![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Pattern recognition
This extraordinary three-volume work, written in an engaging and rigorous style by a world authority in the field, provides an accessible, comprehensive introduction to the full spectrum of mathematical and statistical techniques underpinning contemporary methods in data-driven learning and inference. This final volume, Learning, builds on the foundational topics established in volume I to provide a thorough introduction to learning methods, addressing techniques such as least-squares methods, regularization, online learning, kernel methods, feedforward and recurrent neural networks, meta-learning, and adversarial attacks. A consistent structure and pedagogy is employed throughout this volume to reinforce student understanding, with over 350 end-of-chapter problems (including complete solutions for instructors), 280 figures, 100 solved examples, datasets and downloadable Matlab code. Supported by sister volumes Foundations and Inference, and unique in its scale and depth, this textbook sequence is ideal for early-career researchers and graduate students across many courses in signal processing, machine learning, data and inference.
Hybrid Computational Intelligence: Challenges and Utilities is a comprehensive resource that begins with the basics and main components of computational intelligence. It brings together many different aspects of the current research on HCI technologies, such as neural networks, support vector machines, fuzzy logic and evolutionary computation, while also covering a wide range of applications and implementation issues, from pattern recognition and system modeling, to intelligent control problems and biomedical applications. The book also explores the most widely used applications of hybrid computation as well as the history of their development. Each individual methodology provides hybrid systems with complementary reasoning and searching methods which allow the use of domain knowledge and empirical data to solve complex problems.
This book presents the complex topic of using computational intelligence for pattern recognition in a straightforward and applicable way, using Matlab to illustrate topics and concepts. The author covers computational intelligence tools like particle swarm optimization, bacterial foraging, simulated annealing, genetic algorithm, and artificial neural networks. The Matlab based illustrations along with the code are given for every topic. Readers get a quick basic understanding of various pattern recognition techniques using only the required depth in math. The Matlab program and algorithm are given along with the running text, providing clarity and usefulness of the various techniques. Presents pattern recognition and the computational intelligence using Matlab; Includes mixtures of theory, math, and algorithms, letting readers understand the concepts quickly; Outlines an array of classifiers, various regression models, statistical tests and the techniques for pattern recognition using computational intelligence.
Social media data contains our communication and online sharing, mirroring our daily life. This book looks at how we can use and what we can discover from such big data: Basic knowledge (data & challenges) on social media analytics Clustering as a fundamental technique for unsupervised knowledge discovery and data mining A class of neural inspired algorithms, based on adaptive resonance theory (ART), tackling challenges in big social media data clustering Step-by-step practices of developing unsupervised machine learning algorithms for real-world applications in social media domain Adaptive Resonance Theory in Social Media Data Clustering stands on the fundamental breakthrough in cognitive and neural theory, i.e. adaptive resonance theory, which simulates how a brain processes information to perform memory, learning, recognition, and prediction. It presents initiatives on the mathematical demonstration of ART's learning mechanisms in clustering, and illustrates how to extend the base ART model to handle the complexity and characteristics of social media data and perform associative analytical tasks. Both cutting-edge research and real-world practices on machine learning and social media analytics are included in the book and if you wish to learn the answers to the following questions, this book is for you: How to process big streams of multimedia data? How to analyze social networks with heterogeneous data? How to understand a user's interests by learning from online posts and behaviors? How to create a personalized search engine by automatically indexing and searching multimodal information resources? .
This book contains high-quality research articles and reviews that promote research and reflect the most recent advances in intelligent wavelet based techniques for advanced multimedia applications as well as other emerging areas. In recent time, wavelet transforms have become useful in many signal, image and video processing applications, especially for multimedia security and surveillance. A few applications of wavelets in security and surveillance are watermarking, fusion, steganography, object detection, tracking, motion recognition and intention recognition, etc. Wavelets are well capable of analyzing signal, image and video at different resolution levels, popularly known as multiresolution analysis. The multiresolution analysis is advantageous in multimedia security and surveillance applications. It provides flexibility in selection of different resolution levels that leads to better accuracy. Furthermore, recently sparse representation has become an advancement to analyze wavelet coefficients. It is observed that wavelet transforms possess the invariance property which makes them suitable for many vision applications. This book provides a concise overview of the current state of the art and disseminates some of the novel and exciting ideas and techniques. In addition, it is also helpful for the senior undergraduate and graduate students, researcher, academicians, IT professional and providers, citizens, customers as well as policy makers working in this area as well as other emerging applications demanding state-of-the-art wavelet based multimedia applications.
Statistical and machine learning methods have many applications in the environmental sciences, including prediction and data analysis in meteorology, hydrology and oceanography, pattern recognition for satellite images from remote sensing, management of agriculture and forests, assessment of climate change, and much more. With rapid advances in machine learning in the last decade, this book provides an urgently needed, comprehensive guide to machine learning and statistics for students and researchers interested in environmental data science. It includes intuitive explanations covering the relevant background mathematics, with examples drawn from the environmental sciences. A broad range of topics are covered, including correlation, regression, classification, clustering, neural networks, random forests, boosting, kernel methods, evolutionary algorithms, and deep learning, as well as the recent merging of machine learning and physics. End-of-chapter exercises allow readers to develop their problem-solving skills and online data sets allow readers to practise analysis of real data.
With the development of Big Data platforms for managing massive amount of data and wide availability of tools for processing these data, the biggest limitation is the lack of trained experts who are qualified to process and interpret the results. This textbook is intended for graduate students and experts using methods of cluster analysis and applications in various fields. Suitable for an introductory course on cluster analysis or data mining, with an in-depth mathematical treatment that includes discussions on different measures, primitives (points, lines, etc.) and optimization-based clustering methods, Cluster Analysis and Applications also includes coverage of deep learning based clustering methods. With clear explanations of ideas and precise definitions of concepts, accompanied by numerous examples and exercises together with Mathematica programs and modules, Cluster Analysis and Applications may be used by students and researchers in various disciplines, working in data analysis or data science.
This book provides a unique view of human activity recognition, especially fine-grained human activity structure learning, human-interaction recognition, RGB-D data based action recognition, temporal decomposition, and causality learning in unconstrained human activity videos. The techniques discussed give readers tools that provide a significant improvement over existing methodologies of video content understanding by taking advantage of activity recognition. It links multiple popular research fields in computer vision, machine learning, human-centered computing, human-computer interaction, image classification, and pattern recognition. In addition, the book includes several key chapters covering multiple emerging topics in the field. Contributed by top experts and practitioners, the chapters present key topics from different angles and blend both methodology and application, composing a solid overview of the human activity recognition techniques.
This book provides insights into smart ways of computer log data analysis, with the goal of spotting adversarial actions. It is organized into 3 major parts with a total of 8 chapters that include a detailed view on existing solutions, as well as novel techniques that go far beyond state of the art. The first part of this book motivates the entire topic and highlights major challenges, trends and design criteria for log data analysis approaches, and further surveys and compares the state of the art. The second part of this book introduces concepts that apply character-based, rather than token-based, approaches and thus work on a more fine-grained level. Furthermore, these solutions were designed for "online use", not only forensic analysis, but also process new log lines as they arrive in an efficient single pass manner. An advanced method for time series analysis aims at detecting changes in the overall behavior profile of an observed system and spotting trends and periodicities through log analysis. The third part of this book introduces the design of the AMiner, which is an advanced open source component for log data anomaly mining. The AMiner comes with several detectors to spot new events, new parameters, new correlations, new values and unknown value combinations and can run as stand-alone solution or as sensor with connection to a SIEM solution. More advanced detectors help to determines the characteristics of variable parts of log lines, specifically the properties of numerical and categorical fields. Detailed examples throughout this book allow the reader to better understand and apply the introduced techniques with open source software. Step-by-step instructions help to get familiar with the concepts and to better comprehend their inner mechanisms. A log test data set is available as free download and enables the reader to get the system up and running in no time. This book is designed for researchers working in the field of cyber security, and specifically system monitoring, anomaly detection and intrusion detection. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems. Forward-thinking practitioners, who would benefit from becoming familiar with the advanced anomaly detection methods, will also be interested in this book.
This groundbreaking text examines the problem of user authentication from a completely new viewpoint. Rather than describing the requirements, technologies and implementation issues of designing point-of-entry authentication, the book introduces and investigates the technological requirements of implementing transparent user authentication - where authentication credentials are captured during a user's normal interaction with a system. This approach would transform user authentication from a binary point-of-entry decision to a continuous identity confidence measure. Topics and features: discusses the need for user authentication; reviews existing authentication approaches; introduces novel behavioural biometrics techniques; examines the wider system-specific issues with designing large-scale multimodal authentication systems; concludes with a look to the future of user authentication.
This book explores internet applications in which a crucial role is played by classification, such as spam filtering, recommender systems, malware detection, intrusion detection and sentiment analysis. It explains how such classification problems can be solved using various statistical and machine learning methods, including K nearest neighbours, Bayesian classifiers, the logit method, discriminant analysis, several kinds of artificial neural networks, support vector machines, classification trees and other kinds of rule-based methods, as well as random forests and other kinds of classifier ensembles. The book covers a wide range of available classification methods and their variants, not only those that have already been used in the considered kinds of applications, but also those that have the potential to be used in them in the future. The book is a valuable resource for post-graduate students and professionals alike.
This book presents an approach to postmortem human identification using dental image processing based on dental features and characteristics, and provides information on various identification systems based on dental features using image processing operations. The book also provides information on a novel human identification approach that uses Infinite Symmetric Exponential Filter (ISEF) based edge detection and contouring algorithms. Provides complete details on dental imaging; Discusses the important features of a human identification approach and presents a brief review on DICOM standard for dental imaging; Presents human identification approach based on dental features.
This book covers the key advances in computerized facial beauty analysis, with an emphasis on data-driven research and the results of quantitative experiments. It takes a big step toward practical facial beauty analysis, proposes more reliable and stable facial features for beauty analysis and designs new models, methods, algorithms and schemes while implementing a facial beauty analysis and beautification system. This book also tests some previous putative rules and models for facial beauty analysis by using computationally efficient mathematical models and algorithms, especially large scale database-based and repeatable experiments.The first section of this book provides an overview of facial beauty analysis. The base of facial beauty analysis, i.e., facial beauty features, is presented in part two. Part three describes hypotheses on facial beauty, while part four defines data-driven facial beauty analysis models. This book concludes with the authors explaining how to implement their new facial beauty analysis system.This book is designed for researchers, professionals and post graduate students working in the field of facial beauty analysis, computer vision, human-machine interface, pattern recognition and biometrics. Those involved in interdisciplinary fields with also find the contents useful. The ideas, means and conclusions for beauty analysis are valuable for researchers and the system design and implementation can be used as models for practitioners and engineers.
Fuzzy classi ers are important tools in exploratory data analysis, which is a vital set of methods used in various engineering, scienti c and business applications. Fuzzy classi ers use fuzzy rules and do not require assumptions common to statistical classi cation. Rough set theory is useful when data sets are incomplete. It de nes a formal approximation of crisp sets by providing the lower and the upper approximation of the original set. Systems based on rough sets have natural ability to work on such data and incomplete vectors do not have to be preprocessed before classi cation. To achieve better performance than existing machine learning systems, fuzzy classifiers and rough sets can be combined in ensembles. Such ensembles consist of a nite set of learning models, usually weak learners. The present book discusses the three aforementioned elds - fuzzy systems, rough sets and ensemble techniques. As the trained ensemble should represent a single hypothesis, a lot of attention is placed on the possibility to combine fuzzy rules from fuzzy systems being members of classi cation ensemble. Furthermore, an emphasis is placed on ensembles that can work on incomplete data, thanks to rough set theory. ."
This contributed volume presents an overview of concepts, methods, and applications used in several quantitative areas of drug research, development, and marketing. Chapters bring together the theories and applications of various disciplines, allowing readers to learn more about quantitative fields, and to better recognize the differences between them. Because it provides a thorough overview, this will serve as a self-contained resource for readers interested in the pharmaceutical industry, and the quantitative methods that serve as its foundation. Specific disciplines covered include: Biostatistics Pharmacometrics Genomics Bioinformatics Pharmacoepidemiology Commercial analytics Operational analytics Quantitative Methods in Pharmaceutical Research and Development is ideal for undergraduate students interested in learning about real-world applications of quantitative methods, and the potential career options open to them. It will also be of interest to experts working in these areas.
A unique point of this book is its low threshold, textually simple and at the same time full of self-assessment opportunities. Other unique points are the succinctness of the chapters with 3 to 6 pages, the presence of entire-commands-texts of the statistical methodologies reviewed and the fact that dull scientific texts imposing an unnecessary burden on busy and jaded professionals have been left out. For readers requesting more background, theoretical and mathematical information a note section with references is in each chapter. The first edition in 2010 was the first publication of a complete overview of SPSS methodologies for medical and health statistics. Well over 100,000 copies of various chapters were sold within the first year of publication. Reasons for a rewrite were four. First, many important comments from readers urged for a rewrite. Second, SPSS has produced many updates and upgrades, with relevant novel and improved methodologies. Third, the authors felt that the chapter texts needed some improvements for better readability: chapters have now been classified according the outcome data helpful for choosing your analysis rapidly, a schematic overview of data, and explanatory graphs have been added. Fourth, current data are increasingly complex and many important methods for analysis were missing in the first edition. For that latter purpose some more advanced methods seemed unavoidable, like hierarchical loglinear methods, gamma and Tweedie regressions and random intercept analyses. In order for the contents of the book to remain covered by the title, the authors renamed the book: SPSS for Starters and 2nd Levelers. Special care was, nonetheless, taken to keep things as simple as possible, simple menu commands are given. The arithmetic is still of a no-more-than high-school level. Step-by-step analyses of different statistical methodologies are given with the help of 60 SPSS data files available through the internet. Because of the lack of time of this busy group of people, the authors have given every effort to produce a text as succinct as possible.
Despite the fact that images constitute the main objects in computer vision and image analysis, there is remarkably little concern about their actual definition. In this book a complete account of image structure is proposed in terms of rigorously defined machine concepts, using basic tools from algebra, analysis, and differential geometry. Machine technicalities such as discretisation and quantisation details are de-emphasised, and robustness with respect to noise is manifest. From the foreword by Jan Koenderink: It is my hope that the book will find a wide audience, including physicists - who still are largely unaware of the general importance and power of scale space theory, mathematicians - who will find in it a principled and formally tight exposition of a topic awaiting further development, and computer scientists - who will find here a unified and conceptually well founded framework for many apparently unrelated and largely historically motivated methods they already know and love. The book is suited for self-study and graduate courses, the carefully formulated exercises are designed to get to grips with the subject matter and prepare the reader for original research.'
This book generalizes and extends the available theory in robust and decentralized hypothesis testing. In particular, it presents a robust test for modeling errors which is independent from the assumptions that a sufficiently large number of samples is available, and that the distance is the KL-divergence. Here, the distance can be chosen from a much general model, which includes the KL-divergence as a very special case. This is then extended by various means. A minimax robust test that is robust against both outliers as well as modeling errors is presented. Minimax robustness properties of the given tests are also explicitly proven for fixed sample size and sequential probability ratio tests. The theory of robust detection is extended to robust estimation and the theory of robust distributed detection is extended to classes of distributions, which are not necessarily stochastically bounded. It is shown that the quantization functions for the decision rules can also be chosen as non-monotone. Finally, the book describes the derivation of theoretical bounds in minimax decentralized hypothesis testing, which have not yet been known. As a timely report on the state-of-the-art in robust hypothesis testing, this book is mainly intended for postgraduates and researchers in the field of electrical and electronic engineering, statistics and applied probability. Moreover, it may be of interest for students and researchers working in the field of classification, pattern recognition and cognitive radio.
This textbook presents the main principles of visual analytics and describes techniques and approaches that have proven their utility and can be readily reproduced. Special emphasis is placed on various instructive examples of analyses, in which the need for and the use of visualisations are explained in detail. The book begins by introducing the main ideas and concepts of visual analytics and explaining why it should be considered an essential part of data science methodology and practices. It then describes the general principles underlying the visual analytics approaches, including those on appropriate visual representation, the use of interactive techniques, and classes of computational methods. It continues with discussing how to use visualisations for getting aware of data properties that need to be taken into account and for detecting possible data quality issues that may impair the analysis. The second part of the book describes visual analytics methods and workflows, organised by various data types including multidimensional data, data with spatial and temporal components, data describing binary relationships, texts, images and video. For each data type, the specific properties and issues are explained, the relevant analysis tasks are discussed, and appropriate methods and procedures are introduced. The focus here is not on the micro-level details of how the methods work, but on how the methods can be used and how they can be applied to data. The limitations of the methods are also discussed and possible pitfalls are identified. The textbook is intended for students in data science and, more generally, anyone doing or planning to do practical data analysis. It includes numerous examples demonstrating how visual analytics techniques are used and how they can help analysts to understand the properties of data, gain insights into the subject reflected in the data, and build good models that can be trusted. Based on several years of teaching related courses at the City, University of London, the University of Bonn and TU Munich, as well as industry training at the Fraunhofer Institute IAIS and numerous summer schools, the main content is complemented by sample datasets and detailed, illustrated descriptions of exercises to practice applying visual analytics methods and workflows.
"Reliable Knowledge Discovery" focuses on theory, methods, and techniques for RKDD, a new sub-field of KDD. It studies the theory and methods to assure the reliability and trustworthiness of discovered knowledge and to maintain the stability and consistency of knowledge discovery processes. RKDD has a broad spectrum of applications, especially in critical domains like medicine, finance, and military. "Reliable Knowledge Discovery" also presents methods and techniques for designing robust knowledge-discovery processes. Approaches to assessing the reliability of the discovered knowledge are introduced. Particular attention is paid to methods for reliable feature selection, reliable graph discovery, reliable classification, and stream mining. Estimating the data trustworthiness is covered in this volume as well. Case studies are provided in many chapters. "Reliable Knowledge Discovery" is designed for researchers and advanced-level students focused on computer science and electrical engineering as a secondary text or reference. Professionals working in this related field and KDD application developers will also find this book useful.
This book offers comprehensive coverage of information retrieval by considering both Text Based Information Retrieval (TBIR) and Content Based Image Retrieval (CBIR), together with new research topics. The approach to TBIR is based on creating a thesaurus, as well as event classification and detection. N-gram thesaurus generation for query refinement offers a new method for improving the precision of retrieval, while event classification and detection approaches aid in the classification and organization of information using web documents for domain-specific retrieval applications. In turn, with regard to content based image retrieval (CBIR) the book presents a histogram construction method, which is based on human visual perceptions of color. The book's overarching goal is to introduce readers to new ideas in an easy-to-follow manner.
This book describes in detail sampling techniques that can be used for unsupervised and supervised cases, with a focus on sampling techniques for machine learning algorithms. It covers theory and models of sampling methods for managing scalability and the "curse of dimensionality", their implementations, evaluations, and applications. A large part of the book is dedicated to database comprising standard feature vectors, and a special section is reserved to the handling of more complex objects and dynamic scenarios. The book is ideal for anyone teaching or learning pattern recognition and interesting teaching or learning pattern recognition and is interested in the big data challenge. It provides an accessible introduction to the field and discusses the state of the art concerning sampling techniques for supervised and unsupervised task. Provides a comprehensive description of sampling techniques for unsupervised and supervised tasks; Describe implementation and evaluation of algorithms that simultaneously manage scalable problems and curse of dimensionality; Addresses the role of sampling in dynamic scenarios, sampling when dealing with complex objects, and new challenges arising from big data. "This book represents a timely collection of state-of-the art research of sampling techniques, suitable for anyone who wants to become more familiar with these helpful techniques for tackling the big data challenge." M. Emre Celebi, Ph.D., Professor and Chair, Department of Computer Science, University of Central Arkansas "In science the difficulty is not to have ideas, but it is to make them work" From Carlo Rovelli
Provides the basic concepts of process mining techniques for pattern recognition for readers to analyze, predict, forecast, and enhance the workflow of processes Covers the entire spectrum of process mining from process discovery to operational support Discusses several process mining techniques in the context of data science and big data Contains real-life applications and case studies related to process mining theories and practices Includes detailed examples, figures, and tables for easy understanding of concepts discussed
This book focuses on grammatical inference, presenting classic and modern methods of grammatical inference from the perspective of practitioners. To do so, it employs the Python programming language to present all of the methods discussed. Grammatical inference is a field that lies at the intersection of multiple disciplines, with contributions from computational linguistics, pattern recognition, machine learning, computational biology, formal learning theory and many others. Though the book is largely practical, it also includes elements of learning theory, combinatorics on words, the theory of automata and formal languages, plus references to real-world problems. The listings presented here can be directly copied and pasted into other programs, thus making the book a valuable source of ready recipes for students, academic researchers, and programmers alike, as well as an inspiration for their further development.>
This text presents an overview of smart information systems for both the private and public sector, highlighting the research questions that can be studied by applying computational intelligence. The book demonstrates how to transform raw data into effective smart information services, covering the challenges and potential of this approach. Each chapter describes the algorithms, tools, measures and evaluations used to answer important questions. This is then further illustrated by a diverse selection of case studies reflecting genuine problems faced by SMEs, multinational manufacturers, service companies, and the public sector. Features: provides a state-of-the-art introduction to the field, integrating contributions from both academia and industry; reviews novel information aggregation services; discusses personalization and recommendation systems; examines sensor-based knowledge acquisition services, describing how the analysis of sensor data can be used to provide a clear picture of our world. |
You may like...
Electronic Nose: Algorithmic Challenges
Lei Zhang, Fengchun Tian, …
Hardcover
R3,376
Discovery Miles 33 760
Natural Computing for Unsupervised…
Xiangtao Li, Ka-Chun Wong
Hardcover
R2,677
Discovery Miles 26 770
Dark Web Pattern Recognition and Crime…
Romil Rawat, Vinod Mahor, …
Hardcover
R6,208
Discovery Miles 62 080
Biometric Security and Privacy…
Richard Jiang, Somaya Al-Maadeed, …
Hardcover
R4,834
Discovery Miles 48 340
Handbook of Medical Image Computing and…
S. Kevin Zhou, Daniel Rueckert, …
Hardcover
R4,574
Discovery Miles 45 740
Human Centric Visual Analysis with Deep…
Liang Lin, Dongyu Zhang, …
Hardcover
R3,785
Discovery Miles 37 850
Advances in Feature Selection for Data…
Urszula Stanczyk, Beata Zielosko, …
Hardcover
|