![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Pattern recognition
Automatic personal authentication using biometric information is becoming more essential in applications of public security, access control, forensics, banking, etc. Many kinds of biometric authentication techniques have been developed based on different biometric characteristics. However, most of the physical biometric recognition techniques are based on two dimensional (2D) images, despite the fact that human characteristics are three dimensional (3D) surfaces. Recently, 3D techniques have been applied to biometric applications such as 3D face, 3D palmprint, 3D fingerprint, and 3D ear recognition. This book introduces four typical 3D imaging methods, and presents some case studies in the field of 3D biometrics. This book also includes many efficient 3D feature extraction, matching, and fusion algorithms. These 3D imaging methods and their applications are given as follows: - Single view imaging with line structured-light: 3D ear identification - Single view imaging with multi-line structured-light: 3D palmprint authentication - Single view imaging using only 3D camera: 3D hand verification - Multi-view imaging: 3D fingerprint recognition 3D Biometrics: Systems and Applications is a comprehensive introduction to both theoretical issues and practical implementation in 3D biometric authentication. It will serve as a textbook or as a useful reference for graduate students and researchers in the fields of computer science, electrical engineering, systems science, and information technology. Researchers and practitioners in industry and R&D laboratories working on security system design, biometrics, immigration, law enforcement, control, and pattern recognition will also find much of interest in this book.
This book constitutes the refereed proceedings of the 9th Chinese Conference on Biometric Recognition, CCBR 2014, held in Shenyang, China, in November 2014. The 60 revised full papers presented were carefully reviewed and selected from among 90 submissions. The papers focus on face, fingerprint and palmprint, vein biometrics, iris and ocular biometrics, behavioral biometrics, application and system of biometrics, multi-biometrics and information fusion, other biometric recognition and processing.
A natural evolution of statistical signal processing, in connection with the progressive increase in computational power, has been exploiting higher-order information. Thus, high-order spectral analysis and nonlinear adaptive filtering have received the attention of many researchers. One of the most successful techniques for non-linear processing of data with complex non-Gaussian distributions is the independent component analysis mixture modelling (ICAMM). This thesis defines a novel formalism for pattern recognition and classification based on ICAMM, which unifies a certain number of pattern recognition tasks allowing generalization. The versatile and powerful framework developed in this work can deal with data obtained from quite different areas, such as image processing, impact-echo testing, cultural heritage, hypnograms analysis, web-mining and might therefore be employed to solve many different real-world problems.
This book constitutes the refereed proceedings of the 6th International Symposium on Search-Based Software Engineering, SSBSE 2014, held in Fortaleza, Brazil. The 14 revised full papers presented together with 2 keynote addresses, 1 invited talk, 1 short paper, 3 papers of the graduate track, and 4 challenge track papers were carefully reviewed and selected from 51 submissions. Search Based Software Engineering (SBSE) studies the application of meta-heuristic optimization techniques to various software engineering problems, ranging from requirements engineering to software testing and maintenance.
This book constitutes the refereed proceedings of the 10th International Symposium on Bioinformatics Research and Applications, ISBRA 2014, held in Zhangjiajie, China, in June 2014. The 33 revised full papers and 31 one-page abstracts included in this volume were carefully reviewed and selected from 119 submissions. The papers cover a wide range of topics in bioinformatics and computational biology and their applications including the development of experimental or commercial systems.
This book constitutes the refereed proceedings of the 7th International Conference on Artificial General Intelligence, AGI 2014, held in Quebec City, QC, Canada, in August 2014. The 22 papers and 8 posters were carefully reviewed and selected from 65 submissions. Researchers have recognized the necessity of returning to the original goals of the field by treating intelligence as a whole. Increasingly, there is a call for a transition back to confronting the more difficult issues of "human-level intelligence" and more broadly artificial general intelligence. AGI research differs from the ordinary AI research by stressing on the versatility and wholeness of intelligence and by carrying out the engineering practice according to an outline of a system comparable to the human mind in a certain sense. The AGI conference series has played and continues to play, a significant role in this resurgence of research on artificial intelligence in the deeper, original sense of the term of "artificial intelligence". The conferences encourage interdisciplinary research based on different understandings of intelligence and exploring different approaches.
This book comprises chapters on key problems in machine learning and signal processing arenas. The contents of the book are a result of a 2014 Workshop on Machine Intelligence and Signal Processing held at the Indraprastha Institute of Information Technology. Traditionally, signal processing and machine learning were considered to be separate areas of research. However in recent times the two communities are getting closer. In a very abstract fashion, signal processing is the study of operator design. The contributions of signal processing had been to device operators for restoration, compression, etc. Applied Mathematicians were more interested in operator analysis. Nowadays signal processing research is gravitating towards operator learning - instead of designing operators based on heuristics (for example wavelets), the trend is to learn these operators (for example dictionary learning). And thus, the gap between signal processing and machine learning is fast converging. The 2014 Workshop on Machine Intelligence and Signal Processing was one of the few unique events that are focused on the convergence of the two fields. The book is comprised of chapters based on the top presentations at the workshop. This book has three chapters on various topics of biometrics - two are on face detection and one on iris recognition; all from top researchers in their field. There are four chapters on different biomedical signal / image processing problems. Two of these are on retinal vessel classification and extraction; one on biomedical signal acquisition and the fourth one on region detection. There are three chapters on data analysis - a topic gaining immense popularity in industry and academia. One of these shows a novel use of compressed sensing in missing sales data interpolation. Another chapter is on spam detection and the third one is on simple one-shot movie rating prediction. Four other chapters cover various cutting edge miscellaneous topics on character recognition, software effort prediction, speech recognition and non-linear sparse recovery. The contents of this book will prove useful to researchers, professionals and students in the domains of machine learning and signal processing.
Fuzzy classifiers are important tools in exploratory data analysis, which is a vital set of methods used in various engineering, scientific and business applications. Fuzzy classifiers use fuzzy rules and do not require assumptions common to statistical classification. Rough set theory is useful when data sets are incomplete. It defines a formal approximation of crisp sets by providing the lower and the upper approximation of the original set. Systems based on rough sets have natural ability to work on such data and incomplete vectors do not have to be preprocessed before classification. To achieve better performance than existing machine learning systems, fuzzy classifiers and rough sets can be combined in ensembles. Such ensembles consist of a finite set of learning models, usually weak learners. The present book discusses the three aforementioned fields - fuzzy systems, rough sets and ensemble techniques. As the trained ensemble should represent a single hypothesis, a lot of attention is placed on the possibility to combine fuzzy rules from fuzzy systems being members of classification ensemble. Furthermore, an emphasis is placed on ensembles that can work on incomplete data, thanks to rough set theory. .
Biometric recognition, or simply biometrics, is the science of establishing the identity of a person based on physical or behavioral attributes. It is a rapidly evolving field with applications ranging from securely accessing one's computer to gaining entry into a country. While the deployment of large-scale biometric systems in both commercial and government applications has increased the public awareness of this technology, "Introduction to Biometrics" is the first textbook to introduce the fundamentals of Biometrics to undergraduate/graduate students. The three commonly used modalities in the biometrics field, namely, fingerprint, face, and iris are covered in detail in this book. Few other modalities like hand geometry, ear, and gait are also discussed briefly along with advanced topics such as multibiometric systems and security of biometric systems. Exercises for each chapter will be available on the book website to help students gain a better understanding of the topics and obtain practical experience in designing computer programs for biometric applications. These can be found at: http://www.csee.wvu.edu/~ross/BiometricsTextBook/. Designed for undergraduate and graduate students in computer science and electrical engineering, "Introduction to Biometrics" is also suitable for researchers and biometric and computer security professionals.
This volume constitutes the proceedings of the 9th International Conference on Hybrid Artificial Intelligent Systems, HAIS 2014, held in Salamanca, Spain, in June 2014. The 61 papers published in this volume were carefully reviewed and selected from 199 submissions. They are organized in topical sessions on HAIS applications; data mining and knowledge discovery; video and image analysis; bio-inspired models and evolutionary computation; learning algorithms; hybrid intelligent systems for data mining and applications and classification and cluster analysis.
Consumer electronics (CE) devices, providing multimedia entertainment and enabling communication, have become ubiquitous in daily life. However, consumer interaction with such equipment currently requires the use of devices such as remote controls and keyboards, which are often inconvenient, ambiguous and non-interactive. An important challenge for the modern CE industry is the design of user interfaces for CE products that enable interactions which are natural, intuitive and fun. As many CE products are supplied with microphones and cameras, the exploitation of both audio and visual information for interactive multimedia is a growing field of research. Collecting together contributions from an international selection of experts, including leading researchers in industry, this unique text presents the latest advances in applications of multimedia interaction and user interfaces for consumer electronics. Covering issues of both multimedia content analysis and human-machine interaction, the book examines a wide range of techniques from computer vision, machine learning, audio and speech processing, communications, artificial intelligence and media technology. Topics and features: introduces novel computationally efficient algorithms to extract semantically meaningful audio-visual events; investigates modality allocation in intelligent multimodal presentation systems, taking into account the cognitive impacts of modality on human information processing; provides an overview on gesture control technologies for CE; presents systems for natural human-computer interaction, virtual content insertion, and human action retrieval; examines techniques for 3D face pose estimation, physical activity recognition, and video summary quality evaluation; discusses the features that characterize the new generation of CE and examines how web services can be integrated with CE products for improved user experience. This book is an essential resource for researchers and practitioners from both academia and industry working in areas of multimedia analysis, human-computer interaction and interactive user interfaces. Graduate students studying computer vision, pattern recognition and multimedia will also find this a useful reference.
The amount of data medical databases doubles every 20 months, and physicians are at a loss to analyze them. Also, traditional data analysis has difficulty to identify outliers and patterns in big data and data with multiple exposure / outcome variables and analysis-rules for surveys and questionnaires, currently common methods of data collection, are, essentially, missing. Consequently, proper data-based health decisions will soon be impossible. Obviously, it is time that medical and health professionals mastered their reluctance to use machine learning methods and this was the main incentive for the authors to complete a series of three textbooks entitled "Machine Learning in Medicine Part One, Two and Three, Springer Heidelberg Germany, 2012-2013", describing in a nonmathematical way over sixty machine learning methodologies, as available in SPSS statistical software and other major software programs. Although well received, it came to our attention that physicians and students often lacked time to read the entire books, and requested a small book, without background information and theoretical discussions and highlighting technical details. For this reason we produced a 100 page cookbook, entitled "Machine Learning in Medicine - Cookbook One", with data examples available at extras.springer.com for self-assessment and with reference to the above textbooks for background information. Already at the completion of this cookbook we came to realize, that many essential methods were not covered. The current volume, entitled "Machine Learning in Medicine - Cookbook Two" is complementary to the first and also intended for providing a more balanced view of the field and thus, as a must-read not only for physicians and students, but also for any one involved in the process and progress of health and health care. Similarly to Machine Learning in Medicine - Cookbook One, the current work will describe stepwise analyses of over twenty machine learning methods, that are, likewise, based on the three major machine learning methodologies: Cluster methodologies (Chaps. 1-3) Linear methodologies (Chaps. 4-11) Rules methodologies (Chaps. 12-20) In extras.springer.com the data files of the examples are given, as well as XML (Extended Mark up Language), SPS (Syntax) and ZIP (compressed) files for outcome predictions in future patients. In addition to condensed versions of the methods, fully described in the above three textbooks, an introduction is given to SPSS Modeler (SPSS' data mining workbench) in the Chaps. 15, 18, 19, while improved statistical methods like various automated analyses and Monte Carlo simulation models are in the Chaps. 1, 5, 7 and 8. We should emphasize that all of the methods described have been successfully applied in practice by the authors, both of them professors in applied statistics and machine learning at the European Community College of Pharmaceutical Medicine in Lyon France. We recommend the current work not only as a training companion to investigators and students, because of plenty of step by step analyses given, but also as a brief introductory text to jaded clinicians new to the methods. For the latter purpose, background and theoretical information have been replaced with the appropriate references to the above textbooks, while single sections addressing "general purposes", "main scientific questions" and "conclusions" are given in place. Finally, we will demonstrate that modern machine learning performs sometimes better than traditional statistics does. Machine learning may have little options for adjusting confounding and interaction, but you can add propensity scores and interaction variables to almost any machine learning method.
Financial identity theft is well understood with clear underlying motives. Medical identity theft is new and presents a growing problem. The solutions to both problems however, are less clear. The Economics of Financial and Medical Identity Theft discusses how the digital networked environment is critically different from the world of paper, eyeballs and pens. Many of the effective identity protections are embedded behind the eyeballs, where the presumably passive observer is actually a fairly keen student of human behavior. The emergence of medical identity theft and the implications of medical data privacy are described in the second section of this book. The Economics of Financial and Medical Identity Theft also presents an overview of the current technology for identity management. The book closes with a series of vignettes in the last chapter, looking at the risks we may see in the future and how these risks can be mitigated or avoided.
Dialect Accent Features for Establishing Speaker Identity: A Case Study discusses the subject of forensic voice identification and speaker profiling. Specifically focusing on speaker profiling and using dialects of the Hindi language, widely used in India, the authors have contributed to the body of research on speaker identification by using accent feature as the discriminating factor. This case study contributes to the understanding of the speaker identification process in a situation where unknown speech samples are in different language/dialect than the recording of a suspect. The authors' data establishes that vowel quality, quantity, intonation and tone of a speaker as compared to Khariboli (standard Hindi) could be the potential features for identification of dialect accent.
This book constitutes the refereed proceedings of the First International Conference on Biomedical Informatics and Technology, ACBIT 2013, held in Aizu-Wakamatsu, Japan, in September 2013. The ??? revised full papers presented together with 14 keynotes and invited talks were carefully reviewed and selected from 48 submissions. The papers address important problems in medicine, biology and health using image analysis, computer vision, pattern analysis and classification, information visualization, signal processing, control theory, information theory, statistical analysis, information fusion, numerical analysis, fractals and chaos, optimization, simulation and modeling, parallel computing, computational intelligence methods, machine learning, data mining, decision support systems, database integration and management, cognitive modeling, and applied linguistics.
The classification of patterns is an important area of research which is central to all pattern recognition fields, including speech, image, robotics, and data analysis. Neural networks have been used successfully in a number of these fields, but so far their application has been based on a 'black box approach' with no real understanding of how they work. In this book, Sarunas Raudys - an internationally respected researcher in the area - provides an excellent mathematical and applied introduction to how neural network classifiers work and how they should be used.. .
This book constitutes the refereed proceedings of the 10th Chinese Conference on Advances in Image and Graphics Technologies, IGTA 2015, held in Beijing, China, in June 2015. The 50 papers presented were carefully reviewed and selected from 138 submissions. They provide a forum for sharing new aspects of the progresses in the areas of image processing technology, image analysis und understanding, computer vision and pattern recognition, big data mining, computer graphics and VR, image technology application.
The book is organized so as to address in separate sections first the preparatory topics of medicine (clinical and epidemiological), science in general, and statistics (mathematical); then topics of epidemiological research proper; and, finally, topics of 'meta-epidemiological' clinical research. In those two main sections, a further grouping is based on the distraction between objects and methods of study. In this framework, the particular topics are addressed both descriptively and quasi-prescriptively, commonly with a number of explicatory annotations. This book is intended to serve as a handbook for whomever is, in whatever way, concerned with epidemiological or 'meta-epidemiological' clinical research. But besides this, it is also intended to serve as a textbook for students in introductory courses on 'epidemiological' research - to which end there is a suggested hierarchy of the concepts that might reasonably be covered.
The LNCS journal Transactions on Rough Sets is devoted to the entire spectrum of rough sets related issues, from logical and mathematical foundations, through all aspects of rough set theory and its applications, such as data mining, knowledge discovery and intelligent information processing, to relations between rough sets and other approaches to uncertainty, vagueness, and incompleteness, such as fuzzy sets and theory of evidence. Volume XVII is a continuation of a number of research streams which have grown out of the seminal work by Zdzislaw Pawlak during the first decade of the 21st century. The research streams represented in the papers cover both theory and applications of rough, fuzzy and near sets as well as their combinations.
"Reliable Knowledge Discovery" focuses on theory, methods, and techniques for RKDD, a new sub-field of KDD. It studies the theory and methods to assure the reliability and trustworthiness of discovered knowledge and to maintain the stability and consistency of knowledge discovery processes. RKDD has a broad spectrum of applications, especially in critical domains like medicine, finance, and military. "Reliable Knowledge Discovery" also presents methods and techniques for designing robust knowledge-discovery processes. Approaches to assessing the reliability of the discovered knowledge are introduced. Particular attention is paid to methods for reliable feature selection, reliable graph discovery, reliable classification, and stream mining. Estimating the data trustworthiness is covered in this volume as well. Case studies are provided in many chapters. "Reliable Knowledge Discovery" is designed for researchers and advanced-level students focused on computer science and electrical engineering as a secondary text or reference. Professionals working in this related field and KDD application developers will also find this book useful.
This authoritative collection introduces the reader to the state of the art in iris recognition technology. Topics and features: with a Foreword by the "father of iris recognition," Professor John Daugman of Cambridge University; presents work from an international selection of preeminent researchers, reflecting the uses of iris recognition in many different social contexts; provides viewpoints from researchers in government, industry and academia, highlighting how iris recognition is both a thriving industry and an active research area; surveys previous developments in the field, and covers topics ranging from the low-level (e.g., physics of iris image acquisition) to the high level (e.g., alternative non-Daugman approaches to iris matching); introduces many active and open areas of research in iris recognition, including cross-wavelength matching and iris template aging. This book is an essential resource for anyone wishing to improve their understanding of iris recognition technology.
This book presents a thorough and detailed guide to image registration, outlining the principles and reviewing state-of-the-art tools and methods. The book begins by identifying the components of a general image registration system, and then describes the design of each component using various image analysis tools. The text reviews a vast array of tools and methods, not only describing the principles behind each tool and method, but also measuring and comparing their performances using synthetic and real data. Features: discusses similarity/dissimilarity measures, point detectors, feature extraction/selection and homogeneous/heterogeneous descriptors; examines robust estimators, point pattern matching algorithms, transformation functions, and image resampling and blending; covers principal axes methods, hierarchical methods, optimization-based methods, edge-based methods, model-based methods, and adaptive methods; includes a glossary, an extensive list of references, and an appendix on PCA.
The two-volume set LNCS 8935 and 8936 constitutes the thoroughly refereed proceedings of the 21st International Conference on Multimedia Modeling, MMM 2015, held in Sydney, Australia, in January 2015. The 49 revised regular papers, 24 poster presentations, were carefully reviewed and selected from 189 submissions. For the three special session, a total of 18 papers were accepted for MMM 2015. The three special sessions are Personal (Big) Data Modeling for Information Access and Retrieval, Social Geo-Media Analytics and Retrieval and Image or video processing, semantic analysis and understanding. In addition, 9 demonstrations and 9 video showcase papers were accepted for MMM 2015. The accepted contributions included in these two volumes represent the state-of-the-art in multimedia modeling research and cover a diverse range of topics including: Image and Video Processing, Multimedia encoding and streaming, applications of multimedia modelling and 3D and augmented reality.
"The book is outstanding and admirable in many respects. ... is necessary reading for all kinds of readers from undergraduate students to top authorities in the field." Journal of Symbolic Logic Written by two experts in the field, this is the only comprehensive and unified treatment of the central ideas and applications of Kolmogorov complexity. The book presents a thorough treatment of the subject with a wide range of illustrative applications. Such applications include the randomness of finite objects or infinite sequences, Martin-Loef tests for randomness, information theory, computational learning theory, the complexity of algorithms, and the thermodynamics of computing. It will be ideal for advanced undergraduate students, graduate students, and researchers in computer science, mathematics, cognitive sciences, philosophy, artificial intelligence, statistics, and physics. The book is self-contained in that it contains the basic requirements from mathematics and computer science. Included are also numerous problem sets, comments, source references, and hints to solutions of problems. New topics in this edition include Omega numbers, Kolmogorov-Loveland randomness, universal learning, communication complexity, Kolmogorov's random graphs, time-limited universal distribution, Shannon information and others.
This book constitutes the proceedings of the third International Workshop on Symbiotic Interaction, Symbiotic 2014, held in Helsinki, Finland, in October 2014. The 8 full papers and 5 short papers presented in this volume were carefully reviewed and selected from 16 submissions. They are organized in topical sections named: definitions of symbiotic interaction; reviews of implicit interaction; example applications; experimenting with users; and demos and posters. |
You may like...
Handbook of Medical Image Computing and…
S. Kevin Zhou, Daniel Rueckert, …
Hardcover
R4,574
Discovery Miles 45 740
Human Centric Visual Analysis with Deep…
Liang Lin, Dongyu Zhang, …
Hardcover
R3,785
Discovery Miles 37 850
Dark Web Pattern Recognition and Crime…
Romil Rawat, Vinod Mahor, …
Hardcover
R6,208
Discovery Miles 62 080
Handbook of Research on Advanced…
MD Imtiyaz Anwar, Arun Khosla, …
Hardcover
R6,686
Discovery Miles 66 860
Pattern Recognition Applications in…
Diego Alexander Tibaduiza Burgos, Maribel Anaya Vejar, …
Hardcover
R5,960
Discovery Miles 59 600
Self-Learning Speaker Identification - A…
Tobias Herbig, Franz Gerl, …
Hardcover
R2,746
Discovery Miles 27 460
Analyzing Emotion in Spontaneous Speech
Rupayan Chakraborty, Meghna Pandharipande, …
Hardcover
R1,408
Discovery Miles 14 080
|