![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Pattern recognition
Consumer electronics (CE) devices, providing multimedia entertainment and enabling communication, have become ubiquitous in daily life. However, consumer interaction with such equipment currently requires the use of devices such as remote controls and keyboards, which are often inconvenient, ambiguous and non-interactive. An important challenge for the modern CE industry is the design of user interfaces for CE products that enable interactions which are natural, intuitive and fun. As many CE products are supplied with microphones and cameras, the exploitation of both audio and visual information for interactive multimedia is a growing field of research. Collecting together contributions from an international selection of experts, including leading researchers in industry, this unique text presents the latest advances in applications of multimedia interaction and user interfaces for consumer electronics. Covering issues of both multimedia content analysis and human-machine interaction, the book examines a wide range of techniques from computer vision, machine learning, audio and speech processing, communications, artificial intelligence and media technology. Topics and features: introduces novel computationally efficient algorithms to extract semantically meaningful audio-visual events; investigates modality allocation in intelligent multimodal presentation systems, taking into account the cognitive impacts of modality on human information processing; provides an overview on gesture control technologies for CE; presents systems for natural human-computer interaction, virtual content insertion, and human action retrieval; examines techniques for 3D face pose estimation, physical activity recognition, and video summary quality evaluation; discusses the features that characterize the new generation of CE and examines how web services can be integrated with CE products for improved user experience. This book is an essential resource for researchers and practitioners from both academia and industry working in areas of multimedia analysis, human-computer interaction and interactive user interfaces. Graduate students studying computer vision, pattern recognition and multimedia will also find this a useful reference.
This book considers biometric technology in a broad light, integrating the concept seamlessly into mainstream IT, while discussing the cultural attitudes and the societal impact of identity management. Features: summarizes the material covered at the beginning of every chapter, and provides chapter-ending review questions and discussion points; reviews identity verification in nature, and early historical interest in anatomical measurement; provides an overview of biometric technology, presents a focus on biometric systems and true systems integration, examines the concept of identity management, and predicts future trends; investigates performance issues in biometric systems, the management and security of biometric data, and the impact of mobile devices on biometrics technology; explains the equivalence of performance across operational nodes, introducing the APEX system; considers the legal, political and societal factors of biometric technology, in addition to user psychology and other human factors.
Micromechanical manufacturing based on microequipment creates new possibi- ties in goods production. If microequipment sizes are comparable to the sizes of the microdevices to be produced, it is possible to decrease the cost of production drastically. The main components of the production cost - material, energy, space consumption, equipment, and maintenance - decrease with the scaling down of equipment sizes. To obtain really inexpensive production, labor costs must be reduced to almost zero. For this purpose, fully automated microfactories will be developed. To create fully automated microfactories, we propose using arti?cial neural networks having different structures. The simplest perceptron-like neural network can be used at the lowest levels of microfactory control systems. Adaptive Critic Design, based on neural network models of the microfactory objects, can be used for manufacturing process optimization, while associative-projective neural n- works and networks like ART could be used for the highest levels of control systems. We have examined the performance of different neural networks in traditional image recognition tasks and in problems that appear in micromechanical manufacturing. We and our colleagues also have developed an approach to mic- equipment creation in the form of sequential generations. Each subsequent gene- tion must be of a smaller size than the previous ones and must be made by previous generations. Prototypes of ?rst-generation microequipment have been developed and assessed.
This book constitutes the refereed proceedings of the 9th Chinese Conference on Biometric Recognition, CCBR 2014, held in Shenyang, China, in November 2014. The 60 revised full papers presented were carefully reviewed and selected from among 90 submissions. The papers focus on face, fingerprint and palmprint, vein biometrics, iris and ocular biometrics, behavioral biometrics, application and system of biometrics, multi-biometrics and information fusion, other biometric recognition and processing.
Automatic personal authentication using biometric information is becoming more essential in applications of public security, access control, forensics, banking, etc. Many kinds of biometric authentication techniques have been developed based on different biometric characteristics. However, most of the physical biometric recognition techniques are based on two dimensional (2D) images, despite the fact that human characteristics are three dimensional (3D) surfaces. Recently, 3D techniques have been applied to biometric applications such as 3D face, 3D palmprint, 3D fingerprint, and 3D ear recognition. This book introduces four typical 3D imaging methods, and presents some case studies in the field of 3D biometrics. This book also includes many efficient 3D feature extraction, matching, and fusion algorithms. These 3D imaging methods and their applications are given as follows: - Single view imaging with line structured-light: 3D ear identification - Single view imaging with multi-line structured-light: 3D palmprint authentication - Single view imaging using only 3D camera: 3D hand verification - Multi-view imaging: 3D fingerprint recognition 3D Biometrics: Systems and Applications is a comprehensive introduction to both theoretical issues and practical implementation in 3D biometric authentication. It will serve as a textbook or as a useful reference for graduate students and researchers in the fields of computer science, electrical engineering, systems science, and information technology. Researchers and practitioners in industry and R&D laboratories working on security system design, biometrics, immigration, law enforcement, control, and pattern recognition will also find much of interest in this book.
This small book addresses different kinds of datafiles, as commonly encountered in clinical research, and their data-analysis on SPSS Software. Some 15 years ago serious statistical analyses were conducted by specialist statisticians using ma- frame computers. Nowadays, there is ready access to statistical computing using personal computers or laptops, and this practice has changed boundaries between basic statistical methods that can be conveniently carried out on a pocket calculator and more advanced statistical methods that can only be executed on a computer. Clinical researchers currently perform basic statistics without professional help from a statistician, including t-tests and chi-square tests. With help of user-friendly software the step from such basic tests to more complex tests has become smaller, and more easy to take. It is our experience as masters' and doctorate class teachers of the European College of Pharmaceutical Medicine (EC Socrates Project Lyon France) that s- dents are eager to master adequate command of statistical software for that purpose. However, doing so, albeit easy, still takes 20-50 steps from logging in to the final result, and all of these steps have to be learned in order for the procedures to be successful.
This volume constitutes the refereed proceedings of the 15th International Conference on Engineering Applications of Neural Networks, EANN 2014, held in Sofia, Bulgaria, in September 2014. The 18 revised full papers presented together with 5 short papers were carefully reviewed and selected from 37 submissions. The papers demonstrate a variety of applications of neural networks and other computational intelligence approaches to challenging problems relevant to society and the economy. These include areas such as: environmental engineering, facial expression recognition, classification with parallelization algorithms, control of autonomous unmanned aerial vehicles, intelligent transport, flood forecasting, classification of medical images, renewable energy systems, intrusion detection, fault classification and general engineering.
A natural evolution of statistical signal processing, in connection with the progressive increase in computational power, has been exploiting higher-order information. Thus, high-order spectral analysis and nonlinear adaptive filtering have received the attention of many researchers. One of the most successful techniques for non-linear processing of data with complex non-Gaussian distributions is the independent component analysis mixture modelling (ICAMM). This thesis defines a novel formalism for pattern recognition and classification based on ICAMM, which unifies a certain number of pattern recognition tasks allowing generalization. The versatile and powerful framework developed in this work can deal with data obtained from quite different areas, such as image processing, impact-echo testing, cultural heritage, hypnograms analysis, web-mining and might therefore be employed to solve many different real-world problems.
This book constitutes the refereed proceedings of the 17th International Conference on Text, Speech and Dialogue, TSD 2013, held in Brno, Czech Republic, in September 2014. The 70 papers presented together with 3 invited papers were carefully reviewed and selected from 143 submissions. They focus on topics such as corpora and language resources; speech recognition; tagging, classification and parsing of text and speech; speech and spoken language generation; semantic processing of text and speech; integrating applications of text and speech processing; automatic dialogue systems; as well as multimodal techniques and modelling.
The book constitutes the proceedings of the 24th International Conference on Artificial Neural Networks, ICANN 2014, held in Hamburg, Germany, in September 2014. The 107 papers included in the proceedings were carefully reviewed and selected from 173 submissions. The focus of the papers is on following topics: recurrent networks; competitive learning and self-organisation; clustering and classification; trees and graphs; human-machine interaction; deep networks; theory; reinforcement learning and action; vision; supervised learning; dynamical models and time series; neuroscience; and applications.
This book constitutes the refereed proceedings of the 10th International Conference on Machine Learning and Data Mining in Pattern Recognition, MLDM 2014, held in St. Petersburg, Russia in July 2014. The 40 full papers presented were carefully reviewed and selected from 128 submissions. The topics range from theoretical topics for classification, clustering, association rule and pattern mining to specific data mining methods for the different multimedia data types such as image mining, text mining, video mining and Web mining.
This book constitutes the refereed proceedings of the 4th International Conference on Computational Modeling of Objects Presented in Images, CompIMAGE 2014, held in Pittsburgh, PA, USA, in September 2014. The 29 revised full papers presented together with 10 short papers and 6 keynote talks were carefully reviewed and selected from 54 submissions. The papers cover the following topics: medical treatment, imaging and analysis; image registration, denoising and feature identification; image segmentation; shape analysis, meshing and graphs; medical image processing and simulations; image recognition, reconstruction and predictive modeling; image-based modeling and simulations; and computer vision and data-driven investigations.
This book constitutes the refereed proceedings of the 6th International Conference, ICISP 2014, held in June/July 2014 in Cherbourg, France. The 76 revised full papers were carefully reviewed and selected from 164 submissions. The contributions are organized in topical sections on multispectral colour science, color imaging and applications, digital cultural heritage, document image analysis, graph-based representations, image filtering and representation, computer vision and pattern recognition, computer graphics, biomedical, and signal processing.
This book constitutes the refereed proceedings of the 8th IAPR International Conference on Pattern Recognition in Bioinformatics, PRIB 2014, held in Stockholm, Sweden in August 2014. The 9 revised full papers and 9 revised short papers presented were carefully reviewed and selected from 29 submissions. The focus of the conference was on the latest Research in Pattern Recognition and Computational Intelligence-Based Techniques Applied to Problems in Bioinformatics and Computational Biology.
This book constitutes the refereed proceedings of the 10th International Symposium on Bioinformatics Research and Applications, ISBRA 2014, held in Zhangjiajie, China, in June 2014. The 33 revised full papers and 31 one-page abstracts included in this volume were carefully reviewed and selected from 119 submissions. The papers cover a wide range of topics in bioinformatics and computational biology and their applications including the development of experimental or commercial systems.
This book constitutes the refereed proceedings of the 7th International Conference on Artificial General Intelligence, AGI 2014, held in Quebec City, QC, Canada, in August 2014. The 22 papers and 8 posters were carefully reviewed and selected from 65 submissions. Researchers have recognized the necessity of returning to the original goals of the field by treating intelligence as a whole. Increasingly, there is a call for a transition back to confronting the more difficult issues of "human-level intelligence" and more broadly artificial general intelligence. AGI research differs from the ordinary AI research by stressing on the versatility and wholeness of intelligence and by carrying out the engineering practice according to an outline of a system comparable to the human mind in a certain sense. The AGI conference series has played and continues to play, a significant role in this resurgence of research on artificial intelligence in the deeper, original sense of the term of "artificial intelligence". The conferences encourage interdisciplinary research based on different understandings of intelligence and exploring different approaches.
Fuzzy classifiers are important tools in exploratory data analysis, which is a vital set of methods used in various engineering, scientific and business applications. Fuzzy classifiers use fuzzy rules and do not require assumptions common to statistical classification. Rough set theory is useful when data sets are incomplete. It defines a formal approximation of crisp sets by providing the lower and the upper approximation of the original set. Systems based on rough sets have natural ability to work on such data and incomplete vectors do not have to be preprocessed before classification. To achieve better performance than existing machine learning systems, fuzzy classifiers and rough sets can be combined in ensembles. Such ensembles consist of a finite set of learning models, usually weak learners. The present book discusses the three aforementioned fields - fuzzy systems, rough sets and ensemble techniques. As the trained ensemble should represent a single hypothesis, a lot of attention is placed on the possibility to combine fuzzy rules from fuzzy systems being members of classification ensemble. Furthermore, an emphasis is placed on ensembles that can work on incomplete data, thanks to rough set theory. .
This groundbreaking text examines the problem of user authentication from a completely new viewpoint. Rather than describing the requirements, technologies and implementation issues of designing point-of-entry authentication, the book introduces and investigates the technological requirements of implementing transparent user authentication - where authentication credentials are captured during a user's normal interaction with a system. This approach would transform user authentication from a binary point-of-entry decision to a continuous identity confidence measure. Topics and features: discusses the need for user authentication; reviews existing authentication approaches; introduces novel behavioural biometrics techniques; examines the wider system-specific issues with designing large-scale multimodal authentication systems; concludes with a look to the future of user authentication.
This book - in conjunction with the volumes LNAI 8589 and LNBI 8590 - constitutes the refereed proceedings of the 10th International Conference on Intelligent Computing, ICIC 2014, held in Taiyuan, China, in August 2014. The 92 papers of this volume were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections such as evolutionary computation and learning; swarm intelligence and optimization; machine learning; social and natural computing; neural networks; biometrics recognition; image processing; information security; virtual reality and human-computer interaction; knowledge discovery and data mining; signal processing; pattern recognition; biometric system and security for intelligent computing.
Biometric recognition, or simply biometrics, is the science of establishing the identity of a person based on physical or behavioral attributes. It is a rapidly evolving field with applications ranging from securely accessing one's computer to gaining entry into a country. While the deployment of large-scale biometric systems in both commercial and government applications has increased the public awareness of this technology, "Introduction to Biometrics" is the first textbook to introduce the fundamentals of Biometrics to undergraduate/graduate students. The three commonly used modalities in the biometrics field, namely, fingerprint, face, and iris are covered in detail in this book. Few other modalities like hand geometry, ear, and gait are also discussed briefly along with advanced topics such as multibiometric systems and security of biometric systems. Exercises for each chapter will be available on the book website to help students gain a better understanding of the topics and obtain practical experience in designing computer programs for biometric applications. These can be found at: http://www.csee.wvu.edu/~ross/BiometricsTextBook/. Designed for undergraduate and graduate students in computer science and electrical engineering, "Introduction to Biometrics" is also suitable for researchers and biometric and computer security professionals.
This book constitutes the refereed proceedings of the 6th International Symposium on Search-Based Software Engineering, SSBSE 2014, held in Fortaleza, Brazil. The 14 revised full papers presented together with 2 keynote addresses, 1 invited talk, 1 short paper, 3 papers of the graduate track, and 4 challenge track papers were carefully reviewed and selected from 51 submissions. Search Based Software Engineering (SBSE) studies the application of meta-heuristic optimization techniques to various software engineering problems, ranging from requirements engineering to software testing and maintenance.
The amount of data medical databases doubles every 20 months, and physicians are at a loss to analyze them. Also, traditional data analysis has difficulty to identify outliers and patterns in big data and data with multiple exposure / outcome variables and analysis-rules for surveys and questionnaires, currently common methods of data collection, are, essentially, missing. Consequently, proper data-based health decisions will soon be impossible. Obviously, it is time that medical and health professionals mastered their reluctance to use machine learning methods and this was the main incentive for the authors to complete a series of three textbooks entitled "Machine Learning in Medicine Part One, Two and Three, Springer Heidelberg Germany, 2012-2013", describing in a nonmathematical way over sixty machine learning methodologies, as available in SPSS statistical software and other major software programs. Although well received, it came to our attention that physicians and students often lacked time to read the entire books, and requested a small book, without background information and theoretical discussions and highlighting technical details. For this reason we produced a 100 page cookbook, entitled "Machine Learning in Medicine - Cookbook One", with data examples available at extras.springer.com for self-assessment and with reference to the above textbooks for background information. Already at the completion of this cookbook we came to realize, that many essential methods were not covered. The current volume, entitled "Machine Learning in Medicine - Cookbook Two" is complementary to the first and also intended for providing a more balanced view of the field and thus, as a must-read not only for physicians and students, but also for any one involved in the process and progress of health and health care. Similarly to Machine Learning in Medicine - Cookbook One, the current work will describe stepwise analyses of over twenty machine learning methods, that are, likewise, based on the three major machine learning methodologies: Cluster methodologies (Chaps. 1-3) Linear methodologies (Chaps. 4-11) Rules methodologies (Chaps. 12-20) In extras.springer.com the data files of the examples are given, as well as XML (Extended Mark up Language), SPS (Syntax) and ZIP (compressed) files for outcome predictions in future patients. In addition to condensed versions of the methods, fully described in the above three textbooks, an introduction is given to SPSS Modeler (SPSS' data mining workbench) in the Chaps. 15, 18, 19, while improved statistical methods like various automated analyses and Monte Carlo simulation models are in the Chaps. 1, 5, 7 and 8. We should emphasize that all of the methods described have been successfully applied in practice by the authors, both of them professors in applied statistics and machine learning at the European Community College of Pharmaceutical Medicine in Lyon France. We recommend the current work not only as a training companion to investigators and students, because of plenty of step by step analyses given, but also as a brief introductory text to jaded clinicians new to the methods. For the latter purpose, background and theoretical information have been replaced with the appropriate references to the above textbooks, while single sections addressing "general purposes", "main scientific questions" and "conclusions" are given in place. Finally, we will demonstrate that modern machine learning performs sometimes better than traditional statistics does. Machine learning may have little options for adjusting confounding and interaction, but you can add propensity scores and interaction variables to almost any machine learning method.
This book constitutes the refereed proceedings of the 13th International Conference on Unconventional Computation and Natural Computation, UCNC 2014, held in London, ON, Canada, in July 2014. The 31 revised full papers were carefully reviewed and selected from 79 submissions. The papers cover a wide range of topics including among others molecular, quantum, optical and chaos computing as well as neural computation, evolutionary computation, swarm intelligence and computational neuroscience.
This book constitutes the proceedings of the International Conference on Brain Informatics and Health, BIH 2014, held in Warsaw, Poland, in August 2014, as part of 2014 Web Intelligence Congress, WIC 2014. The 29 full papers presented together with 23 special session papers were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on brain understanding; cognitive modelling; brain data analytics; health data analytics; brain informatics and data management; semantic aspects of biomedical analytics; healthcare technologies and systems; analysis of complex medical data; understanding of information processing in brain; neuroimaging data processing strategies; advanced methods of interactive data mining for personalized medicine.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics, CIBB 2013, held in Nice, France in June 2013. The 19 revised full papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in topical sections on bioinformatics, biostatistics, knowledge based medicine, and data integration and analysis in omic-science. |
![]() ![]() You may like...
VLSI-SoC: Design Trends - 28th IFIP WG…
Andrea Calimera, Pierre-Emmanuel Gaillardon, …
Hardcover
R3,667
Discovery Miles 36 670
The Next Day - Transitions, Change, And…
Melinda French Gates
Paperback
Grids, P2P and Services Computing
Frederic Desprez, Vladimir Getov, …
Hardcover
R4,467
Discovery Miles 44 670
How Not To Mess Up Online - A Teenager's…
Emma Sadleir, Rorke Wilson
Paperback
Flip Thinking - The Life-Changing Art Of…
Berthold Gunster
Paperback
Proceedings of International Conference…
Valentina E. Balas, Aboul Ella Hassanien, …
Hardcover
R5,760
Discovery Miles 57 600
Bio-inspired Algorithms for Data…
Simon James Fong, Richard C. Millham
Hardcover
R4,924
Discovery Miles 49 240
|