![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Pattern recognition
This book uses a mathematical approach to deriving the laws of science and technology, based upon the concept of Fisher information. The approach that follows from these ideas is called the principle of Extreme Physical Information (EPI). The authors show how to use EPI to determine the theoretical input/output laws of unknown systems. Will benefit readers whose math skill is at the level of an undergraduate science or engineering degree.
The International Gesture Workshops (GW) are interdisciplinary events for those researching gesture-based communication across the disciplines. The focus of these events is a shared interest in understanding gestures and sign language in their many facets, and using them for advancing human-machine interaction. Since 1996, International Gesture Workshops have been held roughly every second year, with fully reviewed proceedings published by Springer. The International Gesture Workshop GW 2009 was hosted by Bielefeld University's Center for Interdisciplinary Research (ZiF - Zentrum fur interdisziplinare Forschung) during February 25-27, 2009. Like its predecessors, GW 2009 aimed to provide a platform for participants to share, discuss, and criticize recent and novel research with a multidisciplinary audience. More than 70 computer scientists, linguistics, psychologists, neuroscientists as well as dance and music scientists from 16 countries met to present and exchange their newest results under the umbrella theme "Gesture in Embodied Communication and Human-Computer Interaction. " Consistent with the steady growth of research activity in this area, a large number of high-quality submissions were received, which made GW 2009 an exciting and important event for anyone interested in gesture-related technological research relevant to human-computer interaction. In line with the practice of previous gesture workshops, presenters were invited to submit theirs papers for publication in a subsequent peer-reviewed publication of high quality. The present book is the outcome of this effort. Representing the research work from eight countries, it contains a selection of 28 thoroughly reviewed articles.
This volume constitutes the refereed proceedings of the 14th International Workshop on Combinatorial Image Analysis, IWCIA 2011, held in Madrid, Spain, in May 2011. The 25 revised full papers and 13 poster papers presented together with 4 invited contributions were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections such as combinatorial problems in the discrete plane and space related to image analysis; lattice polygons and polytopes; discrete/combinatorial geometry and topology and their use in image analysis; digital geometry of curves and surfaces; tilings and patterns; combinatorial pattern matching; image representation, segmentation, grouping, and reconstruction; methods for image compression; discrete tomography; applications of integer programming, linear programming, and computational geometry to problems of image analysis; parallel architectures and algorithms for image analysis; fuzzy and stochastic image analysis; grammars and models for image or scene analysis and recognition, cellular automata; mathematical morphology and its applications to image analysis; applications in medical imaging, biometrics, and others.
This book constitutes the refereed proceedings of the 22nd International Conference on Information Processing in Medical Imaging, IPMI 2011, held at Kloster Irsee, Germany, in July 2011. The 24 full papers and 39 poster papers included in this volume were carefully reviewed and selected from 224 submissions. The papers are organized in topical sections on segmentation, statistical methods, shape analysis, registration, diffusion imaging, disease progression modeling, and computer aided diagnosis. The poster sessions deal with segmentation, shape analysis, statistical methods, image reconstruction, microscopic image analysis, computer aided diagnosis, diffusion imaging, functional brain analysis, registration and other related topics.
This book constitutes the refereed proceedings of the International Conference on Ergonomics and Health Aspects of Work with Computers, EHAWC 2011, held within the framework of the 14th International Conference on Human-Computer Interaction, HCII 2011, incorporating 12 thematically similar conferences. A total of 4039 contributions was submitted to HCII 2011, of which 1318 papers were accepted for publication. The 25 papers presented in this volume were carefully reviewed and selected for inclusion in the book. They are organized in topical sections on quality of working life; health and well-being; and interactive devices and interfaces.
This book constitutes the refereed proceedings of the Second
International Conference on Autonomous and Intelligent Systems, AIS
2011, held in Burnaby, BC, Canada, in June 2011, colocated with the
International Conference on Image Analysis and Recognition, IACIAR
2011.
This book constitutes the proceedings of the Second International Conference on Information Processing in Computer-Assisted Interventions IPCAI 2011, held in Berlin, Germany, on June 22, 2011. The 17 papers presented were carefully reviewed and selected from 29 submissions. The focus of the conference is the use of information technology in interventional medicine, including real-time modeling and analysis, technology, human-machine interfaces, and systems associated with operating rooms and interventional suites. It also covers the overall information flow associated with intervention planning, execution, follow-up, and outcome analysis; as well as training and skill assessment for such procedures.
This two volume set LNCS 6791 and LNCS 6792 constitutes the
refereed proceedings of the 21th International Conference on
Artificial Neural Networks, ICANN 2011, held in Espoo, Finland, in
June 2011.
st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification and access control is growing, not only in companies and organisations but also in the world at large. At the same time, such security measures have to be balanced with means for protecting the privacy of users. Identity management is put under pressure, due to the growing number of frauds who want to hide their true identity. This challenges the information security research community to focus on interdisciplinary and holistic approaches while retaining the benefits of previous research efforts. In this context, the IFIP Working Group 11.6 on Identity Management has been founded in August 2006. The intention of the Working Group is to offer a broad forum for the exchange of knowledge and for the tracking and discussion of issues and new developments. In this, we take an interdisciplinary approach. Scientists as well as practitioners, from government and business, who are involved in the field of identity management are welcome to participate. The IDMAN 2007 Conference on Policies and Research in Identity Management was the very first conference organized by this Working Group. We aim to organize conferences bi-annually. The IDMAN 2007 Conference has been centered around the theme of National Identity Management or, in other words, identity management in the public sector.
This book collects the lectures given at the NATO Advanced Study Institute From Identijication to Learning held in Villa Olmo, Como, Italy, from August 22 to September 2, 1994. The school was devoted to the themes of Identijication, Adaptation and Learning, as they are currently understood in the Information and Contral engineering community, their development in the last few decades, their inter connections and their applications. These titles describe challenging, exciting and rapidly growing research areas which are of interest both to contral and communication engineers and to statisticians and computer scientists. In accordance with the general goals of the Institute, and notwithstanding the rat her advanced level of the topics discussed, the presentations have been generally kept at a fairly tutorial level. For this reason this book should be valuable to a variety of rearchers and to graduate students interested in the general area of Control, Signals and Information Pracessing. As the goal of the school was to explore a common methodologicalline of reading the issues, the flavor is quite interdisciplinary. We regard this as an original and valuable feature of this book."
The recent development of intelligent surveillance systems has captured the interest of both academic research labs and industry. Automated Multi-Camera Surveillance addresses monitoring of people and vehicles, and detection of threatening objects and events in a variety of scenarios. In this book, techniques for development of an automated multi-camera surveillance system are discussed and proposed. The state-of-the-art in the automated surveillance systems is reviewed as well. Detailed explanation of sub-components of surveillance systems are provided, and enhancements to each of these components are proposed. The authors identify important challenges that such a system must address, and propose solutions. Development of a specific surveillance system called "KNIGHT" is described, along with the authors' experience using it. This book enables the reader to understand the mathematical models and algorithms underlying automated surveillance as well as the benefits and limitations of using such methods.
This volume presents high quality, state-of-the-art research ideas and results from theoretic, algorithmic and application viewpoints. It contains contributions by leading experts in the obsequious scientific and technological field of multimedia. The book specifically focuses on interaction with multimedia content with special emphasis on multimodal interfaces for accessing multimedia information. The book is designed for a professional audience composed of practitioners and researchers in industry. It is also suitable for advanced-level students in computer science.
Over the last few decades, research on handwriting recognition has made impressive progress. The research and development on handwritten word recognition are to a large degree motivated by many application areas, such as automated postal address and code reading, data acquisition in banks, text-voice conversion, security, etc. As the prices of scanners, com puters and handwriting-input devices are falling steadily, we have seen an increased demand for handwriting recognition systems and software pack ages. Some commercial handwriting recognition systems are now available in the market. Current commercial systems have an impressive performance in recognizing machine-printed characters and neatly written texts. For in stance, High-Tech Solutions in Israel has developed several products for container ID recognition, car license plate recognition and package label recognition. Xerox in the U. S. has developed TextBridge for converting hardcopy documents into electronic document files. In spite of the impressive progress, there is still a significant perfor mance gap between the human and the machine in recognizing off-line unconstrained handwritten characters and words. The difficulties encoun tered in recognizing unconstrained handwritings are mainly caused by huge variations in writing styles and the overlapping and the interconnection of neighboring characters. Furthermore, many applications demand very high recognition accuracy and reliability. For example, in the banking sector, although automated teller machines (ATMs) and networked banking sys tems are now widely available, many transactions are still carried out in the form of cheques."
This book constitutes the refereed proceedings of the 9th International Conference on Smart Homes and Health Telematics, ICOST 2011, held in Montreal, Canada, in June 2011. The 25 revised full papers presented together with 16 short papers and 8 student papers were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections on smart home and village; health telematics and healthcare technology; wellbeing, ageing friendly and enabling technology; and medical health telematics and healthcare technology.
Integrates computer vision, pattern recognition, and AI. Presents original research that will benefit researchers and professionals in computer vision, pattern recognition, target recognition, machine learning, evolutionary learning, image processing, knowledge discovery and data mining, cybernetics, robotics, automation and psychology
From the reviews: "This book is very well written and contains many important and new original results that certainly play an important role in today 's nonlinear optics." Physicalia
This two-volume set LNCS 6691 and 6692 constitutes the refereed proceedings of the 11th International Work-Conference on Artificial Neural Networks, IWANN 2011, held in Torremolinos-M laga, Spain, in June 2011. The 154 revised papers were carefully reviewed and selected from 202 submissions for presentation in two volumes. The second volume includes 76 papers organized in topical sections on video and image processing; hybrid artificial neural networks: models, algorithms and data; advances in machine learning for bioinformatics and computational biomedicine; biometric systems for human-machine interaction; data mining in biomedicine; bio-inspired combinatorial optimization; applying evolutionary computation and nature-inspired algorithms to formal methods; recent advances on fuzzy logic and soft computing applications; new advances in theory and applications of ICA-based algorithms; biological and bio-inspired dynamical systems; and interactive and cognitive environments. The last section contains 9 papers from the International Workshop on Intelligent Systems for Context-Based Information Fusion, ISCIF 2011, held at IWANN 2011.
We welcome you to the First International Conference on Arts and Technology (ArtsIT 2009), hosted by CSIE of the National Ilan University and co-organized by the National Science Council, ICST, College of EECS at National Ilan University, Software Simulation Society in Taiwan, ISAC, TCA, NCHC, CREATE-NET, and Institute for Information Industry. ArtsIT2009 was held in Yilan, Taiwan, during September 24-25, 2009. The conference comprised the following themes: * New Media Technologies (Evolutionary systems that create arts or display art works, such as tracking sensors, wearable computers, mixed reality, etc. ) * Software Art (Image processing or computer graphics techniques that create arts, including algorithmic art, mathematic art, advanced modeling and rend- ing, etc. ) * Animation Techniques (2D or 3D computer animations, AI-based animations, etc. ) * Multimedia (Integration of different media, such as virtual reality systems, audio, performing arts, etc. ) * Interactive Methods (Vision-based tracking and recognition, interactive art, etc. ) The conference program started with an opening ceremony, followed by three keynote speeches and four technical sessions distributed over a period of two days. Two poster sessions, one hour each, were scheduled before the afternoon oral sessions. An Int- active Arts Exhibition was held in conjunction with ArtsIT 2009. Twelve well-known digital arts teams from Taiwan exhibited 15 artworks in this event, including 10 int- active installation arts, 4 video arts, and 1 digital print. The conference received around 50 submissions from 15 different countries.
This comprehensive textbook on data mining details the unique steps of the knowledge discovery process that prescribes the sequence in which data mining projects should be performed, from problem and data understanding through data preprocessing to deployment of the results. This knowledge discovery approach is what distinguishes Data Mining from other texts in this area. The book provides a suite of exercises and includes links to instructional presentations. Furthermore, it contains appendices of relevant mathematical material.
Clustering is one of the most fundamental and essential data analysis techniques. Clustering can be used as an independent data mining task to discern intrinsic characteristics of data, or as a preprocessing step with the clustering results then used for classification, correlation analysis, or anomaly detection. Kogan and his co-editors have put together recent advances in clustering large and high-dimension data. Their volume addresses new topics and methods which are central to modern data analysis, with particular emphasis on linear algebra tools, opimization methods and statistical techniques. The contributions, written by leading researchers from both academia and industry, cover theoretical basics as well as application and evaluation of algorithms, and thus provide an excellent state-of-the-art overview. The level of detail, the breadth of coverage, and the comprehensive bibliography make this book a perfect fit for researchers and graduate students in data mining and in many other important related application areas.
The three-volume set LNCS 6675, 6676 and 6677 constitutes the refereed proceedings of the 8th International Symposium on Neural Networks, ISNN 2011, held in Guilin, China, in May/June 2011. The total of 215 papers presented in all three volumes were carefully reviewed and selected from 651 submissions. The contributions are structured in topical sections on computational neuroscience and cognitive science; neurodynamics and complex systems; stability and convergence analysis; neural network models; supervised learning and unsupervised learning; kernel methods and support vector machines; mixture models and clustering; visual perception and pattern recognition; motion, tracking and object recognition; natural scene analysis and speech recognition; neuromorphic hardware, fuzzy neural networks and robotics; multi-agent systems and adaptive dynamic programming; reinforcement learning and decision making; action and motor control; adaptive and hybrid intelligent systems; neuroinformatics and bioinformatics; information retrieval; data mining and knowledge discovery; and natural language processing.
Many computer scientists, engineers, applied mathematicians, and physicists use geometry theory and geometric computing methods in the design of perception-action systems, intelligent autonomous systems, and man-machine interfaces. This handbook brings together the most recent advances in the application of geometric computing for building such systems, with contributions from leading experts in the important fields of neuroscience, neural networks, image processing, pattern recognition, computer vision, uncertainty in geometric computations, conformal computational geometry, computer graphics and visualization, medical imagery, geometry and robotics, and reaching and motion planning. For the first time, the various methods are presented in a comprehensive, unified manner. This handbook is highly recommended for postgraduate students and researchers working on applications such as automated learning; geometric and fuzzy reasoning; human-like artificial vision; tele-operation; space maneuvering; haptics; rescue robots; man-machine interfaces; tele-immersion; computer- and robotics-aided neurosurgery or orthopedics; the assembly and design of humanoids; and systems for metalevel reasoning.
In today's security-conscious society, real-world applications for authentication or identification require a highly accurate system for recognizing individual humans. The required level of performance cannot be achieved through the use of a single biometric such as face, fingerprint, ear, iris, palm, gait or speech. Fusing multiple biometrics enables the indexing of large databases, more robust performance and enhanced coverage of populations. Multiple biometrics are also naturally more robust against attacks than single biometrics. This book addresses a broad spectrum of research issues on multibiometrics for human identification, ranging from sensing modes and modalities to fusion of biometric samples and combination of algorithms. It covers publicly available multibiometrics databases, theoretical and empirical studies on sensor fusion techniques in the context of biometrics authentication, identification and performance evaluation and prediction.
Markov random field (MRF) theory provides a basis for modeling contextual constraints in visual processing and interpretation. It enables us to develop optimal vision algorithms systematically when used with optimization principles. This book presents a comprehensive study on the use of MRFs for solving computer vision problems. Various vision models are presented in a unified framework, including image restoration and reconstruction, edge and region segmentation, texture, stereo and motion, object matching and recognition, and pose estimation. This third edition includes the most recent advances and has new and expanded sections on topics such as: Bayesian Network; Discriminative Random Fields; Strong Random Fields; Spatial-Temporal Models; Learning MRF for Classification. This book is an excellent reference for researchers working in computer vision, image processing, statistical pattern recognition and applications of MRFs. It is also suitable as a text for advanced courses in these areas.
This book contains an edited collection of eighteen contributions on soft and hard computing techniques and their applications to autonomous robotic systems. Each contribution has been exclusively written for this volume by a leading researcher. The volume demonstrates the various ways that the soft computing and hard computing techniques can be used in different integrated manners to better develop autonomous robotic systems that can perform various tasks of vision, perception, cognition, thinking, pattern recognition, decision-making, and reasoning and control, amongst others. Each chapter of the book is self-contained and points out the future direction of research. "It is a must reading for students and researchers interested in
exploring the potentials of the fascinating field that will form
the basis for the design of the intelligent machines of the
future" |
You may like...
Imaging, Vision and Learning Based on…
Xue-Cheng Tai, Egil Bae, …
Hardcover
R1,428
Discovery Miles 14 280
Neural Representations of Natural…
Lyndon White, Roberto Togneri, …
Hardcover
R2,427
Discovery Miles 24 270
Pattern Recognition And Big Data
Sankar Kumar Pal, Amita Pal
Hardcover
R7,545
Discovery Miles 75 450
Handbook of Medical Image Computing and…
S. Kevin Zhou, Daniel Rueckert, …
Hardcover
R4,574
Discovery Miles 45 740
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain
Hardcover
R7,962
Discovery Miles 79 620
Biometric Security and Privacy…
Richard Jiang, Somaya Al-Maadeed, …
Hardcover
R4,834
Discovery Miles 48 340
Supervised and Unsupervised Learning for…
Michael W. Berry, Azlinah Mohamed, …
Hardcover
R2,533
Discovery Miles 25 330
Dark Web Pattern Recognition and Crime…
Romil Rawat, Vinod Mahor, …
Hardcover
R6,208
Discovery Miles 62 080
|