This book addresses the range image registration problem for automatic 3D model construction. The focus is on obtaining highly precise alignments between different view pairs of the same object to avoid 3D model distortions; in contrast to most prior work, the view pairs may exhibit relatively little overlap and need not be prealigned.
As our heritage deteriorates through erosion, human error or natural disasters, it has become more important than ever to preserve our past – even if it is in digital form only. This highly relevant work describes thorough research and methods for preserving cultural heritage objects through the use of 3D digital data. These methods were developed via computer vision and computer graphics technologies. They offer a way of passing our heritage down to future generations.
Software systems surround us. Software is a critical component in everything from the family car through electrical power systems to military equipment. As software plays an ever-increasing role in our lives and livelihoods, the quality of that software becomes more and more critical. However, our ability to deliver high-quality software has not kept up with those increasing demands. The economic fallout is enormous; the US economy alone is losing over US$50 billion per year due to software failures. This book presents new research into using advanced artificial intelligence techniques to guide software quality improvements. The techniques of chaos theory and data mining are brought to bear to provide new insights into the software development process. Written for researchers and practitioners in software engineering and computational intelligence, this book is a unique and important bridge between these two fields.
This book provides a fundamentally new approach to pattern recognition in which objects are characterized by relations to other objects instead of by using features or models. This 'dissimilarity representation' bridges the gap between the traditionally opposing approaches of statistical and structural pattern recognition.Physical phenomena, objects and events in the world are related in various and often complex ways. Such relations are usually modeled in the form of graphs or diagrams. While this is useful for communication between experts, such representation is difficult to combine and integrate by machine learning procedures. However, if the relations are captured by sets of dissimilarities, general data analysis procedures may be applied for analysis.With their detailed description of an unprecedented approach absent from traditional textbooks, the authors have crafted an essential book for every researcher and systems designer studying or developing pattern recognition systems.
A collection of articles by leading experts in theoretical computer science, this volume commemorates the 75th birthday of Professor Rani Siromoney, one of the pioneers in the field in India. The articles span the vast range of areas that Professor Siromoney has worked in or influenced, including grammar systems, picture languages and new models of computation.
As became apparent after the tragic events of September 11, 2001, terrorist groups are increasingly using the Internet as a communication and propaganda tool where they can safely communicate with their affiliates, coordinate action plans, raise funds, and introduce new supporters to their networks. This is evident from the large number of web sites run by different terrorist organizations, though the URLs and geographical locations of these web sites are frequently moved around the globe. The wide use of the Internet by terrorists makes some people think that the risk of a major cyber-attack against the communication infrastructure is low. However, this situation may change abruptly once the terrorists decide that the Net does not serve their purposes anymore and, like any other invention of our civilization, deserves destruction.Fighting Terror in Cyberspace is a unique volume, which provides, for the first time, a comprehensive overview of terrorist threats in cyberspace along with state-of-the-art tools and technologies that can deal with these threats in the present and in the future. The book covers several key topics in cyber warfare such as terrorist use of the Internet, the Cyber Jihad, data mining tools and techniques of terrorist detection on the web, analysis and detection of terror financing, and automated identification of terrorist web sites in multiple languages. The contributors include leading researchers on international terrorism, as well as distinguished experts in information security and cyber intelligence. This book represents a valuable source of information for academic researchers, law enforcement and intelligence experts, and industry consultants who are involved in detection, analysis, and prevention of terrorist activities on the Internet.
Data Mining is the science and technology of exploring data in order to discover previously unknown patterns. It is a part of the overall process of Knowledge Discovery in Databases (KDD). The accessibility and abundance of information today makes data mining a matter of considerable importance and necessity. This book provides an introduction to the field with an emphasis on advanced decomposition methods in general data mining tasks and for classification tasks in particular. The book presents a complete methodology for decomposing classification problems into smaller and more manageable sub-problems that are solvable by using existing tools. The various elements are then joined together to solve the initial problem. The benefits of decomposition methodology in data mining include: increased performance (classification accuracy); conceptual simplification of the problem; enhanced feasibility for huge databases; clearer and more comprehensible results; reduced runtime by solving smaller problems and by using parallel/distributed computation; and the opportunity of using different techniques for individual sub-problems.
This book describes exciting new opportunities for utilizing robust graph representations of data with common machine learning algorithms. Graphs can model additional information which is often not present in commonly used data representations, such as vectors. Through the use of graph distance ? a relatively new approach for determining graph similarity ? the authors show how well-known algorithms, such as k-means clustering and k-nearest neighbors classification, can be easily extended to work with graphs instead of vectors. This allows for the utilization of additional information found in graph representations, while at the same time employing well-known, proven algorithms.To demonstrate and investigate these novel techniques, the authors have selected the domain of web content mining, which involves the clustering and classification of web documents based on their textual substance. Several methods of representing web document content by graphs are introduced; an interesting feature of these representations is that they allow for a polynomial time distance computation, something which is typically an NP-complete problem when using graphs. Experimental results are reported for both clustering and classification in three web document collections using a variety of graph representations, distance measures, and algorithm parameters.In addition, this book describes several other related topics, many of which provide excellent starting points for researchers and students interested in exploring this new area of machine learning further. These topics include creating graph-based multiple classifier ensembles through random node selection and visualization of graph-based data using multidimensional scaling.
This book constitutes the refereed proceedings of the 4th International Conference on Geometric Modeling and Processing, GMP 2006, held in Pittsburgh, PA, USA in July 2006. The 36 revised full papers and 21 revised short papers presented were carefully reviewed and selected from a total of 84 submissions. All current issues in the area of geometric modeling and processing are addressed and the impact in such areas as computer graphics, computer vision, machining, robotics, and scientific visualization is shown. The papers are organized in topical sections on shape reconstruction, curves and surfaces, geometric processing, shape deformation, shape description, shape recognition, geometric modeling, subdivision surfaces, and engineering applications.
The five-volume set LNCS 9003--9007 constitutes the thoroughly refereed post-conference proceedings of the 12th Asian Conference on Computer Vision, ACCV 2014, held in Singapore, Singapore, in November 2014. The total of 227 contributions presented in these volumes was carefully reviewed and selected from 814 submissions. The papers are organized in topical sections on recognition; 3D vision; low-level vision and features; segmentation; face and gesture, tracking; stereo, physics, video and events; and poster sessions 1-3.