Page 75 - REC :: All Dept Open Electives
P. 75
UNIT V APPLICATIONS 9
Application: Photo album – Face detection – Face recognition – Eigen faces – Active appearance and
3D shape models of faces Application: Surveillance – foreground-background separation – particle
filters – Chamfer matching, tracking, and occlusion – combining views from multiple cameras–human
gait analysis Application: In-vehicle vision system: locating roadway – road markings–identifying road
signs – locating pedestrians (Ref. Book 2: Chapter 2-5 & Ref. Book 5: All chapters)
TOTAL: 45 PERIODS
OUTCOMES:
Upon completion of the course, the students will be able to
1. Implement fundamental image processing techniques required for computer vision
2. Calibrate cameras as when required
3. Apply chain codes and other region descriptors
4. Apply Transformation for line, circle, and ellipse detections
5. Develop applications using computer vision techniques
TEXT BOOK:
1. Concise Computer Vision: An Introduction into Theory and Algorithms, Reinhard Klette, 2014,
Springer
REFERENCES
1. Introductory Techniques for 3-D Computer Vision, Prentice Hall, 1998.
2. Computer Vision: Algorithms and Applications Richard Szeliski, Springer International, 2011.
3. Computer Vision: a Modern Approach, David Forsyth and Jean Ponce, Prentice Hall, 2009.
4. Multiple View Geometry in Computer Vision, Richard Hartley and Andrew Zisserman,
Cambridge, 2001
5. E.R.Davies,‖Computer and Machine Vision‖, Elsevier, 4th edition, 2012
OIT1705 CYBER SECURITY L T P C
3 0 0 3
OBJECTIVES:
Students should be able to understand
The difference between threat, risk, attack and vulnerability
How threats materialize into attacks.
Where to find information about threats, vulnerabilities and attacks
Typical threats, attacks and exploits and the motivations behind them.
UNIT I INTRODUCTION TO CYBER SECURITY 9
Introduction -Computer Security - Threats -Harm - Vulnerabilities - Controls - Authentication - Access
Control and Cryptography - Web—User Side - Browser Attacks - Web Attacks Targeting Users -
Obtaining User or Website Data - Email Attacks (Ref. Book 1: Chapter 1-3)
Curriculum and Syllabus | Open Electives | R 2017 | REC Page 75

