Bemærk: Kan leveres før jul.
Master basic matrix methods by seeing how the mathematics is used in practice in a range of data-driven applications. Includes a... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book provides a thorough overview of recent progress in video object segmentation, providing researchers and industrial practitioners with thorough information on the most important problems and developed technologies in the area.
Bemærk: Kan ikke leveres før jul.
Video tracking is a key research area in computer vision and aims to track unique objects in a given video, which are useful for various applications such as video conference, video editing, surveillance, and autonomous driving.
Bemærk: Kan ikke leveres før jul.
Next, neural networks are presented as a means to learn a classification model directly from labeled sample images, with individual components of the network discussed.
Bemærk: Kan leveres før jul.
Bemærk: Kan ikke leveres før jul.
This textbook presents multiple facets of design, development and deployment of deep learning networks for both students and industry practitioners.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
The generalized information concept is called novelty and it is accompanied by two concepts derived from it, designated as information and surprise, which describe... Læs mere
Bemærk: Kan ikke leveres før jul.
The third edition of this authoritative and comprehensive handbook is the definitive work on the current state of the art of Biometric Presentation Attack Detection (PAD) – also known as Biometric Anti-Spoofing.
Bemærk: Kan ikke leveres før jul.
This book contains select chapters on support vector algorithms from different perspectives, including mathematical background, properties of various kernel functions, and several applications.
Bemærk: Kan ikke leveres før jul.
This book highlights recent advances in smart cities technologies, with a focus on new technologies such as biometrics, blockchains, data encryption, data mining, machine learning, deep learning, cloud security, and mobile security.