You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The rapid increase in computing power and communication speed, coupled with computer storage facilities availability, has led to a new age of multimedia applications. This book presents recent advances in Multimedia Signal Processing and Communications.
The main idea and the driver of further research in the area of face recognition are security applications and human-computer interaction. Face recognition represents an intuitive and non-intrusive method of recognizing people and this is why it became one of three identification methods used in e-passports and a biometric of choice for many other security applications. This goal of this book is to provide the reader with the most up to date research performed in automatic face recognition. The chapters presented use innovative approaches to deal with a wide variety of unsolved issues.
Over the past two decades, swarm intelligence has emerged as a powerful approach to solving optimization as well as other complex problems. Swarm intelligence models are inspired by social behaviours of simple agents interacting among themselves as well as with the environment, e.g., flocking of birds, schooling of fish, foraging of bees and ants. The collective behaviours that emerge out of the interactions at the colony level are useful in achieving complex goals. The main aim of this research book is to present a sample of recent innovations and advances in techniques and applications of swarm intelligence. Among the topics covered in this book include: particle swarm optimization and hyb...
The College of Computing and Informatics (CCI) at UNC-Charlotte has three departments: Computer Science, Software and Information Systems, and Bioinformatics and Genomics. The Department of Computer Science offers study in a variety of specialized computing areas such as database design, knowledge systems, computer graphics, artificial intelligence, computer networks, game design, visualization, computer vision, and virtual reality. The Department of Software and Information Systems is primarily focused on the study of technologies and methodologies for information system architecture, design, implementation, integration, and management with particular emphasis on system security. The Depart...
Discover Novel and Insightful Knowledge from Data Represented as a Graph Practical Graph Mining with R presents a "do-it-yourself" approach to extracting interesting patterns from graph data. It covers many basic and advanced techniques for the identification of anomalous or frequently recurring patterns in a graph, the discovery of groups or clusters of nodes that share common patterns of attributes and relationships, the extraction of patterns that distinguish one category of graphs from another, and the use of those patterns to predict the category of new graphs. Hands-On Application of Graph Data Mining Each chapter in the book focuses on a graph mining task, such as link analysis, clust...
This LNCS volume contains the papers presented at the 3rd International Conference on Advances in Pattern Recognition (ICAPR 2005) organized in August, 2005 in the beautiful city of Bath, UK.
This book delves into the history of biometrics, the different systems that have been developed to date, problems that have arisen from these systems, the necessity of AI-based biometrics systems, different AI techniques developed to date (including machine learning, deep learning, natural language processing, and pattern recognition), their potential uses and applications, security and privacy issues in AI-based Biometric systems, current trends in AI-based biometrics, and presents case studies of AI-based biometrics.
Information security and copyright protection are more important today than before. Digital watermarking is one of the widely used techniques used in the world in the area of information security. This book introduces a number of digital watermarking techniques and is divided into four parts. The first part introduces the importance of watermarking techniques and intelligent technology. The second part includes a number of watermarking techniques. The third part includes the hybrid watermarking techniques and the final part presents conclusions. This book is directed to students, professors, researchers and application engineers who are interested in the area of information security.
Tremendous advances in all disciplines including engineering, science, health care, business, avionics, management, and so on, can also be attributed to the development of artificial intelligence paradigms. In fact, researchers are always interested in desi- ing machines which can mimic the human behaviour in a limited way. Therefore, the study of neural information processing paradigms have generated great interest among researchers, in that machine learning, borrowing features from human intelligence and applying them as algorithms in a computer friendly way, involves not only Mathem- ics and Computer Science but also Biology, Psychology, Cognition and Philosophy (among many other discipli...
The two volume set LNCS 3686 and LNCS 3687 constitutes the refereed proceedings of the Third International Conference on Advances in Pattern Recognition, ICAPR 2005, held in Bath, UK in August 2005. The papers submitted to ICAPR 2005 were thoroughly reviewed by up to three referees per paper and less than 40% of the submitted papers were accepted. The first volume includes 73 contributions related to Pattern Recognition and Data Mining (which included papers from the tracks of pattern recognition methods, knowledge and learning, and data mining); topics addressed are pattern recognition, data mining, signal processing and OCR/ document analysis. The second volume contains 87 contributions related to Pattern Recognition and Image Analysis (which included papers from the applications track) and deals with security and surveillance, biometrics, image processing and medical imaging. It also contains papers from the Workshop on Pattern Recognition for Crime Prevention.