Narrow your search

Library

KU Leuven (13)

Odisee (13)

Thomas More Kempen (13)

Thomas More Mechelen (13)

ULB (13)

ULiège (13)

VIVES (13)

UCLL (12)

KBC (4)

UGent (3)


Resource type

book (13)


Language

English (13)


Year
From To Submit

2024 (1)

2023 (2)

2021 (2)

2020 (3)

2019 (1)

More...
Listing 1 - 10 of 13 << page
of 2
>>
Sort by

Book
Introduction to Intelligent Surveillance
Author:
ISBN: 3319285149 3319285157 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This concise textbook/reference examines the fundamental aspects of intelligent computing for surveillance systems, from camera calibration and data capturing, to secure data transmission. The text covers digital surveillance from the level of an individual object or biometric feature, to the full lifecycle of an event. This is followed by a detailed discussion on how an intelligent system can independently monitor and learn from an event, and invite human input when necessary. The book concludes with a presentation on how the computation speed of the system can be enhanced through the use of supercomputing technology. Topics and features: Contains exercises at the end of every chapter, and a glossary of important terms Provides a thorough introduction to the fundamentals of intelligent surveillance, including surveillance data capture and surveillance data compression Covers the key issues of computer network infrastructure, security, monitoring and forensics, and the essential aspects of object analysis Presents a detailed review of algorithms for surveillance data analytics using biometric features Introduces the concept of surveillance events, and discusses how artificial intelligence can be used for the automated observation and understanding of such events Reviews algorithms that apply decision-making approaches to determine the need for triggering an alarm to alert a member of security staff Describes the use of cutting-edge supercomputing technologies for digital surveillance, such as FPGA, GPU and parallel computing This accessible work serves as a classroom-tested textbook on intelligent surveillance for undergraduate and postgraduate students, as well as a self-study reference for researchers entering this area. Dr. Wei Qi Yan is an Associate Professor in the Department of Computer Science at Auckland University of Technology, New Zealand. His other publications include the Springer title Visual Cryptography for Image Processing and Security.


Book
Introduction to Intelligent Surveillance : Surveillance Data Capture, Transmission, and Analytics
Author:
ISBN: 3319602284 3319602276 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This accessible textbook/reference reviews the fundamental concepts and practical issues involved in designing digital surveillance systems that fully exploit the power of intelligent computing techniques. The book presents comprehensive coverage of all aspects of such systems, from camera calibration and data capture, to the secure transmission of surveillance data. In addition to the detection and recognition of objects and biometric features, the text also examines the automated observation of surveillance events, and how this can be enhanced through the use of deep learning methods and supercomputing technology. This updated new edition features extended coverage on face detection, pedestrian detection and privacy preservation for intelligent surveillance. Topics and features: Contains review questions and exercises in every chapter, together with a glossary Describes the essentials of implementing an intelligent surveillance system and analyzing surveillance data, including a range of biometric characteristics Examines the importance of network security and digital forensics in the communication of surveillance data, as well as issues of issues of privacy and ethics Discusses the Viola-Jones object detection method, and the HOG algorithm for pedestrian and human behavior recognition Reviews the use of artificial intelligence for automated monitoring of surveillance events, and decision-making approaches to determine the need for human intervention Presents a case study on a system that triggers an alarm when a vehicle fails to stop at a red light, and identifies the vehicle’s license plate number Investigates the use of cutting-edge supercomputing technologies for digital surveillance, such as FPGA, GPU and parallel computing This concise, classroom-tested textbook is ideal for undergraduate and postgraduate-level courses on intelligent surveillance. Researchers interested in entering this area will also find the book suitable as a helpful self-study reference. Dr. Wei Qi Yan is an Associate Professor in the Department of Computer Science at Auckland University of Technology, New Zealand. His other publications include the Springer title Visual Cryptography for Image Processing and Security.


Book
Introduction to Intelligent Surveillance : Surveillance Data Capture, Transmission, and Analytics
Author:
ISBN: 3030107132 3030107124 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This practically-oriented textbook introduces the fundamentals of designing digital surveillance systems powered by intelligent computing techniques. The text offers comprehensive coverage of each aspect of the system, from camera calibration and data capture, to the secure transmission of surveillance data, in addition to the detection and recognition of individual biometric features and objects. The coverage concludes with the development of a complete system for the automated observation of the full lifecycle of a surveillance event, enhanced by the use of artificial intelligence and supercomputing technology. This updated third edition presents an expanded focus on human behavior analysis and privacy preservation, as well as deep learning methods. Topics and features: Contains review questions and exercises in every chapter, together with a glossary Describes the essentials of implementing an intelligent surveillance system and analyzing surveillance data, including a range of biometric characteristics Examines the importance of network security and digital forensics in the communication of surveillance data, as well as issues of issues of privacy and ethics Discusses the Viola-Jones object detection method, and the HOG algorithm for pedestrian and human behavior recognition Reviews the use of artificial intelligence for automated monitoring of surveillance events, and decision-making approaches to determine the need for human intervention Presents a case study on a system that triggers an alarm when a vehicle fails to stop at a red light, and identifies the vehicle’s license plate number Investigates the use of cutting-edge supercomputing technologies for digital surveillance, such as FPGA, GPU and parallel computing This concise and accessible work serves as a classroom-tested textbook for graduate-level courses on intelligent surveillance. Researchers and engineers interested in entering this area will also find the book suitable as a helpful self-study reference. Dr. Wei Qi Yan is an Associate Professor in the Department of Computer Science at Auckland University of Technology, New Zealand. His other publications include the Springer title Visual Cryptography for Image Processing and Security.

Keywords

Biometrics. --- Artificial intelligence. --- Computer security. --- Computer Communication Networks. --- Artificial Intelligence. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Protection --- Security measures --- Biometrics (Biology). --- Computer communication systems. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Distributed processing --- Statistical methods


Book
Computational Methods for Deep Learning : Theoretic, Practice and Applications
Author:
ISBN: 3030610810 3030610802 Year: 2021 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Integrating concepts from deep learning, machine learning, and artificial neural networks, this highly unique textbook presents content progressively from easy to more complex, orienting its content about knowledge transfer from the viewpoint of machine intelligence. It adopts the methodology from graphical theory, mathematical models, and algorithmic implementation, as well as covers datasets preparation, programming, results analysis and evaluations. Beginning with a grounding about artificial neural networks with neurons and the activation functions, the work then explains the mechanism of deep learning using advanced mathematics. In particular, it emphasizes how to use TensorFlow and the latest MATLAB deep-learning toolboxes for implementing deep learning algorithms. As a prerequisite, readers should have a solid understanding especially of mathematical analysis, linear algebra, numerical analysis, optimizations, differential geometry, manifold, and information theory, as well as basic algebra, functional analysis, and graphical models. This computational knowledge will assist in comprehending the subject matter not only of this text/reference, but also in relevant deep learning journal articles and conference papers. This textbook/guide is aimed at Computer Science research students and engineers, as well as scientists interested in deep learning for theoretic research and analysis. More generally, this book is also helpful for those researchers who are interested in machine intelligence, pattern analysis, natural language processing, and machine vision. Dr. Wei Qi Yan is an Associate Professor in the Department of Computer Science at Auckland University of Technology, New Zealand. His other publications include the Springer title, Visual Cryptography for Image Processing and Security. .

Keywords

Optical data processing. --- Machine learning. --- Computer science—Mathematics. --- Artificial intelligence. --- Neural networks (Computer science) . --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Machine Learning. --- Mathematics of Computing. --- Artificial Intelligence. --- Mathematical Models of Cognitive Processes and Neural Networks. --- Artificial neural networks --- Nets, Neural (Computer science) --- Networks, Neural (Computer science) --- Neural nets (Computer science) --- Artificial intelligence --- Natural computation --- Soft computing --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Learning, Machine --- Optical computing --- Visual data processing --- Integrated optics --- Photonics --- Computers --- Optical equipment --- Image processing --- Computer vision. --- Computer science --- Neural networks (Computer science). --- Digital techniques. --- Mathematics. --- Computer mathematics --- Mathematics --- Machine vision --- Vision, Computer --- Pattern recognition systems --- Digital image processing --- Digital electronics --- Neural networks (Computer science)


Book
Computational methods for deep learning : theory, algorithms, and implementations
Author:
ISBN: 9819948231 9819948223 Year: 2023 Publisher: Singapore : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Visual Cryptography for Image Processing and Security : Theory, Methods, and Applications
Authors: ---
ISBN: 3319096443 3319096435 1322138044 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Visual cryptography is a secret sharing technique which allows the encryption of an image without requiring any complex computation or knowledge of cryptography. This unique text/reference describes the fundamental concepts, theories and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. Topics and features: Provides a thorough introduction to the field of visual cryptography Examines various common problems in visual cryptography, including the alignment, flipping, cheating, distortion, and thin line problems Reviews a range of visual cryptography schemes, including XOR-based visual cryptography and security enriched VCS Describes different methods for presenting color content using visual cryptographic techniques Covers such applications of visual cryptography as watermarking, resolution variant VCS, and multiple resolution VCS This logically-structured and comprehensive work will serve as a helpful reference for all researchers and students interested in document authentication and cryptography, including those involved in digital image processing, image watermarking, and media-based security technology. Dr. Feng Liu is an Associate Professor at the Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China. Dr. Wei Qi Yan is a Senior Lecturer in the School of Computing and Mathematical Sciences at Auckland University of Technology, New Zealand.


Book
Visual Cryptography for Image Processing and Security : Theory, Methods, and Applications
Authors: ---
ISBN: 3319234722 3319234730 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This unique text/reference addresses the fundamental concepts in the theory and practice of visual cryptography, a secret sharing technique which allows the encryption of an image without requiring any complex computation or knowledge of cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. This updated second edition has also been expanded with new content on braille and 2D barcode authentication of visual cryptography shares. Topics and features: • Contains review exercises at the end of each chapter, as well as a helpful glossary (NEW) • Provides a thorough introduction to the field of visual cryptography • Examines various common problems in visual cryptography, including the alignment, flipping, cheating, distortion, and thin line problems • Reviews a range of visual cryptography schemes, including XOR-based visual cryptography and security enriched VCS • Describes different methods for presenting color content using visual cryptographic techniques • Covers such applications of visual cryptography as watermarking, resolution variant VCS, and multiple resolution VCS This logically-structured and comprehensive work will serve as a helpful reference for all researchers and students interested in do.


Book
Pattern Recognition : ACPR 2019 Workshops, Auckland, New Zealand, November 26, 2019, Proceedings
Authors: --- --- ---
ISBN: 9811536511 9811536503 Year: 2020 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume constitutes the refereed proceedings, presented during the ACPR 2019 Workshops, held in Auckland, New Zealand, in November 2019. The 17 full papers and 6 short papers were carefully reviewed and selected out of numerous submissions. The papers are organized according to the topics of the workshops: computer vision for modern vehicles; advances and applications on generative deep learning models; image and pattern analysis for multidisciplinary computational anatomy; multi-sensor for action and gesture recognition; towards the automatic data processing chain for airborne and spaceborne sensors. .


Book
Geometry and vision : first International Symposium, ISGV 2021, Auckland, New Zealand, January 28-29, 2021, Revised Selected Papers
Authors: --- ---
ISBN: 303072073X 3030720721 Year: 2021 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer vision


Book
Image and vision computing : 37th international conference, IVCNZ 2022, Auckland, New Zealand, November 24-25, 2022, revised selected papers
Authors: --- ---
ISBN: 3031258258 303125824X Year: 2023 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 37th International Conference, IVCNZ 2022, which took place in Auckland, New Zealand, in November 2022. The 37 papers (14 accepted for long oral presentation, 23 for short oral presentation) included in this volume were carefully reviewed and selected from 79 submissions. The conference presents papers on all aspects of computer vision, image processing, computer graphics, virtual and augmented reality, visualization, and HCI applications related to these fields.

Listing 1 - 10 of 13 << page
of 2
>>
Sort by