![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Pattern recognition
This book discusses opportunities for broadcasters that arise with the advent of broadband networks, both fixed and mobile. It discusses how the traditional way of distributing audio-visual content over broadcasting networks has been complemented by the usage of broadband networks. The author shows how this also gives the possibility to offer new types of interactive or so-called nonlinear services. The book illustrates how change in distribution technology is accelerating the need for broadcasters around the world to adapt their content distribution strategy and how it will impact the portfolios of content they offer.
This text presents an overview of smart information systems for both the private and public sector, highlighting the research questions that can be studied by applying computational intelligence. The book demonstrates how to transform raw data into effective smart information services, covering the challenges and potential of this approach. Each chapter describes the algorithms, tools, measures and evaluations used to answer important questions. This is then further illustrated by a diverse selection of case studies reflecting genuine problems faced by SMEs, multinational manufacturers, service companies, and the public sector. Features: provides a state-of-the-art introduction to the field, integrating contributions from both academia and industry; reviews novel information aggregation services; discusses personalization and recommendation systems; examines sensor-based knowledge acquisition services, describing how the analysis of sensor data can be used to provide a clear picture of our world.
Current speech recognition systems are based on speaker independent speech models and suffer from inter-speaker variations in speech signal characteristics. This work develops an integrated approach for speech and speaker recognition in order to gain space for self-learning opportunities of the system. This work introduces a reliable speaker identification which enables the speech recognizer to create robust speaker dependent models In addition, this book gives a new approach to solve the reverse problem, how to improve speech recognition if speakers can be recognized. The speaker identification enables the speaker adaptation to adapt to different speakers which results in an optimal long-term adaptation.
Many important planning decisions in society and business depend on proper knowledge and a correct understanding of movement, be it in transportation, logistics, biology, or the life sciences. Today the widespread use of mobile phones and technologies like GPS and RFID provides an immense amount of data on location and movement. What is needed are new methods of visualization and algorithmic data analysis that are tightly integrated and complement each other to allow end-users and analysts to extract useful knowledge from these extremely large data volumes. This is exactly the topic of this book. As the authors show, modern visual analytics techniques are ready to tackle the enormous challenges brought about by movement data, and the technology and software needed to exploit them are available today. The authors start by illustrating the different kinds of data available to describe movement, from individual trajectories of single objects to multiple trajectories of many objects, and then proceed to detail a conceptual framework, which provides the basis for a fundamental understanding of movement data. With this basis, they move on to more practical and technical aspects, focusing on how to transform movement data to make it more useful, and on the infrastructure necessary for performing visual analytics in practice. In so doing they demonstrate that visual analytics of movement data can yield exciting insights into the behavior of moving persons and objects, but can also lead to an understanding of the events that transpire when things move. Throughout the book, they use sample applications from various domains and illustrate the examples with graphical depictions of both the interactive displays and the analysis results. In summary, readers will benefit from this detailed description of the state of the art in visual analytics in various ways. Researchers will appreciate the scientific precision involved, software technologists will find essential information on algorithms and systems, and practitioners will profit from readily accessible examples with detailed illustrations for practical purposes.
This volume offers a guide to the state of the art in the fast evolving field of biometric recognition to newcomers and experienced practitioners. It is focused on the emerging strategies to perform biometric recognition under uncontrolled data acquisition conditions. The mainstream research work in this field is presented in an organized manner, so the reader can easily follow the trends that best suits her/his interests in this growing field. The book chapters cover the recent advances in less controlled / covert data acquisition frameworks, segmentation of poor quality biometric data, biometric data quality assessment, normalization of poor quality biometric data. contactless biometric recognition strategies, biometric recognition robustness, data resolution, illumination, distance, pose, motion, occlusions, multispectral biometric recognition, multimodal biometrics, fusion at different levels, high confidence automatic surveillance.
Computer Vision and Pattern Recognition (CVPR) together play an important role in the processes involved in environmental informatics due to their pervasive, non-destructive, effective, and efficient natures. As a result, CVPR has made significant contributions to the field of environmental informatics by enabling multi-modal data fusion and feature extraction, supporting fast and reliable object detection and classification, and mining the intrinsic relationship between different aspects of environmental data. Computer Vision and Pattern Recognition in Environmental Informatics describes a number of methods and tools for image interpretation and analysis, which enables observation, modelling, and understanding of environmental targets. In addition to case studies on monitoring and modeling plant, soil, insect, and aquatic animals, this publication includes discussions on innovative new ideas related to environmental monitoring, automatic fish segmentation and recognition, real-time motion tracking systems, sparse coding and decision fusion, and cell phone image-based classification and provides useful references for professionals, researchers, engineers, and students with various backgrounds within a multitude of communities.
This book presents a comprehensive overview of the basics of Hindustani music and the associated signal analysis and technological developments. It begins with an in-depth introduction to musical signal analysis and its current applications, and then moves on to a detailed discussion of the features involved in understanding the musical meaning of the signal in the context of Hindustani music. The components consist of tones, shruti, scales, pitch duration and stability, raga, gharana and musical instruments. The book covers the various technological developments in this field, supplemented with a number of case studies and their analysis. The book offers new music researchers essential insights into the use the automatic concept for finding and testing the musical features for their applications. Intended primarily for postgraduate and PhD students working in the area of scientific research on Hindustani music, as well as other genres where the concepts are applicable, it is also a valuable resource for professionals and researchers in musical signal processing.
This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several software fingerprinting techniques for cybersecurity applications, such as malware detection, vulnerability analysis, and digital forensics. More specifically, it starts with an overview of binary code analysis and its challenges, and then discusses the existing state-of-the-art approaches and their cybersecurity applications. Furthermore, it discusses and details a set of practical techniques for compiler provenance extraction, library function identification, function fingerprinting, code reuse detection, free open-source software identification, vulnerability search, and authorship attribution. It also illustrates several case studies to demonstrate the efficiency, scalability and accuracy of the above-mentioned proposed techniques and tools. This book also introduces several innovative quantitative and qualitative techniques that synergistically leverage machine learning, program analysis, and software engineering methods to solve binary code fingerprinting problems, which are highly relevant to cybersecurity and digital forensics applications. The above-mentioned techniques are cautiously designed to gain satisfactory levels of efficiency and accuracy. Researchers working in academia, industry and governmental agencies focusing on Cybersecurity will want to purchase this book. Software engineers and advanced-level students studying computer science, computer engineering and software engineering will also want to purchase this book.
A guide on the use of SVMs in pattern classification, including a rigorous performance comparison of classifiers and regressors. The book presents architectures for multiclass classification and function approximation problems, as well as evaluation criteria for classifiers and regressors. Features: Clarifies the characteristics of two-class SVMs; Discusses kernel methods for improving the generalization ability of neural networks and fuzzy systems; Contains ample illustrations and examples; Includes performance evaluation using publicly available data sets; Examines Mahalanobis kernels, empirical feature space, and the effect of model selection by cross-validation; Covers sparse SVMs, learning using privileged information, semi-supervised learning, multiple classifier systems, and multiple kernel learning; Explores incremental training based batch training and active-set training methods, and decomposition techniques for linear programming SVMs; Discusses variable selection for support vector regressors.
The development of new-generation micro-manufacturing technologies and systems has revolutionised the way products are designed and manufactured today with a s- nificant impact in a number of key industrial sectors. Micro-manufacturing techno- gies are often described as disruptive, enabling and interdisciplinary leading to the creation of whole new classes of products that were previously not feasible to ma- facture. While key processes for volume manufacture of micro-parts such as mach- ing and moulding are becoming mature technologies, micro-assembly remains a key challenge for the cost-effective manufacture of complex micro-products. The ability to manufacture customizable micro-products that can be delivered in variable volumes within relatively short timescales is very much dependent on the level of development of the micro-assembly processes, positioning, alignment and measurement techniques, gripping and feeding approaches and devices. Micro-assembly has developed rapidly over the last few years and all the pred- tions are that it will remain a critical technology for high-value products in a number of key sectors such as healthcare, communications, defence and aerospace. The key challenge is to match the significant technological developments with a new gene- tion of micro-products that will establish firmly micro-assembly as a mature manuf- turing process. th The book includes the set of papers presented at the 5 International Precision - sembly Seminar IPAS 2010 held in Chamonix, France from the 14th to the 17th February 2010.
The last decade has witnessed a rapid surge of interest in new sensing and monitoring devices for wellbeing and healthcare. One key development in this area is wireless, wearable and implantable "in vivo" monitoring and intervention. A myriad of platforms are now available from both academic institutions and commercial organisations. They permit the management of patients with both acute and chronic symptoms, including diabetes, cardiovascular diseases, treatment of epilepsy and other debilitating neurological disorders. Despite extensive developments in sensing technologies, there are significant research issues related to system integration, sensor miniaturisation, low-power sensor interface, wireless telemetry and signal processing. In the 2nd edition of this popular and authoritative reference on Body Sensor Networks (BSN), major topics related to the latest technological developments and potential clinical applications are discussed, with contents covering. Biosensor Design, Interfacing and Nanotechnology Wireless Communication and Network Topologies Communication Protocols and Standards Energy Harvesting and Power Delivery Ultra-low Power Bio-inspired Processing Multi-sensor Fusion and Context Aware Sensing Autonomic Sensing Wearable, Ingestible Sensor Integration and Exemplar Applications System Integration and Wireless Sensor Microsystems The book also provides a comprehensive review of the current wireless sensor development platforms and a step-by-step guide to developing your own BSN applications through the use of BSN development kit.
The purpose of this book is to present a methodology for designing and tuning fuzzy expert systems in order to identify nonlinear objects; that is, to build input-output models using expert and experimental information. The results of these identifications are used for direct and inverse fuzzy evidence in forecasting and diagnosis problem solving. The book is organised as follows: Chapter 1 presents the basic knowledge about fuzzy sets, genetic algorithms and neural nets necessary for a clear understanding of the rest of this book. Chapter 2 analyzes direct fuzzy inference based on fuzzy if-then rules. Chapter 3 is devoted to the tuning of fuzzy rules for direct inference using genetic algorithms and neural nets. Chapter 4 presents models and algorithms for extracting fuzzy rules from experimental data. Chapter 5 describes a method for solving fuzzy logic equations necessary for the inverse fuzzy inference in diagnostic systems. Chapters 6 and 7 are devoted to inverse fuzzy inference based on fuzzy relations and fuzzy rules. Chapter 8 presents a method for extracting fuzzy relations from data. All the algorithms presented in Chapters 2-8 are validated by computer experiments and illustrated by solving medical and technical forecasting and diagnosis problems. Finally, Chapter 9 includes applications of the proposed methodology in dynamic and inventory control systems, prediction of results of football games, decision making in road accident investigations, project management and reliability analysis.
This interdisciplinary volume presents a detailed overview of the latest advances and challenges remaining in the field of adaptive biometric systems. A broad range of techniques are provided from an international selection of pre-eminent authorities, collected together under a unified taxonomy and designed to be applicable to any pattern recognition system. Features: presents a thorough introduction to the concept of adaptive biometric systems; reviews systems for adaptive face recognition that perform self-updating of facial models using operational (unlabeled) data; describes a novel semi-supervised training strategy known as fusion-based co-training; examines the characterization and recognition of human gestures in videos; discusses a selection of learning techniques that can be applied to build an adaptive biometric system; investigates procedures for handling temporal variance in facial biometrics due to aging; proposes a score-level fusion scheme for an adaptive multimodal biometric system.
This monograph describes the latest advances in discriminative learning methods for biometric recognition. Specifically, it focuses on three representative categories of methods: sparse representation-based classification, metric learning, and discriminative feature representation, together with their applications in palmprint authentication, face recognition and multi-biometrics. The ideas, algorithms, experimental evaluation and underlying rationales are also provided for a better understanding of these methods. Lastly, it discusses several promising research directions in the field of discriminative biometric recognition.
This book provides a comprehensive overview of the field of pattern mining with evolutionary algorithms. To do so, it covers formal definitions about patterns, patterns mining, type of patterns and the usefulness of patterns in the knowledge discovery process. As it is described within the book, the discovery process suffers from both high runtime and memory requirements, especially when high dimensional datasets are analyzed. To solve this issue, many pruning strategies have been developed. Nevertheless, with the growing interest in the storage of information, more and more datasets comprise such a dimensionality that the discovery of interesting patterns becomes a challenging process. In this regard, the use of evolutionary algorithms for mining pattern enables the computation capacity to be reduced, providing sufficiently good solutions. This book offers a survey on evolutionary computation with particular emphasis on genetic algorithms and genetic programming. Also included is an analysis of the set of quality measures most widely used in the field of pattern mining with evolutionary algorithms. This book serves as a review of the most important evolutionary algorithms for pattern mining. It considers the analysis of different algorithms for mining different type of patterns and relationships between patterns, such as frequent patterns, infrequent patterns, patterns defined in a continuous domain, or even positive and negative patterns. A completely new problem in the pattern mining field, mining of exceptional relationships between patterns, is discussed. In this problem the goal is to identify patterns which distribution is exceptionally different from the distribution in the complete set of data records. Finally, the book deals with the subgroup discovery task, a method to identify a subgroup of interesting patterns that is related to a dependent variable or target attribute. This subgroup of patterns satisfies two essential conditions: interpretability and interestingness.
This book presents the use of efficient Evolutionary Computation (EC) algorithms for solving diverse real-world image processing and pattern recognition problems. It provides an overview of the different aspects of evolutionary methods in order to enable the reader in reaching a global understanding of the field and, in conducting studies on specific evolutionary techniques that are related to applications in image processing and pattern recognition. It explains the basic ideas of the proposed applications in a way that can also be understood by readers outside of the field. Image processing and pattern recognition practitioners who are not evolutionary computation researchers will appreciate the discussed techniques beyond simple theoretical tools since they have been adapted to solve significant problems that commonly arise on such areas. On the other hand, members of the evolutionary computation community can learn the way in which image processing and pattern recognition problems can be translated into an optimization task. The book has been structured so that each chapter can be read independently from the others. It can serve as reference book for students and researchers with basic knowledge in image processing and EC methods.
This book describes the latest advances in pulse signal analysis and their applications in classification and diagnosis. First, it provides a comprehensive introduction to useful techniques for pulse signal acquisition based on different kinds of pulse sensors together with the optimized acquisition scheme. It then presents a number of preprocessing and feature extraction methods, as well as case studies of the classification methods used. Lastly it discusses some promising directions for the future study and clinical applications of pulse signal analysis. The book is a valuable resource for researchers, professionals and postgraduate students working in the field of pulse diagnosis, signal processing, pattern recognition and biometrics. It is also useful for those involved in interdisciplinary research.
This volume features key contributions from the International Conference on Pattern Recognition Applications and Methods, (ICPRAM 2012,) held in Vilamoura, Algarve, Portugal from February 6th-8th, 2012. The conference provided a major point of collaboration between researchers, engineers and practitioners in the areas of Pattern Recognition, both from theoretical and applied perspectives, with a focus on mathematical methodologies. Contributions describe applications of pattern recognition techniques to real-world problems, interdisciplinary research, and experimental and theoretical studies which yield new insights that provide key advances in the field. This book will be suitable for scientists and researchers in optimization, numerical methods, computer science, statistics and for differential geometers and mathematical physicists.
This book presents the state-of-the-art in face detection and analysis. It outlines new research directions, including in particular psychology-based facial dynamics recognition, aimed at various applications such as behavior analysis, deception detection, and diagnosis of various psychological disorders. Topics of interest include face and facial landmark detection, face recognition, facial expression and emotion analysis, facial dynamics analysis, face classification, identification, and clustering, and gaze direction and head pose estimation, as well as applications of face analysis.
This book examines the context, motivation and current status of biometric systems based on the palmprint, with a specific focus on touchless and less-constrained systems. It covers new technologies in this rapidly evolving field and is one of the first comprehensive books on palmprint recognition systems. It discusses the research literature and the most relevant industrial applications of palmprint biometrics, including the low-cost solutions based on webcams. The steps of biometric recognition are described in detail, including acquisition setups, algorithms, and evaluation procedures. Constraints and limitations of current palmprint recognition systems are analyzed and discussed. The authors also introduce innovative methods for touchless and less-constrained palmprint recognition, with the aim to make palmprint biometrics easier to use in practical, daily-life applications, and overcome the typical constraints and limitations described. Touchless Palmprint Recognition Systems targets professionals and researchers working in biometrics, image processing and three-dimensional reconstruction. Advanced-level students studying biometrics and computer science will also find this material valuable as a secondary text book or reference.
The book offers a comprehensive survey of soft-computing models for optical character recognition systems. The various techniques, including fuzzy and rough sets, artificial neural networks and genetic algorithms, are tested using real texts written in different languages, such as English, French, German, Latin, Hindi and Gujrati, which have been extracted by publicly available datasets. The simulation studies, which are reported in details here, show that soft-computing based modeling of OCR systems performs consistently better than traditional models. Mainly intended as state-of-the-art survey for postgraduates and researchers in pattern recognition, optical character recognition and soft computing, this book will be useful for professionals in computer vision and image processing alike, dealing with different issues related to optical character recognition.
This book summarizes the organized competitions held during the first NIPS competition track. It provides both theory and applications of hot topics in machine learning, such as adversarial learning, conversational intelligence, and deep reinforcement learning. Rigorous competition evaluation was based on the quality of data, problem interest and impact, promoting the design of new models, and a proper schedule and management procedure. This book contains the chapters from organizers on competition design and from top-ranked participants on their proposed solutions for the five accepted competitions: The Conversational Intelligence Challenge, Classifying Clinically Actionable Genetic Mutations, Learning to Run, Human-Computer Question Answering Competition, and Adversarial Attacks and Defenses.
This book offers several new GP approaches to feature learning for image classification. Image classification is an important task in computer vision and machine learning with a wide range of applications. Feature learning is a fundamental step in image classification, but it is difficult due to the high variations of images. Genetic Programming (GP) is an evolutionary computation technique that can automatically evolve computer programs to solve any given problem. This is an important research field of GP and image classification. No book has been published in this field. This book shows how different techniques, e.g., image operators, ensembles, and surrogate, are proposed and employed to improve the accuracy and/or computational efficiency of GP for image classification. The proposed methods are applied to many different image classification tasks, and the effectiveness and interpretability of the learned models will be demonstrated. This book is suitable as a graduate and postgraduate level textbook in artificial intelligence, machine learning, computer vision, and evolutionary computation.
Based on more than 10 years of teaching experience, Blanken and his coeditors have assembled all the topics that should be covered in advanced undergraduate or graduate courses on multimedia retrieval and multimedia databases. The single chapters of this textbook explain the general architecture of multimedia information retrieval systems and cover various metadata languages such as Dublin Core, RDF, or MPEG. The authors emphasize high-level features and show how these are used in mathematical models to support the retrieval process. For each chapter, there 's detail on further reading, and additional exercises and teaching material is available online.
"Iris Biometrics: From Segmentation to Template Security" provides critical analysis, challenges and solutions on recent iris biometric research topics, including image segmentation, image compression, watermarking, advanced comparators, template protection and more. Open source software is also provided on a dedicated website which includes feature extraction, segmentation and matching schemes applied in this book to foster scientific exchange. Current state-of-the-art approaches accompanied by comprehensive experimental evaluations are presented as well. This book has been designed as a secondary text book or reference for researchers and advanced-level students in computer science and electrical engineering. Professionals working in this related field will also find this book useful as a reference. |
![]() ![]() You may like...
Women-in-Law - Explorations in Law…
Julia Brophy, Carol Smart
Hardcover
R2,937
Discovery Miles 29 370
Notes Expository and Critical on Certain…
Simon Somerville Laurie
Paperback
R445
Discovery Miles 4 450
Media ethics in South African context…
Lucas M. Oosthuizen
Paperback
![]()
Shared Pedagogical Responsibility
Hans Van Crombrugge, Wouter Vandenhole, …
Paperback
R997
Discovery Miles 9 970
This I Believe: - Philadelphia
Dan Gediman, Mary Jo Gediman
Paperback
South African Family Law
Jacqueline Heaton, Hanneretha Kruger
Paperback
|