|
Showing 1 - 15 of
15 matches in All Departments
This book focuses on the key technologies and scientific problems
involved in emotional robot systems, such as multimodal emotion
recognition (i.e., facial expression/speech/gesture and their
multimodal emotion recognition) and emotion intention
understanding, and presents the design and application examples of
emotional HRI systems. Aiming at the development needs of emotional
robots and emotional human-robot interaction (HRI) systems, this
book introduces basic concepts, system architecture, and system
functions of affective computing and emotional robot systems. With
the professionalism of this book, it serves as a useful reference
for engineers in affective computing, and graduate students
interested in emotion recognition and intention understanding. This
book offers the latest approaches to this active research area. It
provides readers with the state-of-the-art methods of multimodal
emotion recognition, intention understanding, and application
examples of emotional HRI systems.
This book discusses the developments in the advanced control and
intelligent automation for complex systems completed over the last
two decades, including the progress in advanced control theory and
method, intelligent control and decision-making of complex
metallurgical processes, intelligent systems and machine learning,
intelligent robot systems design and control, and prediction and
control technology for renewable energy. With the depth and breadth
of coverage of this book, it serves as a useful reference for
engineers in the field of automation and complex process control
and graduate students interested in advanced control theory and
computational intelligence as well as their applications to the
complex industrial processes. This book offers an up-to-date
overview of this active research area. It provides readers with the
state-of-the-art methods for advanced control and intelligent
automation for complex systems
This book discusses the intelligent optimization and control of
complex metallurgical processes, including intelligent optimization
and control of raw-material proportioning processes, coking
process, and reheating furnaces; intelligent control of thermal
state parameters in sintering processes; and intelligent decoupling
control of gas collection and mixing-and-pressurization processes.
The intelligent control and optimization methods presented were
originally applied to complex metallurgical processes by the
authors, and their effectiveness and their advantages have been
theoretically proven and demonstrated practically. This book offers
an up-to-date overview of this active research area, and provides
readers with state-of-the-art methods for the control of complex
metallurgical processes.
Deep Learning has achieved great success in many challenging
research areas, such as image recognition and natural language
processing. The key merit of deep learning is to automatically
learn good feature representation from massive data conceptually.
In this book, we will show that the deep learning technology can be
a very good candidate for improving sensing capabilities.In this
edited volume, we aim to narrow the gap between humans and machines
by showcasing various deep learning applications in the area of
sensing. The book will cover the fundamentals of deep learning
techniques and their applications in real-world problems including
activity sensing, remote sensing and medical sensing. It will
demonstrate how different deep learning techniques help to improve
the sensing capabilities and enable scientists and practitioners to
make insightful observations and generate invaluable discoveries
from different types of data.
Bringing together a team of cutting-edge researchers based in Hong
Kong, Taiwan and Indo-Pacific countries, this book focuses on the
tug of war between China's influence and forces of resistance in
Hong Kong, Taiwan and selected countries in its surrounding
jurisdictions. China's influence has met growing defiance from
citizens in Hong Kong and Taiwan who fear the extinction of their
valued local identities. However, the book shows that resistance to
China's influence is a global phenomenon, varying in motivation and
intensity from region to region and country to country depending on
the forms of China's influence and the balances of forces in each
society. The book also advances a concentric center-periphery
framework for comparing different forms of extra-jurisdictional
Chinese influence mechanisms, ranging from economic, military and
diplomatic influences to united front operations. This book will be
of key interest to scholars and students of comparative politics,
international relations, geopolitics, Chinese politics, Hong
Kong-China relations, Taiwan and Asian politics.
Bringing together a team of cutting-edge researchers based in Hong
Kong, Taiwan and Indo-Pacific countries, this book focuses on the
tug of war between China's influence and forces of resistance in
Hong Kong, Taiwan and selected countries in its surrounding
jurisdictions. China's influence has met growing defiance from
citizens in Hong Kong and Taiwan who fear the extinction of their
valued local identities. However, the book shows that resistance to
China's influence is a global phenomenon, varying in motivation and
intensity from region to region and country to country depending on
the forms of China's influence and the balances of forces in each
society. The book also advances a concentric center-periphery
framework for comparing different forms of extra-jurisdictional
Chinese influence mechanisms, ranging from economic, military and
diplomatic influences to united front operations. This book will be
of key interest to scholars and students of comparative politics,
international relations, geopolitics, Chinese politics, Hong
Kong-China relations, Taiwan and Asian politics.
With the advances of the digital information revolution and the societal changes they have prompted, it has become critical to facilitate secure management of content usage and delivery across communication networks. Data hiding and digital watermarking are promising new technologies for multimedia information protection and rights management. Multimedia Data Hiding addresses the theory, methods, and design of multimedia data hiding and its application to multimedia rights management, information security, and communication. It offers theoretical and practical aspects, and both design and attack problems. Applications discussed include: annotation, tamper detection, copy/access control, fingerprinting, and ownership protection. Countermeasures for attacks on data hiding are discussed, and a chapter assesses attack problems on digital music protection under a unique competitive environment. Topics and features: * Comprehensive and practical coverage of data hiding for various media types, including binary image, grayscale and color images and video, and audio * Provides unique analysis of problems and solutions, such as data hiding in binary signature and generic binary documents, block concealment attacks, and attacks on audio watermarking * Authoritative discussion and analysis of data hiding and effective countermeasures, supported by concrete application examples * Accessible, well-organized progression from the fundamentals to specific approaches to various data-hiding problems This work offers a state-of-the-art presentation covering theoretical, algorithmic, and design topics for digital content/data security protection, and rights management. It is an essential resource for multimedia security researchers and professionals in electrical engineering, computer science, IT, and digital rights management.
This book discusses the developments in the advanced control and
intelligent automation for complex systems completed over the last
two decades, including the progress in advanced control theory and
method, intelligent control and decision-making of complex
metallurgical processes, intelligent systems and machine learning,
intelligent robot systems design and control, and prediction and
control technology for renewable energy. With the depth and breadth
of coverage of this book, it serves as a useful reference for
engineers in the field of automation and complex process control
and graduate students interested in advanced control theory and
computational intelligence as well as their applications to the
complex industrial processes. This book offers an up-to-date
overview of this active research area. It provides readers with the
state-of-the-art methods for advanced control and intelligent
automation for complex systems
This book discusses the intelligent optimization and control of
complex metallurgical processes, including intelligent optimization
and control of raw-material proportioning processes, coking
process, and reheating furnaces; intelligent control of thermal
state parameters in sintering processes; and intelligent decoupling
control of gas collection and mixing-and-pressurization processes.
The intelligent control and optimization methods presented were
originally applied to complex metallurgical processes by the
authors, and their effectiveness and their advantages have been
theoretically proven and demonstrated practically. This book offers
an up-to-date overview of this active research area, and provides
readers with state-of-the-art methods for the control of complex
metallurgical processes.
With the advances of the digital information revolution and the
societal changes they have prompted, it has become critical to
facilitate secure management of content usage and delivery across
communication networks. Data hiding and digital watermarking are
promising new technologies for multimedia information protection
and rights management. Multimedia Data Hiding addresses the theory,
methods, and design of multimedia data hiding and its application
to multimedia rights management, information security, and
communication. It offers theoretical and practical aspects, and
both design and attack problems. Applications discussed include:
annotation, tamper detection, copy/access control, fingerprinting,
and ownership protection. Countermeasures for attacks on data
hiding are discussed, and a chapter assesses attack problems on
digital music protection under a unique competitive environment.
Topics and features: * Comprehensive and practical coverage of data
hiding for various media types, including binary image, grayscale
and color images and video, and audio * Provides unique analysis of
problems and solutions, such as data hiding in binary signature and
generic binary documents, block concealment attacks, and attacks on
audio watermarking * Authoritative discussion and analysis of data
hiding and effective countermeasures, supported by concrete
application examples * Accessible, well-organized progression from
the fundamentals to specific approaches to various data-hiding
problems This work offers a state-of-the-art presentation covering
theoretical, algorithmic, and design topics for digital
content/data security protection, and rights management. It is an
essential resource for multimedia security researchers and
professionals in electrical engineering, computer science, IT, and
digital rights management.
|
Deep Learning for Human Activity Recognition - Second International Workshop, DL-HAR 2020, Held in Conjunction with IJCAI-PRICAI 2020, Kyoto, Japan, January 8, 2021, Proceedings (Paperback, 1st ed. 2021)
Xiao-Li Li, Min Wu, Zhenghua Chen, Le Zhang
|
R1,597
Discovery Miles 15 970
|
Ships in 10 - 15 working days
|
This book constitutes refereed proceedings of the Second
International Workshop on Deep Learning for Human Activity
Recognition, DL-HAR 2020, held in conjunction with IJCAI-PRICAI
2020, in Kyoto, Japan, in January 2021. Due to the COVID-19
pandemic the workshop was postponed to the year 2021 and held in a
virtual format. The 10 presented papers were thorougly reviewed and
included in the volume. They present recent research on
applications of human activity recognition for various areas such
as healthcare services, smart home applications, and more.
Information Technology in Healthcare: What Professionals Need to
Know introduces students in the healthcare, nursing, and allied
health professions to information technology. The material narrows
the reader's understanding of the general term data in order to
explain primary components of information technology as it applies
specifically to healthcare fields. The book describes key concepts
in the new discipline of health informatics, particularly
electronic medical records, which are now widely used in health
care. The five sections of the books cover the four primary
components of medical information. Parts I and III focus on
databases, Part II discusses electronic medical records, Part IV is
devoted to the network, and Part V addresses software engineering.
Written with an eye to current uses of technology in the field and
designed for today's healthcare professionals, Information
Technology in Healthcare is an excellent text for courses in
healthcare administration, and undergraduate nursing and allied
health programs.
Taiwan has been depicted as an island facing the incessant threat
of forcible unification with the People's Republic of China. Why,
then, has Taiwan spent more than three decades pouring capital and
talent into China? In award-winning Rival Partners, Wu Jieh-min
follows the development of Taiwanese enterprises in China over
twenty-five years and provides fresh insights. The geopolitical
shift in Asia beginning in the 1970s and the global restructuring
of value chains since the 1980s created strong incentives for
Taiwanese entrepreneurs to rush into China despite high political
risks and insecure property rights. Taiwanese investment, in
conjunction with Hong Kong capital, laid the foundation for the
world's factory to flourish in the southern province of Guangdong,
but official Chinese narratives play down Taiwan's vital
contribution. It is hard to imagine the Guangdong model without
Taiwanese investment, and, without the Guangdong model, China's
rise could not have occurred. Going beyond the received wisdom of
the "China miracle" and "Taiwan factor," Wu delineates how
Taiwanese businesspeople, with the cooperation of local officials,
ushered global capitalism into China. By partnering with its
political archrival, Taiwan has benefited enormously, while helping
to cultivate an economic superpower that increasingly exerts its
influence around the world.
|
You may like...
Flying Angels
Danielle Steel
Paperback
R438
Discovery Miles 4 380
|