Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Applications of computing > Pattern recognition
The three volume set LNCS 7062, LNCS 7063, and LNCS 7064
constitutes the proceedings of the 18th International Conference on
Neural Information Processing, ICONIP 2011, held in Shanghai,
China, in November 2011.
The three volume set LNCS 7062, LNCS 7063, and LNCS 7064 constitutes the proceedings of the 18th International Conference on Neural Information Processing, ICONIP 2011, held in Shanghai, China, in November 2011. The 262 regular session papers presented were carefully reviewed and selected from numerous submissions. The papers of part I are organized in topical sections on perception, emotion and development, bioinformatics, biologically inspired vision and recognition, bio-medical data analysis, brain signal processing, brain-computer interfaces, brain-like systems, brain-realistic models for learning, memory and embodied cognition, Clifford algebraic neural networks, combining multiple learners, computational advances in bioinformatics, and computational-intelligent human computer interaction. The second volume is structured in topical sections on cybersecurity and data mining workshop, data mining and knowledge doscovery, evolutionary design and optimisation, graphical models, human-originated data analysis and implementation, information retrieval, integrating multiple nature-inspired approaches, kernel methods and support vector machines, and learning and memory. The third volume contains all the contributions connected with multi-agent systems, natural language processing and intelligent Web information processing, neural encoding and decoding, neural network models, neuromorphic hardware and implementations, object recognition, visual perception modelling, and advances in computational intelligence methods based pattern recognition.
The two-volume set LNCS 7066 and LNCS 7067 constitutes the proceedings of the Second International Visual Informatics Conference, IVIC 2011, held in Selangor, Malaysia, during November 9-11, 2011. The 71 revised papers presented were carefully reviewed and selected for inclusion in these proceedings. They are organized in topical sections named computer vision and simulation; virtual image processing and engineering; visual computing; and visualisation and social computing. In addition the first volume contains two keynote speeches in full paper length, and one keynote abstract.
This book constitutes the refereed proceedings of the 6th International Conference on Pattern Recognition in Bioinformatics, PRIB 2011, held in Delft, The Netherlands, in November 2011. The 29 revised full papers presented were carefully reviewed and selected from 35 submissions. The papers cover the wide range of possible applications of bioinformatics in pattern recognition: novel algorithms to handle traditional pattern recognition problems such as (bi)clustering, classification and feature selection; applications of (novel) pattern recognition techniques to infer and analyze biological networks and studies on specific problems such as biological image analysis and the relation between sequence and structure. They are organized in the following topical sections: clustering, biomarker selection and classification, network inference and analysis, image analysis, and sequence, structure, and interactions.
This book describes hybrid intelligent systems using type-2 fuzzy logic and modular neural networks for pattern recognition applications. Hybrid intelligent systems combine several intelligent computing paradigms, including fuzzy logic, neural networks, and bio-inspired optimization algorithms, which can be used to produce powerful pattern recognition systems. Type-2 fuzzy logic is an extension of traditional type-1 fuzzy logic that enables managing higher levels of uncertainty in complex real world problems, which are of particular importance in the area of pattern recognition. The book is organized in three main parts, each containing a group of chapters built around a similar subject. The first part consists of chapters with the main theme of theory and design algorithms, which are basically chapters that propose new models and concepts, which are the basis for achieving intelligent pattern recognition. The second part contains chapters with the main theme of using type-2 fuzzy models and modular neural networks with the aim of designing intelligent systems for complex pattern recognition problems, including iris, ear, face and voice recognition. The third part contains chapters with the theme of evolutionary optimization of type-2 fuzzy systems and modular neural networks in the area of intelligent pattern recognition, which includes the application of genetic algorithms for obtaining optimal type-2 fuzzy integration systems and ideal neural network architectures for solving problems in this area.
During the last twenty years the problem of pattern recognition (specifically, image recognition) has been studied intensively by many investigators, yet it is far from being solved. The number of publications increases yearly, but all the experimental results-with the possible exception of some dealing with recognition of printed characters-report a probability of error significantly higher than that reported for the same images by humans. It is widely agreed that ideally the recognition problem could be thought of as a problem in testing statistical hypotheses. However, in most applications the immediate use of even the simplest statistical device runs head on into grave computational difficulties, which cannot be eliminated by recourse to general theory. We must accept the fact that it is impossible to build a universal machine which can learn an arbitrary classification of multidimensional signals. Therefore the solution of the recognition problem must be based on a priori postulates (concerning the sets of signals to be recognized) that will narrow the set of possible classifications, i.e., the set of decision functions. This notion can be taken as the methodological basis for the approach adopted in this book.
Evolutionary Computation (EC) techniques are e?cient, nature-inspired me- ods based on the principles of natural evolution and genetics. Due to their - ciency and simple underlying principles, these methods can be used for a diverse rangeofactivitiesincludingproblemsolving,optimization,machinelearningand pattern recognition. A large and continuously increasing number of researchers and professionals make use of EC techniques in various application domains. This volume presents a careful selection of relevant EC examples combined with a thorough examination of the techniques used in EC. The papers in the volume illustrate the current state of the art in the application of EC and should help and inspire researchers and professionals to develop e?cient EC methods for design and problem solving. All papers in this book were presented during EvoApplications 2010, which included a range of events on application-oriented aspects of EC. Since 1998, EvoApplications - formerly known as EvoWorkshops- has provided a unique opportunity for EC researchers to meet and discuss application aspects of EC and has been an important link between EC research and its application in a variety of domains. During these 12 years, new events have arisen, some have disappeared,whileothershavematuredtobecomeconferencesoftheirown,such as EuroGP in 2000, EvoCOP in 2004, and EvoBIO in 2007. And from this year, EvoApplications has become a conference as well.
This book provides a broad survey of advanced pattern recognition techniques for human behavior analysis. Clearly structured, the book begins with concise coverage of the major concepts, before introducing the most frequently used techniques and algorithms in detail, and then discussing examples of real applications. Features: contains contributions from an international selection of experts in the field; presents a thorough introduction to the fundamental topics of human behavior analysis; investigates methods for activity recognition, including gait and posture analysis, hand gesture analysis, and semantics of human behavior in image sequences; provides an accessible psychological treatise on social signals for the analysis of social behaviors; discusses voice and speech analysis, combined audiovisual cues, and social interactions and group dynamics; examines applications in different research fields; each chapter concludes with review questions, a summary of the topics covered, and a glossary.
Human Identification Based on Gait is the first book to address gait as a biometric. Biometrics is now in a unique position where it affects most people's lives. This is especially true of "gait," which is one of the most recent biometrics. Recognizing people by the way they walk and run implies analyzing movement which, in turn, implies analyzing sequences of images, thus requiring memory and computational performance that became available only recently. Human Identification Based on Gait introduces developments from distinguished researchers within this relatively new area of biometrics. This book clearly establishes how human gait is biometric. Human Identification Based on Gait is structured to meet the needs of professionals in industry, as well as advanced-level students in computer science.
This book thoroughly surveys and examines advances in fingerprint sensing devices and in algorithms for fingerprint image analysis and matching. After an opening chapter on the history of fingerprint recognition, "Automatic Fingerprint Recognition Systems" moves into new technologies for inkless sensors, fingerprint image analysis techniques, including fingerprint video analysis, filtering and classification and other areas aimed at fully automatic operation. The book also addresses large-scale fingerprint identification system design, as well as standards. Topics and Features: * Covers numerous areas related to modern automatic fingerprint recognition, not just its history or forensic analysis * Examines advances in fingerprint sensing and fingerprint image filtering and preprocessing * Describes fingerprint feature abstraction, as well as compression and decompression of fingerprint images * Develops ideas related to large-scale, large-database fingerprint matching * Assesses such important areas as security in fingerprint matching and the common criterion protection profile This authoritative survey provides a unique reference for automatic fingerprint recognition concepts, technologies, and systems. Its editors and contributors are leading researchers and applied R&D developers of this technology. Biometrics and pattern recognition researchers, security professionals, and systems developers will find the work an indispensable resource for current knowledge and technology.
This book focuses on use of voice as a biometric measure for personal authentication. In particular, "Speaker Recognition" covers two approaches in speaker authentication: speaker verification (SV) and verbal information verification (VIV). The SV approach attempts to verify a speaker 's identity based on his/her voice characteristics while the VIV approach validates a speaker 's identity through verification of the content of his/her utterance(s). SV and VIV can be combined for new applications. This is still a new research topic with significant potential applications.The book provides with a broad overview of the recent advances in speaker authentication while giving enough attention to advanced and useful algorithms and techniques. It also provides a step by step introduction to the current state of the speaker authentication technology, from the fundamental concepts to advanced algorithms. We will also present major design methodologies and share our experience in developing real and successful speaker authentication systems. Advanced and useful topics and algorithms are selected with real design examples and evaluation results. Special attention is given to the topics related to improving overall system robustness and performances, such as robust endpoint detection, fast discriminative training theory and algorithms, detection-based decoding, sequential authentication, etc. For example, the sequential authentication was developed based on statistical sequential testing theory. By adding enough subtests, a speaker authentication system can achieve any accuracy requirement. The procedure of designing the sequential authentication will be presented. For any presented technique, we will provide experimental results to validate the usefulness. We will also highlight the important developments in academia, government, and industry, and outline a few open issues.As the methodologies developed in speaker authentication span several diverse fields, the tutorial book provides an introductory forum for a broad spectrum of researchers and developers from different areas to acquire the knowledge and skills to engage in the interdisciplinary fields of user authentication, biometrics, speech and speaker recognition, multimedia, and dynamic pattern recognition.
This volume contains the Proceedings of the 8th Italian Workshop on Neural Nets WIRN VIETRI-96, organized by the International Institute for Advanced Scientific Studies "Eduardo R. Caianiello" and by the Societa Italiana Reti Neuroniche (SIREN). We would like to thank Professor L.B. Almeida who agreed to deliver an invited lecture which is included in these Proceedings. The spectrum of contributors and participants covers the activity of Italian research in the field and of some European groups. The highly qualified and motivated attendance is.proof of the interest with which this annual event has met in the Italian scientific community. Maria Marinaro Roberto Tagliaferri Organizing - Scientific Committee: B. Apolloni (Univ. Milano), A. Bertoni (Univ. Milano), D.o. Caviglia (Univ. Genova), P. Campadelli (Univ. Milano), M. Ceccarelli (CNR NapolD, A. Colla (ELSAG - Genova), M. Frixione (/lASS), C. Furlanello (IRST - Trento), G.M. Guazzo ( lASS), M. Gori (Univ. Firenze), F. Lauria (Univ. Napo/D, M. Marinaro (Univ. Salerno - flASS), F. Masulli (Univ. Genova), P. Morasso (Univ. Genova), G. Orlandi (Univ. Roma), E. Pasero (Politecnico Torino), A. Petrosino (CNR Napoli), M. Protasi (Univ. Roma Ilj, S. Rampone (/lASS), R. Serra (Gruppo Ferruzzi Ravenna), F. Sorbello (Univ. Palermo), R. Stefanel.1i (Politecnico Milano), R. Tagliaferri (Univ. Salerno), R. Vaccaro (CNR Napo/D."
Spatial trajectories have been bringing the unprecedented wealth to a variety of research communities. A spatial trajectory records the paths of a variety of moving objects, such as people who log their travel routes with GPS trajectories. The field of moving objects related research has become extremely active within the last few years, especially with all major database and data mining conferences and journals. "Computing with Spatial Trajectories" introduces the algorithms, technologies, and systems used to process, manage and understand existing spatial trajectories for different applications. This book also presents an overview on both fundamentals and the state-of-the-art research inspired by spatial trajectory data, as well as a special focus on trajectory pattern mining, spatio-temporal data mining and location-based social networks. Each chapter provides readers with a tutorial-style introduction to one important aspect of location trajectory computing, case studies and many valuable references to other relevant research work. "Computing with Spatial Trajectories" is designed as a reference or secondary text book for advanced-level students and researchers mainly focused on computer science and geography. Professionals working on spatial trajectory computing will also find this book very useful.
This book constitutes the refereed proceedings of the 5th International Conference on Computer Vision/Computer Graphics Collaboration Techniques, MIRAGE 2011, held in Rocquencourt, France, in October 2011. The 23 full papers presented were carefully reviewed and selected from numerous submissions. The papers cover a wide range of topics with focus on Computer Vision/Computer Graphics Collaboration Techniques involving image analysis/synthesis approaches especially concerning theoretical, computational, experimental or industrial aspects of model-based image analysis and image-based model synthesis.
This book covers the basic statistical and analytical techniques of computer intrusion detection. It is the first to present a data-centered approach to these problems. It begins with a description of the basics of TCP/IP, followed by chapters dealing with network traffic analysis, network monitoring for intrusion detection, host based intrusion detection, and computer viruses and other malicious code.
A fast and reasonably accurate perception of the environment is essential for successful navigation of an autonomous agent. Although many modes of sensing are applicable to this task and have been used, vision remains the most appealing due to its passive nature, good range, and resolution. Most vision techniques to recover depth for navigation use stereo. In the last few years, researchers have started studying techniques to combine stereo with the motion of the camera. Skifstad's dissertation proposes a new approach to recover depth information using known camera motion. This approach results in a robust technique for fast estimation of distances to objects in an image using only one translating camera. A very interesting aspect of the approach pursued by Skifstad is the method used to bypass the most difficult and computationally expensive step in using stereo or similar approaches for the vision-based depth esti mation. The correspondence problem has been the focus of research in most stereo approaches. Skifstad trades the correspondence problem for the known translational motion by using the fact that it is easier to detect single pixel disparities in a sequence of images rather than arbitrary disparities after two frames. A very attractive feature of this approach is that the computations required to detect single pixel disparities are local and hence can be easily parallelized. Another useful feature of the approach, particularly in naviga tion applications, is that the closer objects are detected earlier."
This book constitutes the proceedings of the First International Workshop on Similarity Based Pattern Recognition, SIMBAD 2011, held in Venice, Italy, in September 2011. The 16 full papers and 7 poster papers presented were carefully reviewed and selected from 35 submissions. The contributions are organized in topical sections on dissimilarity characterization and analysis; generative models of similarity data; graph-based and relational models; clustering and dissimilarity data; applications; spectral methods and embedding.
The two volume set LNCS 6938 and LNCS 6939 constitutes the refereed proceedings of the 7th International Symposium on Visual Computing, ISVC 2011, held in Las Vegas, NV, USA, in September 2011. The 68 revised full papers and 46 poster papers presented together with 30 papers in the special tracks were carefully reviewed and selected from more than 240 submissions. The papers of part I (LNCS 6938) are organized in computational bioimaging, computer graphics, motion and tracking, segmentation, visualization; mapping modeling and surface reconstruction, biomedical imaging, computer graphics, interactive visualization in novel and heterogeneous display environments, object detection and recognition. Part II (LNCS 6939) comprises topics such as immersive visualization, applications, object detection and recognition, virtual reality, and best practices in teaching visual computing.
International Conference on Advances in Pattern Recognition (ICAPR 98) at Plymouth represents an important meeting for advanced research in pattern recognition. There is considerable interest in the areas of image processing, medical imaging, speech recognition, document analysis and character recognition, fuzzy data analysis and neural networks. ICAPR 98 is aimed at providing an international platform for invited research in this multi-disciplinary area. It is expected that the conference will grow in future years to include more research contributions that detail state-of the-art research in pattern recognition. ICAPR 98 attracted contributions from different countries of the highest quality. I should like to thank the programme and organising committee for doing an excellent job in organising this conference. The peer reviewed nature of the conference ensured high quality publications in these proceedings. My personal thanks to Mrs. Barbara Davies who served as conference secretary and worked tirelessly in organising the conference. I thank the organising chair for the local arrangements and our should also key-note, plenary and tutorial speakers for their valuable contributions to the conference. I also thank Springer-Verlag for publishing these proceedings that will be a valuable source of research reference for the readers. Finally, I thank all participants who made this conference successful."
Line drawing interpretation is a challenging area with enormous
practical potential. At present, many companies throughout the
world invest large amounts of money and human resource in the input
of paper drawings into computers. The technology needed to produce
an image of a drawing is widely available, but the transformation
of these images into more useful forms is an active field of
research and development. Machine Interpretation of Line Drawing
Images
This book constitutes the refereed proceedings of the Second International Workshop on Machine Learning in Medical Imaging, MLMI 2011, held in conjunction with MICCAI 2011, in Toronto, Canada, in September 2011. The 44 revised full papers presented were carefully reviewed and selected from 74 submissions. The papers focus on major trends in machine learning in medical imaging aiming to identify new cutting-edge techniques and their use in medical imaging.
From its early beginnings in the fifties and sixties, the field of neural networks has been steadily developing to become one of the most interdisciplinary areas of research within computer science. This volume contains selected papers from WIRN Vietri-98, the 10th Italian Workshop on Neural Nets, 21-23 May 1998, Vietri sul Mare, Salerno, Italy. This annual event, sponsored amongst others by the IEEE Neural Network Council and the INNS/SIG Italy, brings together the best of research from all over the world. The papers cover a range of key topics within neural networks, including pattern recognition, signal processing, hybrid systems, mathematical models, hardware and software design, and fuzzy techniques. It also includes two review talks on a "Morpho-Functional" " Model to Describe Variability Found at" "Hippocampal" " Synapses" and "Neural Networks and Speech" "Processing." By providing the reader with a comprehensive overview of recent research in this area, the volume makes a valuable contribution to the "Perspectives in Neural" "Computing" Series.
This book constitutes the refereed proceedings of the First International Conference on Digital Image Processing and Pattern Recognition, DPPR 2011, held in Tirunelveli, India, in September 2011. The 48 revised full papers were carefully reviewed and selected from about 400 submissions. The conference brought together leading researchers, engineers and scientists in the domain of Digital Image Processing and Pattern Recognition. The papers cover all theoretical and practical aspects of the field and present new advances and current research results in two tracks, namely: digital image processing and pattern recognition, and computer science, engineering and information technology.
This book constitutes the refereed proceedings of the First
International Workshop on Multimodal Brain Image Analysis, held in
conjunction with MICCAI 2011, in Toronto, Canada, in September
2011.
This book constitutes the refereed proceedings of the 13th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2011, held in Ghent, Belgium, in August 2011. The 66 revised full papers presented were carefully reviewed and selected from 124 submissions. The papers are organized in topical sections on classification recognition, and tracking, segmentation, images analysis, image processing, video surveillance and biometrics, algorithms and optimization; and 3D, depth and scene understanding. |
You may like...
Taoism for Beginners - Understanding and…
Elizabeth Reninger
Paperback
4th Party Cyber Logistics for Air Cargo
Sung-Chi Chu, Lawrence C. Leung, …
Hardcover
R3,063
Discovery Miles 30 630
Flight Of The Diamond Smugglers - A Tale…
Matthew Gavin Frank
Paperback
|