模式识别机器智能与生物特征识别

当前位置:首页 > 计算机网络 > 人工智能 > 模式识别机器智能与生物特征识别

出版社:高等教育出版社
出版日期:2011-7
ISBN:9787040331394
作者:王申培 编
页数:866页

作者简介

《模式识别、机器智能与生物特征识别(英文版)》介绍广泛应用的人工智能技术——模式识别及其应用的最新进展,收集了世界一流的模式识别、人工智能和生物特征识别技术领域专家编写的31章内容,涵盖模式识别与机器智能、计算机视觉与图像处理、人脸识别与取证、生物特征身份验证等多方面结合的研究。其应用跨越多个领域,从工程、科学研究和实验,到生物医学和医学诊断,再到身份认证和国土安全。此外,《模式识别、机器智能与生物特征识别(英文版)》还介绍了人类行为的计算机建模和仿真。
《模式识别、机器智能与生物特征识别(英文版)》是计算机与信息类以及通信与控制类专业研究生和相关研究人员的必备参考书。
P0trckS.P.Wang(王申培)美国东北大学教授,上海华东师大紫江学者,台湾科技大学客座教授。

书籍目录

Part I: Pattern Recognition and Machine Intelligence
1 A Review of Applications of Evolutionary Algorithms in Pattern Recognition
1.1 Introduction
1.2 Basic Notions of Evolutionary Algorithms
1.3 A Review of EAs in Pattern Recognition
1.4 Future Research Directions
1.5 Conclusions
References
2 Pattern Discovery and Recognition in Sequences
2.1 Introduction
2.2 Sequence Patterns and Pattern Discovery-A Brief Review.
2.3 Our Pattern Discovery Framework
2.4 Conclusion
References
3 A Hybrid Method of Tone Assessment for Mandarin
CALL System
3.1 Introduction
3.2 Related Work
3.3 Proposed Approach
3.4 Experimental Procedure and Analysis
3.5 Conclusions
References
4 Fusion with Infrared Images for an Improved Performance and Perception
4.1 Introduction
4.2 The Principle of Infrared Imaging
4.3 Fusion with Infrared Images
4.4 Applications
4.5 Summary
References
5 Feature Selection and Ranking for Pattern
Classification in Wireless Sensor Networks
5.1 Introduction
5.2 General Approach
5.3 Sensor Ranking
5.4 Experiments
5.5 Summary, Discussion and Conclusions
References
6 Principles and Applications of RIDED-2D-A Robust Edge Detection Method in Range Images
6.1 Introduction
6.2 Definitions and Analysis
6.3 Principles of Instantaneous Denoising and Edge Detection
6.4 Experiments and Evaluations
6.5 Discussions and Applications
6.6 Conclusions and Prospects
References
Part Ⅱ: Computer Vision and Image Processing Lens Shading Correction for Dirt Detection
7.1 Introduction
7.2 Background
7.3 Our Proposed Method
7.4 Experimental Results
7.5 Conclusions
References
Using Prototype-Based Classification for Automatic Knowledge Acquisition
8.1 Introduction
8.2 Prototype-Based Classification
8.3 Methodology
8.4 Application
8.5 Results
8.6 Conclusion
References
9 Tracking Deformable Objects with Evolving Templates forReal-Time Machine Vision
9.1 Introduction
9.2 Problem Formulation
9.3 Search Framework for Computing Template Position
9.4 Updating Framework for Computing Template Changes
……
Part Ⅲ:Face Recognition and Forensics
PartⅣ:Biometric Authentication

编辑推荐

《模式识别、机器智能与生物特征识别(英文版)》:关键词:模式识别,人工智能,生物识别、信息安全。

内容概要

S.P. Wang(王申培)美国东北大学教授,上海华东师大紫江学者,台湾科技大学客座教授。

章节摘录

版权页:插图:As IEEE and ISIBM Distinguished Achieve-ment Awardee, Dr. Wang was on the faculty at University of Oregonand Boston University, and senior researcher at Southern Bell, GTE Labsand Wang Labs prior to his present position. Dr. Wang was Otto-Von-Guericke Distinguished Guest Professor of Magdeburg University, Germany,and iCORE (Informatics Circle of Research Excellence) visiting professorof University of Calgary, Canada, Honorary Advisor Professor for China'sSichuan University, Xiamen University, and Guangxi Normal University. Inaddition to his research experience at MIT AI Lab, Dr. Wang has been avisiting professor and invited to give lectures, do research and present papersin a number of countries and areas, from Europe, Asia and many univer-sities and industries in the U.S.A. and Canada. Dr. Wang has publishedover 160 technical papers and 26 books on Pattern Recognition, A.I. Bio-metrics and Imaging Technologies and has 30CR patents by US and Eu-rope Patent Bureaus. One of his books is so important and widely citedthat the USA Department of Homeland Security(DHS) uses it as refer-ence for Call For Proposals 2010.

图书封面


 模式识别机器智能与生物特征识别下载



发布书评

 
 


精彩短评 (总计3条)

  •     是论文集,水平倒是很高
  •     适合搞技术的人,做参考教材不建议买
  •     Over the last 30+ years, many good engineers worked very hard to bring the internet to life. In the early days just getting computers to reliably transfer files was a victory. Now the internet is broadly used for commerce and the features continue to accelerate. In the hurry to build out this complex functionality, security was neglected, so there should be little surprise that there are many holes to be exploited for fraud. As the title implies, security could be a major speed bump for the continued growth of the internet if security professionals don't keep up with the new threats. Individua...l compromises of privacy or financial accounts information is an inconvenience, but broad systemic attacks could cause unresolveable damage.Because the security threats are so diverse, it is difficult for security types to keep up with the breadth of problems outside their area. For example, an encryption expert may have little knowledge of current trends in spear phishing attacks or clickjacking. This book provides a good compilation of current and emerging threats in a single place for people casually interested in security as well as pros.Dr. Jakobsson has put together a broad set of current security topics with in depth explanations from domain experts. The book provides coverage of many topics that security people may want to scan but also has in depth explanation for each area. It can be used for a quick background across topics or for an in depth understanding. While the book is good for security experts, there is very little confusing jargon so an interested novice can readily understand the concepts. The topics are all very current or newly emerging threats, but since threats are often slow to get fully addressed and new variations arise the topics will remain relevant for a long time. 阅读更多 ›
 

农业基础科学,时尚,美术/书法,绘画,软件工程/开发项目管理,研究生/本专科,爱情/情感,动漫学堂PDF下载,。 PDF下载网 

PDF下载网 @ 2024