Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applied Graph Theory in Computer Vision and Pattern Recognition (Studies in Computational Intelligence)

Buy
This book will serve as a foundation for a variety of useful applications of graph theory to computer vision, pattern recognition, and related areas. It covers a representative set of novel graph-theoretic methods for complex computer vision and pattern recognition tasks. The first part of the book presents the application of graph theory to low-level processing of digital images such as a new method for partitioning a given image into a hierarchy of homogeneous areas using graph pyramids, or a study of the relationship between graph theory and digital topology. Part II presents graph-theoretic learning algorithms for high-level computer vision and pattern recognition applications, including a survey of graph based methodologies for pattern recognition and computer vision, a presentation of a series of computationally efficient algorithms for testing graph isomorphism and related graph matching tasks in pattern recognition and a new graph distance measure to be used for solving graph matching problems. Finally, Part III provides detailed descriptions of several applications of graph-based methods to real-world pattern recognition tasks. It includes a critical review of the main graph-based and structural methods for fingerprint classification, a new method to visualize time series of graphs, and potential applications in computer network monitoring and abnormal event detection.
(HTML tags aren't allowed.)

Document Security: Protecting Physical and Electronic Content
Document Security: Protecting Physical and Electronic Content

Several electronic layers exist in most documents, a fact overlooked by many writers. Probing these sublayers often reveals information not intended for release by the author. Documents in electronic formats create a “palimpsest” that even semiskilled investigators can probe for sensitive data.

Palimpsest seems...

Kali Linux CTF Blueprints
Kali Linux CTF Blueprints

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux

About This Book

  • Put the skills of the experts to the test with these tough and customisable pentesting projects
  • Develop each challenge to suit your specific...
Key Concepts in Energy
Key Concepts in Energy

Organized around eight fundamental ideas, Key concepts in energy history explores the discoveries, technologies and new paradigms in the field of energy, and how they have changed the course of history. Complex technical concepts such as the “rebound effect”, “technological hybridization”, “marginal cost...


Microsoft Access 2010 VBA Macro Programming
Microsoft Access 2010 VBA Macro Programming

Database macro programming has changed enormously over the last 15 years, having gone from Access Basic macros to VBA. Another major change occurred with Office 95, when macros went to VBA modules in a separate environment accessed via the Visual Basic Editor. It used to be fairly basic: code was entered into a special design window....

Historical Information Science: An Emerging Unidiscipline
Historical Information Science: An Emerging Unidiscipline
It suggests that trends in information retrieval, research, and teaching using modern information technology point toward a unidisciplinary field, Historical Information Science, which potentially can grow out of older quantification and Social Science history, the interplay between History and Information Science, and new methodologies and...
Rock, Paper, Scissors: Game Theory in Everyday Life
Rock, Paper, Scissors: Game Theory in Everyday Life
“Physicist and Ig Nobel Prize–winner Fisher explores how game theory illuminates social behavior in this lively study…. Fisher does succeed in making the complex nature of game theory accessible and relevant, showing how mathematics applies to the dilemmas we face on a daily basis.”

A FRIEND CALLED ME RECENTLY
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy