![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General
This book examines the context, motivation and current status of biometric systems based on the palmprint, with a specific focus on touchless and less-constrained systems. It covers new technologies in this rapidly evolving field and is one of the first comprehensive books on palmprint recognition systems. It discusses the research literature and the most relevant industrial applications of palmprint biometrics, including the low-cost solutions based on webcams. The steps of biometric recognition are described in detail, including acquisition setups, algorithms, and evaluation procedures. Constraints and limitations of current palmprint recognition systems are analyzed and discussed. The authors also introduce innovative methods for touchless and less-constrained palmprint recognition, with the aim to make palmprint biometrics easier to use in practical, daily-life applications, and overcome the typical constraints and limitations described. Touchless Palmprint Recognition Systems targets professionals and researchers working in biometrics, image processing and three-dimensional reconstruction. Advanced-level students studying biometrics and computer science will also find this material valuable as a secondary text book or reference.
This book reviews the challenging issues that present barriers to greater implementation of the cloud computing paradigm, together with the latest research into developing potential solutions. Topics and features: presents a focus on the most important issues and limitations of cloud computing, covering cloud security and architecture, QoS and SLAs; discusses a methodology for cloud security management, and proposes a framework for secure data storage and identity management in the cloud; introduces a simulation tool for energy-aware cloud environments, and an efficient congestion control system for data center networks; examines the issues of energy-aware VM consolidation in the IaaS provision, and software-defined networking for cloud related applications; reviews current trends and suggests future developments in virtualization, cloud security, QoS data warehouses, cloud federation approaches, and DBaaS provision; predicts how the next generation of utility computing infrastructures will be designed.
The work described in this book is an excellent example of interdisciplinary research in systems biology. It shows how concepts and approaches from the field of physics can be efficiently used to answer biological questions and reports on a novel methodology involving creative computer-based analyses of high-throughput biological data. Many of the findings described in the book, which are the result of collaborations between the author (a theoretical scientist) and experimental biologists and between different laboratories, have been published in high-quality peer-reviewed journals such as Molecular Cell and Nature. However, while those publications address different aspects of post-transcriptional gene regulation, this book provides readers with a complete, coherent and logical view of the research project as a whole. The introduction presents post-transcriptional gene regulation from a distinct angle, highlighting aspects of information theory and evolution and laying the groundwork for the questions addressed in the subsequent chapters, which concern the regulation of the transcriptome as the primary functional carrier of active genetic information.
The integrated and advanced science research topic man-machine-environment system engineering (MMESE) was first established in China by Professor Shengzhao Long in 1981, with direct support from one of the greatest modern Chinese scientists, Xuesen Qian. In a letter to Shengzhao Long from October 22nd, 1993, Xuesen Qian wrote: “You have created a very important modern science and technology in China!” MMESE primarily focuses on the relationship between man, machines and the environment, studying the optimum combination of man-machine-environment systems. In this system, “man” refers to people in the workplace (e.g. operators, decision-makers); “ machine” is the general name for any object controlled by man (including tools, machinery, computers, systems and technologies), and “environment” describes the specific working conditions under which man and machine interact (e.g. temperature, noise, vibration, hazardous gases etc.). The three goals of optimization of man-machine-environment systems are to ensure safety, efficiency and economy. Proceedings of the 14th International Conference on Man-Machine-Environment System Engineering are an academic showcase of the best papers selected from more than 400 submissions, introducing readers to the top research topics and the latest developmental trends in the theory and application of MMESE. These proceedings are interdisciplinary studies on the concepts and methods of physiology, psychology, system engineering, computer science, environment science, management, education, and other related disciplines. Researchers and professionals working in these interdisciplinary fields and researchers on MMESE related topics will benefit from these proceedings.
Based on a rigorous selection of submissions to The 29th International Symposium on Computer and Information Sciences (ISCIS 2014), this books includes some of the most recent ideas and technical results in computer systems, computer science, and computer-communication networks. It offers the reader a timely access to innovative research and advances in computing and communications from many different areas of the world. The topics covered include (but are not limited to) computer architectures and digital systems, algorithms, theory, software engineering, data engineering, computational intelligence, system security, computer systems and networks, performance modeling and analysis, distributed and parallel systems, bioinformatics, computer vision and significant applications such as medical informatics and imaging. The 29th International Symposium on Computer and Information Sciences (ISCIS 2014) took place in Krakow Old City, Poland on October, 27–8, 2014.
This book presents up-to-date research developments and novel methodologies on fuzzy control systems. It presents solutions to a series of problems with new approaches for the analysis and synthesis of fuzzy time-delay systems and fuzzy stochastic systems, including stability analysis and stabilization, dynamic output feedback control, robust filter design, and model approximation. A set of newly developed techniques such as fuzzy Lyapunov function approach, delay-partitioning, reciprocally convex, cone complementary linearization approach are presented. Fuzzy Control Systems with Time-Delay and Stochastic Perturbation: Analysis and Synthesis is a comprehensive reference for researcher and practitioners working in control engineering, system sciences and applied mathematics, and is also a useful source of information for senior undergraduates and graduates in these areas. The readers will benefit from some new concepts, new models and new methodologies with practical significance in control engineering and signal processing.
The book offers an original view on channel coding, based on a unitary approach to block and convolutional codes for error correction. It presents both new concepts and new families of codes. For example, lengthened and modified lengthened cyclic codes are introduced as a bridge towards time-invariant convolutional codes and their extension to time-varying versions. The novel families of codes include turbo codes and low-density parity check (LDPC) codes, the features of which are justified from the structural properties of the component codes. Design procedures for regular LDPC codes are proposed, supported by the presented theory. Quasi-cyclic LDPC codes, in block or convolutional form, represent one of the most original contributions of the book. The use of more than 100 examples allows the reader gradually to gain an understanding of the theory, and the provision of a list of more than 150 definitions, indexed at the end of the book, permits rapid location of sought information.
This highly practical and self-contained guidebook explains the principles and major applications of digital hologram recording and numerical reconstruction (Digital Holography). A special chapter is designated to digital holographic interferometry with applications in deformation and shape measurement and refractive index determination. Applications in imaging and microscopy are also described. Spcial techniques such as digital light-in-flight holography, holographic endoscopy, information encrypting, comparative holography, and related techniques of speckle metrology are also treated
This book deals with the theoretical, methodological, and empirical implications of bounded rationality in the operation of institutions. It focuses on decisions made under uncertainty, and presents a reliable strategy of knowledge acquisition for the design and implementation of decision-support systems. Based on the distinction between the inner and outer environment of decisions, the book explores both the cognitive mechanisms at work when actors decide, and the institutional mechanisms existing among and within organizations that make decisions fairly predictable. While a great deal of work has been done on how organizations act as patterns of events for (boundedly) rational decisions, less effort has been devoted to study under which circumstances organizations cease to act as such reliable mechanisms. Through an empirical strategy on open-ended response data from a survey among junior judges, the work pursues two main goals. The first one is to explore the limits of “institutional rationality” of the Spanish lower courts on-call service, an optimal scenario to observe decision-making under uncertainty. The second aim is to achieve a better understanding of the kind of uncertainty under which inexperienced decision-makers work. This entails exploring the demands imposed by problems and the knowledge needed to deal with them, making this book also a study on expertise achievement in institutional environments. This book combines standard multivariate statistical methods with machine learning techniques such as multidimensional scaling and topic models, treating text as data. Doing so, the book contributes to the collaboration between empirical social scientific approaches and the community of scientists that provide the set of tools and methods to make sense of the fastest growing resource of our time: data.
This book discusses how to combine type-2 fuzzy sets and graphical models to solve a range of real-world pattern recognition problems such as speech recognition, handwritten Chinese character recognition, topic modeling as well as human action recognition. It covers these recent developments while also providing a comprehensive introduction to the fields of type-2 fuzzy sets and graphical models. Though primarily intended for graduate students, researchers and practitioners in fuzzy logic and pattern recognition, the book can also serve as a valuable reference work for researchers without any previous knowledge of these fields. Dr. Jia Zeng is a Professor at the School of Computer Science and Technology, Soochow University, China. Dr. Zhi-Qiang Liu is a Professor at the School of Creative Media, City University of Hong Kong, China.
The book presents findings, views and ideas on what exact problems of image processing, pattern recognition and generation can be efficiently solved by cellular automata architectures. This volume provides a convenient collection in this area, in which publications are otherwise widely scattered throughout the literature. The topics covered include image compression and resizing; skeletonization, erosion and dilation; convex hull computation, edge detection and segmentation; forgery detection and content based retrieval; and pattern generation. The book advances the theory of image processing, pattern recognition and generation as well as the design of efficient algorithms and hardware for parallel image processing and analysis. It is aimed at computer scientists, software programmers, electronic engineers, mathematicians and physicists, and at everyone who studies or develops cellular automaton algorithms and tools for image processing and analysis, or develops novel architectures and implementations of massive parallel computing devices. The book will provide attractive reading for a general audience because it has do-it-yourself appeal: all the computer experiments presented within it can be implemented with minimal knowledge of programming. The simplicity yet substantial functionality of the cellular automaton approach, and the transparency of the algorithms proposed, makes the text ideal supplementary reading for courses on image processing, parallel computing, automata theory and applications.
This book describes how the principle of self-sufficiency can be applied to a reconfigurable modular robotic organism. It shows the design considerations for a novel REPLICATOR robotic platform, both hardware and software, featuring the behavioral characteristics of social insect colonies. Following a comprehensive overview of some of the bio-inspired techniques already available, and of the state-of-the-art in re-configurable modular robotic systems, the book presents a novel power management system with fault-tolerant energy sharing, as well as its implementation in the REPLICATOR robotic modules. In addition, the book discusses, for the first time, the concept of “artificial energy homeostasis” in the context of a modular robotic organism, and shows its verification on a custom-designed simulation framework in different dynamic power distribution and fault tolerance scenarios. This book offers an ideal reference guide for both hardware engineers and software developers involved in the design and implementation of autonomous robotic systems.
This book provides an overview of the research work on data privacy and privacy enhancing technologies carried by the participants of the ARES project. ARES (Advanced Research in Privacy an Security, CSD2007-00004) has been one of the most important research projects funded by the Spanish Government in the fields of computer security and privacy. It is part of the now extinct CONSOLIDER INGENIO 2010 program, a highly competitive program which aimed to advance knowledge and open new research lines among top Spanish research groups. The project started in 2007 and will finish this 2014. Composed by 6 research groups from 6 different institutions, it has gathered an important number of researchers during its lifetime. Among the work produced by the ARES project, one specific work package has been related to privacy. This books gathers works produced by members of the project related to data privacy and privacy enhancing technologies. The presented works not only summarize important research carried in the project but also serve as an overview of the state of the art in current research on data privacy and privacy enhancing technologies.
This book presents various recent applications of Artificial Intelligence in Information and Communication Technologies such as Search and Optimization methods, Machine Learning, Data Representation and Ontologies, and Multi-agent Systems. The main aim of this book is to help Information and Communication Technologies (ICT) practitioners in managing efficiently their platforms using AI tools and methods and to provide them with sufficient Artificial Intelligence background to deal with real-life problems.
This monograph presents a comprehensive study of portfolio optimization, an important area of quantitative finance. Considering that the information available in financial markets is incomplete and that the markets are affected by vagueness and ambiguity, the monograph deals with fuzzy portfolio optimization models. At first, the book makes the reader familiar with basic concepts, including the classical mean–variance portfolio analysis. Then, it introduces advanced optimization techniques and applies them for the development of various multi-criteria portfolio optimization models in an uncertain environment. The models are developed considering both the financial and non-financial criteria of investment decision making, and the inputs from the investment experts. The utility of these models in practice is then demonstrated using numerical illustrations based on real-world data, which were collected from one of the premier stock exchanges in India. The book addresses both academics and professionals pursuing advanced research and/or engaged in practical issues in the rapidly evolving field of portfolio optimization.
This book offers a comprehensive analysis of the social choice literature and shows, by applying fuzzy sets, how the use of fuzzy preferences, rather than that of strict ones, may affect the social choice theorems. To do this, the book explores the presupposition of rationality within the fuzzy framework and shows that the two conditions for rationality, completeness and transitivity, do exist with fuzzy preferences. Specifically, this book examines: the conditions under which a maximal set exists; the Arrow’s theorem; the Gibbard-Satterthwaite theorem and the median voter theorem. After showing that a non-empty maximal set does exists for fuzzy preference relations, this book goes on to demonstrating the existence of a fuzzy aggregation rule satisfying all five Arrowian conditions, including non-dictatorship. While the Gibbard-Satterthwaite theorem only considers individual fuzzy preferences, this work shows that both individuals and groups can choose alternatives to various degrees, resulting in a social choice that can be both strategy-proof and non-dictatorial. Moreover, the median voter theorem is shown to hold under strict fuzzy preferences but not under weak fuzzy preferences. By providing a standard model of fuzzy social choice and by drawing the necessary connections between the major theorems, this book fills an important gap in the current literature and encourages future empirical research in the field.
This book is dedicated to applied computational intelligence and soft computing techniques with special reference to decision support in Cyber Physical Systems (CPS), where the physical as well as the communication segment of the networked entities interact with each other. The joint dynamics of such systems result in a complex combination of computers, software, networks and physical processes all combined to establish a process flow at system level. This volume provides the audience with an in-depth vision about how to ensure dependability, safety, security and efficiency in real time by making use of computational intelligence in various CPS applications ranging from the nano-world to large scale wide area systems of systems. Key application areas include healthcare, transportation, energy, process control and robotics where intelligent decision support has key significance in establishing dynamic, ever-changing and high confidence future technologies. A recommended text for graduate students and researchers working on the applications of computational intelligence methods in CPS.
This book brings together geometric tools and their applications for Information analysis. It collects current and many uses of in the interdisciplinary fields of Information Geometry Manifolds in Advanced Signal, Image & Video Processing, Complex Data Modeling and Analysis, Information Ranking and Retrieval, Coding, Cognitive Systems, Optimal Control, Statistics on Manifolds, Machine Learning, Speech/sound recognition and natural language treatment which are also substantially relevant for the industry.
In recent years, ELM has emerged as a revolutionary technique of computational intelligence, and has attracted considerable attentions. An extreme learning machine (ELM) is a single layer feed-forward neural network alike learning system, whose connections from the input layer to the hidden layer are randomly generated, while the connections from the hidden layer to the output layer are learned through linear learning methods. The outstanding merits of extreme learning machine (ELM) are its fast learning speed, trivial human intervene and high scalability. This book contains some selected papers from the International Conference on Extreme Learning Machine 2013, which was held in Beijing China, October 15-17, 2013. This conference aims to bring together the researchers and practitioners of extreme learning machine from a variety of fields including artificial intelligence, biomedical engineering and bioinformatics, system modelling and control, and signal and image processing, to promote research and discussions of “learning without iterative tuning". This book covers algorithms and applications of ELM. It gives readers a glance of the newest developments of ELM.
Providing a comprehensive introduction into an overview of the field of pervasive healthcare applications, this volume incorporates a variety of timely topics ranging from medical sensors and hardware infrastructures, to software platforms and applications and addresses issues of user experience and technology acceptance. The recent developments in the area of information and communication technologies have laid the groundwork for new patient-centred healthcare solutions. While the majority of computer-supported healthcare tools designed in the last decades focused mainly on supporting care-givers and medical personnel, this trend changed with the introduction of pervasive healthcare technologies, which provide supportive and adaptive services for a broad variety and diverse set of end users. With contributions from key researchers the book integrates the various aspects of pervasive healthcare systems including application design, hardware development, system implementation, hardware and software infrastructures as well as end-user aspects providing an excellent overview of this important and evolving field.
The book presents papers delivered by researchers, industrial experts and academicians at the Conference on Emerging Trends in Computing and Communication (ETCC 2014). As such, the book is a collection of recent and innovative works in the field Network Security and Cryptography, Cloud Computing and Big Data Analytics, Data Mining and Data Warehouse, Communication and Nanotechnology and VLSI and Image Processing.
Modern image processing techniques are based on multiresolution geometrical methods of image representation. These methods are efficient in sparse approximation of digital images. There is a wide family of functions called simply ‘X-lets’, and these methods can be divided into two groups: the adaptive and the nonadaptive. This book is devoted to the adaptive methods of image approximation, especially to multismoothlets. Besides multismoothlets, several other new ideas are also covered. Current literature considers the black and white images with smooth horizon function as the model for sparse approximation but here, the class of blurred multihorizon is introduced, which is then used in the approximation of images with multiedges. Additionally, the semi-anisotropic model of multiedge representation, the introduction of the shift invariant multismoothlet transform and sliding multismoothlets are also covered. Geometrical Multiresolution Adaptive Transforms should be accessible to both mathematicians and computer scientists. It is suitable as a professional reference for students, researchers and engineers, containing many open problems and will be an excellent starting point for those who are beginning new research in the area or who want to use geometrical multiresolution adaptive methods in image processing, analysis or compression.
Vision-based control of wheeled mobile robots is an interesting field of research from a scientific and even social point of view due to its potential applicability. This book presents a formal treatment of some aspects of control theory applied to the problem of vision-based pose regulation of wheeled mobile robots. In this problem, the robot has to reach a desired position and orientation, which are specified by a target image. It is faced in such a way that vision and control are unified to achieve stability of the closed loop, a large region of convergence, without local minima and good robustness against parametric uncertainty. Three different control schemes that rely on monocular vision as unique sensor are presented and evaluated experimentally. A common benefit of these approaches is that they are valid for imaging systems obeying approximately a central projection model, e.g., conventional cameras, catadioptric systems and some fisheye cameras. Thus, the presented control schemes are generic approaches. A minimum set of visual measurements, integrated in adequate task functions, are taken from a geometric constraint imposed between corresponding image features. Particularly, the epipolar geometry and the trifocal tensor are exploited since they can be used for generic scenes. A detailed experimental evaluation is presented for each control scheme.
With the proliferation of social media and on-line communities in networked world a large gamut of data has been collected and stored in databases. The rate at which such data is stored is growing at a phenomenal rate and pushing the classical methods of data analysis to their limits. This book presents an integrated framework of recent empirical and theoretical research on social network analysis based on a wide range of techniques from various disciplines like data mining, social sciences, mathematics, statistics, physics, network science, machine learning with visualization techniques and security. The book illustrates the potential of multi-disciplinary techniques in various real life problems and intends to motivate researchers in social network analysis to design more effective tools by integrating swarm intelligence and data mining.
This book captures the state of the art in cloud technologies, infrastructures, and service delivery and deployment models. The work provides guidance and case studies on the development of cloud-based services and infrastructures from an international selection of expert researchers and practitioners. Features: presents a focus on security and access control mechanisms for cloud environments, analyses standards and brokerage services, and investigates the role of certification for cloud adoption; evaluates cloud ERP, suggests a framework for implementing “big data” science, and proposes an approach for cloud interoperability; reviews existing elasticity management solutions, discusses the relationship between cloud management and governance, and describes the development of a cloud service capability assessment model; examines cloud applications in higher education, including the use of knowledge-as-a-service in the provision of education, and cloud-based e-learning for students with disabilities. |
![]() ![]() You may like...
Behavioral Finance - Psychology…
Richard Deaves, Lucy Ackert
Hardcover
Introduction to Information Theory and…
Peter D Johnson Jr, Greg A. Harris, …
Paperback
R2,117
Discovery Miles 21 170
|