Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Applications of computing > Pattern recognition
Model-driven individual-based forest ecology and individual-based methods in forest management are of increasing importance in many parts of the world. For the first time this book integrates three main fields of forest ecology and management, i.e. tree/plant interactions, biometry of plant growth and human behaviour in forests. Individual-based forest ecology and management is an interdisciplinary research field with a focus on how the individual behaviour of plants contributes to the formation of spatial patterns that evolve through time. Key to this research is a strict bottom-up approach where the shaping and characteristics of plant communities are mostly the result of interactions between plants and between plants and humans. This book unites important methods of individual-based forest ecology and management from point process statistics, individual-based modelling, plant growth science and behavioural statistics. For ease of access, better understanding and transparency the methods are accompanied by R code and worked examples.
This book provides insights into smart ways of computer log data analysis, with the goal of spotting adversarial actions. It is organized into 3 major parts with a total of 8 chapters that include a detailed view on existing solutions, as well as novel techniques that go far beyond state of the art. The first part of this book motivates the entire topic and highlights major challenges, trends and design criteria for log data analysis approaches, and further surveys and compares the state of the art. The second part of this book introduces concepts that apply character-based, rather than token-based, approaches and thus work on a more fine-grained level. Furthermore, these solutions were designed for "online use", not only forensic analysis, but also process new log lines as they arrive in an efficient single pass manner. An advanced method for time series analysis aims at detecting changes in the overall behavior profile of an observed system and spotting trends and periodicities through log analysis. The third part of this book introduces the design of the AMiner, which is an advanced open source component for log data anomaly mining. The AMiner comes with several detectors to spot new events, new parameters, new correlations, new values and unknown value combinations and can run as stand-alone solution or as sensor with connection to a SIEM solution. More advanced detectors help to determines the characteristics of variable parts of log lines, specifically the properties of numerical and categorical fields. Detailed examples throughout this book allow the reader to better understand and apply the introduced techniques with open source software. Step-by-step instructions help to get familiar with the concepts and to better comprehend their inner mechanisms. A log test data set is available as free download and enables the reader to get the system up and running in no time. This book is designed for researchers working in the field of cyber security, and specifically system monitoring, anomaly detection and intrusion detection. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems. Forward-thinking practitioners, who would benefit from becoming familiar with the advanced anomaly detection methods, will also be interested in this book.
The proceedings set LNCS 13231, 13232, and 13233 constitutes the refereed proceedings of the 21st International Conference on Image Analysis and Processing, ICIAP 2022, which was held during May 23-27, 2022, in Lecce, Italy,The 168 papers included in the proceedings were carefully reviewed and selected from 307 submissions. They deal with video analysis and understanding; pattern recognition and machine learning; deep learning; multi-view geometry and 3D computer vision; image analysis, detection and recognition; multimedia; biomedical and assistive technology; digital forensics and biometrics; image processing for cultural heritage; robot vision; etc.
This book constitutes the refereed proceedings of the 5th International Conference on Intelligence Science, ICIS 2022, held in Xi'an, China, in August 2022. The 41 full and 5 short papers presented in this book were carefully reviewed and selected from 85 submissions. They were organized in topical sections as follows: Brain cognition; machine learning; data intelligence; language cognition; remote sensing images; perceptual intelligence; wireless sensor; and medical artificial intelligence.
This book covers virtually all aspects of image formation in medical imaging, including systems based on ionizing radiation (x-rays, gamma rays) and non-ionizing techniques (ultrasound, optical, thermal, magnetic resonance, and magnetic particle imaging) alike. In addition, it discusses the development and application of computer-aided detection and diagnosis (CAD) systems in medical imaging. Also there will be a special track on computer-aided diagnosis on COVID-19 by CT and X-rays images. Given its coverage, the book provides both a forum and valuable resource for researchers involved in image formation, experimental methods, image performance, segmentation, pattern recognition, feature extraction, classifier design, machine learning / deep learning, radiomics, CAD workstation design, human-computer interaction, databases, and performance evaluation.
The textbook provides both profound technological knowledge and a comprehensive treatment of essential topics in music processing and music information retrieval (MIR). Including numerous examples, figures, and exercises, this book is suited for students, lecturers, and researchers working in audio engineering, signal processing, computer science, digital humanities, and musicology. The book consists of eight chapters. The first two cover foundations of music representations and the Fourier transform-concepts used throughout the book. Each of the subsequent chapters starts with a general description of a concrete music processing task and then discusses-in a mathematically rigorous way-essential techniques and algorithms applicable to a wide range of analysis, classification, and retrieval problems. By mixing theory and practice, the book's goal is to offer detailed technological insights and a deep understanding of music processing applications. As a substantial extension, the textbook's second edition introduces the FMP (fundamentals of music processing) notebooks, which provide additional audio-visual material and Python code examples that implement all computational approaches step by step. Using Jupyter notebooks and open-source web applications, the FMP notebooks yield an interactive framework that allows students to experiment with their music examples, explore the effect of parameter settings, and understand the computed results by suitable visualizations and sonifications. The FMP notebooks are available from the author's institutional web page at the International Audio Laboratories Erlangen.
This book emphasizes recent advances in the creation of biometric identification systems for various applications in the field of human activity. The book displays the problems that arise in modern systems of biometric identification, as well as the level of development and prospects for the introduction of biometric technologies. The authors classify biometric technologies into two groups, distinguished according to the type of biometric characteristics used. The first group uses static biometric parameters: fingerprints, hand geometry, retina pattern, vein pattern on the finger, etc. The second group uses dynamic parameters for identification: the dynamics of the reproduction of a signature or a handwritten keyword, voice, gait, dynamics of work on the keyboard, etc. The directions of building information systems that use automatic personality identification based on the analysis of unique biometric characteristics of a person are discussed. The book is intended for professionals working and conducting research in the field of intelligent information processing, information security, and robotics and in the field of real-time identification systems. The book contains examples and problems/solutions throughout.
The two-volume set CCIS 1516 and 1517 constitutes thoroughly refereed short papers presented at the 28th International Conference on Neural Information Processing, ICONIP 2021, held in Sanur, Bali, Indonesia, in December 2021.* The volume also presents papers from the workshop on Artificial Intelligence and Cyber Security, held during the ICONIP 2021. The 176 short and workshop papers presented in this volume were carefully reviewed and selected for publication out of 1093 submissions. The papers are organized in topical sections as follows: theory and algorithms; AI and cybersecurity; cognitive neurosciences; human centred computing; advances in deep and shallow machine learning algorithms for biomedical data and imaging; reliable, robust, and secure machine learning algorithms; theory and applications of natural computing paradigms; applications. * The conference was held virtually due to the COVID-19 pandemic.
An intuitive and accessible text explaining the fundamentals and applications of graph signal processing. Requiring only an elementary understanding of linear algebra, it covers both basic and advanced topics, including node domain processing, graph signal frequency, sampling, and graph signal representations, as well as how to choose a graph. Understand the basic insights behind key concepts and learn how graphs can be associated to a range of specific applications across physical, biological and social networks, distributed sensor networks, image and video processing, and machine learning. With numerous exercises and Matlab examples to help put knowledge into practice, and a solutions manual available online for instructors, this unique text is essential reading for graduate and senior undergraduate students taking courses on graph signal processing, signal processing, information processing, and data analysis, as well as researchers and industry professionals.
Observing the environment and recognising patterns for the purpose of decision making is fundamental to human nature. This book deals with the scientific discipline that enables similar perception in machines through pattern recognition (PR), which has application in diverse technology areas. This book is an exposition of principal topics in PR using an algorithmic approach. It provides a thorough introduction to the concepts of PR and a systematic account of the major topics in PR besides reviewing the vast progress made in the field in recent times. It includes basic techniques of PR, neural networks, support vector machines and decision trees. While theoretical aspects have been given due coverage, the emphasis is more on the practical. The book is replete with examples and illustrations and includes chapter-end exercises. It is designed to meet the needs of senior undergraduate and postgraduate students of computer science and allied disciplines.
This book contains papers presented at the International Conference on Cognitive based Information Processing and Applications (CIPA) held during August 21, 2021, online conference (since COVID 19), which is divided into a 2-volume book. The papers in the second volume represent the various technological advancements in network information processing, graphics and image processing, medical care, machine learning, smart cities. It caters to postgraduate students, researchers, and practitioners specializing and working in the area of cognitive-inspired computing and information processing.
This book contains papers presented at the International Conference on Cognitive based Information Processing and Applications (CIPA) held during August 21, 2021, online conference (since COVID 19), which is divided into a 2-volume book. The papers in the first volume represent the various technological advancements in network information processing, graphics and image processing, medical care, machine learning, smart cities. It caters to postgraduate students, researchers, and practitioners specializing and working in the area of cognitive-inspired computing and information processing.
The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation techniques; (3) the portability over different platforms and architectures. First, the authors propose an approximate fingerprinting technique for android packaging that captures the underlying static structure of the android applications in the context of bulk and offline detection at the app-market level. This book proposes a malware clustering framework to perform malware clustering by building and partitioning the similarity network of malicious applications on top of this fingerprinting technique. Second, the authors propose an approximate fingerprinting technique that leverages dynamic analysis and natural language processing techniques to generate Android malware behavior reports. Based on this fingerprinting technique, the authors propose a portable malware detection framework employing machine learning classification. Third, the authors design an automatic framework to produce intelligence about the underlying malicious cyber-infrastructures of Android malware. The authors then leverage graph analysis techniques to generate relevant intelligence to identify the threat effects of malicious Internet activity associated with android malware. The authors elaborate on an effective android malware detection system, in the online detection context at the mobile device level. It is suitable for deployment on mobile devices, using machine learning classification on method call sequences. Also, it is resilient to common code obfuscation techniques and adaptive to operating systems and malware change overtime, using natural language processing and deep learning techniques. Researchers working in mobile and network security, machine learning and pattern recognition will find this book useful as a reference. Advanced-level students studying computer science within these topic areas will purchase this book as well.
This book gathers selected papers presented at the International Conference on Advancements in Computing and Management (ICACM 2019). Discussing current research in the field of artificial intelligence and machine learning, cloud computing, recent trends in security, natural language processing and machine translation, parallel and distributed algorithms, as well as pattern recognition and analysis, it is a valuable resource for academics, practitioners in industry and decision-makers.
This book contains high-quality research articles and reviews that promote research and reflect the most recent advances in intelligent wavelet based techniques for advanced multimedia applications as well as other emerging areas. In recent time, wavelet transforms have become useful in many signal, image and video processing applications, especially for multimedia security and surveillance. A few applications of wavelets in security and surveillance are watermarking, fusion, steganography, object detection, tracking, motion recognition and intention recognition, etc. Wavelets are well capable of analyzing signal, image and video at different resolution levels, popularly known as multiresolution analysis. The multiresolution analysis is advantageous in multimedia security and surveillance applications. It provides flexibility in selection of different resolution levels that leads to better accuracy. Furthermore, recently sparse representation has become an advancement to analyze wavelet coefficients. It is observed that wavelet transforms possess the invariance property which makes them suitable for many vision applications. This book provides a concise overview of the current state of the art and disseminates some of the novel and exciting ideas and techniques. In addition, it is also helpful for the senior undergraduate and graduate students, researcher, academicians, IT professional and providers, citizens, customers as well as policy makers working in this area as well as other emerging applications demanding state-of-the-art wavelet based multimedia applications.
This book highlights new advances in biometrics using deep learning toward deeper and wider background, deeming it "Deep Biometrics". The book aims to highlight recent developments in biometrics using semi-supervised and unsupervised methods such as Deep Neural Networks, Deep Stacked Autoencoder, Convolutional Neural Networks, Generative Adversary Networks, and so on. The contributors demonstrate the power of deep learning techniques in the emerging new areas such as privacy and security issues, cancellable biometrics, soft biometrics, smart cities, big biometric data, biometric banking, medical biometrics, healthcare biometrics, and biometric genetics, etc. The goal of this volume is to summarize the recent advances in using Deep Learning in the area of biometric security and privacy toward deeper and wider applications. Highlights the impact of deep learning over the field of biometrics in a wide area; Exploits the deeper and wider background of biometrics, such as privacy versus security, biometric big data, biometric genetics, and biometric diagnosis, etc.; Introduces new biometric applications such as biometric banking, internet of things, cloud computing, and medical biometrics.
This two-volume set constitutes the proceedings of the Third International Conference on Pattern Recognition and Artificial Intelligence, ICPRAI 2022, which took place in Paris, France, in June 2022. The 98 full papers presented were carefully reviewed and selected from 192 submissions. The papers present new advances in the field of pattern recognition and artificial intelligence. They are organized in topical sections as follows: pattern recognition; computer vision; artificial intelligence; big data.
This book constitutes the refereed proceedings of the 16th International Conference on Augmented Cognition, AC 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022.The total of 1271 papers and 275 posters included in the HCII 2022 proceedings was carefully reviewed and selected from 5487 submissions. The AC 2022 proceedings aims to develop adaptive systems capable of extending the information management capacity of individuals through computing technologies and offers a broad range of theoretical and applied issues related to Augmented Cognition and its applications.
Data stealing is a major concern on the internet as hackers and criminals have begun using simple tricks to hack social networks and violate privacy. Cyber-attack methods are progressively modern, and obstructing the attack is increasingly troublesome, regardless of whether countermeasures are taken. The Dark Web especially presents challenges to information privacy and security due to anonymous behaviors and the unavailability of data. To better understand and prevent cyberattacks, it is vital to have a forecast of cyberattacks, proper safety measures, and viable use of cyber-intelligence that empowers these activities. Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence discusses cyberattacks, security, and safety measures to protect data and presents the shortcomings faced by researchers and practitioners due to the unavailability of information about the Dark Web. Attacker techniques in these Dark Web environments are highlighted, along with intrusion detection practices and crawling of hidden content. Covering a range of topics such as malware and fog computing, this reference work is ideal for researchers, academicians, practitioners, industry professionals, computer scientists, scholars, instructors, and students.
This is a book about software engineering, bioinformatics, the C++ programming language and the SeqAn library. In the broadest sense, it will help the reader create better, faster and more reliable software by deepening their understanding of available tools, language features, techniques and design patterns. Every developer who previously worked with C++ will enjoy the in-depth chapter on important changes in the language from C++11 up to and including C++20. In contrast to many resources on Modern C++ that present new features only in small isolated examples, this book represents a more holistic approach: readers will understand the relevance of new features and how they interact in the context of a large software project and not just within a "toy example". Previous experience in creating software with C++ is highly recommended to fully appreciate these aspects. SeqAn3 is a new, re-designed software library. The conception and implementation process is detailed in this book, including a critical reflection on the previous versions of the library. This is particularly helpful to readers who are about to create a large software project themselves, or who are planning a major overhaul of an existing library or framework. While the focus of the book is clearly on software development and design, it also touches on various organisational and administrative aspects like licensing, dependency management and quality control.
This book presents a collection of high-quality research papers accepted to multi-conference consisting of International Conference on Image Processing and Communications (IP&C 2021), International Conference on Computer Recognition Systems (CORES 2021), International Conference on Advanced Computer Systems (ACS 2021) held jointly in Bydgoszcz, Poland (virtually), in June 2021. The accepted papers address current computer science and computer systems-related technological challenges and solutions, as well as many practical applications and results. The first part of the book deals with advances in pattern recognition and classifiers, the second part is devoted to image processing and computer vision, while the third part addresses practical applications of computer recognition systems. Machine learning solutions for security and networks are tackled in part four of the book, while the last part collects papers on progress in advanced computer systems. We believe this book will be interesting for researchers and practitioners in many fields of computer science and IT applications.
This book explains how depth measurements from the Time-of-Flight (ToF) range imaging cameras are influenced by the electronic timing-jitter. The author presents jitter extraction and measurement techniques for any type of ToF range imaging cameras. The author mainly focuses on ToF cameras that are based on the amplitude modulated continuous wave (AMCW) lidar techniques that measure the phase difference between the emitted and reflected light signals. The book discusses timing-jitter in the emitted light signal, which is sensible since the light signal of the camera is relatively straightforward to access. The specific types of jitter that present on the light source signal are investigated throughout the book. The book is structured across three main sections: a brief literature review, jitter measurement, and jitter influence in AMCW ToF range imaging.
This book presents works detailing the application of processing and visualization techniques for analyzing the Earth's subsurface. The topic of the book is interactive data processing and interactive 3D visualization techniques used on subsurface data. Interactive processing of data together with interactive visualization is a powerful combination which has in the recent years become possible due to hardware and algorithm advances in. The combination enables the user to perform interactive exploration and filtering of datasets while simultaneously visualizing the results so that insights can be made immediately. This makes it possible to quickly form hypotheses and draw conclusions. Case studies from the geosciences are not as often presented in the scientific visualization and computer graphics community as e.g., studies on medical, biological or chemical data. This book will give researchers in the field of visualization and computer graphics valuable insight into the open visualization challenges in the geosciences, and how certain problems are currently solved using domain specific processing and visualization techniques. Conversely, readers from the geosciences will gain valuable insight into relevant visualization and interactive processing techniques. Subsurface data has interesting characteristics such as its solid nature, large range of scales and high degree of uncertainty, which makes it challenging to visualize with standard methods. It is also noteworthy that parallel fields of research have taken place in geosciences and in computer graphics, with different terminology when it comes to representing geometry, describing terrains, interpolating data and (example-based) synthesis of data. The domains covered in this book are geology, digital terrains, seismic data, reservoir visualization and CO2 storage. The technologies covered are 3D visualization, visualization of large datasets, 3D modelling, machine learning, virtual reality, seismic interpretation and multidisciplinary collaboration. People within any of these domains and technologies are potential readers of the book.
Fingerprints are among the most widely used biometric modalities and have been successfully applied in various scenarios. For example, in forensics, fingerprints serve as important legal evidence; and in civilian applications, fingerprints are used for access and attendance control as well as other identity services. Thanks to advances in three-dimensional (3D) and high-resolution imaging technology, it is now feasible to capture 3D or high-resolution fingerprints to provide extra information and go beyond the traditional features such as global ridge patterns and local ridge singularities used in conventional fingerprint recognition tasks. This book presents the state of the art in the acquisition and analysis of 3D and high-resolution fingerprints. Based on the authors' research, this book focuses on advanced fingerprint recognition using 3D fingerprint features (i.e., finger shape, level 0 features) or high-resolution fingerprint features (i.e., ridge detail, level 3 features). It is a valuable resource for researchers, professionals and graduate students working in the field of computer vision, pattern recognition, security/biometrics practice, as well as interdisciplinary researchers.
This completely revised second edition presents an introduction to statistical pattern recognition. Pattern recognition in general covers a wide range of problems: it is applied to engineering problems, such as character readers and wave form analysis as well as to brain modeling in biology and psychology. Statistical decision and estimation, which are the main subjects of this book, are regarded as fundamental to the study of pattern recognition. This book is appropriate as a text for introductory courses in pattern recognition and as a reference book for workers in the field. Each chapter contains computer projects as well as exercises. |
You may like...
Pattern Recognition with Neural Networks…
Abhijit S. Pandya, Robert B. Macy
Hardcover
R6,150
Discovery Miles 61 500
Advances in Computer Vision - Volume 1
C Brown, Christopher Brown
Hardcover
R3,920
Discovery Miles 39 200
Mathematics for Machine Learning
Marc Peter Deisenroth, A. Aldo Faisal, …
Paperback
Process Mining Techniques for Pattern…
Vikash Yadav, Anil Kumar Dubey, …
Hardcover
R3,971
Discovery Miles 39 710
Computational Auditory Scene Analysis…
David F. Rosenthal, Hiroshi G. Okuno, …
Hardcover
R4,824
Discovery Miles 48 240
Natural Language Processing - A Machine…
Yue Zhang, Zhiyang Teng
Hardcover
|