This book constitutes the thoroughly refereed post-workshop proceedings of the Second International Workshop on Modelling and Simulation for Autonomous Systems, MESAS 2015, held in Prague, Czech Republic, in April 2015. The 18 revised full papers included in the volume were carefully reviewed and selected from 33 submissions. They are organized in the following topical sections: state of the ar…
The need of video compression in the modern age of visual communication cannot be over-emphasized. This monograph will provide useful information to the postgraduate students and researchers who wish to work in the domain of VLSI design for video processing applications. In this book, one can find an in-depth discussion of several motion estimation algorithms and their VLSI implementation as co…
Respiratory and cardiac motion leads to image degradation in Positron Emission Tomography (PET), which impairs quantification. In this book, the authors present approaches to motion estimation and motion correction in thoracic PET. The approaches for motion estimation are based on dual gating and mass-preserving image registration (VAMPIRE) and mass-preserving optical flow (MPOF). With mass-pre…
The three-volume set LNCS 9349, 9350, and 9351 constitutes the refereed proceedings of the 18th International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2015, held in Munich, Germany, in October 2015. Based on rigorous peer reviews, the program committee carefully selected 263 revised papers from 810 submissions for presentation in three volumes. The papers…
The three-volume set LNCS 9349, 9350, and 9351 constitutes the refereed proceedings of the 18th International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2015, held in Munich, Germany, in October 2015. Based on rigorous peer reviews, the program committee carefully selected 263 revised papers from 810 submissions for presentation in three volumes. The papers…
This pioneering text/reference presents a detailed focus on the use of machine vision techniques in industrial inspection applications. An internationally renowned selection of experts provide insights on a range of inspection tasks, drawn from their cutting-edge work in academia and industry, covering practical issues of vision system integration for real-world applications. Topics and feature…
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development …
This book constitutes the refereed proceedings of the Second International Conference on Geometric Science of Information, GSI 2015, held in Palaiseau, France, in October 2015. The 80 full papers presented were carefully reviewed and selected from 110 submissions and are organized into the following thematic sessions: Dimension reduction on Riemannian manifolds; optimal transport; optimal…
This book constitutes the refereed proceedings of the 16th Annual Conference on Towards Autonomous Robotics, TAROS 2015, held in Liverpool UK, in September 2015. The 16 revised full papers presented together with 18 short papers were carefully reviewed and selected from 59 submissions. The overall program covers various aspects of robotics, including navigation, planning, sensing and perceptio…