第一图书网

模式识别机器智能与生物特征识别

王申培 编 高等教育出版社
出版时间:

2011-7  

出版社:

高等教育出版社  

作者:

王申培 编  

页数:

866  

Tag标签:

无  

内容概要

  本书介绍广泛应用的人工智能技术——模式识别及其应用的最新进展,收集了世界一流的模式识别、人工智能和生物特征识别技术领域专家编写的31章内容,涵盖模式识别与机器智能、计算机视觉与图像处理、人脸识别与取证、生物特征身份验证等多方面结合的研究。其应用跨越多个领域,从工程、科学研究和实验,到生物医学和医学诊断,再到身份认证和国土安全。此外,《本书还介绍了人类行为的计算机建模和仿真。
  本书是计算机与信息类以及通信与控制类专业研究生和相关研究人员的必备参考书。
  P0trckS.P.Wang(王申培)美国东北大学教授,上海华东师大紫江学者,台湾科技大学客座教授。

作者简介

编者:(美国)王申培

书籍目录

Part I: Pattern Recognition and Machine Intelligence
 1 A Review of Applications of Evolutionary Algorithms in Pattern
Recognition
  1.1 Introduction
  1.2 Basic Notions of Evolutionary Algorithms
  1.3 A Review of EAs in Pattern Recognition
  1.4 Future Research Directions
  1.5 Conclusions
  References
 2 Pattern Discovery and Recognition in Sequences
  2.1 Introduction
  2.2 Sequence Patterns and Pattern Discovery-A Brief Review.
  2.3 Our Pattern Discovery Framework
  2.4 Conclusion
  References
 3 A Hybrid Method of Tone Assessment for Mandarin CALL
System
  3.1 Introduction
  3.2 Related Work
  3.3 Proposed Approach
  3.4 Experimental Procedure and Analysis
  3.5 Conclusions
  References
 4 Fusion with Infrared Images for an Improved Performance and
Perception
  4.1 Introduction
  4.2 The Principle of Infrared Imaging
  4.3 Fusion with Infrared Images
  4.4 Applications
  4.5 Summary
  References
 5 Feature Selection and Ranking for Pattern Classification in
Wireless Sensor Networks
  5.1 Introduction
  5.2 General Approach
  5.3 Sensor Ranking
  5.4 Experiments
  5.5 Summary, Discussion and Conclusions
  References
 6 Principles and Applications of RIDED-2D-A Robust Edge Detection
Method in Range Images
  6.1 Introduction
  6.2 Definitions and Analysis
  6.3 Principles of Instantaneous Denoising and Edge
Detection
  6.4 Experiments and Evaluations
  6.5 Discussions and Applications
  6.6 Conclusions and Prospects
  References
 ……
Part Ⅱ: Computer Vision and Image Processing Lens Shading
Correction for Dirt Detection
Part Ⅲ:Face Recognition and Forensics
PartⅣ:Biometric Authentication

章节摘录

版权页:插图:As IEEE and ISIBM Distinguished Achieve-ment Awardee, Dr. Wang was on the faculty at University of Oregonand Boston University, and senior researcher at Southern Bell, GTE Labsand Wang Labs prior to his present position. Dr. Wang was Otto-Von-Guericke Distinguished Guest Professor of Magdeburg University, Germany,and iCORE (Informatics Circle of Research Excellence) visiting professorof University of Calgary, Canada, Honorary Advisor Professor for China'sSichuan University, Xiamen University, and Guangxi Normal University. Inaddition to his research experience at MIT AI Lab, Dr. Wang has been avisiting professor and invited to give lectures, do research and present papersin a number of countries and areas, from Europe, Asia and many univer-sities and industries in the U.S.A. and Canada. Dr. Wang has publishedover 160 technical papers and 26 books on Pattern Recognition, A.I. Bio-metrics and Imaging Technologies and has 30CR patents by US and Eu-rope Patent Bureaus. One of his books is so important and widely citedthat the USA Department of Homeland Security(DHS) uses it as refer-ence for Call For Proposals 2010.


编辑推荐

《模式识别、机器智能与生物特征识别(英文版)》:关键词:模式识别,人工智能,生物识别、信息安全。

图书封面

图书标签Tags

广告

下载页面


模式识别机器智能与生物特征识别 PDF格式下载



是论文集,水平倒是很高


适合搞技术的人,做参考教材不建议买


Over the last 30+ years, many good engineers worked very hard to bring the internet to life. In the early days just getting computers to reliably transfer files was a victory. Now the internet is broadly used for commerce and the features continue to accelerate. In the hurry to build out this complex functionality, security was neglected, so there should be little surprise that there are many holes to be exploited for fraud. As the title implies, security could be a major speed bump for the continued growth of the internet if security professionals don't keep up with the new threats. Individua...l compromises of privacy or financial accounts information is an inconvenience, but broad systemic attacks could cause unresolveable damage.Because the security threats are so diverse, it is difficult for security types to keep up with the breadth of problems outside their area. For example, an encryption expert may have little knowledge of current trends in spear phishing attacks or clickjacking. This book provides a good compilation of current and emerging threats in a single place for people casually interested in security as well as pros.Dr. Jakobsson has put together a broad set of current security topics with in depth explanations from domain experts. The book provides coverage of many topics that security people may want to scan but also has in depth explanation for each area. It can be used for a quick background across topics or for an in depth understanding. While the book is good for security experts, there is very little confusing jargon so an interested novice can readily understand the concepts. The topics are all very current or newly emerging threats, but since threats are often slow to get fully addressed and new variations arise the topics will remain relevant for a long time. 阅读更多 ›


相关图书