Page 75 - REC :: All Dept Open Electives
P. 75

UNIT V APPLICATIONS                                                                    9
               Application: Photo album – Face detection – Face recognition – Eigen faces – Active appearance and
               3D  shape  models  of  faces  Application:  Surveillance  –  foreground-background  separation  –  particle
               filters – Chamfer matching, tracking, and occlusion – combining views from multiple cameras–human
               gait analysis Application: In-vehicle vision system: locating roadway – road markings–identifying road
               signs – locating pedestrians (Ref. Book 2: Chapter 2-5 & Ref. Book 5: All chapters)
                                                                                TOTAL: 45 PERIODS



               OUTCOMES:
               Upon completion of the course, the students will be able to
                   1.  Implement fundamental image processing techniques required for computer vision
                   2.   Calibrate cameras as when required
                   3.   Apply chain codes and other region descriptors
                   4.  Apply Transformation for line, circle, and ellipse detections
                   5.  Develop applications using computer vision techniques

               TEXT BOOK:

                   1.  Concise Computer Vision: An Introduction into Theory and Algorithms, Reinhard Klette, 2014,
                       Springer


               REFERENCES

               1. Introductory Techniques for 3-D Computer Vision, Prentice Hall, 1998.
               2. Computer Vision: Algorithms and Applications Richard Szeliski, Springer International, 2011.
               3. Computer Vision: a Modern Approach, David Forsyth and Jean Ponce, Prentice Hall, 2009.
               4. Multiple View Geometry in Computer Vision, Richard Hartley and Andrew Zisserman,
                   Cambridge, 2001
               5. E.R.Davies,‖Computer and Machine Vision‖, Elsevier, 4th edition, 2012







               OIT1705                           CYBER SECURITY                                L T P C
                                                                                               3  0  0  3
               OBJECTIVES:


               Students should be able to understand
                 The difference between threat, risk, attack and vulnerability
                 How threats materialize into attacks.
                 Where to find information about threats, vulnerabilities and attacks
                 Typical threats, attacks and exploits and the motivations behind them.


               UNIT I         INTRODUCTION TO CYBER SECURITY                                          9

                Introduction -Computer Security - Threats -Harm - Vulnerabilities - Controls - Authentication - Access
               Control  and  Cryptography  -  Web—User  Side  -  Browser  Attacks  -  Web  Attacks  Targeting  Users  -
               Obtaining User or Website Data - Email Attacks (Ref. Book 1: Chapter 1-3)



               Curriculum and Syllabus | Open Electives | R 2017 | REC                              Page 75
   70   71   72   73   74   75   76   77   78   79   80