Home Page Icon
Home Page
Table of Contents for
End User License Agreement
Close
End User License Agreement
by Muthukumaran Malarvel, Soumya Ranjan Nayak, Surya Na
Machine Vision Inspection Systems, Image Processing, Concepts, Methodologies, and Applications
Cover
Preface
1 Land-Use Classification with Integrated Data
1.1 Introduction
1.2 Background Study
1.3 System Design
1.4 Implementation Details
1.5 System Evaluation
1.6 Discussion
1.7 Conclusion
References
2 Indian Sign Language Recognition Using Soft Computing Techniques
2.1 Introduction
2.2 Related Works
2.3 Experiments
2.4 Summary
References
3 Stored Grain Pest Identification Using an Unmanned Aerial Vehicle (UAV)-Assisted Pest Detection Model
3.1 Introduction
3.2 Related Work
3.3 Proposed Model
3.4 Results and Discussion
3.5 Conclusion
References
4 Object Descriptor for Machine Vision
4.1 Outline
4.2 Chain Codes
4.3 Polygonal Approximation
4.4 Moments
4.5 HU Invariant Moments
4.6 Zernike Moments
4.7 Fourier Descriptors
4.8 Quadtree
4.9 Conclusion
References
5 Flood Disaster Management
5.1 Flood Management
5.2 Existing Disaster Management Systems
5.3 Advancements in Disaster Management Technologies
5.4 Proposed System
References
6 Temporal Color Analysis of Avocado Dip for Quality Control
6.1 Introduction
6.2 Materials and Methods
6.3 Image Acquisition
6.4 Image Processing
6.5 Experimental Design
6.6 Results and Discussion
6.7 Conclusion
References
7 Image and Video Processing for Defect Detection in Key Infrastructure
7.1 Introduction
7.2 Reasons for Defective Roads and Bridges
7.3 Image Processing for Defect Detection
7.4 Image-Based Defect Detection Methods
7.5 Factors Affecting the Performance
7.6 Achievements and Issues
7.7 Conclusion
References
8 Methodology for the Detection of Asymptomatic Diabetic Retinopathy
8.1 Introduction
8.2 Key Steps of Computer-Aided Diagnostic Methods
8.3 DR Screening and Grading Methods
8.4 Key Observations from Literature Review
8.5 Design of Experimental Methodology
8.6 Conclusion
References
9 Offline Handwritten Numeral Recognition Using Convolution Neural Network
9.1 Introduction
9.2 Related Work Done
9.3 Data Set Used for Simulation
9.4 Proposed Model
9.5 Result Analysis
9.6 Conclusion and Future Work
References
10 A Review on Phishing—Machine Vision and Learning Approaches
10.1 Introduction
10.2 Literature Survey
10.3 Role of Data Mining in Antiphishing
10.4 Conclusion
Acknowledgments
References
Index
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Index
]>
WILEY END USER LICENSE AGREEMENT
WILEY END USER LICENSE AGREEMENT
Go to
www.wiley.com/go/eula
to access Wiley’s ebook EULA.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset