Implement supervised and unsupervised machine learning algorithms using C++ libraries such as PyTorch C++ API, Caffe2, Shogun, Shark-ML, mlpack, and dlib with the help of real-world examples and datasetsKey FeaturesBecome familiar with data processing, performance measuring, and model selection using various C++ librariesImplement practical machine learning and deep learning techniques to build smart modelsDeploy machine learning models to work on mobile and embedded devicesBook DescriptionC++ can make your machine learning models run faster and more efficiently.
Explore OpenCV 4 to create visually appealing cross-platform computer vision applicationsKey FeaturesUnderstand basic OpenCV 4 concepts and algorithmsGrasp advanced OpenCV techniques such as 3D reconstruction, machine learning, and artificial neural networksWork with Tesseract OCR, an open-source library to recognize text in imagesBook DescriptionOpenCV is one of the best open source libraries available, and can help you focus on constructing complete projects on image processing, motion detection, and image segmentation.
Anomaly detection in video surveillance stands at the core of numerous real-world applications that have broad impact and generate significant academic and industrial value.
Offering the first comprehensive analysis of touchless fingerprint-recognition technologies, Touchless Fingerprint Biometrics gives an overview of the state of the art and describes relevant industrial applications.
Anomaly detection in video surveillance stands at the core of numerous real-world applications that have broad impact and generate significant academic and industrial value.
This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more.
"e;Ultra Low Bit-Rate Speech Coding"e; focuses on the specialized topic of speech coding at very low bit-rates of 1 Kbits/sec and less, particularly at the lower ends of this range, down to 100 bps.
Many industry experts consider unsupervised learning the next frontier in artificial intelligence, one that may hold the key to general artificial intelligence.
Many industry experts consider unsupervised learning the next frontier in artificial intelligence, one that may hold the key to general artificial intelligence.
In the second edition of this practical book, four Cloudera data scientists present a set of self-contained patterns for performing large-scale data analysis with Spark.
In the second edition of this practical book, four Cloudera data scientists present a set of self-contained patterns for performing large-scale data analysis with Spark.
Apply the Processing language to tasks involved in computer vision--tasks such as edge and corner detection, recognition of motion between frames in a video, recognition of objects, matching of feature points and shapes in different frames for tracking purposes, and more.
This book is meant as a textbook for undergraduate and graduate students who are willing to understand essential elements of machine learning from both a theoretical and a practical perspective.
Current cameras are poor imitations of the human eye and close descen- dants in their design of ideas and a technology that are more than a century old.
In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins University.
The papers in this volume discuss important methodological advances in several important areas, including multivariate failure time data and interval censored data.
An attempt is made in this book to give scientists a detailed working knowledge of the powerful mathematical tools available to aid in data interpretation, especially when con- fronted with large data sets incorporating many parameters.
Automatic personal authentication using biometric information is becoming more essential in applications of public security, access control, forensics, banking, etc.
Iris Biometrics: From Segmentation to Template Security provides critical analysis, challenges and solutions on recent iris biometric research topics, including image segmentation, image compression, watermarking, advanced comparators, template protection and more.
Semantic Analysis and Understanding of Human Behaviour in Video Streaming investigates the semantic analysis of the human behaviour captured by video streaming, and introduces both theoretical and technological points of view.
This volume features key contributions from the International Conference on Pattern Recognition Applications and Methods, (ICPRAM 2012,) held in Vilamoura, Algarve, Portugal from February 6th-8th, 2012.
Graph Embedding for Pattern Recognition covers theory methods, computation, and applications widely used in statistics, machine learning, image processing, and computer vision.
This volume directly addresses the complexities involved in data mining and the development of new algorithms, built on an underlying theory consisting of linear and non-linear dynamics, data selection, filtering, and analysis, while including analytical projection and prediction.
Time-of-Flight Cameras and Microsoft Kinect(TM) closely examines the technology and general characteristics of time-of-flight range cameras, and outlines the best methods for maximizing the data captured by these devices.