![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Pattern recognition
Recently, there has been a dramatic increase in the use of sensors in the non-visible bands. As a result, there is a need for existing computer vision methods and algorithms to be adapted for use with non-visible sensors, or for the development of completely new methods and systems. Computer Vision Beyond the Visible Spectrum is the first book to bring together state-of-the-art work in this area. It presents new & pioneering research across the electromagnetic spectrum in the military, commercial, and medical domains. By providing a detailed examination of each of these areas, it focuses on the development of state-of-the-art algorithms and looks at how they can be used to solve existing & new challenges within computer vision. Essential reading for academics & industrial researchers working in the area of computer vision, image processing, and medical imaging, it will also be useful background reading for advanced undergraduate & postgraduate students.
As a graduate student at Ohio State in the mid-1970s, I inherited a unique c- puter vision laboratory from the doctoral research of previous students. They had designed and built an early frame-grabber to deliver digitized color video from a (very large) electronic video camera on a tripod to a mini-computer (sic) with a (huge ) disk drive-about the size of four washing machines. They had also - signed a binary image array processor and programming language, complete with a user's guide, to facilitate designing software for this one-of-a-kindprocessor. The overall system enabled programmable real-time image processing at video rate for many operations. I had the whole lab to myself. I designed software that detected an object in the eldofview, trackeditsmovementsinrealtime, anddisplayedarunningdescription of the events in English. For example: "An object has appeared in the upper right corner...Itismovingdownandtotheleft...Nowtheobjectisgettingcloser...The object moved out of sight to the left"-about like that. The algorithms were simple, relying on a suf cient image intensity difference to separate the object from the background (a plain wall). From computer vision papers I had read, I knew that vision in general imaging conditions is much more sophisticated. But it worked, it was great fun, and I was hooked.
Fuzzy sets were first proposed by Lotfi Zadeh in his seminal paper [366] in 1965, and ever since have been a center of many discussions, fervently admired and condemned. Both proponents and opponents consider the argu ments pointless because none of them would step back from their territory. And stiH, discussions burst out from a single sparkle like a conference pa per or a message on some fuzzy-mail newsgroup. Here is an excerpt from an e-mail messagepostedin1993tofuzzy-mail@vexpert. dbai. twvien. ac. at. by somebody who signed "Dave". , . . . Why then the "logic" in "fuzzy logic"? I don't think anyone has successfully used fuzzy sets for logical inference, nor do I think anyone wiH. In my admittedly neophyte opinion, "fuzzy logic" is a misnomer, an oxymoron. (1 would be delighted to be proven wrong on that. ) . . . I carne to the fuzzy literature with an open mind (and open wal let), high hopes and keen interest. I am very much disiHusioned with "fuzzy" per se, but I did happen across some extremely interesting things along the way. " Dave, thanks for the nice quote! Enthusiastic on the surface, are not many of us suspicious deep down? In some books and journals the word fuzzy is religiously avoided: fuzzy set theory is viewed as a second-hand cheap trick whose aim is nothing else but to devalue good classical theories and open up the way to lazy ignorants and newcomers.
This book brings all the major and frontier topics in the field of document analysis together into a single volume, creating a unique reference source that will be invaluable to a large audience of researchers, lecturers and students working in this field. With chapters written by some of the most distinguished researchers active in this field, this book addresses recent advances in digital document processing research and development.
The evolution of technology has set the stage for the rapid growth of the video Web: broadband Internet access is ubiquitous, and streaming media protocols, systems, and encoding standards are mature. In addition to Web video delivery, users can easily contribute content captured on low cost camera phones and other consumer products. The media and entertainment industry no longer views these developments as a threat to their established business practices, but as an opportunity to provide services for more viewers in a wider range of consumption contexts. The emergence of IPTV and mobile video services offers unprecedented access to an ever growing number of broadcast channels and provides the flexibility to deliver new, more personalized video services. Highly capable portable media players allow us to take this personalized content with us, and to consume it even in places where the network does not reach. Video search engines enable users to take advantage of these emerging video resources for a wide variety of applications including entertainment, education and communications. However, the task of information extr- tion from video for retrieval applications is challenging, providing opp- tunities for innovation. This book aims to first describe the current state of video search engine technology and second to inform those with the req- site technical skills of the opportunities to contribute to the development of this field. Today's Web search engines have greatly improved the accessibility and therefore the value of the Web.
This book features a collection of articles presented at the 2007 Workshop on Advances in Pattern Recognition, which was organized in conjunction with the 5th International Summer School on Pattern Recognition. It provides readers with the state-of-the-art algorithms in the area of pattern recognition as well as a presentation of the cutting edge applications within the field.
This book introduces the area of image processing and data-parallel processing. It covers a number of standard algorithms in image processing and describes their parallel implementation. The programming language chosen for all examples is a structured parallel programming language which is ideal for educational purposes. It has a number of advantages over C, and since all image processing tasks are inherently parallel, using a parallel language for presentation actually simplifies the subject matter. This results in shorter source codes and a better understanding. Sample programs and a free compiler are available on an accompanying Web site.
This book presents recent developments in automatic text analysis. Providing an overview of linguistic modeling, it collects contributions of authors from a multidisciplinary area that focus on the topic of automatic text analysis from different perspectives. It includes chapters on cognitive modeling and visual systems modeling, and contributes to the computational linguistic and information theoretical grounding of automatic text analysis.
This book introduces a dynamic, on-line fuzzy inference system. In this system membership functions and control rules are not determined until the system is applied and each output of its lookup table is calculated based on current inputs. The book describes the real-world uses of new fuzzy techniques to simplify readers' tuning processes and enhance the performance of their control systems. It further contains application examples.
Principles of Visual Information Retrieval introduces the basic
concepts and techniques in VIR and develops a foundation that can
be used for further research and study.
Understanding sequence data, and the ability to utilize this hidden knowledge, will create a significant impact on many aspects of our society. Examples of sequence data include DNA, protein, customer purchase history, web surfing history, and more. This book provides thorough coverage of the existing results on sequence data mining as well as pattern types and associated pattern mining methods. It offers balanced coverage on data mining and sequence data analysis, allowing readers to access the state-of-the-art results in one place.
This book constitutes the refereed proceedings of the 18th International Multimedia Modeling Conference, MMM 2012, held in Klagenfurt, Austria, in January 2012. The 38 revised regular papers, 12 special session papers, 15 poster session papers, and 6 demo session papers were carefully reviewed and selected from 142 submissions. The papers are organized in the following topical sections: annotation, annotation and interactive multimedia applications, event and activity, mining and mobile multimedia applications, search, summarization and visualization, visualization and advanced multimedia systems, and the special sessions: interactive and immersive entertainment and communication, multimedia preservation: how to ensure multimedia access over time, multi-modal and cross-modal search, and video surveillance.
In order to build successful video processing systems, it is important to consider not only traditional image processing methods, but also techniques which account for temporal aspects like object motion and changes in lighting. This "Introduction to Video and Image Processing" presents the fundamental concepts and methods in an unique, easy-to-read style which ensures the material is accessible to a wide audience. Exploring more than just the basics of image processing, the text provides a specific focus on the practical design and implementation of real systems for processing video data. Topics and features: includes more than 100 exercises, as well as C-code snippets of the key algorithms; equips the reader with a solid foundation for understanding and working with images and video, including basic methods for image manipulation and image analysis; covers topics on image acquisition, color images, point processing, neighborhood processing, morphology, BLOB analysis, segmentation in video, tracking, geometric transformation, and visual effects; requires only a minimal understanding of mathematics, with the necessary basics covered in an appendix; presents two chapters dedicated to applications, in which the different methods are applied in real systems, supported by further application examples at an associated website; concludes each chapter with pointers to additional concepts, methods and details not covered in the book; provides a guide to defining suitable values for parameters in video and image processing systems, and to conversion between the RGB color representation and the HIS, HSV and YUV/YC"b"C"r" color representations. This concise and easy-to-follow textbook/reference is an ideal introduction to the subject for both first-year engineering students and for non-engineering students without a strong mathematical background. Suitable for self-study, professionals outside of the field will also find the work an excellent overview of the basics.
Correcting the Great Mistake People often mistake one thing for another. That's human nature. However, one would expect the leaders in a particular ?eld of endeavour to have superior ab- ities to discriminate among the developments within that ?eld. That is why it is so perplexing that the technology elite - supposedly savvy folk such as software developers, marketers and businessmen - have continually mistaken Web-based graphics for something it is not. The ?rst great graphics technology for the Web, VRML, has been mistaken for something else since its inception. Viewed variously as a game system, a format for architectural walkthroughs, a platform for multi-user chat and an augmentation of reality, VRML may qualify as the least understood invention in the history of inf- mation technology. Perhaps it is so because when VRML was originally introduced it was touted as a tool for putting the shopping malls of the world online, at once prosaic and horrifyingly mundane to those of us who were developing it. Perhaps those ?rst two initials,"VR,"created expectations of sprawling, photorealistic f- tasy landscapes for exploration and play across the Web. Or perhaps the magnitude of the invention was simply too great to be understood at the time by the many, ironically even by those spending the money to underwrite its development. Regardless of the reasons, VRML suffered in the mainstream as it was twisted to meet unintended ends and stretched far beyond its limitations.
Computer security - the protection of data and computer systems from intentional, malicious intervention - is attracting increasing attention. Much work has gone into development of tools to detect ongoing or already perpetrated attacks, but a key shortfall in current intrusion detection systems is the high number of false alarms they produce. This book analyzes the false alarm problem, then applies results from the field of information visualization to the problem of intrusion detection. Four different visualization approaches are presented, mainly applied to data from web server access logs.
Humans are often extraordinary at performing practical reasoning. There are cases where the human computer, slow as it is, is faster than any artificial intelligence system. Are we faster because of the way we perceive knowledge as opposed to the way we represent it? The authors address this question by presenting neural network models that integrate the two most fundamental phenomena of cognition: our ability to learn from experience, and our ability to reason from what has been learned. This book is the first to offer a self-contained presentation of neural network models for a number of computer science logics, including modal, temporal, and epistemic logics. By using a graphical presentation, it explains neural networks through a sound neural-symbolic integration methodology, and it focuses on the benefits of integrating effective robust learning with expressive reasoning capabilities. The book will be invaluable reading for academic researchers, graduate students, and senior undergraduates in computer science, artificial intelligence, machine learning, cognitive science and engineering. It will also be of interest to computational logicians, and professional specialists on applications of cognitive, hybrid and artificial intelligence systems.
This textbook is for graduate students and research workers in social statistics and related subject areas. It follows a novel curriculum developed around the basic statistical activities: sampling, measurement and inference. The monograph aims to prepare the reader for the career of an independent social statistician and to serve as a reference for methods, ideas for and ways of studying of human populations. Elementary linear algebra and calculus are prerequisites, although the exposition is quite forgiving. Familiarity with statistical software at the outset is an advantage, but it can be developed while reading the first few chapters.
This professional book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. This book also includes identity-based signatures, spyware, and placing biometric security in an economically broken system, which results in a broken biometric system. The last chapters include systematic problems with practical individual strategies for preventing identity theft for any reader of any economic status. While a plethora of books on identity theft exists, this book combines both technical and economic aspects, presented from the perspective of the identified individual.
These two volumes, LNCS 7076 and LNCS 7077, constitute the refereed proceedings of the Second International Conference on Swarm, Evolutionary, and Memetic Computing, SEMCCO 2011, held in Visakhapatnam, India, in December 2011. The 124 revised full papers presented in both volumes were carefully reviewed and selected from 422 submissions. The papers explore new application areas, feature new bio-inspired algorithms for solving specific hard optimization problems, and review the latest progresses in the cutting-edge research with swarm, evolutionary, and memetic computing in both theoretical and practical aspects.
Neural networks are members of a class of software that have the potential to enable intelligent computational systems capable of simulating characteristics of biological thinking and learning. Currently no standards exist to verify and validate neural network-based systems. NASA Independent Verification and Validation Facility has contracted the Institute for Scientific Research, Inc. to perform research on this topic and develop a comprehensive guide to performing V&V on adaptive systems, with emphasis on neural networks used in safety-critical or mission-critical applications. Methods and Procedures for the Verification and Validation of Artificial Neural Networks is the culmination of the first steps in that research. This volume introduces some of the more promising methods and techniques used for the verification and validation (V&V) of neural networks and adaptive systems. A comprehensive guide to performing V&V on neural network systems, aligned with the IEEE Standard for Software Verification and Validation, will follow this book.
This comprehensive textbook on data mining details the unique steps of the knowledge discovery process that prescribes the sequence in which data mining projects should be performed, from problem and data understanding through data preprocessing to deployment of the results. This knowledge discovery approach is what distinguishes Data Mining from other texts in this area. The book provides a suite of exercises and includes links to instructional presentations. Furthermore, it contains appendices of relevant mathematical material.
Computational Intelligence is tolerant of imprecise information, partial truth and uncertainty. This book presents a selected collection of contributions on a focused treatment of important elements of CI, centred on its key element: learning. This book presents novel applications and real world applications working in Manufacturing and Engineering, and it sets a basis for understanding Domotic and Production Methods of the XXI Century.
It is an established tradition that researchers from many countries get together on the average every three years for a two week Advanced Studies Institute on Automatic Speech Recognition and Synthesis. According to ASI policies the Institute is financed by NATO. This book contains the texts of lectures and papers contributed by the attendees of the ASI which was held July 2 - 14, 1984, at Bonas, Gers, France. Focussed on New Systems and Architectures for Automatic Speech Recognition and Synthesis, this book is divided into 4 parts: (a) Review of ba8ic algorithm8 (b) SY8tem architecture and VLSI for automatic Speech (c) Software 8Y8tem8 for automatic 8peech recognition, (d) Speech 8ynthe8i8 and phonetic8. Due to the international nature of the Institute, the readers will find in this book different styles, different points of view and applications to different languages. This reflects also some characteristics of the International Association for Pattern Recognition ( APR) whose technical committee on Speech Recognition has organized this ASI. Proposed contributions have been reviewed by an Editorial Committee composed of W. Ainsworth (Kent), R. Bisiani (Pittsburgh), J. P. Haton (Nancy), W. Hess (Munich), J. L. Houle (Montreal), P. Laface (Turin), R. Moore (Malvern), H. Niemann (Erlangen) and J. Ohala (Berkeley). Typesetting of the book was performed using SYMSET facilities developed entirely by the Department of Computer Science at Concordia University. Special thanks are due to L. Lam, H. Monkiewicz and L. Thiel.
This book constitutes the refereed proceedings of the Second
International Workshop on Human Behavior Understanding, HBU 2011,
held in Amsterdam, The Netherlands, in November 2011, in
conjunction with AmI-11, the International Joint Conference on
Ambient Intelligence.
This book contains several invited papers and a selection of research papers submitted to Computer Animation '92, the fourth international workshop on Computer Animation, which was held in Geneva on May 20-22. This workshop, now an annual event, has been organized by the Computer Graphics Society, the University of Geneva, and the Swiss Federal Institute of Technology in Lausanne. During the international workshop on Computer Animation '92, the fifth Computer-generated Film Festival of Geneva, was held. The book presents original research results and applications experience in various areas of computer animation. This year most papers are related to physics-based animation, human animation, and geometric modelling for animation. NADIA MAGNENAT THALMANN DANIEL THALMANN Table of Contents Part I: Physics-based Animation The Control of Hovering Flight for Computer Animation David Haumann, Jessica K. Hodgins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Inverse Problems in Computer Graphics Michael Kass . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . " . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 NPSNET: Physically-based Modeling Enhancements to An Object File Format Michael J. Zyda, James G. Monahan, David R. Pratt. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 A New Method for Approximative Interactive Dynamics Ulrich Leiner, Bernhard Preim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Part ll: Human animation Extraction of 3D Shapes from the Moving Human Face Using Lighting Swjtch Photometry Hitoshi Saji, Hirohisa Hioki, Yoshihisa Shinagawa, Kensyu Yoshida, Tosiyasu L. Kunii . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 An Interactive Tool for the Design of Human Free-Walking Trajectories Laurent Bezault, Ronan Boulic, Nadia Magnenat Thalmann, Daniel Thalmann . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Achilles - A System for Visualizing Non Standard Human Gait Homero L. Piccolo, Kentaro Takahashi, Marcus G. de Amorim, Andre C. de Sa Carneiro . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
You may like...
Biometric Systems - Technology, Design…
James L. Wayman, Anil K. Jain, …
Hardcover
R2,924
Discovery Miles 29 240
Natural Computing for Unsupervised…
Xiangtao Li, Ka-Chun Wong
Hardcover
R2,677
Discovery Miles 26 770
Biometric Security and Privacy…
Richard Jiang, Somaya Al-Maadeed, …
Hardcover
R4,834
Discovery Miles 48 340
Natural User Interfaces in Medical Image…
Marek R. Ogiela, Tomasz Hachaj
Hardcover
R1,990
Discovery Miles 19 900
Mobile Networks for Biometric Data…
Massimo Conti, Natividad Martinez Madrid, …
Hardcover
R6,197
Discovery Miles 61 970
Handbook of Medical Image Computing and…
S. Kevin Zhou, Daniel Rueckert, …
Hardcover
R4,574
Discovery Miles 45 740
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain
Hardcover
R7,962
Discovery Miles 79 620
Dark Web Pattern Recognition and Crime…
Romil Rawat, Vinod Mahor, …
Hardcover
R6,208
Discovery Miles 62 080
|