steganography according to their implied assumptions on the limits of the adversary and on the nature of covers.