模式識別機器智能與生物特征識別

出版時間:2011-7  出版社:高等教育出版社  作者:王申培 編  頁數(shù):866  
Tag標簽:無  

內(nèi)容概要

  本書介紹廣泛應(yīng)用的人工智能技術(shù)——模式識別及其應(yīng)用的最新進展,收集了世界一流的模式識別、人工智能和生物特征識別技術(shù)領(lǐng)域?qū)<揖帉懙?1章內(nèi)容,涵蓋模式識別與機器智能、計算機視覺與圖像處理、人臉識別與取證、生物特征身份驗證等多方面結(jié)合的研究。其應(yīng)用跨越多個領(lǐng)域,從工程、科學(xué)研究和實驗,到生物醫(yī)學(xué)和醫(yī)學(xué)診斷,再到身份認證和國土安全。此外,《本書還介紹了人類行為的計算機建模和仿真。
  本書是計算機與信息類以及通信與控制類專業(yè)研究生和相關(guān)研究人員的必備參考書。
  P0trckS.P.Wang(王申培)美國東北大學(xué)教授,上海華東師大紫江學(xué)者,臺灣科技大學(xué)客座教授。

作者簡介

編者:(美國)王申培

書籍目錄

Part I: Pattern Recognition and Machine Intelligence
 1 A Review of Applications of Evolutionary Algorithms in Pattern
Recognition
  1.1 Introduction
  1.2 Basic Notions of Evolutionary Algorithms
  1.3 A Review of EAs in Pattern Recognition
  1.4 Future Research Directions
  1.5 Conclusions
  References
 2 Pattern Discovery and Recognition in Sequences
  2.1 Introduction
  2.2 Sequence Patterns and Pattern Discovery-A Brief Review.
  2.3 Our Pattern Discovery Framework
  2.4 Conclusion
  References
 3 A Hybrid Method of Tone Assessment for Mandarin CALL
System
  3.1 Introduction
  3.2 Related Work
  3.3 Proposed Approach
  3.4 Experimental Procedure and Analysis
  3.5 Conclusions
  References
 4 Fusion with Infrared Images for an Improved Performance and
Perception
  4.1 Introduction
  4.2 The Principle of Infrared Imaging
  4.3 Fusion with Infrared Images
  4.4 Applications
  4.5 Summary
  References
 5 Feature Selection and Ranking for Pattern Classification in
Wireless Sensor Networks
  5.1 Introduction
  5.2 General Approach
  5.3 Sensor Ranking
  5.4 Experiments
  5.5 Summary, Discussion and Conclusions
  References
 6 Principles and Applications of RIDED-2D-A Robust Edge Detection
Method in Range Images
  6.1 Introduction
  6.2 Definitions and Analysis
  6.3 Principles of Instantaneous Denoising and Edge
Detection
  6.4 Experiments and Evaluations
  6.5 Discussions and Applications
  6.6 Conclusions and Prospects
  References
 ……
Part Ⅱ: Computer Vision and Image Processing Lens Shading
Correction for Dirt Detection
Part Ⅲ:Face Recognition and Forensics
PartⅣ:Biometric Authentication

章節(jié)摘錄

版權(quán)頁:插圖:As IEEE and ISIBM Distinguished Achieve-ment Awardee, Dr. Wang was on the faculty at University of Oregonand Boston University, and senior researcher at Southern Bell, GTE Labsand Wang Labs prior to his present position. Dr. Wang was Otto-Von-Guericke Distinguished Guest Professor of Magdeburg University, Germany,and iCORE (Informatics Circle of Research Excellence) visiting professorof University of Calgary, Canada, Honorary Advisor Professor for China'sSichuan University, Xiamen University, and Guangxi Normal University. Inaddition to his research experience at MIT AI Lab, Dr. Wang has been avisiting professor and invited to give lectures, do research and present papersin a number of countries and areas, from Europe, Asia and many univer-sities and industries in the U.S.A. and Canada. Dr. Wang has publishedover 160 technical papers and 26 books on Pattern Recognition, A.I. Bio-metrics and Imaging Technologies and has 30CR patents by US and Eu-rope Patent Bureaus. One of his books is so important and widely citedthat the USA Department of Homeland Security(DHS) uses it as refer-ence for Call For Proposals 2010.

編輯推薦

《模式識別、機器智能與生物特征識別(英文版)》:關(guān)鍵詞:模式識別,人工智能,生物識別、信息安全。

圖書封面

圖書標簽Tags

評論、評分、閱讀與下載


    模式識別機器智能與生物特征識別 PDF格式下載


用戶評論 (總計3條)

 
 

  •   是論文集,水平倒是很高
  •   適合搞技術(shù)的人,做參考教材不建議買
  •   Over the last 30+ years, many good engineers worked very hard to bring the internet to life. In the early days just getting computers to reliably transfer files was a victory. Now the internet is broadly used for commerce and the features continue to accelerate. In the hurry to build out this complex functionality, security was neglected, so there should be little surprise that there are many holes to be exploited for fraud. As the title implies, security could be a major speed bump for the continued growth of the internet if security professionals don't keep up with the new threats. Individua...l compromises of privacy or financial accounts information is an inconvenience, but broad systemic attacks could cause unresolveable damage.Because the security threats are so diverse, it is difficult for security types to keep up with the breadth of problems outside their area. For example, an encryption expert may have little knowledge of current trends in spear phishing attacks or clickjacking. This book provides a good compilation of current and emerging threats in a single place for people casually interested in security as well as pros.Dr. Jakobsson has put together a broad set of current security topics with in depth explanations from domain experts. The book provides coverage of many topics that security people may want to scan but also has in depth explanation for each area. It can be used for a quick background across topics or for an in depth understanding. While the book is good for security experts, there is very little confusing jargon so an interested novice can readily understand the concepts. The topics are all very current or newly emerging threats, but since threats are often slow to get fully addressed and new variations arise the topics will remain relevant for a long time. 閱讀更多 ›
 

250萬本中文圖書簡介、評論、評分,PDF格式免費下載。 第一圖書網(wǎng) 手機版

京ICP備13047387號-7