![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Pattern recognition
This book is one outcome of the NATO Advanced Studies Institute (ASI) Workshop, "Speechreading by Man and Machine," held at the Chateau de Bonas, Castera-Verduzan (near Auch, France) from August 28 to Septem ber 8, 1995 - the first interdisciplinary meeting devoted the subject of speechreading ("lipreading"). The forty-five attendees from twelve countries covered the gamut of speechreading research, from brain scans of humans processing bi-modal stimuli, to psychophysical experiments and illusions, to statistics of comprehension by the normal and deaf communities, to models of human perception, to computer vision and learning algorithms and hardware for automated speechreading machines. The first week focussed on speechreading by humans, the second week by machines, a general organization that is preserved in this volume. After the in evitable difficulties in clarifying language and terminology across disciplines as diverse as human neurophysiology, audiology, psychology, electrical en gineering, mathematics, and computer science, the participants engaged in lively discussion and debate. We think it is fair to say that there was an atmosphere of excitement and optimism for a field that is both fascinating and potentially lucrative. Of the many general results that can be taken from the workshop, two of the key ones are these: * The ways in which humans employ visual image for speech recogni tion are manifold and complex, and depend upon the talker-perceiver pair, severity and age of onset of any hearing loss, whether the topic of conversation is known or unknown, the level of noise, and so forth.
This book presents a novel approach to neural nets and thus offers a genuine alternative to the hitherto known neuro-computers. The new edition includes a section on transformation properties of the equations of the synergetic computer and on the invariance properties of the order parameter equations. Further additions are a new section on stereopsis and recent developments in the use of pulse-coupled neural nets for pattern recognition.
Science has made great progress in the twentieth century, with the establishment of proper disciplines in the fields of physics, computer science, molecular biology, and many others. At the same time, there have also emerged many engineering ideas that are interdisciplinary in nature, beyond the realm of such orthodox disciplines. These in clude, for example, artificial intelligence, fuzzy logic, artificial neural networks, evolutional computation, data mining, and so on. In or der to generate new technology that is truly human-friendly in the twenty-first century, integration of various methods beyond specific disciplines is required. Soft computing is a key concept for the creation of such human friendly technology in our modern information society. Professor Rutkowski is a pioneer in this field, having devoted himself for many years to publishing a large variety of original work. The present vol ume, based mostly on his own work, is a milestone in the devel opment of soft computing, integrating various disciplines from the fields of information science and engineering. The book consists of three parts, the first of which is devoted to probabilistic neural net works. Neural excitation is stochastic, so it is natural to investi gate the Bayesian properties of connectionist structures developed by Professor Rutkowski. This new approach has proven to be par ticularly useful for handling regression and classification problems vi Preface in time-varying environments. Throughout this book, major themes are selected from theoretical subjects that are tightly connected with challenging applications."
The related fields of fractal image encoding and fractal image
analysis have blossomed in recent years. This book, originating
from a NATO Advanced Study Institute held in 1995, presents work by
leading researchers. It is developing the subjects at an
introductory level, but it also has some recent and exciting
results in both fields.
Face recognition has been actively studied over the past decade and continues to be a big research challenge. Just recently, researchers have begun to investigate face recognition under unconstrained conditions. Unconstrained Face Recognition provides a comprehensive review of this biometric, especially face recognition from video, assembling a collection of novel approaches that are able to recognize human faces under various unconstrained situations. The underlying basis of these approaches is that, unlike conventional face recognition algorithms, they exploit the inherent characteristics of the unconstrained situation and thus improve the recognition performance when compared with conventional algorithms. Unconstrained Face Recognition is structured to meet the needs of a professional audience of researchers and practitioners in industry. This volume is also suitable for advanced-level students in computer science.
The fields of image analysis, computer vision, and artificial intelligence all make use of descriptions of shape in grey-level images. Most existing algorithms for the automatic recognition and classification of particular shapes have been devel oped for specific purposes, with the result that these methods are often restricted in their application. The use of advanced and theoretically well-founded math ematical methods should lead to the construction of robust shape descriptors having more general application. Shape description can be regarded as a meeting point of vision research, mathematics, computing science, and the application fields of image analy sis, computer vision, and artificial intelligence. The NATO Advanced Research Workshop "Shape in Picture" was organised with a twofold objective: first, it should provide all participants with an overview of relevant developments in these different disciplines; second, it should stimulate researchers to exchange original results and ideas across the boundaries of these disciplines. This book comprises a widely drawn selection of papers presented at the workshop, and many contributions have been revised to reflect further progress in the field. The focus of this collection is on mathematical approaches to the construction of shape descriptions from grey-level images. The book is divided into five parts, each devoted to a different discipline. Each part contains papers that have tutorial sections; these are intended to assist the reader in becoming acquainted with the variety of approaches to the problem."
This book covers the basic statistical and analytical techniques of computer intrusion detection. It is the first to present a data-centered approach to these problems. It begins with a description of the basics of TCP/IP, followed by chapters dealing with network traffic analysis, network monitoring for intrusion detection, host based intrusion detection, and computer viruses and other malicious code.
Evolutionary Computation (EC) techniques are e?cient, nature-inspired me- ods based on the principles of natural evolution and genetics. Due to their - ciency and simple underlying principles, these methods can be used for a diverse rangeofactivitiesincludingproblemsolving,optimization,machinelearningand pattern recognition. A large and continuously increasing number of researchers and professionals make use of EC techniques in various application domains. This volume presents a careful selection of relevant EC examples combined with a thorough examination of the techniques used in EC. The papers in the volume illustrate the current state of the art in the application of EC and should help and inspire researchers and professionals to develop e?cient EC methods for design and problem solving. All papers in this book were presented during EvoApplications 2010, which included a range of events on application-oriented aspects of EC. Since 1998, EvoApplications - formerly known as EvoWorkshops- has provided a unique opportunity for EC researchers to meet and discuss application aspects of EC and has been an important link between EC research and its application in a variety of domains. During these 12 years, new events have arisen, some have disappeared,whileothershavematuredtobecomeconferencesoftheirown,such as EuroGP in 2000, EvoCOP in 2004, and EvoBIO in 2007. And from this year, EvoApplications has become a conference as well.
This is the second edition of the comprehensive treatment of statistical inference using permutation techniques. It makes available to practitioners a variety of useful and powerful data analytic tools that rely on very few distributional assumptions. Although many of these procedures have appeared in journal articles, they are not readily available to practitioners. This new and updated edition places increased emphasis on the use of alternative permutation statistical tests based on metric Euclidean distance functions that have excellent robustness characteristics. These alternative permutation techniques provide many powerful multivariate tests including multivariate multiple regression analyses.
A sharp increase in the computing power of modern computers has triggered the development of powerful algorithms that can analyze complex patterns in large amounts of data within a short time period. Consequently, it has become possible to apply pattern recognition techniques to new tasks. The main goal of this book is to cover some of the latest application domains of pattern recognition while presenting novel techniques that have been developed or customized in those domains.
This book is a groundbreaking resource that covers both algorithms and technologies of interactive videos. It presents recent research and application work for building and browsing interactive digital videos. The book deals mainly with low-level semi-automatic and full-automatic processing of the video content for intelligent human computer interaction. There is a special focus on eye tracking methods.
This book covers content recognition in text, elaborating on past and current most successful algorithms and their application in a variety of settings: news filtering, mining of biomedical text, intelligence gathering, competitive intelligence, legal information searching, and processing of informal text. Today, there is considerable interest in integrating the results of information extraction in retrieval systems, because of the demand for search engines that return precise answers to flexible information queries.
Multimodal Video Characterization and Summarization is a valuable research tool for both professionals and academicians working in the video field. This book describes the methodology for using multimodal audio, image, and text technology to characterize video content. This new and groundbreaking science has led to many advances in video understanding, such as the development of a video summary. Applications and methodology for creating video summaries are described, as well as user-studies for evaluation and testing.
Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological traits such as fingerprint, iris, face) and active (learned and trained behavior such as voice, handwriting and gait) biometric recognition techniques to the reader. Unlike other publications in this area that concentrate on passive schemes, this professional book reflects a more comprehensive analysis of one particular active biometric technique: handwriting. Aspects that are thoroughly discussed include sensor characteristic dependency, attack scenarios, and the generation of cryptographic keys from handwriting.
This book constitutes the refereed proceedings of the 8th International Conference on Computer Vision Systems, ICVS 2011, held in Sophia Antipolis, France, in September 2009. The 22 revised papers presented were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on vision systems, control of perception, performance evaluation, activity recognition, and knowledge directed vision.
Sir Francis Crick would undoubtedly be at the front of the line ordering this fascinating book. Being one of the discoverers of DNA, he would be amazed at how his work has been applied to mankind's most important invention, the computer. In this excellent text, the reader is given a comprehensive introduction to the field of DNA computing. The book emphasizes computational methods to tackle central problems of DNA computing, such as controlling living cells, building patterns, and generating nanomachines. It also includes laboratory-scale human-operated models of computation, as well as a description of the first experiment of DNA computation conducted by Adleman in 1994.
This book presents the most recent achievements in some rapidly developing fields within Computer Science. This includes the very latest research in biometrics and computer security systems, and descriptions of the latest inroads in artificial intelligence applications. The book contains over 30 articles by well-known scientists and engineers. The articles are extended versions of works introduced at the ACS-CISIM 2005 conference.
Biometrics is becoming increasingly common in establishments that require high security such as state security and financial sectors. The increased threat to national security by terrorists has led to the explosive popularity of biometrics. Biometric devices are now available to capture biometric measurements such as fingerprints, palm, retinal scans, keystroke, voice recognition and facial scanning. However, the accuracy of these measurements varies, which has a direct relevance on the levels of security they offer. With the need to combat the problems related to identify theft and other security issues, society will have to compromise between security and personal freedoms. Securing Biometrics Applications investigates and identifies key impacts of biometric security applications, while discovering opportunities and challenges presented by the biometric technologies available.
Computational Intelligence is tolerant of imprecise information, partial truth and uncertainty. This book presents a selected collection of contributions on a focused treatment of important elements of CI, centred on its key element: learning. This book presents novel applications and real world applications working in Manufacturing and Engineering, and it sets a basis for understanding Domotic and Production Methods of the XXI Century.
Data Mining is the science and technology of exploring large and complex bodies of data in order to discover useful patterns. It is extremely important because it enables modeling and knowledge extraction from abundant data availability. This book introduces soft computing methods extending the envelope of problems that data mining can solve efficiently. It presents practical soft-computing approaches in data mining and includes various real-world case studies with detailed results.
This book constitutes the refereed proceedings of the First International Conference on Digital Image Processing and Pattern Recognition, DPPR 2011, held in Tirunelveli, India, in September 2011. The 48 revised full papers were carefully reviewed and selected from about 400 submissions. The conference brought together leading researchers, engineers and scientists in the domain of Digital Image Processing and Pattern Recognition. The papers cover all theoretical and practical aspects of the field and present new advances and current research results in two tracks, namely: digital image processing and pattern recognition, and computer science, engineering and information technology.
A mathematically rigorous but accessible treatment of digital signal processing that intertwines basic theoretical techniques with hands-on laboratory instruction is provided by this book. The book covers various aspects of the digital signal processing (DSP) "problem." It begins with the analysis of discrete-time signals and explains sampling and the use of the discrete and fast Fourier transforms. The second part of the book - covering digital to analog and analog to digital conversion - provides a practical interlude in the mathematical content before Part III lays out a careful development of the Z-transform and the design and analysis of digital filters.
"Intelligent Data Mining - Techniques and Applications" is an organized edited collection of contributed chapters covering basic knowledge for intelligent systems and data mining, applications in economic and management, industrial engineering and other related industrial applications. The main objective of this book is to gather a number of peer-reviewed high quality contributions in the relevant topic areas. The focus is especially on those chapters that provide theoretical/analytical solutions to the problems of real interest in intelligent techniques possibly combined with other traditional tools, for data mining and the corresponding applications to engineers and managers of different industrial sectors. Academic and applied researchers and research students working on data mining can also directly benefit from this book.
Design of water control structures, reservoir management, economic evaluation of flood protection projects, land use planning and management, flood insurance assessment, and other projects rely on knowledge of magnitude and frequency of floods. Often, estimation of floods is not easy because of lack of flood records at the target sites. Regional flood frequency analysis (RFFA) alleviates this problem by utilizing flood records pooled from other watersheds, which are similar to the watershed of the target site in flood characteristics. Clustering techniques are used to identify group(s) of watersheds which have similar flood characteristics. This book is a comprehensive reference on how to use these techniques for RFFA and is the first of its kind. It provides a detailed account of several recently developed clustering techniques, including those based on fuzzy set theory and artificial neural networks. It also documents research findings on application of clustering techniques to RFFA that remain scattered in various hydrology and water resources journals. The optimal number of groups defined in an area is based on cluster validation measures and L-moment based homogeneity tests. These form the bases to check the regions for homogeneity. The subjectivity involved and the effort needed to identify homogeneous groups of watersheds with conventional approaches are greatly reduced by using efficient clustering techniques discussed in this book. Furthermore, better flood estimates with smaller confidence intervals are obtained by analysis of data from homogeneous watersheds. Consequently, the problem of over- or under-designing by using these flood estimates is reduced. This leads to optimal economic design of structures. The advantages of better regionalization of watersheds and their utility are entering into hydrologic practice. Audience
Fuzzy sets were first proposed by Lotfi Zadeh in his seminal paper [366] in 1965, and ever since have been a center of many discussions, fervently admired and condemned. Both proponents and opponents consider the argu ments pointless because none of them would step back from their territory. And stiH, discussions burst out from a single sparkle like a conference pa per or a message on some fuzzy-mail newsgroup. Here is an excerpt from an e-mail messagepostedin1993tofuzzy-mail@vexpert. dbai. twvien. ac. at. by somebody who signed "Dave". , . . . Why then the "logic" in "fuzzy logic"? I don't think anyone has successfully used fuzzy sets for logical inference, nor do I think anyone wiH. In my admittedly neophyte opinion, "fuzzy logic" is a misnomer, an oxymoron. (1 would be delighted to be proven wrong on that. ) . . . I carne to the fuzzy literature with an open mind (and open wal let), high hopes and keen interest. I am very much disiHusioned with "fuzzy" per se, but I did happen across some extremely interesting things along the way. " Dave, thanks for the nice quote! Enthusiastic on the surface, are not many of us suspicious deep down? In some books and journals the word fuzzy is religiously avoided: fuzzy set theory is viewed as a second-hand cheap trick whose aim is nothing else but to devalue good classical theories and open up the way to lazy ignorants and newcomers. |
![]() ![]() You may like...
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain
Hardcover
R8,638
Discovery Miles 86 380
Human Recognition in Unconstrained…
Maria De Marsico, Michele Nappi, …
Hardcover
Handbook of Medical Image Computing and…
S. Kevin Zhou, Daniel Rueckert, …
Hardcover
3D Point Cloud Analysis - Traditional…
Shan Liu, Min Zhang, …
Hardcover
R3,357
Discovery Miles 33 570
Biometric Security and Privacy…
Richard Jiang, Somaya Al-Maadeed, …
Hardcover
R5,137
Discovery Miles 51 370
Smart Assisted Living - Toward An Open…
Feng Chen, Rebeca I. Garcia-Betances, …
Hardcover
R3,658
Discovery Miles 36 580
Human Centric Visual Analysis with Deep…
Liang Lin, Dongyu Zhang, …
Hardcover
R4,102
Discovery Miles 41 020
Feature Learning and Understanding…
Haitao Zhao, Zhihui Lai, …
Hardcover
R3,903
Discovery Miles 39 030
|