![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Pattern recognition
This edited volume explores several issues relating to parametric segmentation including robust operations, model selection criteria and automatic model selection, plus 2D and 3D scene segmentation. Emphasis is placed on robust model selection with techniques such as robust Mallows Cp, least K-th order statistical model fitting (LKS), and robust regression receiving much attention. With contributions from leading researchers, this is a valuable resource for researchers and graduated students working in computer vision, pattern recognition, image processing and robotics.
Biometrics, the science of using physical traits to identify individuals, is playing an increasing role in our security-conscious society and across the globe. Biometric authentication, or bioauthentication, systems are being used to secure everything from amusement parks to bank accounts to military installations. Yet developments in this field have not been matched by an equivalent improvement in the statistical methods for evaluating these systems. Compensating for this need, this unique text/reference provides a basic statistical methodology for practitioners and testers of bioauthentication devices, supplying a set of rigorous statistical methods for evaluating biometric authentication systems. This framework of methods can be extended and generalized for a wide range of applications and tests. This is the first single resource on statistical methods for estimation and comparison of the performance of biometric authentication systems. The book focuses on six common performance metrics: for each metric, statistical methods are derived for a single system that incorporates confidence intervals, hypothesis tests, sample size calculations, power calculations and prediction intervals. These methods are also extended to allow for the statistical comparison and evaluation of multiple systems for both independent and paired data. Topics and features: * Provides a statistical methodology for the most common biometric performance metrics: failure to enroll (FTE), failure to acquire (FTA), false non-match rate (FNMR), false match rate (FMR), and receiver operating characteristic (ROC) curves * Presents methods for the comparison of two or more biometric performance metrics * Introduces a new bootstrap methodology for FMR and ROC curve estimation * Supplies more than 120 examples, using publicly available biometric data where possible * Discusses the addition of prediction intervals to the bioauthentication statistical toolset * Describes sample-size and power calculations for FTE, FTA, FNMR and FMR Researchers, managers and decisions makers needing to compare biometric systems across a variety of metrics will find within this reference an invaluable set of statistical tools. Written for an upper-level undergraduate or master's level audience with a quantitative background, readers are also expected to have an understanding of the topics in a typical undergraduate statistics course. Dr. Michael E. Schuckers is Associate Professor of Statistics at St. Lawrence University, Canton, NY, and a member of the Center for Identification Technology Research.
This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2012, held in Brno, Czech Republic, in September 2012. The 46 revised full papers were carefully selected from 81 submissions and deal with image analysis and computer vision with a focus on detection, recognition, tracking and identification.
This book constitutes the refereed proceedings of the 13th International Conference on Intelligent Data Engineering and Automated Learning, IDEAL 2012, held in Natal, Brazil, in August 2012. The 100 revised full papers presented were carefully reviewed and selected from more than 200 submissions for inclusion in the book and present the latest theoretical advances and real-world applications in computational intelligence.
Multi-Modal User Interactions in Controlled Environments investigates the capture and analysis of user's multimodal behavior (mainly eye gaze, eye fixation, eye blink and body movements) within a real controlled environment (controlled-supermarket, personal environment) in order to adapt the response of the computer/environment to the user. Such data is captured using non-intrusive sensors (for example, cameras in the stands of a supermarket) installed in the environment. This multi-modal video based behavioral data will be analyzed to infer user intentions while assisting users in their day-to-day tasks by adapting the system's response to their requirements seamlessly. This book also focuses on the presentation of information to the user. Multi-Modal User Interactions in Controlled Environments is designed for professionals in industry, including professionals in the domains of security and interactive web television. This book is also suitable for graduate-level students in computer science and electrical engineering.
This book focuses on use of voice as a biometric measure for personal authentication. In particular, "Speaker Recognition" covers two approaches in speaker authentication: speaker verification (SV) and verbal information verification (VIV). The SV approach attempts to verify a speaker's identity based on his/her voice characteristics while the VIV approach validates a speaker's identity through verification of the content of his/her utterance(s). SV and VIV can be combined for new applications. This is still a new research topic with significant potential applications. The book provides with a broad overview of the recent advances in speaker authentication while giving enough attention to advanced and useful algorithms and techniques. It also provides a step by step introduction to the current state of the speaker authentication technology, from the fundamental concepts to advanced algorithms. We will also present major design methodologies and share our experience in developing real and successful speaker authentication systems. Advanced and useful topics and algorithms are selected with real design examples and evaluation results. Special attention is given to the topics related to improving overall system robustness and performances, such as robust endpoint detection, fast discriminative training theory and algorithms, detection-based decoding, sequential authentication, etc. For example, the sequential authentication was developed based on statistical sequential testing theory. By adding enough subtests, a speaker authentication system can achieve any accuracy requirement. The procedure of designing the sequential authentication will be presented. For any presented technique, we will provide experimental results to validate the usefulness. We will also highlight the important developments in academia, government, and industry, and outline a few open issues. As the methodologies developed in speaker authentication span several diverse fields, the tutorial book provides an introductory forum for a broad spectrum of researchers and developers from different areas to acquire the knowledge and skills to engage in the interdisciplinary fields of user authentication, biometrics, speech and speaker recognition, multimedia, and dynamic pattern recognition.
This book constitutes the refereed proceedings of the 9th International Conference on Cooperative Design, Visualization, and Engineering, CDVE 2012, held in Osaka, Japan, in September 2012. The 36 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers cover the topics of cooperative engineering, basic theories, methods and technologies that support CDVE, cooperative design, visualization and applications.
The three volume set LNAI 7506, LNAI 7507 and LNAI 7508 constitutes the refereed proceedings of the 5th International Conference on Intelligent Robotics and Applications, ICIRA 2012, held in Montreal, Canada, in October 2012. The 197 revised full papers presented were thoroughly reviewed and selected from 271 submissions. They present the state-of-the-art developments in robotics, automation and mechatronics. This volume covers the topics of robot actuators and sensors; robot design, development and control; robot intelligence, learning and linguistics; robot mechanism and design; robot motion analysis and planning; robotic vision, recognition and reconstruction; and planning and navigation.
The two volumes set, CCIS 383 and 384, constitutes the refereed proceedings of the 14th International Conference on Engineering Applications of Neural Networks, EANN 2013, held on Halkidiki, Greece, in September 2013. The 91 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers describe the applications of artificial neural networks and other soft computing approaches to various fields such as pattern recognition-predictors, soft computing applications, medical applications of AI, fuzzy inference, evolutionary algorithms, classification, learning and data mining, control techniques-aspects of AI evolution, image and video analysis, classification, pattern recognition, social media and community based governance, medical applications of AI-bioinformatics and learning.
The two volumes set, CCIS 383 and 384, constitutes the refereed proceedings of the 14th International Conference on Engineering Applications of Neural Networks, EANN 2013, held on Halkidiki, Greece, in September 2013. The 91 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers describe the applications of artificial neural networks and other soft computing approaches to various fields such as pattern recognition-predictors, soft computing applications, medical applications of AI, fuzzy inference, evolutionary algorithms, classification, learning and data mining, control techniques-aspects of AI evolution, image and video analysis, classification, pattern recognition, social media and community based governance, medical applications of AI-bioinformatics and learning.
This book constitutes the refereed proceedings of the 17th Iberoamerican Congress on Pattern Recognition, CIARP 2012, held in Buenos Aires, Argentina, in September 2012. The 109 papers presented, among them two tutorials and four keynotes, were carefully reviewed and selected from various submissions. The papers are organized in topical sections on face and iris: detection and recognition; clustering; fuzzy methods; human actions and gestures; graphs; image processing and analysis; shape and texture; learning, mining and neural networks; medical images; robotics, stereo vision and real time; remote sensing; signal processing; speech and handwriting analysis; statistical pattern recognition; theoretical pattern recognition; and video analysis.
The three volume set LNAI 7506, LNAI 7507 and LNAI 7508 constitutes the refereed proceedings of the 5th International Conference on Intelligent Robotics and Applications, ICIRA 2012, held in Montreal, Canada, in October 2012. The 197 revised full papers presented were thoroughly reviewed and selected from 271 submissions. They present the state-of-the-art developments in robotics, automation and mechatronics. This volume covers the topics of adaptive control systems; automotive systems; estimation and identification; intelligent visual systems; application of differential geometry in robotic mechanisms; unmanned systems technologies and applications; new development on health management, fault diagnosis, and fault-tolerant control; biomechatronics; intelligent control of mechanical and mechatronic systems.
From its early beginnings in the fifties and sixties, the field of neural networks has been steadily developing to become one of the most interdisciplinary areas of research within computer science. This volume contains a selection of papers from WIRN Vietri-99, the 11th Italian Workshop on Neural Nets. This annual event, sponsored, amongst others, by the IEEE Neural Networks Council and the INNS/SIG Italy, brings together the best of research from all over the world. The papers cover a range of topics within neural networks, including pattern recognition, signal and image processing, mathematical models, neuro-fuzzy models and economics applications.
This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Rough Sets, Fuzzy Sets, Data Mining and Granular Computing, RSFDGrC 2013, held in Halifax, Canada in October 2013 as one of the co-located conference of the 2013 Joint Rough Set Symposium, JRS 2013. The 69 papers (including 44 regular and 25 short papers) included in the JRS proceedings (LNCS 8170 and LNCS 8171) were carefully reviewed and selected from 106 submissions. The papers in this volume cover topics such as inconsistency, incompleteness, non-determinism; fuzzy and rough hybridization; granular computing and covering-based rough sets; soft clustering; image and medical data analysis.
This book constitutes the refereed proceedings of the 9th International Symposium on Bioinformatics Research and Applications, ISBRA 2013, held in Charlotte, NC, USA, in May 2013. The 25 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 46 submissions. The papers cover a wide range of biomedical databases and data integration, high-performance bio-computing, biomolecular imaging, high-throughput sequencing data analysis, bio-ontologies, molecular evolution, comparative genomics and phylogenomics, molecular modeling and simulation, pattern discovery and classification, computational proteomics, population genetics, data mining and visualization, software tools and applications.
Change detection using remotely sensed images has many applications, such as urban monitoring, land-cover change analysis, and disaster management. This work investigates two-dimensional change detection methods. The existing methods in the literature are grouped into four categories: pixel-based, transformation-based, texture analysis-based, and structure-based. In addition to testing existing methods, four new change detection methods are introduced: fuzzy logic-based, shadow detection-based, local feature-based, and bipartite graph matching-based. The latter two methods form the basis for a structural analysis of change detection. Three thresholding algorithms are compared, and their effects on the performance of change detection methods are measured. These tests on existing and novel change detection methods make use of a total of 35 panchromatic and multi-spectral Ikonos image sets. Quantitative test results and their interpretations are provided.
This book constitutes the refereed proceedings of the 17th International Conference on Applications of Natural Language to Information Systems, held in Groningen, The Netherlands, in June 2012. The 12 full papers, 24 short papers and 16 poster papers presented in this volume together with a full-paper length invited talks were carefully reviewed and selected from 90 submissions. The rapidly evolving state-of-the-art in NLP and the shifting interest to appcliations targeting document and data collections available on the Web, including an increasing amount of user generated content, is reflected in the contributions to this book. Topics covered are information retrieval, text classification and clustering, summarization, normalization of user generated content, "forensic" NLP, ontologies and natural language, sentiment analysis, question answering and information extraction, terminology and named entity recognition, and NLP tools development.
This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2013, held in Magdeburg, Germany, in September 2013. The 5 revised full papers presented together with 11 short papers, 5 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on biometrics; applied cryptography; digital watermarking, steganography and forensics; and social network privacy, security and authentication.
This book constitutes the thoroughly refereed revised selected papers from the Second IAPR International Workshop, PSL 2013, held in Nanjing, China, in May 2013. The 10 papers included in this volume were carefully reviewed and selected from 26 submissions. Partially supervised learning is a rapidly evolving area of machine learning. It generalizes many kinds of learning paradigms including supervised and unsupervised learning, semi-supervised learning for classification and regression, transductive learning, semi-supervised clustering, multi-instance learning, weak label learning, policy learning in partially observable environments, etc.
This book is the first attempt to bring together current research findings in the domain of interactive horizontal displays. The novel compilation will integrate and summarise findings from the most important international tabletop research teams. It will provide a state-of-the art overview of this research domain and therefore allow for discussion of emerging and future directions in research and technology of interactive horizontal displays. Latest advances in interaction and software technologies and their increasing availability beyond research labs, refuels the interest in interactive horizontal displays. In the early 1990s Mark Weiser's vision of Ubiquitous Computing redefined the notion of Human Computer Interaction. Interaction was no longer considered to happen only with standard desktop computers but also with elements of their environment. This book is structured in three major areas: 'under', 'on/above' and 'around' tabletops. These areas are associated with different research disciplines such as Hardware/Software and Computer Science, Human Computer Interaction (HCI) and Computer Supported Collaborative Work (CSCW). However, the comprehensive and compelling presentation of the topic of the book results from its interdisciplinary character. The book addresses fellow researchers who are interested in this domain and practitioners considering interactive tabletops in real-world projects. It will also be a useful introduction into tabletop research that can be used for the academic curriculum.
Active Contours deals with the analysis of moving images - a topic of growing importance within the computer graphics industry. In particular it is concerned with understanding, specifying and learning prior models of varying strength and applying them to dynamic contours. Its aim is to develop and analyse these modelling tools in depth and within a consistent framework.
This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012. The 6 revised full papers presented together with 8 short papers, 8 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on image and handwriting analysis, authentication and performance, biometrics, forensics and watermarking, and communications security.
The two volume set LNCS 7491 and 7492 constitutes the refereed proceedings of the 12th International Conference on Parallel Problem Solving from Nature, PPSN 2012, held in Taormina, Sicily, Italy, in September 2012. The total of 105 revised full papers were carefully reviewed and selected from 226 submissions. The meeting began with 5 workshops which offered an ideal opportunity to explore specific topics in evolutionary computation, bio-inspired computing and metaheuristics. PPSN 2012 also included 8 tutorials. The papers are organized in topical sections on evolutionary computation; machine learning, classifier systems, image processing; experimental analysis, encoding, EDA, GP; multiobjective optimization; swarm intelligence, collective behavior, coevolution and robotics; memetic algorithms, hybridized techniques, meta and hyperheuristics; and applications.
This book constitutes the refereed proceedings of the International Workshop on Depth Image Analysis, held in conjunction with ICPR 2012 in Japan in November 2012. The 16 revised full papers presented at the workshop were carefully reviewed and selected from 27 submissions and are complemented with 3 invited papers that were also peer-reviewed. The papers are organized in topical sections on acquisition and modeling of depth data, processing and analysis of depth data, applications, and ICPR contest.
This two volumes set LNAI 8102 and LNAI 8103 constitutes the refereed proceedings of the 6th International Conference on Intelligent Robotics and Applications, ICIRA 2013, held in Busan, South Korea, in September 2013. The 147 revised full papers presented were carefully reviewed and selected from 184 submissions. The papers discuss various topics from intelligent robotics, automation and mechatronics with particular emphasis on technical challenges associated with varied applications such as biomedical application, industrial automation, surveillance and sustainable mobility. |
You may like...
Mobile Networks for Biometric Data…
Massimo Conti, Natividad Martinez Madrid, …
Hardcover
R6,197
Discovery Miles 61 970
Type-2 Fuzzy Graphical Models for…
Jia Zeng, Zhiqiang Liu
Hardcover
Artificial Vision - Image Description…
Stefano Levialdi, Virginio Cantoni, …
Hardcover
R2,090
Discovery Miles 20 900
Handbook of Medical Image Computing and…
S. Kevin Zhou, Daniel Rueckert, …
Hardcover
R4,574
Discovery Miles 45 740
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain
Hardcover
R7,962
Discovery Miles 79 620
Dark Web Pattern Recognition and Crime…
Romil Rawat, Vinod Mahor, …
Hardcover
R6,208
Discovery Miles 62 080
Biometric Security and Privacy…
Richard Jiang, Somaya Al-Maadeed, …
Hardcover
R4,834
Discovery Miles 48 340
Supervised and Unsupervised Learning for…
Michael W. Berry, Azlinah Mohamed, …
Hardcover
R2,533
Discovery Miles 25 330
|