Angebote zu "Vision" (88 Treffer)

Visual Inspection Technology in the Hard Disc D...
115,99 € *
ggf. zzgl. Versand

A presentation of the use of computer vision systems to control manufacturing processes and product quality in the hard disk drive industry. Visual Inspection Technology in the Hard Disk Drive Industry is an application-oriented book borne out of collaborative research with the worlds leading hard disk drive companies. It covers the latest developments and important topics in computer vision technology in hard disk drive manufacturing, as well as offering a glimpse of future technologies.

Anbieter: ciando eBooks
Stand: 11.07.2017
Zum Angebot
PowerShell - Anwendung und effektive Nutzung
2,99 € *
ggf. zzgl. Versand

Windows PowerShell ist ein auf dem .NET Framework basierendes Kommandozeilenprogramm. Dieser shortcut stellt PowerShell mitsamt ihrer neuen Features vor und geht auf deren Anwendungsgebiete ein. Die Autoren werfen einen Blick auf die PowerShell-Erweiterung Desired State Configuration (DSC). Sie beschreiben, wie DSC als Konfigurationsplattform funktioniert, wie man sie nutzt und erweitert. Abschließend befassen sie sich mit der Sicherheit von PowerShell. Hierbei beleuchten sie mögliche Schadsoftware und benennen Schutzmaßnahmen im Umgang mit PowerShell. Dr. Holger Schwichtenberg - alias Der DOTNET-DOKTOR - gehört zu den bekanntesten .NET-Experten in Deutschland. Er ist Entwicklungsleiter der 5Minds IT-Solutions GmbH & Co. KG. Zudem unterstützt er mit seiner Firma www.IT-Visions.de kleine und große Unternehmen durch Beratung und Schulung bei der Erstellung von Windows- und webbasierten Anwendungen. Ununterbrochen seit 1998 ist er Sprecher auf jeder BASTA! (so auch wieder auf der nächsten BASTA! im September) und Autor zahlreicher Fachbücher. Kontakt: hs@IT-Visions.de; www.dotnet-doktor.de. Frank Peter Schultze ist ein Automatisierungsveteran mit fast zwanzig Jahren Erfahrung und ein PowerShell-Nutzer der ersten Stunde. Er plant, entwickelt und implementiert für die Kunden der FRITZ & MACZIOL group Lösungen zur Automatisierung und Orchestrierung ihrer IT-Infrastrukturen. Dipl.-Inform. Carsten Eilers ist freier Berater und Coach für ITSicherheit und technischen Datenschutz und Autor einer Vielzahl von Artikeln für verschiedene Magazine und Onlinemedien. Sie erreichen ihn unter www.ceilers-it.de, sein Blog finden Sie unterwww.ceilers-news.de.

Anbieter: ciando eBooks
Stand: 11.07.2017
Zum Angebot
Blockchain. Technologien, Innovationen und Anwe...
19,99 € *
ggf. zzgl. Versand

Bachelorarbeit aus dem Jahr 2016 im Fachbereich Informatik - Wirtschaftsinformatik, Note: 94,17%, Frankfurt School of Finance & Management, Sprache: Deutsch, Abstract: Milton Friedman wurde 1999 einmal in einem Fernsehinterview nach seiner Einschätzung zu den Möglichkeiten des Internets gefragt, worauf dieser antwortete: The one thing thats missing but that will soon be developed is a reliable e-cash. A method whereby on the Internet you can transfer funds from A to B without A knowing B or B knowing A. The way in which I can take a twenty-dollar bill and hand it over to you and theres no record of where it came from. And you may get that without knowing who I am. That kind of thing will develop on the Internet. Inzwischen ist seine Vision mit der virtuellen Kryptowährung Bitcoin längst Realität geworden. Sie ist in aller Munde und höchst kontrovers. Die dahinterstehende Technologie mit Namen Blockchain kennt man dagegen bisher hauptsächlich in Finanzkreisen. Dabei besitzt sie erstaunliches Innovationspotenzial in den unterschiedlichsten Anwendungsfeldern, von denen virtuelle Währungen nur eines von vielen darstellt. Ganze Wirtschafts- und Gesellschaftsbereiche sind im Begriff, durch die Blockchain revolutioniert zu werden. Es erscheint daher umso wichtiger, die Technologie genau zu verstehen, um positive wie negative Folgen besser abschätzen zu können. Nach einer anwendungsorientierten Erläuterung der Blockchain-Technologie will diese Arbeit untersuchen, welche Gesellschaftsbereiche am meisten durch eine Blockchain bereits verändert werden oder in Zukunft noch beeinflusst werden könnten.

Anbieter: ciando eBooks
Stand: 11.07.2017
Zum Angebot
Visualization of Large Unstructured Grids. Effi...
12,99 € *
ggf. zzgl. Versand

Seminar paper from the year 2013 in the subject Engineering - Computer Engineering, grade: 1.0, University of Heidelberg (Computer Graphics and Visualization), course: Seminar Computer Vision, language: English, abstract: Visualization of large data sets, especially the visualization of unstructured grids, is a challenge due to the unstructured nature of the data which oftentimes causes large overheads in memory as well as performance problems on large grids. Problems emerge because existing solutions generally presuppose properties like uniform point distributions for datasets which are usually not existent in unstructured grids. These issues become particularly problematic on large grids since the existing solutions, if they work at all for unstructured grids, do not scale well. In this paper I will present two innovative approaches to visualization in large, unstructured grids. The first approach was developed by Max Langbein, Gerik Scheuermann and Xavier Tricoche. It makes use of cell adjacency and a complete adaptive k-d tree and utilizes ray shooting to locate points for visualization. The second approach was developed by Christoph Garth and Kenneth I. Joy. They use an innovative data structure, the celltree which is based on a bounding interval hierarchy, in order to narrow down the number of cells that conceivably contain points for visualization. Both approaches present memoryecient and performant solutions for visualizing large unstructured grids, the approach of Garth and Joy further focuses on numerical robustness. The main difference between the two papers is that the work of Garth and Joy designs a data structure based on points and attempts to narrow down the number of cell candidates and subsequently performs a simple check for inclusion, whereas in the work of Langbein et al. the data structure design is based on the cells and uses ray tracing after making an educated guess for a cell close to the searched point. In other words, Garth and Joy present an approach to cell location, Langbein et al. present an approach for point location.

Anbieter: ciando eBooks
Stand: 11.07.2017
Zum Angebot
A Developers Guide to the Semantic Web
71,39 € *
ggf. zzgl. Versand

The Semantic Web represents a vision for how to make the huge amount of information on the Web automatically processable by machines on a large scale. For this purpose, a whole suite of standards, technologies and related tools have been specified and developed over the last couple of years and they have now become the foundation for numerous new applications. A Developers Guide to the Semantic Web helps the reader to learn the core standards, key components and underlying concepts. It provides in-depth coverage of both the what-is and how-to aspects of the Semantic Web. From Yus presentation, the reader will obtain not only a solid understanding about the Semantic Web, but also learn how to combine all the pieces to build new applications on the Semantic Web. The second edition of this book not only adds detailed coverage of the latest W3C standards such as SPARQL 1.1 and RDB2RDF, it also updates the readers by following recent developments. More specifically, it includes five new chapters on schema.org and semantic markup, on Semantic Web technologies used in social networks and on new applications and projects such as data.gov and Wikidata and it also provides a complete coding example of building a search engine that supports Rich Snippets. Software developers in industry and students specializing in Web development or Semantic Web technologies will find in this book the most complete guide to this exciting field available today. Based on the step-by-step presentation of real-world projects, where the technologies and standards are applied, they will acquire the knowledge needed to design and implement state-of-the-art applications. Liyang Yu is Senior Software Developer with Delta Air Lines in Atlanta, GA, USA. His previously published Semantic Web books are widely used as textbooks and often referenced by developers worldwide. He also actively provides services and assistance to a variety of organizations and companies about development and applications of Semantic Web technologies.

Anbieter: ciando eBooks
Stand: 11.07.2017
Zum Angebot
TOGAF® Version 9.1 – Guide de Poche
18,98 € *
ggf. zzgl. Versand

Ce Guide de Poche se base sur TOGAF® Version 9.1 Entreprise Edition et il fait autorité en la matière car il en reprend des éléments de documentation. En introduisant de manière concise TOGAF®; sa lecture ne nécessite pas d'avoir des connaissances préalables sur l'architecture d'entreprise. Ce livre vous est principalement destiné si vous êtes un professionnel concerné par l'architecture: architecte d'entreprise; architecte métiers; architecte des systèmes d'information; architecte des données; architecte systèmes; architecte solutions ou dirigeant cherchant une première introduction à TOGAF®. Ce guide de Poche fournit les éléments suivants: • une présentation générale de TOGAF®; • une introduction à la Méthode de Développement d'Architecture; • une introduction aux notions de Cadre de Contenu d'Architecture et de Continuum d'Entreprise; • une introduction au Cadre de Capacité d'Architecture; permettant de créer et de mettre en oeuvre une fonction d'architecture au sein d'une entreprise. Avec plus de 30.000 praticiens certifiés dans le monde, TOGAF® est le cadre d'Architecture d'Entreprise le plus répandu dans les entreprises. Il s'appuie sur une approche itérative de transformation de l'entreprise qui couvre: • le cycle de vie complet des architectures produites, de la vision à la maintenance, en s'attachant à livrer aux acteurs concernés la valeur métier et les qualités attendues; • et le développement continu de la capacité à faire de l'Architecture d'Entreprise. TOGAF® a pour objectifs d'améliorer l'agilité et la performance de l'entreprise; de permettre l'innovation et l'émergence de nouveaux business models, de maîtriser la transformation de l'entreprise. TOGAF® est un standard de The Open Group et il a bénéficié de la mise en commun et de la coordination des bonnes pratiques de plusieurs centaines d'entreprises des domaines IT et industriels.

Anbieter: ciando eBooks
Stand: 11.07.2017
Zum Angebot
Hacking the Hacker - Learn From the Experts Who...
18,99 € *
ggf. zzgl. Versand

Meet the worlds top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the worlds top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top. Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure. Go deep into the world of white hat hacking to grasp just how critical cybersecurity is Read the stories of some of the worlds most renowned computer security experts Learn how hackers do what they do-no technical expertise necessary Delve into social engineering, cryptography, penetration testing, network attacks, and more As a field, cybersecurity is large and multi-faceted-yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look. ROGER A. GRIMES has worked in the field of computer security for over 27 years. As a professional penetration tester, he successfully broke into every company he was hired to hack within an hour, with a single exception that took three hours. He consults worldwide and has been the InfoWorld magazine (www.infoworld.com) computer security columnist since 2005. (ISC) 2 books published by Wiley provide aspiring and experienced cybersecurity professionals with unique insights and advice for delivering on (ISC) 2 s vision of inspiring a safe and secure world.

Anbieter: ciando eBooks
Stand: 11.07.2017
Zum Angebot
Hacking the Hacker - Learn From the Experts Who...
18,99 € *
ggf. zzgl. Versand

Meet the worlds top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the worlds top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top. Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure. Go deep into the world of white hat hacking to grasp just how critical cybersecurity is Read the stories of some of the worlds most renowned computer security experts Learn how hackers do what they do-no technical expertise necessary Delve into social engineering, cryptography, penetration testing, network attacks, and more As a field, cybersecurity is large and multi-faceted-yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look. ROGER A. GRIMES has worked in the field of computer security for over 27 years. As a professional penetration tester, he successfully broke into every company he was hired to hack within an hour, with a single exception that took three hours. He consults worldwide and has been the InfoWorld magazine (www.infoworld.com) computer security columnist since 2005. (ISC) 2 books published by Wiley provide aspiring and experienced cybersecurity professionals with unique insights and advice for delivering on (ISC) 2 s vision of inspiring a safe and secure world.

Anbieter: ciando eBooks
Stand: 11.07.2017
Zum Angebot
Domain Adaptation in Computer Vision Applications
117,69 € *
ggf. zzgl. Versand

This comprehensive text/reference presents a broad review of diverse domain adaptation (DA) methods for machine learning, with a focus on solutions for visual applications. The book collects together solutions and perspectives proposed by an international selection of pre-eminent experts in the field, addressing not only classical image categorization, but also other computer vision tasks such as detection, segmentation and visual attributes. Topics and features: surveys the complete field of visual DA, including shallow methods designed for homogeneous and heterogeneous data as well as deep architectures; presents a positioning of the dataset bias in the CNN-based feature arena; proposes detailed analyses of popular shallow methods that addresses landmark data selection, kernel embedding, feature alignment, joint feature transformation and classifier adaptation, or the case of limited access to the source data; discusses more recent deep DA methods, including discrepancy-based adaptation networks and adversarial discriminative DA models; addresses domain adaptation problems beyond image categorization, such as a Fisher encoding adaptation for vehicle re-identification, semantic segmentation and detection trained on synthetic images, and domain generalization for semantic part detection; describes a multi-source domain generalization technique for visual attributes and a unifying framework for multi-domain and multi-task learning. This authoritative volume will be of great interest to a broad audience ranging from researchers and practitioners, to students involved in computer vision, pattern recognition and machine learning.

Anbieter: buecher.de
Stand: 19.07.2017
Zum Angebot
Proceedings of International Conference on Cogn...
181,89 € *
ggf. zzgl. Versand

The book covers a comprehensive overview of the theory, methods, applications and tools of cognition and recognition. The book is a collection of best selected papers presented in the International Conference on Cognition and Recognition 2016 (ICCR 2016) and helpful for scientists and researchers in the field of image processing, pattern recognition and computer vision for advance studies. Nowadays, researchers are working in interdisciplinary areas and the proceedings of ICCR 2016 plays a major role to accumulate those significant works at one place. The chapters included in the proceedings inculcates both theoretical as well as practical aspects of different areas like nature inspired algorithms, fuzzy systems, data mining, signal processing, image processing, text processing, wireless sensor networks, network security and cellular automata.

Anbieter: buecher.de
Stand: 20.07.2017
Zum Angebot