This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
      • Featured Products
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Store » Books » From Visual Surveillance to Internet of Things: Technology and Applications
9780367221942.jpg

From Visual Surveillance to Internet of Things: Technology and Applications

$152.95
Books

Product Details

Published October 25, 2019
Reference - 260 Pages - 118 B/W Illustrations
ISBN 9780367221942 - hardback

From Visual Surveillance to Internet of Things: Technology and Applications is an invaluable resource for students, academicians and researchers to explore the utilization of Internet of Things with visual surveillance and its underlying technologies in different application areas. Using a series of present and future applications – business insights, indoor-outdoor securities, smart grids, human detection and tracking, intelligent traffic monitoring, e-health department and many more – this book will support readers to obtain a deeper knowledge in implementing IoT with visual surveillance.

The book offers comprehensive coverage of the most essential topics, including:

  • The rise of machines and communications to IoT (3G, 5G)
  • Tools and technologies of IoT with visual surveillance
  • IoT with visual surveillance for real-time applications
  • IoT architectures
  • Challenging issues and novel solutions for realistic applications
  • Mining and tracking of motion-based object data
  • Image processing and analysis into the unified framework to understand both IOT and computer vision applications

This book will be an ideal resource for IT professionals, researchers, under- or post-graduate students, practitioners, and technology developers who are interested in gaining a deeper knowledge in implementing IoT with visual surveillance, critical applications domains, technologies, and solutions to handle relevant challenges.

Dr. Lavanya Sharma is an Assistant Professor in the Amity Institute of Information Technology at Amity University UP, Noida, India. She is a recipient of several prestigious awards during her academic career. She is an active nationally-recognized researcher who has published numerous papers in her field. She has contributed as an Organizing Committee member and session chair at Springer and IEEE conferences.

Prof. Pradeep K. Garg worked as a Vice Chancellor, Uttarakhand Technical University, Dehradun. Presently he is working in the department of Civil Engineering, IIT Roorkee as a professor. Prof. Garg has published more than 300 technical papers in national and international conferences and journals. He has completed 26 research projects funded by various government agencies, guided 27 PhD candidates, and provided technical services to 84 consultancy projects on various aspects of Civil Engineering.

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing