![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Pattern recognition
The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation techniques; (3) the portability over different platforms and architectures. First, the authors propose an approximate fingerprinting technique for android packaging that captures the underlying static structure of the android applications in the context of bulk and offline detection at the app-market level. This book proposes a malware clustering framework to perform malware clustering by building and partitioning the similarity network of malicious applications on top of this fingerprinting technique. Second, the authors propose an approximate fingerprinting technique that leverages dynamic analysis and natural language processing techniques to generate Android malware behavior reports. Based on this fingerprinting technique, the authors propose a portable malware detection framework employing machine learning classification. Third, the authors design an automatic framework to produce intelligence about the underlying malicious cyber-infrastructures of Android malware. The authors then leverage graph analysis techniques to generate relevant intelligence to identify the threat effects of malicious Internet activity associated with android malware. The authors elaborate on an effective android malware detection system, in the online detection context at the mobile device level. It is suitable for deployment on mobile devices, using machine learning classification on method call sequences. Also, it is resilient to common code obfuscation techniques and adaptive to operating systems and malware change overtime, using natural language processing and deep learning techniques. Researchers working in mobile and network security, machine learning and pattern recognition will find this book useful as a reference. Advanced-level students studying computer science within these topic areas will purchase this book as well.
The nature of handwriting in our society has significantly altered over the ages due to the introduction of new technologies such as computers and the World Wide Web. With increases in the amount of signature verification needs, state of the art internet and paper-based automated recognition methods are necessary. Pattern Recognition Technologies and Applications: Recent Advances provides cutting-edge pattern recognition techniques and applications. Written by world-renowned experts in their field, this easy to understand book is a must have for those seeking explanation in topics such as on- and offline handwriting and speech recognition, signature verification, and gender classification.
Deep Learning models are at the core of artificial intelligence research today. It is well known that deep learning techniques are disruptive for Euclidean data, such as images or sequence data, and not immediately applicable to graph-structured data such as text. This gap has driven a wave of research for deep learning on graphs, including graph representation learning, graph generation, and graph classification. The new neural network architectures on graph-structured data (graph neural networks, GNNs in short) have performed remarkably on these tasks, demonstrated by applications in social networks, bioinformatics, and medical informatics. Despite these successes, GNNs still face many challenges ranging from the foundational methodologies to the theoretical understandings of the power of the graph representation learning. This book provides a comprehensive introduction of GNNs. It first discusses the goals of graph representation learning and then reviews the history, current developments, and future directions of GNNs. The second part presents and reviews fundamental methods and theories concerning GNNs while the third part describes various frontiers that are built on the GNNs. The book concludes with an overview of recent developments in a number of applications using GNNs. This book is suitable for a wide audience including undergraduate and graduate students, postdoctoral researchers, professors and lecturers, as well as industrial and government practitioners who are new to this area or who already have some basic background but want to learn more about advanced and promising techniques and applications.
Volumetric, or three-dimensional, digital imaging now plays a vital role in many areas of research such as medicine and geology. Medical images acquired by tomographic scanners for instance are often given as a stack of cross-sectional image slices. Such images are called ‘volumetric’ because they depict objects in their entire three-dimensional extent rather than just as a projection onto a two-dimensional image plane. Since huge amounts of volumetric data are continually being produced in many places around the world, techniques for their automatic analysis become ever more important. Written by a computer vision specialist, this clear, detailed account of volumetric image analysis techniques provides a practical approach to the field including the following topics:
This book presents the complex topic of using computational intelligence for pattern recognition in a straightforward and applicable way, using Matlab to illustrate topics and concepts. The author covers computational intelligence tools like particle swarm optimization, bacterial foraging, simulated annealing, genetic algorithm, and artificial neural networks. The Matlab based illustrations along with the code are given for every topic. Readers get a quick basic understanding of various pattern recognition techniques using only the required depth in math. The Matlab program and algorithm are given along with the running text, providing clarity and usefulness of the various techniques. Presents pattern recognition and the computational intelligence using Matlab; Includes mixtures of theory, math, and algorithms, letting readers understand the concepts quickly; Outlines an array of classifiers, various regression models, statistical tests and the techniques for pattern recognition using computational intelligence.
Social media data contains our communication and online sharing, mirroring our daily life. This book looks at how we can use and what we can discover from such big data: Basic knowledge (data & challenges) on social media analytics Clustering as a fundamental technique for unsupervised knowledge discovery and data mining A class of neural inspired algorithms, based on adaptive resonance theory (ART), tackling challenges in big social media data clustering Step-by-step practices of developing unsupervised machine learning algorithms for real-world applications in social media domain Adaptive Resonance Theory in Social Media Data Clustering stands on the fundamental breakthrough in cognitive and neural theory, i.e. adaptive resonance theory, which simulates how a brain processes information to perform memory, learning, recognition, and prediction. It presents initiatives on the mathematical demonstration of ART's learning mechanisms in clustering, and illustrates how to extend the base ART model to handle the complexity and characteristics of social media data and perform associative analytical tasks. Both cutting-edge research and real-world practices on machine learning and social media analytics are included in the book and if you wish to learn the answers to the following questions, this book is for you: How to process big streams of multimedia data? How to analyze social networks with heterogeneous data? How to understand a user's interests by learning from online posts and behaviors? How to create a personalized search engine by automatically indexing and searching multimodal information resources? .
This book contains high-quality research articles and reviews that promote research and reflect the most recent advances in intelligent wavelet based techniques for advanced multimedia applications as well as other emerging areas. In recent time, wavelet transforms have become useful in many signal, image and video processing applications, especially for multimedia security and surveillance. A few applications of wavelets in security and surveillance are watermarking, fusion, steganography, object detection, tracking, motion recognition and intention recognition, etc. Wavelets are well capable of analyzing signal, image and video at different resolution levels, popularly known as multiresolution analysis. The multiresolution analysis is advantageous in multimedia security and surveillance applications. It provides flexibility in selection of different resolution levels that leads to better accuracy. Furthermore, recently sparse representation has become an advancement to analyze wavelet coefficients. It is observed that wavelet transforms possess the invariance property which makes them suitable for many vision applications. This book provides a concise overview of the current state of the art and disseminates some of the novel and exciting ideas and techniques. In addition, it is also helpful for the senior undergraduate and graduate students, researcher, academicians, IT professional and providers, citizens, customers as well as policy makers working in this area as well as other emerging applications demanding state-of-the-art wavelet based multimedia applications.
This extraordinary three-volume work, written in an engaging and rigorous style by a world authority in the field, provides an accessible, comprehensive introduction to the full spectrum of mathematical and statistical techniques underpinning contemporary methods in data-driven learning and inference. This final volume, Learning, builds on the foundational topics established in volume I to provide a thorough introduction to learning methods, addressing techniques such as least-squares methods, regularization, online learning, kernel methods, feedforward and recurrent neural networks, meta-learning, and adversarial attacks. A consistent structure and pedagogy is employed throughout this volume to reinforce student understanding, with over 350 end-of-chapter problems (including complete solutions for instructors), 280 figures, 100 solved examples, datasets and downloadable Matlab code. Supported by sister volumes Foundations and Inference, and unique in its scale and depth, this textbook sequence is ideal for early-career researchers and graduate students across many courses in signal processing, machine learning, data and inference.
Hybrid Computational Intelligence: Challenges and Utilities is a comprehensive resource that begins with the basics and main components of computational intelligence. It brings together many different aspects of the current research on HCI technologies, such as neural networks, support vector machines, fuzzy logic and evolutionary computation, while also covering a wide range of applications and implementation issues, from pattern recognition and system modeling, to intelligent control problems and biomedical applications. The book also explores the most widely used applications of hybrid computation as well as the history of their development. Each individual methodology provides hybrid systems with complementary reasoning and searching methods which allow the use of domain knowledge and empirical data to solve complex problems.
With the development of Big Data platforms for managing massive amount of data and wide availability of tools for processing these data, the biggest limitation is the lack of trained experts who are qualified to process and interpret the results. This textbook is intended for graduate students and experts using methods of cluster analysis and applications in various fields. Suitable for an introductory course on cluster analysis or data mining, with an in-depth mathematical treatment that includes discussions on different measures, primitives (points, lines, etc.) and optimization-based clustering methods, Cluster Analysis and Applications also includes coverage of deep learning based clustering methods. With clear explanations of ideas and precise definitions of concepts, accompanied by numerous examples and exercises together with Mathematica programs and modules, Cluster Analysis and Applications may be used by students and researchers in various disciplines, working in data analysis or data science.
This book provides a unique view of human activity recognition, especially fine-grained human activity structure learning, human-interaction recognition, RGB-D data based action recognition, temporal decomposition, and causality learning in unconstrained human activity videos. The techniques discussed give readers tools that provide a significant improvement over existing methodologies of video content understanding by taking advantage of activity recognition. It links multiple popular research fields in computer vision, machine learning, human-centered computing, human-computer interaction, image classification, and pattern recognition. In addition, the book includes several key chapters covering multiple emerging topics in the field. Contributed by top experts and practitioners, the chapters present key topics from different angles and blend both methodology and application, composing a solid overview of the human activity recognition techniques.
This book provides insights into smart ways of computer log data analysis, with the goal of spotting adversarial actions. It is organized into 3 major parts with a total of 8 chapters that include a detailed view on existing solutions, as well as novel techniques that go far beyond state of the art. The first part of this book motivates the entire topic and highlights major challenges, trends and design criteria for log data analysis approaches, and further surveys and compares the state of the art. The second part of this book introduces concepts that apply character-based, rather than token-based, approaches and thus work on a more fine-grained level. Furthermore, these solutions were designed for "online use", not only forensic analysis, but also process new log lines as they arrive in an efficient single pass manner. An advanced method for time series analysis aims at detecting changes in the overall behavior profile of an observed system and spotting trends and periodicities through log analysis. The third part of this book introduces the design of the AMiner, which is an advanced open source component for log data anomaly mining. The AMiner comes with several detectors to spot new events, new parameters, new correlations, new values and unknown value combinations and can run as stand-alone solution or as sensor with connection to a SIEM solution. More advanced detectors help to determines the characteristics of variable parts of log lines, specifically the properties of numerical and categorical fields. Detailed examples throughout this book allow the reader to better understand and apply the introduced techniques with open source software. Step-by-step instructions help to get familiar with the concepts and to better comprehend their inner mechanisms. A log test data set is available as free download and enables the reader to get the system up and running in no time. This book is designed for researchers working in the field of cyber security, and specifically system monitoring, anomaly detection and intrusion detection. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems. Forward-thinking practitioners, who would benefit from becoming familiar with the advanced anomaly detection methods, will also be interested in this book.
This groundbreaking text examines the problem of user authentication from a completely new viewpoint. Rather than describing the requirements, technologies and implementation issues of designing point-of-entry authentication, the book introduces and investigates the technological requirements of implementing transparent user authentication - where authentication credentials are captured during a user's normal interaction with a system. This approach would transform user authentication from a binary point-of-entry decision to a continuous identity confidence measure. Topics and features: discusses the need for user authentication; reviews existing authentication approaches; introduces novel behavioural biometrics techniques; examines the wider system-specific issues with designing large-scale multimodal authentication systems; concludes with a look to the future of user authentication.
This book explores internet applications in which a crucial role is played by classification, such as spam filtering, recommender systems, malware detection, intrusion detection and sentiment analysis. It explains how such classification problems can be solved using various statistical and machine learning methods, including K nearest neighbours, Bayesian classifiers, the logit method, discriminant analysis, several kinds of artificial neural networks, support vector machines, classification trees and other kinds of rule-based methods, as well as random forests and other kinds of classifier ensembles. The book covers a wide range of available classification methods and their variants, not only those that have already been used in the considered kinds of applications, but also those that have the potential to be used in them in the future. The book is a valuable resource for post-graduate students and professionals alike.
This book presents an approach to postmortem human identification using dental image processing based on dental features and characteristics, and provides information on various identification systems based on dental features using image processing operations. The book also provides information on a novel human identification approach that uses Infinite Symmetric Exponential Filter (ISEF) based edge detection and contouring algorithms. Provides complete details on dental imaging; Discusses the important features of a human identification approach and presents a brief review on DICOM standard for dental imaging; Presents human identification approach based on dental features.
Fuzzy classi ers are important tools in exploratory data analysis, which is a vital set of methods used in various engineering, scienti c and business applications. Fuzzy classi ers use fuzzy rules and do not require assumptions common to statistical classi cation. Rough set theory is useful when data sets are incomplete. It de nes a formal approximation of crisp sets by providing the lower and the upper approximation of the original set. Systems based on rough sets have natural ability to work on such data and incomplete vectors do not have to be preprocessed before classi cation. To achieve better performance than existing machine learning systems, fuzzy classifiers and rough sets can be combined in ensembles. Such ensembles consist of a nite set of learning models, usually weak learners. The present book discusses the three aforementioned elds - fuzzy systems, rough sets and ensemble techniques. As the trained ensemble should represent a single hypothesis, a lot of attention is placed on the possibility to combine fuzzy rules from fuzzy systems being members of classi cation ensemble. Furthermore, an emphasis is placed on ensembles that can work on incomplete data, thanks to rough set theory. ."
This contributed volume presents an overview of concepts, methods, and applications used in several quantitative areas of drug research, development, and marketing. Chapters bring together the theories and applications of various disciplines, allowing readers to learn more about quantitative fields, and to better recognize the differences between them. Because it provides a thorough overview, this will serve as a self-contained resource for readers interested in the pharmaceutical industry, and the quantitative methods that serve as its foundation. Specific disciplines covered include: Biostatistics Pharmacometrics Genomics Bioinformatics Pharmacoepidemiology Commercial analytics Operational analytics Quantitative Methods in Pharmaceutical Research and Development is ideal for undergraduate students interested in learning about real-world applications of quantitative methods, and the potential career options open to them. It will also be of interest to experts working in these areas.
This book covers the key advances in computerized facial beauty analysis, with an emphasis on data-driven research and the results of quantitative experiments. It takes a big step toward practical facial beauty analysis, proposes more reliable and stable facial features for beauty analysis and designs new models, methods, algorithms and schemes while implementing a facial beauty analysis and beautification system. This book also tests some previous putative rules and models for facial beauty analysis by using computationally efficient mathematical models and algorithms, especially large scale database-based and repeatable experiments.The first section of this book provides an overview of facial beauty analysis. The base of facial beauty analysis, i.e., facial beauty features, is presented in part two. Part three describes hypotheses on facial beauty, while part four defines data-driven facial beauty analysis models. This book concludes with the authors explaining how to implement their new facial beauty analysis system.This book is designed for researchers, professionals and post graduate students working in the field of facial beauty analysis, computer vision, human-machine interface, pattern recognition and biometrics. Those involved in interdisciplinary fields with also find the contents useful. The ideas, means and conclusions for beauty analysis are valuable for researchers and the system design and implementation can be used as models for practitioners and engineers.
Learn how to apply rough-fuzzy computing techniques to solve problems in bioinformatics and medical image processing Emphasizing applications in bioinformatics and medical image processing, this text offers a clear framework that enables readers to take advantage of the latest rough-fuzzy computing techniques to build working pattern recognition models. The authors explain step by step how to integrate rough sets with fuzzy sets in order to best manage the uncertainties in mining large data sets. Chapters are logically organized according to the major phases of pattern recognition systems development, making it easier to master such tasks as classification, clustering, and feature selection. "Rough-Fuzzy Pattern Recognition" examines the important underlying theory as well as algorithms and applications, helping readers see the connections between theory and practice. The first chapter provides an introduction to pattern recognition and data mining, including the key challenges of working with high-dimensional, real-life data sets. Next, the authors explore such topics and issues as: Soft computing in pattern recognition and data mining A Mathematical framework for generalized rough sets, incorporating the concept of fuzziness in defining the granules as well as the set Selection of non-redundant and relevant features of real-valued data sets Selection of the minimum set of basis strings with maximum information for amino acid sequence analysis Segmentation of brain MR images for visualization of human tissues Numerous examples and case studies help readers better understand how pattern recognition models are developed and used in practice. This text--covering the latest findings as well as directions for future research--is recommended for both students and practitioners working in systems design, pattern recognition, image analysis, data mining, bioinformatics, soft computing, and computational intelligence.
A unique point of this book is its low threshold, textually simple and at the same time full of self-assessment opportunities. Other unique points are the succinctness of the chapters with 3 to 6 pages, the presence of entire-commands-texts of the statistical methodologies reviewed and the fact that dull scientific texts imposing an unnecessary burden on busy and jaded professionals have been left out. For readers requesting more background, theoretical and mathematical information a note section with references is in each chapter. The first edition in 2010 was the first publication of a complete overview of SPSS methodologies for medical and health statistics. Well over 100,000 copies of various chapters were sold within the first year of publication. Reasons for a rewrite were four. First, many important comments from readers urged for a rewrite. Second, SPSS has produced many updates and upgrades, with relevant novel and improved methodologies. Third, the authors felt that the chapter texts needed some improvements for better readability: chapters have now been classified according the outcome data helpful for choosing your analysis rapidly, a schematic overview of data, and explanatory graphs have been added. Fourth, current data are increasingly complex and many important methods for analysis were missing in the first edition. For that latter purpose some more advanced methods seemed unavoidable, like hierarchical loglinear methods, gamma and Tweedie regressions and random intercept analyses. In order for the contents of the book to remain covered by the title, the authors renamed the book: SPSS for Starters and 2nd Levelers. Special care was, nonetheless, taken to keep things as simple as possible, simple menu commands are given. The arithmetic is still of a no-more-than high-school level. Step-by-step analyses of different statistical methodologies are given with the help of 60 SPSS data files available through the internet. Because of the lack of time of this busy group of people, the authors have given every effort to produce a text as succinct as possible.
Despite the fact that images constitute the main objects in computer vision and image analysis, there is remarkably little concern about their actual definition. In this book a complete account of image structure is proposed in terms of rigorously defined machine concepts, using basic tools from algebra, analysis, and differential geometry. Machine technicalities such as discretisation and quantisation details are de-emphasised, and robustness with respect to noise is manifest. From the foreword by Jan Koenderink: It is my hope that the book will find a wide audience, including physicists - who still are largely unaware of the general importance and power of scale space theory, mathematicians - who will find in it a principled and formally tight exposition of a topic awaiting further development, and computer scientists - who will find here a unified and conceptually well founded framework for many apparently unrelated and largely historically motivated methods they already know and love. The book is suited for self-study and graduate courses, the carefully formulated exercises are designed to get to grips with the subject matter and prepare the reader for original research.'
This book generalizes and extends the available theory in robust and decentralized hypothesis testing. In particular, it presents a robust test for modeling errors which is independent from the assumptions that a sufficiently large number of samples is available, and that the distance is the KL-divergence. Here, the distance can be chosen from a much general model, which includes the KL-divergence as a very special case. This is then extended by various means. A minimax robust test that is robust against both outliers as well as modeling errors is presented. Minimax robustness properties of the given tests are also explicitly proven for fixed sample size and sequential probability ratio tests. The theory of robust detection is extended to robust estimation and the theory of robust distributed detection is extended to classes of distributions, which are not necessarily stochastically bounded. It is shown that the quantization functions for the decision rules can also be chosen as non-monotone. Finally, the book describes the derivation of theoretical bounds in minimax decentralized hypothesis testing, which have not yet been known. As a timely report on the state-of-the-art in robust hypothesis testing, this book is mainly intended for postgraduates and researchers in the field of electrical and electronic engineering, statistics and applied probability. Moreover, it may be of interest for students and researchers working in the field of classification, pattern recognition and cognitive radio.
In today's security-conscious society, real-world applications for authentication or identification require a highly accurate system for recognizing individual humans. The required level of performance cannot be achieved through the use of a single biometric such as face, fingerprint, ear, iris, palm, gait or speech. Fusing multiple biometrics enables the indexing of large databases, more robust performance and enhanced coverage of populations. Multiple biometrics are also naturally more robust against attacks than single biometrics. This book addresses a broad spectrum of research issues on multibiometrics for human identification, ranging from sensing modes and modalities to fusion of biometric samples and combination of algorithms. It covers publicly available multibiometrics databases, theoretical and empirical studies on sensor fusion techniques in the context of biometrics authentication, identification and performance evaluation and prediction.
This textbook presents the main principles of visual analytics and describes techniques and approaches that have proven their utility and can be readily reproduced. Special emphasis is placed on various instructive examples of analyses, in which the need for and the use of visualisations are explained in detail. The book begins by introducing the main ideas and concepts of visual analytics and explaining why it should be considered an essential part of data science methodology and practices. It then describes the general principles underlying the visual analytics approaches, including those on appropriate visual representation, the use of interactive techniques, and classes of computational methods. It continues with discussing how to use visualisations for getting aware of data properties that need to be taken into account and for detecting possible data quality issues that may impair the analysis. The second part of the book describes visual analytics methods and workflows, organised by various data types including multidimensional data, data with spatial and temporal components, data describing binary relationships, texts, images and video. For each data type, the specific properties and issues are explained, the relevant analysis tasks are discussed, and appropriate methods and procedures are introduced. The focus here is not on the micro-level details of how the methods work, but on how the methods can be used and how they can be applied to data. The limitations of the methods are also discussed and possible pitfalls are identified. The textbook is intended for students in data science and, more generally, anyone doing or planning to do practical data analysis. It includes numerous examples demonstrating how visual analytics techniques are used and how they can help analysts to understand the properties of data, gain insights into the subject reflected in the data, and build good models that can be trusted. Based on several years of teaching related courses at the City, University of London, the University of Bonn and TU Munich, as well as industry training at the Fraunhofer Institute IAIS and numerous summer schools, the main content is complemented by sample datasets and detailed, illustrated descriptions of exercises to practice applying visual analytics methods and workflows.
"Reliable Knowledge Discovery" focuses on theory, methods, and techniques for RKDD, a new sub-field of KDD. It studies the theory and methods to assure the reliability and trustworthiness of discovered knowledge and to maintain the stability and consistency of knowledge discovery processes. RKDD has a broad spectrum of applications, especially in critical domains like medicine, finance, and military. "Reliable Knowledge Discovery" also presents methods and techniques for designing robust knowledge-discovery processes. Approaches to assessing the reliability of the discovered knowledge are introduced. Particular attention is paid to methods for reliable feature selection, reliable graph discovery, reliable classification, and stream mining. Estimating the data trustworthiness is covered in this volume as well. Case studies are provided in many chapters. "Reliable Knowledge Discovery" is designed for researchers and advanced-level students focused on computer science and electrical engineering as a secondary text or reference. Professionals working in this related field and KDD application developers will also find this book useful. |
You may like...
Making dispute resolution more effective…
Organisation for Economic Cooperation and Development
Paperback
R757
Discovery Miles 7 570
Advanced Questions On SA Tax 2026
Annette Becker, Shaun Parsons, …
Paperback
R380
Discovery Miles 3 800
Graded Questions On Income Tax In South…
Kevin Mitchell, Lindsay Mitchell
Paperback
R1,172
Discovery Miles 11 720
Taxation of costs - A practical guide
Albert Kruger, Wilma Mostert
Paperback
R1,083
Discovery Miles 10 830
A Student’s Approach to Income Tax…
A. Oosthuizen, Karina Coetzee, …
Paperback
Making dispute resolution more effective…
Organisation for Economic Cooperation and Development
Paperback
R863
Discovery Miles 8 630
|