![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Pattern recognition
Although the field of texture processing is now well-established, research in this area remains predominantly restricted to texture analysis and simple and approximate static textures. This comprehensive text/reference presents a survey of the state of the art in multidimensional, physically-correct visual texture modeling. Starting from basic principles and building upon the fundamentals to the latest advanced methods, the book brings together research from computer vision, pattern recognition, computer graphics, virtual and augmented reality. The text assumes a graduate-level understanding of statistics and probability theory, and a knowledge of basic computer graphics principles, but is accessible to newcomers to the field. Topics and features: reviews the entire process of texture synthesis, including material appearance representation, measurement, analysis, compression, modeling, editing, visualization, and perceptual evaluation; explains the derivation of the most common representations of visual texture, discussing their properties, advantages, and limitations; describes a range of techniques for the measurement of visual texture, including BRDF, SVBRDF, BTF and BSSRDF; investigates the visualization of textural information, from texture mapping and mip-mapping to illumination- and view-dependent data interpolation; examines techniques for perceptual validation and analysis, covering both standard pixel-wise similarity measures and also methods of visual psychophysics; reviews the applications of visual textures, from visual scene analysis in image processing and medical applications, to high-quality visualizations for cultural heritage and the automotive industry. Researchers, lecturers, students and practitioners will all find this book an invaluable reference on the rapidly developing new field of texture modeling.
This text reviews the field of digital image processing from the different perspectives offered by the separate domains of signal processing and pattern recognition. The book describes a rich array of applications, representing the latest trends in industry and academic research. To inspire further interest in the field, a selection of worked-out numerical problems is also included in the text. The content is presented in an accessible manner, examining each topic in depth without assuming any prior knowledge from the reader, and providing additional background material in the appendices. Features: covers image enhancement techniques in the spatial domain, the frequency domain, and the wavelet domain; reviews compression methods and formats for encoding images; discusses morphology-based image processing; investigates the modeling of object recognition in the human visual system; provides supplementary material, including MATLAB and C++ code, and interactive GUI-based modules, at an associated website.
The book presents a coherent understanding of computational intelligence from the perspective of what is known as "intelligent computing" with high-dimensional parameters. It critically discusses the central issue of high-dimensional neurocomputing, such as quantitative representation of signals, extending the dimensionality of neuron, supervised and unsupervised learning and design of higher order neurons. The strong point of the book is its clarity and ability of the underlying theory to unify our understanding of high-dimensional computing where conventional methods fail. The plenty of application oriented problems are presented for evaluating, monitoring and maintaining the stability of adaptive learning machine. Author has taken care to cover the breadth and depth of the subject, both in the qualitative as well as quantitative way. The book is intended to enlighten the scientific community, ranging from advanced undergraduates to engineers, scientists and seasoned researchers in computational intelligence.
This book provides comprehensive coverage of neural networks, their evolution, their structure, the problems they can solve, and their applications. The first half of the book looks at theoretical investigations on artificial neural networks and addresses the key architectures that are capable of implementation in various application scenarios. The second half is designed specifically for the production of solutions using artificial neural networks to solve practical problems arising from different areas of knowledge. It also describes the various implementation details that were taken into account to achieve the reported results. These aspects contribute to the maturation and improvement of experimental techniques to specify the neural network architecture that is most appropriate for a particular application scope. The book is appropriate for students in graduate and upper undergraduate courses in addition to researchers and professionals.
Presents original method of enhanced ant colony optimization in feature selection, based on mathematical experiments and modelling. Provides a theoretical concept in iris features searching and detection as part of feature extraction process. Demonstrates the iris features selection and detection using the proposed design methodology with enhanced ant colony optimization for iris recognition.
This book addresses biometrics from a biomedical engineering point of view. Divided into five sections, it discusses topics including the influence of pathologies on various biometric modalities (e.g. face, iris, fingerprint), medical and security biometrics, behavioural biometrics, instrumentation, wearable technologies and imaging. The final chapters also present a number of case studies. The book is suitable for advanced graduate and postgraduate students, engineers and researchers, especially those in signal and image processing, biometrics, and biomedical engineering.
Plan recognition, activity recognition, and intent recognition together combine and unify techniques from user modeling, machine vision, intelligent user interfaces, human/computer interaction, autonomous and multi-agent systems, natural language understanding, and machine learning. " Plan, Activity, and Intent Recognition" explains the crucial role of these techniques in a wide variety of applications including: personal agent assistants computer and network security opponent
modeling in games and simulation systems coordination in robots and
software agents web e-commerce and collaborative filtering dialog
modeling video surveillance smart homes In this book, follow the
history of this research area and witness exciting new developments
in the field made possible by improved sensors, increased
computational power, and new application areas.
Information theory has proved to be effective for solving many computer vision and pattern recognition (CVPR) problems (such as image matching, clustering and segmentation, saliency detection, feature selection, optimal classifier design and many others). Nowadays, researchers are widely bringing information theory elements to the CVPR arena. Among these elements there are measures (entropy, mutual information...), principles (maximum entropy, minimax entropy...) and theories (rate distortion theory, method of types...). This book explores and introduces the latter elements through an incremental complexity approach at the same time where CVPR problems are formulated and the most representative algorithms are presented. Interesting connections between information theory principles when applied to different problems are highlighted, seeking a comprehensive research roadmap. The result is a novel tool both for CVPR and machine learning researchers, and contributes to a cross-fertilization of both areas.
This book discusses recent advances in wearable technologies and personal monitoring devices, covering topics such as skin contact-based wearables (electrodes), non-contact wearables, the Internet of things (IoT), and signal processing for wearable devices. Although it chiefly focuses on wearable devices and provides comprehensive descriptions of all the core principles of personal monitoring devices, the book also features a section on devices that are embedded in smart appliances/furniture, e.g. chairs, which, despite their limitations, have taken the concept of unobtrusiveness to the next level. Wearable and personal devices are the key to precision medicine, and the medical community is finally exploring the opportunities offered by long-term monitoring of physiological parameters that are collected during day-to-day life without the bias imposed by the clinical environment. Such data offers a prime view of individuals' physical condition, as well as the efficacy of therapy and occurrence of events. Offering an in-depth analysis of the latest advances in smart and pervasive wearable devices, particularly those that are unobtrusive and invisible, and addressing topics not covered elsewhere, the book will appeal to medical practitioners and engineers alike.
This book provides a framework for robust and novel biometric techniques, along with implementation and design strategies. The theory, principles, pragmatic and modern methods, and future directions of biometrics are presented, along with in-depth coverage of biometric applications in driverless cars, automated and AI-based systems, IoT, and wearable devices. Additional coverage includes computer vision and pattern recognition, cybersecurity, cognitive computing, soft biometrics, and the social impact of biometric technology. The book will be a valuable reference for researchers, faculty, and practicing professionals working in biometrics and related fields, such as image processing, computer vision, and artificial intelligence. Highlights robust and novel biometrics techniques Provides implementation strategies and future research directions in the field of biometrics Includes case studies and emerging applications
This unique text/reference presents a unified approach to the formulation of Gestalt laws for perceptual grouping, and the construction of nested hierarchies by aggregation utilizing these laws. The book also describes the extraction of such constructions from noisy images showing man-made objects and clutter. Each Gestalt operation is introduced in a separate, self-contained chapter, together with application examples and a brief literature review. These are then brought together in an algebraic closure chapter, followed by chapters that connect the method to the data - i.e., the extraction of primitives from images, cooperation with machine-readable knowledge, and cooperation with machine learning. Topics and features: offers the first unified approach to nested hierarchical perceptual grouping; presents a review of all relevant Gestalt laws in a single source; covers reflection symmetry, frieze symmetry, rotational symmetry, parallelism and rectangular settings, contour prolongation, and lattices; describes the problem from all theoretical viewpoints, including syntactic, probabilistic, and algebraic perspectives; discusses issues important to practical application, such as primitive extraction and any-time search; provides an appendix detailing a general adjustment model with constraints. This work offers new insights and proposes novel methods to advance the field of machine vision, which will be of great benefit to students, researchers, and engineers active in this area.
Biometrics, the science of using physical traits to identify individuals, is playing an increasing role in our security-conscious society and across the globe. Biometric authentication, or bioauthentication, systems are being used to secure everything from amusement parks to bank accounts to military installations. Yet developments in this field have not been matched by an equivalent improvement in the statistical methods for evaluating these systems. Compensating for this need, this unique text/reference provides a basic statistical methodology for practitioners and testers of bioauthentication devices, supplying a set of rigorous statistical methods for evaluating biometric authentication systems. This framework of methods can be extended and generalized for a wide range of applications and tests. This is the first single resource on statistical methods for estimation and comparison of the performance of biometric authentication systems. The book focuses on six common performance metrics: for each metric, statistical methods are derived for a single system that incorporates confidence intervals, hypothesis tests, sample size calculations, power calculations and prediction intervals. These methods are also extended to allow for the statistical comparison and evaluation of multiple systems for both independent and paired data. Topics and features: * Provides a statistical methodology for the most common biometric performance metrics: failure to enroll (FTE), failure to acquire (FTA), false non-match rate (FNMR), false match rate (FMR), and receiver operating characteristic (ROC) curves * Presents methods for the comparison of two or more biometric performance metrics * Introduces a new bootstrap methodology for FMR and ROC curve estimation * Supplies more than 120 examples, using publicly available biometric data where possible * Discusses the addition of prediction intervals to the bioauthentication statistical toolset * Describes sample-size and power calculations for FTE, FTA, FNMR and FMR Researchers, managers and decisions makers needing to compare biometric systems across a variety of metrics will find within this reference an invaluable set of statistical tools. Written for an upper-level undergraduate or master's level audience with a quantitative background, readers are also expected to have an understanding of the topics in a typical undergraduate statistics course. Dr. Michael E. Schuckers is Associate Professor of Statistics at St. Lawrence University, Canton, NY, and a member of the Center for Identification Technology Research.
Dynamic Fuzzy Pattern Recognition with Applications to Finance and Engineering focuses on fuzzy clustering methods which have proven to be very powerful in pattern recognition and considers the entire process of dynamic pattern recognition. This book sets a general framework for Dynamic Pattern Recognition, describing in detail the monitoring process using fuzzy tools and the adaptation process in which the classifiers have to be adapted, using the observations of the dynamic process. It then focuses on the problem of a changing cluster structure (new clusters, merging of clusters, splitting of clusters and the detection of gradual changes in the cluster structure). Finally, the book integrates these parts into a complete algorithm for dynamic fuzzy classifier design and classification.
In today's security-conscious society, real-world applications for authentication or identification require a highly accurate system for recognizing individual humans. The required level of performance cannot be achieved through the use of a single biometric such as face, fingerprint, ear, iris, palm, gait or speech. Fusing multiple biometrics enables the indexing of large databases, more robust performance and enhanced coverage of populations. Multiple biometrics are also naturally more robust against attacks than single biometrics. This book addresses a broad spectrum of research issues on multibiometrics for human identification, ranging from sensing modes and modalities to fusion of biometric samples and combination of algorithms. It covers publicly available multibiometrics databases, theoretical and empirical studies on sensor fusion techniques in the context of biometrics authentication, identification and performance evaluation and prediction.
The book is a collection of invited chapters by experts in Chinese document and text processing, and is part of a series on Language Processing, Pattern Recognition, and Intelligent Systems. The chapters introduce the latest advances and state-of-the-art methods for Chinese document image analysis and recognition, font design, text analysis and speaker recognition. Handwritten Chinese character recognition and text line recognition are at the core of document image analysis (DIA), and therefore, are addressed in four chapters for different scripts (online characters, offline characters, ancient characters, and text lines). Two chapters on character recognition pay much attention to deep convolutional neural networks (CNNs), which are widely used and performing superiorly in various pattern recognition problems. A chapter is contributed to describe a large handwriting database consisting both online and offline characters and text pages. Postal mail reading and writer identification, addressed in two chapters, are important applications of DIA. The collection can serve as reference for students and engineers in Chinese document and text processing and their applications.
"This book guides you in the journey of 3D modeling from the theory with elegant mathematics to applications with beautiful 3D model pictures. Written in a simple, straightforward, and concise manner, readers will learn the state of the art of 3D reconstruction and modeling." -Professor Takeo Kanade, Carnegie Mellon University The computer vision and graphics communities use different terminologies for the same ideas. This book provides a translation, enabling graphics researchers to apply vision concepts, and vice-versa, independence of chapters allows readers to directly jump into a specific chapter of interest, compared to other texts, gives more succinct treatment overall, and focuses primarily on vision geometry. Image-Based Modeling is for graduate students, researchers, and engineers working in the areas of computer vision, computer graphics, image processing, robotics, virtual reality, and photogrammetry.
Evolutionary computation is becoming increasingly important for computer vision and pattern recognition and provides a systematic way of synthesis and analysis of object detection and pattern recognition systems. Incorporating learning into recognition systems will enable these systems to automatically select a good subset of features according to the type of objects and images to which they are applied. This unique monograph investigates evolutionary computational techniques---genetic programming, linear genetic programming, coevolutionary genetic programming and genetic algorithms---to automate the synthesis and analysis of object detection and recognition systems. Researchers, professionals, engineers, and students working in computer vision, pattern recognition, target recognition, machine learning, evolutionary learning, image processing, knowledge discovery and data mining, cybernetics, robotics, automation and psychology will find this well-developed and organized volume an invaluable resource.
Introduction to Pattern Recognition: A Matlab Approach is an accompanying manual to Theodoridis/Koutroumbas' Pattern Recognition. It includes Matlab code of the most common methods and algorithms in the book, together with a descriptive summary and solved examples, and including real-life data sets in imaging and audio recognition. This text is designed for electronic engineering, computer science, computer engineering, biomedical engineering and applied mathematics students taking graduate courses on pattern recognition and machine learning as well as R&D engineers and university researchers in image and signal processing/analyisis, and computer vision.
It has become a truism that the frozen optical diagram representation of vision is the worst possible picture of the way in which we visually interact with the environment. Even apart from our reaction to moving targets by pursuit movements, our visual behaviour can be said to be characterised by eye movements. We sample from our environment in a series of relatively brief fixations which move from one point to another in a series of extremely rapid jerks known as saccades. Many questions arising from this characteristic of vision are explored within this volume, including the question of how our visual world maintains its perceptual stability despite the drastic changes in input associated with these eye movements.
The 2nd edition is an update of the book Wavelet Theory and its Application to Pattern Recognition published in 2000. Three new chapters, which are research results conducted during 2001-2008, are added. The book consists of three parts - the first presents a brief survey of the status of pattern recognition with wavelet theory; the second contains the basic theory of wavelet analysis; the third includes applications of wavelet theory to pattern recognition. The new book provides a bibliography of 170 references including the current state-of-the-art theory and applications of wavelet analysis to pattern recognition.
Due to the fast growth of the Web and the difficulties in finding desired information, efficient and effective information retrieval systems have become more important than ever, and the search engine has become an essential tool for many people. The ranker, a central component in every search engine, is responsible for the matching between processed queries and indexed documents. Because of its central role, great attention has been paid to the research and development of ranking technologies. In addition, ranking is also pivotal for many other information retrieval applications, such as collaborative filtering, definition ranking, question answering, multimedia retrieval, text summarization, and online advertisement. Leveraging machine learning technologies in the ranking process has led to innovative and more effective ranking models, and eventually to a completely new research area called "learning to rank." Liu first gives a comprehensive review of the major approaches to learning to rank. For each approach he presents the basic framework, with example algorithms, and he discusses its advantages and disadvantages. He continues with some recent advances in learning to rank that cannot be simply categorized into the three major approaches - these include relational ranking, query-dependent ranking, transfer ranking, and semisupervised ranking. His presentation is completed by several examples that apply these technologies to solve real information retrieval problems, and by theoretical discussions on guarantees for ranking performance. This book is written for researchers and graduate students in both information retrieval and machine learning. They will find here the only comprehensive description of the state of the art in a field that has driven the recent advances in search engine development.
This book equips readers to handle complex multi-view data representation, centered around several major visual applications, sharing many tips and insights through a unified learning framework. This framework is able to model most existing multi-view learning and domain adaptation, enriching readers' understanding from their similarity, and differences based on data organization and problem settings, as well as the research goal. A comprehensive review exhaustively provides the key recent research on multi-view data analysis, i.e., multi-view clustering, multi-view classification, zero-shot learning, and domain adaption. More practical challenges in multi-view data analysis are discussed including incomplete, unbalanced and large-scale multi-view learning. Learning Representation for Multi-View Data Analysis covers a wide range of applications in the research fields of big data, human-centered computing, pattern recognition, digital marketing, web mining, and computer vision.
There is much interest in the use of biometrics for verification, identification, and "screening" applications, collectively called biometric authentication. This interest has been heightened because of the threat of terrorism. Biometric authentication systems offer advantages over systems based on knowledge or possession such as unsupervised (legacy) authentication systems based on password/PIN and supervised (legacy) authentication systems based on driver's licences and passports. The most important advantage is increased security: when a person is authenticated based on a biometric, the probability that this person is the originally enrolled person can be statistically estimated or computed in some other way. When a person is authenticated based on a password or even based on human observation, no such probabilities can be determined. Of course, the mere capability to compute this probability is not sufficient, what is needed is that the probability of correct authentication is high and the error probabilities are low. Achieving this probabilistic linking by introducing biometrics in authentication systems brings along many design choices and may introduce additional security loopholes. "Biometrics" examines the many aspects of biometric applications that are an issue even before a particular biometrics has been selected. In addition, the book further studies many issues that are associated with the currently popular biometric identifiers, namely, finger, face, voice, iris, hand (geometry) and signature.
This book seeks to comprehensively address the face recognition problem while gaining new insights from complementary fields of endeavor. These include neurosciences, statistics, signal and image processing, computer vision, machine learning and data mining. The book examines the evolution of research surrounding the field to date, explores new directions, and offers specific guidance on the most promising venues for future research and development. The book's focused approach and its clarity of presentation make this an excellent reference work.
This unique compendium presents the major methods of recognition and learning used in syntactic pattern recognition from the 1960s till 2018. Each method is introduced firstly in a formal way. Then, it is explained with the help of examples and its algorithms are described in a pseudocode. The survey of the applications contains more than 1,000 sources published since the 1960s. The open problems in the field, the challenges and the determinants of the future development of syntactic pattern recognition are discussed.This must-have volume provides a good read and serves as an excellent source of reference materials for researchers, academics, and postgraduate students in the fields of pattern recognition, machine perception, computer vision and artificial intelligence. |
![]() ![]() You may like...
Handbook of Medical Image Computing and…
S. Kevin Zhou, Daniel Rueckert, …
Hardcover
Deep Learning - Research and…
Siddhartha Bhattacharyya, Vaclav Snasel, …
Hardcover
R4,094
Discovery Miles 40 940
Android Malware Detection using Machine…
ElMouatez Billah Karbab, Mourad Debbabi, …
Hardcover
R4,922
Discovery Miles 49 220
Biometric Security and Privacy…
Richard Jiang, Somaya Al-Maadeed, …
Hardcover
R5,137
Discovery Miles 51 370
Analyzing Emotion in Spontaneous Speech
Rupayan Chakraborty, Meghna Pandharipande, …
Hardcover
R1,521
Discovery Miles 15 210
Dark Web Pattern Recognition and Crime…
Romil Rawat, Vinod Mahor, …
Hardcover
R6,734
Discovery Miles 67 340
Computer Models for Facial Beauty…
David Zhang, Fangmei Chen, …
Hardcover
3D Point Cloud Analysis - Traditional…
Shan Liu, Min Zhang, …
Hardcover
R3,357
Discovery Miles 33 570
|