![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Pattern recognition
Describing non-parametric and parametric theoretic classification and the training of discriminant functions, this second edition includes new and expanded sections on neural networks, Fisher's discriminant, wavelet transform, and the method of principal components. It contains discussions on dimensionality reduction and feature selection, novel computer system architectures, proven algorithms for solutions to common roadblocks in data processing, computing models including the Hamming net, the Kohonen self-organizing map, and the Hopfield net, detailed appendices with data sets illustrating key concepts in the text, and more.
Human Identification Based on Gait is the first book to address gait as a biometric. Biometrics is now in a unique position where it affects most people's lives. This is especially true of "gait," which is one of the most recent biometrics. Recognizing people by the way they walk and run implies analyzing movement which, in turn, implies analyzing sequences of images, thus requiring memory and computational performance that became available only recently. Human Identification Based on Gait introduces developments from distinguished researchers within this relatively new area of biometrics. This book clearly establishes how human gait is biometric. Human Identification Based on Gait is structured to meet the needs of professionals in industry, as well as advanced-level students in computer science.
Financial identity theft is well understood with clear underlying motives. Medical identity theft is new and presents a growing problem. The solutions to both problems however, are less clear. The Economics of Financial and Medical Identity Theft discusses how the digital networked environment is critically different from the world of paper, eyeballs and pens. Many of the effective identity protections are embedded behind the eyeballs, where the presumably passive observer is actually a fairly keen student of human behavior. The emergence of medical identity theft and the implications of medical data privacy are described in the second section of this book. The Economics of Financial and Medical Identity Theft also presents an overview of the current technology for identity management. The book closes with a series of vignettes in the last chapter, looking at the risks we may see in the future and how these risks can be mitigated or avoided.
The need to electronically store, manipulate and analyze large-scale, high-dimensional data sets requires new computational methods. This book presents new intelligent data management methods and tools, including new results from the field of inference. Leading experts also map out future directions of intelligent data analysis. This book will be a valuable reference for researchers exploring the interdisciplinary area between statistics and computer science as well as for professionals applying advanced data analysis methods in industry.
The interest of AI in problems related to understanding sounds has
a rich history dating back to the ARPA Speech Understanding Project
in the 1970s. While a great deal has been learned from this and
subsequent speech understanding research, the goal of building
systems that can understand general acoustic signals--continuous
speech and/or non-speech sounds--from unconstrained environments is
still unrealized. Instead, there are now systems that understand
"clean" speech well in relatively noiseless laboratory
environments, but that break down in more realistic, noisier
environments. As seen in the "cocktail-party effect," humans and
other mammals have the ability to selectively attend to sound from
a particular source, even when it is mixed with other sounds.
Computers also need to be able to decide which parts of a mixed
acoustic signal are relevant to a particular purpose--which part
should be interpreted as speech, and which should be interpreted as
a door closing, an air conditioner humming, or another person
interrupting.
The domains of Pattern Recognition and Machine Learning have experienced exceptional interest and growth, however the overwhelming number of methods and applications can make the fields seem bewildering. This text offers an accessible and conceptually rich introduction, a solid mathematical development emphasizing simplicity and intuition. Students beginning to explore pattern recognition do not need a suite of mathematically advanced methods or complicated computational libraries to understand and appreciate pattern recognition; rather the fundamental concepts and insights, eminently teachable at the undergraduate level, motivate this text. This book provides methods of analysis that the reader can realistically undertake on their own, supported by real-world examples, case-studies, and worked numerical / computational studies.
This important text/reference presents a comprehensive review of techniques for taxonomy matching, discussing matching algorithms, analyzing matching systems, and comparing matching evaluation approaches. Different methods are investigated in accordance with the criteria of the Ontology Alignment Evaluation Initiative (OAEI). The text also highlights promising developments and innovative guidelines, to further motivate researchers and practitioners in the field. Topics and features: discusses the fundamentals and the latest developments in taxonomy matching, including the related fields of ontology matching and schema matching; reviews next-generation matching strategies, matching algorithms, matching systems, and OAEI campaigns, as well as alternative evaluations; examines how the latest techniques make use of different sources of background knowledge to enable precise matching between repositories; describes the theoretical background, state-of-the-art research, and practical real-world applications; covers the fields of dynamic taxonomies, personalized directories, catalog segmentation, and recommender systems. This stimulating book is an essential reference for practitioners engaged in data science and business intelligence, and for researchers specializing in taxonomy matching and semantic similarity assessment. The work is also suitable as a supplementary text for advanced undergraduate and postgraduate courses on information and metadata management.
The problems it addresses include emotion representation, annotation of music excerpts, feature extraction, and machine learning. The book chiefly focuses on content-based analysis of music files, a system that automatically analyzes the structures of a music file and annotates the file with the perceived emotions. Further, it explores emotion detection in MIDI and audio files. In the experiments presented here, the categorical and dimensional approaches were used, and the knowledge and expertise of music experts with a university music education were used for music file annotation. The automatic emotion detection systems constructed and described in the book make it possible to index and subsequently search through music databases according to emotion. In turn, the emotion maps of musical compositions provide valuable new insights into the distribution of emotions in music and can be used to compare that distribution in different compositions, or to conduct emotional comparisons of different interpretations of the same composition.
This book introduces the point cloud; its applications in industry, and the most frequently used datasets. It mainly focuses on three computer vision tasks -- point cloud classification, segmentation, and registration -- which are fundamental to any point cloud-based system. An overview of traditional point cloud processing methods helps readers build background knowledge quickly, while the deep learning on point clouds methods include comprehensive analysis of the breakthroughs from the past few years. Brand-new explainable machine learning methods for point cloud learning, which are lightweight and easy to train, are then thoroughly introduced. Quantitative and qualitative performance evaluations are provided. The comparison and analysis between the three types of methods are given to help readers have a deeper understanding. With the rich deep learning literature in 2D vision, a natural inclination for 3D vision researchers is to develop deep learning methods for point cloud processing. Deep learning on point clouds has gained popularity since 2017, and the number of conference papers in this area continue to increase. Unlike 2D images, point clouds do not have a specific order, which makes point cloud processing by deep learning quite challenging. In addition, due to the geometric nature of point clouds, traditional methods are still widely used in industry. Therefore, this book aims to make readers familiar with this area by providing comprehensive overview of the traditional methods and the state-of-the-art deep learning methods. A major portion of this book focuses on explainable machine learning as a different approach to deep learning. The explainable machine learning methods offer a series of advantages over traditional methods and deep learning methods. This is a main highlight and novelty of the book. By tackling three research tasks -- 3D object recognition, segmentation, and registration using our methodology -- readers will have a sense of how to solve problems in a different way and can apply the frameworks to other 3D computer vision tasks, thus give them inspiration for their own future research. Numerous experiments, analysis and comparisons on three 3D computer vision tasks (object recognition, segmentation, detection and registration) are provided so that readers can learn how to solve difficult Computer Vision problems.
This revised edition offers an approach to information theory that is more general than the classical approach of Shannon. Classically, information is defined for an alphabet of symbols or for a set of mutually exclusive propositions (a partition of the probability space ) with corresponding probabilities adding up to 1. The new definition is given for an arbitrary cover of , i.e. for a set of possibly overlapping propositions. The generalized information concept is called novelty and it is accompanied by two concepts derived from it, designated as information and surprise, which describe "opposite" versions of novelty, information being related more to classical information theory and surprise being related more to the classical concept of statistical significance. In the discussion of these three concepts and their interrelations several properties or classes of covers are defined, which turn out to be lattices. The book also presents applications of these concepts, mostly in statistics and in neuroscience.
First Published in 1988. Routledge is an imprint of Taylor & Francis, an informa company.
First published in 1988. Routledge is an imprint of Taylor & Francis, an informa company.
This is a book about software engineering, bioinformatics, the C++ programming language and the SeqAn library. In the broadest sense, it will help the reader create better, faster and more reliable software by deepening their understanding of available tools, language features, techniques and design patterns. Every developer who previously worked with C++ will enjoy the in-depth chapter on important changes in the language from C++11 up to and including C++20. In contrast to many resources on Modern C++ that present new features only in small isolated examples, this book represents a more holistic approach: readers will understand the relevance of new features and how they interact in the context of a large software project and not just within a "toy example". Previous experience in creating software with C++ is highly recommended to fully appreciate these aspects. SeqAn3 is a new, re-designed software library. The conception and implementation process is detailed in this book, including a critical reflection on the previous versions of the library. This is particularly helpful to readers who are about to create a large software project themselves, or who are planning a major overhaul of an existing library or framework. While the focus of the book is clearly on software development and design, it also touches on various organisational and administrative aspects like licensing, dependency management and quality control.
This book provides an overview of different deep learning-based methods for face recognition and related problems. Specifically, the authors present methods based on autoencoders, restricted Boltzmann machines, and deep convolutional neural networks for face detection, localization, tracking, recognition, etc. The authors also discuss merits and drawbacks of available approaches and identifies promising avenues of research in this rapidly evolving field. Even though there have been a number of different approaches proposed in the literature for face recognition based on deep learning methods, there is not a single book available in the literature that gives a complete overview of these methods. The proposed book captures the state of the art in face recognition using various deep learning methods, and it covers a variety of different topics related to face recognition. This book is aimed at graduate students studying electrical engineering and/or computer science. Biometrics is a course that is widely offered at both undergraduate and graduate levels at many institutions around the world: This book can be used as a textbook for teaching topics related to face recognition. In addition, the work is beneficial to practitioners in industry who are working on biometrics-related problems. The prerequisites for optimal use are the basic knowledge of pattern recognition, machine learning, probability theory, and linear algebra.
Optical remote sensing relies on exploiting multispectral and hyper spectral imagery possessing high spatial and spectral resolutions respectively. These modalities, although useful for most remote sensing tasks, often present challenges that must be addressed for their effective exploitation. This book presents current state-of-the-art algorithms that address the following key challenges encountered in representation and analysis of such optical remotely sensed data. Challenges in pre-processing images, storing and representing high dimensional data, fusing different sensor modalities, pattern classification and target recognition, visualization of high dimensional imagery.
This book is the first attempt to bring together current research findings in the domain of interactive horizontal displays. The novel compilation will integrate and summarise findings from the most important international tabletop research teams. It will provide a state-of-the art overview of this research domain and therefore allow for discussion of emerging and future directions in research and technology of interactive horizontal displays. Latest advances in interaction and software technologies and their increasing availability beyond research labs, refuels the interest in interactive horizontal displays. In the early 1990s Mark Weiser s vision of Ubiquitous Computing redefined the notion of Human Computer Interaction. Interaction was no longer considered to happen only with standard desktop computers but also with elements of their environment. This book is structured in three major areas: under, on/above and around tabletops. These areas are associated with different research disciplines such as Hardware/Software and Computer Science, Human Computer Interaction (HCI) and Computer Supported Collaborative Work (CSCW). However, the comprehensive and compelling presentation of the topic of the book results from its interdisciplinary character. The book addresses fellow researchers who are interested in this domain and practitioners considering interactive tabletops in real-world projects. It will also be a useful introduction into tabletop research that can be used for the academic curriculum."
Human Recognition in Unconstrained Environments provides a unique picture of the complete 'in-the-wild' biometric recognition processing chain; from data acquisition through to detection, segmentation, encoding, and matching reactions against security incidents. Coverage includes: Data hardware architecture fundamentals Background subtraction of humans in outdoor scenes Camera synchronization Biometric traits: Real-time detection and data segmentation Biometric traits: Feature encoding / matching Fusion at different levels Reaction against security incidents Ethical issues in non-cooperative biometric recognition in public spaces With this book readers will learn how to: Use computer vision, pattern recognition and machine learning methods for biometric recognition in real-world, real-time settings, especially those related to forensics and security Choose the most suited biometric traits and recognition methods for uncontrolled settings Evaluate the performance of a biometric system on real world data
This extraordinary three-volume work, written in an engaging and rigorous style by a world authority in the field, provides an accessible, comprehensive introduction to the full spectrum of mathematical and statistical techniques underpinning contemporary methods in data-driven learning and inference. This second volume, Inference, builds on the foundational topics established in volume I to introduce students to techniques for inferring unknown variables and quantities, including Bayesian inference, Monte Carlo Markov Chain methods, maximum-likelihood estimation, hidden Markov models, Bayesian networks, and reinforcement learning. A consistent structure and pedagogy is employed throughout this volume to reinforce student understanding, with over 350 end-of-chapter problems (including solutions for instructors), 180 solved examples, almost 200 figures, datasets and downloadable Matlab code. Supported by sister volumes Foundations and Learning, and unique in its scale and depth, this textbook sequence is ideal for early-career researchers and graduate students across many courses in signal processing, machine learning, statistical analysis, data science and inference.
Why are We Writing This Book? Visual data (graphical, image, video, and visualized data) affect every aspect of modern society. The cheap collection, storage, and transmission of vast amounts of visual data have revolutionized the practice of science, technology, and business. Innovations from various disciplines have been developed and applied to the task of designing intelligent machines that can automatically detect and exploit useful regularities (patterns) in visual data. One such approach to machine intelligence is statistical learning and pattern analysis for visual data. Over the past two decades, rapid advances have been made throughout the ?eld of visual pattern analysis. Some fundamental problems, including perceptual gro- ing,imagesegmentation, stereomatching, objectdetectionandrecognition,and- tion analysis and visual tracking, have become hot research topics and test beds in multiple areas of specialization, including mathematics, neuron-biometry, and c- nition. A great diversity of models and algorithms stemming from these disciplines has been proposed. To address the issues of ill-posed problems and uncertainties in visual pattern modeling and computing, researchers have developed rich toolkits based on pattern analysis theory, harmonic analysis and partial differential eq- tions, geometry and group theory, graph matching, and graph grammars. Among these technologies involved in intelligent visual information processing, statistical learning and pattern analysis is undoubtedly the most popular and imp- tant approach, and it is also one of the most rapidly developing ?elds, with many achievements in recent years. Above all, it provides a unifying theoretical fra- work for intelligent visual information processing applications.
Pattern recognition in data is a well known classical problem that falls under the ambit of data analysis. As we need to handle different data, the nature of patterns, their recognition and the types of data analyses are bound to change. Since the number of data collection channels increases in the recent time and becomes more diversified, many real-world data mining tasks can easily acquire multiple databases from various sources. In these cases, data mining becomes more challenging for several essential reasons. We may encounter sensitive data originating from different sources - those cannot be amalgamated. Even if we are allowed to place different data together, we are certainly not able to analyze them when local identities of patterns are required to be retained. Thus, pattern recognition in multiple databases gives rise to a suite of new, challenging problems different from those encountered before. Association rule mining, global pattern discovery and mining patterns of select items provide different patterns discovery techniques in multiple data sources. Some interesting item-based data analyses are also covered in this book. Interesting patterns, such as exceptional patterns, icebergs and periodic patterns have been recently reported. The book presents a thorough influence analysis between items in time-stamped databases. The recent research on mining multiple related databases is covered while some previous contributions to the area are highlighted and contrasted with the most recent developments.
We describe in this book, bio-inspired models and applications of hybrid intel- gent systems using soft computing techniques for image analysis and pattern r- ognition based on biometrics and other information sources. Soft Computing (SC) consists of several intelligent computing paradigms, including fuzzy logic, neural networks, and bio-inspired optimization algorithms, which can be used to produce powerful hybrid intelligent systems. The book is organized in five main parts, which contain a group of papers around a similar subject. The first part consists of papers with the main theme of classification methods and applications, which are basically papers that propose new models for classification to solve general pr- lems and applications. The second part contains papers with the main theme of modular neural networks in pattern recognition, which are basically papers using bio-inspired techniques, like modular neural networks, for achieving pattern r- ognition based on biometric measures. The third part contains papers with the theme of bio-inspired optimization methods and applications to diverse problems. The fourth part contains papers that deal with general theory and algorithms of bio-inspired methods, like neural networks and evolutionary algorithms. The fifth part contains papers on computer vision applications of soft computing methods. In the part of classification methods and applications there are 5 papers that - scribe different contributions on fuzzy logic and bio-inspired models with appli- tion in classification for medical images and other data.
This book contains select chapters on support vector algorithms from different perspectives, including mathematical background, properties of various kernel functions, and several applications. The main focus of this book is on orthogonal kernel functions, and the properties of the classical kernel functions-Chebyshev, Legendre, Gegenbauer, and Jacobi-are reviewed in some chapters. Moreover, the fractional form of these kernel functions is introduced in the same chapters, and for ease of use for these kernel functions, a tutorial on a Python package named ORSVM is presented. The book also exhibits a variety of applications for support vector algorithms, and in addition to the classification, these algorithms along with the introduced kernel functions are utilized for solving ordinary, partial, integro, and fractional differential equations. On the other hand, nowadays, the real-time and big data applications of support vector algorithms are growing. Consequently, the Compute Unified Device Architecture (CUDA) parallelizing the procedure of support vector algorithms based on orthogonal kernel functions is presented. The book sheds light on how to use support vector algorithms based on orthogonal kernel functions in different situations and gives a significant perspective to all machine learning and scientific machine learning researchers all around the world to utilize fractional orthogonal kernel functions in their pattern recognition or scientific computing problems.
A self-contained and coherent account of probabilistic techniques, covering: distance measures, kernel rules, nearest neighbour rules, Vapnik-Chervonenkis theory, parametric classification, and feature extraction. Each chapter concludes with problems and exercises to further the readers understanding. Both research workers and graduate students will benefit from this wide-ranging and up-to-date account of a fast- moving field.
Markov models are extremely useful as a general, widely applicable tool for many areas in statistical pattern recognition. This unique text/reference places the formalism of Markov chain and hidden Markov models at the very center of its examination of current pattern recognition systems, demonstrating how the models can be used in a range of different applications. Thoroughly revised and expanded, this new edition now includes a more detailed treatment of the EM algorithm, a description of an efficient approximate Viterbi-training procedure, a theoretical derivation of the perplexity measure, and coverage of multi-pass decoding based on "n"-best search. Supporting the discussion of the theoretical foundations of Markov modeling, special emphasis is also placed on practical algorithmic solutions. Topics and features: introduces the formal framework for Markov models, describing hidden Markov models and Markov chain models, also known as n-gram models; covers the robust handling of probability quantities, which are omnipresent when dealing with these statistical methods; presents methods for the configuration of hidden Markov models for specific application areas, explaining the estimation of the model parameters; describes important methods for efficient processing of Markov models, and the adaptation of the models to different tasks; examines algorithms for searching within the complex solution spaces that result from the joint application of Markov chain and hidden Markov models; reviews key applications of Markov models in automatic speech recognition, character and handwriting recognition, and the analysis of biological sequences. Researchers, practitioners, and graduate students of pattern recognition will all find this book to be invaluable in aiding their understanding of the application of statistical methods in this area.
This book covers virtually all aspects of image formation in medical imaging, including systems based on ionizing radiation (x-rays, gamma rays) and non-ionizing techniques (ultrasound, optical, thermal, magnetic resonance, and magnetic particle imaging) alike. In addition, it discusses the development and application of computer-aided detection and diagnosis (CAD) systems in medical imaging. Also there will be a special track on computer-aided diagnosis on COVID-19 by CT and X-rays images. Given its coverage, the book provides both a forum and valuable resource for researchers involved in image formation, experimental methods, image performance, segmentation, pattern recognition, feature extraction, classifier design, machine learning / deep learning, radiomics, CAD workstation design, human-computer interaction, databases, and performance evaluation. |
You may like...
Cellular Internet of Things - From…
Olof Liberg, Marten Sundberg, …
Paperback
R2,403
Discovery Miles 24 030
Advanced Methodologies and Technologies…
D.B.A., Mehdi Khosrow-Pour,
Hardcover
R9,090
Discovery Miles 90 900
|