Narrow your search

Library

UHasselt (6)

ULiège (4)

UGent (3)

ULB (3)

KBR (1)

KU Leuven (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UAntwerpen (1)

More...

Resource type

book (6)


Language

English (3)

German (2)

Undetermined (1)


Year
From To Submit

2006 (1)

2002 (1)

2001 (1)

2000 (1)

1993 (1)

More...
Listing 1 - 6 of 6
Sort by
Digitale Bildverarbeitung : Eine algorithmische Einführung mit Java
Authors: ---
ISBN: 3540309403 9783540309406 9783540309413 3540309411 Year: 2006 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Überarbeitete Neuauflage des erfolgreichen Buches, das von Praktikern und Dozenten gerne eingesetzt wird. Die Autoren geben eine fundierte Einführung in die wichtigsten Methoden der digitalen Bildverarbeitung. Die praktische Anwendbarkeit steht dabei im Vordergrund, während formale und mathematische Aspekte auf das Wesentliche reduziert sind, ohne auf eine präzse algorithmische Beschreibung zu verzichten. Der Text eignet sich als detaillierte Referenz für Praktiker und Anwender gängiger moderner Verfahren der digitalen Bildverarbeitung, z.B. in der Medientechnik, Medizin, Biologie, Robotik oder Materialprüfung. Zugleich bildet das Buch eine Basis für die Lehre der entsprechenden Fächer oder zum Selbststudium. Konkrete Übungsaufgaben runden die Darstellung ab. Es basiert auf der in Java implementierten und frei verfügbaren Bildverarbeitungssoftware ImageJ. Source Code und ergänzende Materialien finden sich online auf der zugehörigen Support-Site. "Eine trockene Materie gut und spannend aufbereitet, pädagogisch überzeugend und inhaltlich bestechend: Digitale Bildverarabeitung - Eine Einführung mit Java und ImageJ ist ein offener Geheimtipp in Spezialistenkreisen" -- Wolfgang Treß, Amazon Redaktion.

Fuzzy techniques in image processing
Authors: ---
ISBN: 3790813044 3790824755 379081847X Year: 2000 Publisher: Heidelberg Physica

Loading...
Export citation

Choose an application

Bookmark

Abstract

The volume Fuzzy Techniques in Image Processing illustrates the successful application of fuzzy set theory in the area of image processing, and represents a broad, up-to-date and state-of-the-art coverage of diverse aspects related to fuzzy techniques in image processing. Besides an extensive state-of-the-art contribution on fuzzy mathematical morphology we present several contributions on a wide variety of topics, including fuzzy filtering, fuzzy image enhancement, fuzzy edge detection, fuzzy image segmentation, fuzzy processing of color images, and applications in medical imaging and robot vision. All chapters are written by outstanding experts in the field, and are characterized by their originality and high-quality standard. Therefore, the book will not only serve as an important reference for scientists and practitioners in this area, but also as an inspiration for newcoming researchers.

Digital image analysis : selected techniques and applications
Authors: ---
ISBN: 0387950664 9786610187362 1280187360 038721643X Year: 2001 Publisher: New York (N.Y.) : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The human visual system as a functional unit including the eyes, the nervous system, and the corresponding parts of the brain certainly ranks among the most important means of human information processing. The e?ciency of the biological systems is beyond the capabilities of today’s technical systems, even with the fastest available computer systems. However, there are areas of application where digital image analysis systems produce acceptable results. Systems in these areas solve very specialized tasks, they operate in a limited environment, and high speed is often not necessary. Several factors determine the economical application of technical vision systems: cost, speed, ?exibility, robu- ness, functionality, and integration with other system components. Many of the recent developments in digital image processing and pattern recognition show some of the required achievements. Computer vision enhances the capabilities of computer systems • in autonomously collecting large amounts of data, • in extracting relevant information, • in perceiving its environment, and • in automatic or semiautomatic operation in this environment. The development of computer systems in general shows a steadily increasing need in computational power, which comes with decreasing hardware costs.

Information processing in medical imaging
Authors: ---
ISBN: 354056800X 038756800X 354047742X Year: 1993 Volume: vol 687 Publisher: Berlin : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume contains the proceedings of the thirteenth biennial International Conference on Information Processing in Medical Imaging (IPMI XIII), held on the campus of Northern Arizona University in Flagstaff, Arizona, in June 1993. This conference was the latest in a series of meetings where new developments in the acquisition, analysis and utilization of medical images are presented, discussed, dissected, and extended. Today IPMI is widely recognized as a preeminent international forum for presentation of cutting-edge research in medical imaging and imageanalysis. The volume contains the text of the papers presented orally atIPMI XIII. Over 100 manuscripts were submitted and critically reviewed, of which 35 were selected for presentation. In this volume they are arranged into nine categories: shape description with deformable models, abstractshape description, knowledge-based systems, neural networks, novel imaging methods, tomographic reconstruction, image sequences, statistical pattern recognition, and image quality.

Digital image processing
Author:
ISBN: 3540677542 3662047837 3662047810 Year: 2002 Publisher: Berlin Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book offers an integral view of image processing from image acquisition to the extraction of the data of interest. The discussion of the general concepts is supplemented with examples from applications on PC-based image processing systems and ready-to-use implementations of important algorithms. The fifth edition has been completely revised and extended. The most notable extensions include a detailed discussion on random variables and fields, 3-D imaging techniques and a unified approach to regularized parameter estimation. The complete.text of the book is now available on the accompanying CD-ROM. It is hyperlinked so that it can be used in a very flexible way. The CD-ROM contains a full set of exercises to all topics covered by this book and a runtime version of the image processing software heurisko. A large collection of images, image sequences, and volumetric images is available for practical exercises.

Keywords

Stochastic processes --- Mathematical statistics --- Analyse d'image --- Image analysis --- Application des ordinateurs --- computer applications --- Image processing --- Digital techniques. --- Traitement d'images --- Digital techniques --- Techniques numériques --- Techniques numériques. --- Signal processing. --- Image processing. --- Speech processing systems. --- Optical data processing. --- Physical measurements. --- Measurement   . --- Control engineering. --- Robotics. --- Mechatronics. --- Radiology. --- Signal, Image and Speech Processing. --- Image Processing and Computer Vision. --- Measurement Science and Instrumentation. --- Control, Robotics, Mechatronics. --- Imaging / Radiology. --- Radiological physics --- Physics --- Radiation --- Mechanical engineering --- Microelectronics --- Microelectromechanical systems --- Automation --- Machine theory --- Control engineering --- Control equipment --- Control theory --- Engineering instruments --- Programmable controllers --- Measuring --- Mensuration --- Mathematics --- Technology --- Metrology --- Physical measurements --- Measurements, Physical --- Mathematical physics --- Measurement --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Computers --- Computational linguistics --- Electronic systems --- Information theory --- Modulation theory --- Oral communication --- Speech --- Telecommunication --- Singing voice synthesizers --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Processing, Signal --- Information measurement --- Signal theory (Telecommunication) --- Optical equipment --- Techniques numériques.

Infinite matrices of operators
Author:
ISBN: 0387097635 1441935304 9786611875749 1281875740 0387097643 3540097635 3540386513 3540097643 3540389466 9783540097648 Year: 1980 Volume: 786 Publisher: Berlin: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The ease of access, relative anonymity, and borderless nature of the Internet has allowed widespread computer-based crime – or cybercrime – to proliferate rapidly. Law enforcement and international security organizations, along with governments and the private sector, have only recently begun to appreciate the scope, severity and transnational nature of this problem. In recent years, organizations have begun to emerge and evolve in a progressively collaborative ecosystem of vested international bodies seeking to address these challenges in unique, innovative ways. This study attempts to address a series of questions regarding the current state of cyber security. What does the international landscape of cyber security look like today? What are these organizations actually doing? Are they succeeding? What measureable progress has been made in developing a supportive ecosystem of global cyber security? Are these organizations presenting practical, innovative, collaborative, and sustainable solutions to address these issues? Global Initiatives to Secure Cyberspace: An Emerging Landscape is designed for a professional audience composed of researchers, practitioners and the government, focusing on a secure cyberspace industry. Advanced-level students in computer science will also find this book suitable. .

Keywords

Cartography --Data processing --Congresses. --- Computer graphics --Congresses. --- Image processing --Congresses. --- Optical data processing --Congresses. --- Computer security --- Computer networks --- Cyberterrorism --- Telecommunications --- Computer Science --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Security measures --- Prevention --- Computer security. --- Security measures. --- Prevention. --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Computer network security --- Network security, Computer --- Security of computer networks --- Protection of computer systems --- Protection --- 681.3*I42 --- #TCPW P4.5 --- 681.3*I33 --- Compression (coding): approximate methods exact coding (Image processing)--See also {681.3*E4} --- Database management: security integrity protection--See also {?681.5*E5} --- Picture/image generation: digitizing and scanning display algorithms viewing algorithms (Computer graphics) --- Graphics utilities: picture desciption languages software support (Computer graphics) --- 681.3*I34 Graphics utilities: picture desciption languages software support (Computer graphics) --- 681.3*I33 Picture/image generation: digitizing and scanning display algorithms viewing algorithms (Computer graphics) --- 681.3*H2m Database management: security integrity protection--See also {?681.5*E5} --- 681.3*I42 Compression (coding): approximate methods exact coding (Image processing)--See also {681.3*E4} --- Infinite matrices. --- Summability theory. --- Computer science. --- Computer organization. --- Computer communication systems. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Data Encryption. --- Information Systems Applications (incl. Internet). --- Data Structures, Cryptology and Information Theory. --- Computer Systems Organization and Communication Networks. --- Information systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Organization, Computer --- Informatics --- Science --- Distributed processing --- #TCPW P4.0 --- #TCPW P4.2 --- 681.3*A0 --- 681.3*H2m --- 681.3*I34 --- 681.3*I34 Graphics utilities: picture desciption languages; software support (Computer graphics) --- Graphics utilities: picture desciption languages; software support (Computer graphics) --- 681.3*I33 Picture/image generation: digitizing and scanning; display algorithms; viewing algorithms (Computer graphics) --- Picture/image generation: digitizing and scanning; display algorithms; viewing algorithms (Computer graphics) --- 681.3*A0 General --- General --- 681.3*I42 Compression (coding): approximate methods; exact coding (Image processing)--See also {681.3*E4} --- Compression (coding): approximate methods; exact coding (Image processing)--See also {681.3*E4} --- 681.3*H2m Database management: security; integrity; protection--See also {?681.5*E5} --- Database management: security; integrity; protection--See also {?681.5*E5} --- Operator theory --- Computer crimes --- Terrorism --- Operator theory. --- Computer graphics --- Cartography --- Infographie --- Cartographie --- Data processing --- Informatique --- Data structures (Computer scienc. --- Computer network architectures. --- Cryptology. --- Data Structures and Information Theory. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Computer vision. --- Models and Principles. --- Image Processing and Computer Vision. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Matrices. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Matrices --- Théorèmes taubériens --- Suites et series --- Sommabilite

Listing 1 - 6 of 6
Sort by