Upload
dinhdien
View
213
Download
0
Embed Size (px)
Citation preview
1. S. Haykin, Neural Networks: A Comprehensive Foundation, 2nd ed., Prentice Hall, 1998.
2. S. Haykin, Neural Networks and Learning Machines, 3rd ed., Prentice Hall, 2008.
3. R. J. Schalkoff, Artificial Neural Networks, McGraw Hill, 1997.
6. K. Gurney, An Introduction to Neural Networks, 2nd ed., UCL press, 2009.
(Machine Learning)
ZT
Unsupervised
MLMAP
(Supervised)
Classification
LDASVM
QDA
Naïve Bayes
(Graphical Models)
Bayesian NetworksMRF
Kernel
kernel trick
SVM
GP
PCANLPCAKPCA
Local PCA
ICA
MDS
BaggingBoostingAdaboost
Reinforcement
ExplorationExploitationMDP
Q-learning
1. C. Bishop, Pattern Recognition and Machine Learning, Springer, 2006. 2. R. Duda, P. Hart, and D. Stork, Pattern Classification, 2nd ed., Wiley, 2001. 3. R. Tibshirani, T. Hastie, and J. Friedman, The Elements of Statistical
Learning: Data Mining, Inference, and Prediction, 2nd ed., Springer, 2008. 4. B. Scholkopf and A. Smola, Learning with Kernels, MIT Press, 2002. 5. M. Jordan and C. Bishop, Introduction to Graphical Models, 2002. 6. T. Mitchell, Machine Learning, McGraw Hill, 1997.
-
1. E. Kreyszig, Advanced Engineering Mathematics with Math Computer Guide Set, 9th ed., John Willey and Sons Inc., 2006.
2. P.V. O’Neil, Advnaced Engineering Mathematics, 6th ed., Cengage-Engineering Inc., New York, 2006.
3. A. Papoulis and S. U. Pillai, Probability, Random Variables, and Stochastic Processes, 4th ed., McGraw-Hill Inc., New York, 2002.
(Statistical Pattern Recognition)
(Generative)
(Sufficient Statistics)
EM)(HMMs)(
(Discriminative)
(Template Matching)
(Clustering)
(Feature Extraction)(Feature Selection)
-
1. R. Duda, P. Hart, and D. Stork, Pattern Classification, 2nd. ed., Wiley, 2001. 2. S. Theodoridis and K. Koutroumbas, Pattern Recognition, 4th ed., Academic
Press, 2008. 3. C. Bishop, Pattern Recognition and Machine Learning, Springer, 2006. 4. A. Webb, Statistical Pattern Recognition, John Wiley & Sons, 2002. 5. S. Theodoridis, A. Pikrakis, K. Koutroumbas, and D. Cavouras, Introduction
to Pattern Recognition: A Matlab Approach, Academic Press, 2010. 6. R. Schalkoff, Pattern Recognition: Statistical, Structural and Neural
Approaches, Wiley, 1992. 7. A. Papoulis and S. U. Pillai, Probability, Random Variables, and Stochastic
Processes, 4th ed., McGrawHill, 2002.
(Digital Image Processing)
On-chip ElectronicKTC
CIE
Engagement
TimeReadout Rate
Refresh RateInterlacingResolution
(Enhencement)
Segmentation
1. R. C. Gonzalez, R. E. Woods, Digital Image Processing, 3rd ed., Prentice Hall, 2007.
2. John C. Russ, Digital Image Processing Handbook, 5th ed., CRC, 2007. 3. T. Acharya and A. K. Ray, Image Processing: Principles and Applications,
John Wiley & Sons, Inc., Hoboken, New Jersey, 2005.
(Machine Vision)
-
Pixelwise Operations
Engineering Transforms
Edge Detection
Segmentation
HLS
CIE/Lab
Texture Analysis
MorphologyShape Description /
1. E.R. Davies, Machine Vision, Theory, Algorithms, Practicalities, 3rd ed., Morgan Kaufmann, 2005.
2. M. Sonka, V. Hlavac, and R. Boyle, Image Processing: Analysis and Machine Vision, 3rd ed., CL-Engineering, 2007.
3. R. Gonzalez and R. E. Woods, Digital Image Processing, 3rd ed., Prentice Hall, 2007.
4. R. Jain, R. Kasturi, and B. Schunck, Machine Vision, McGraw Hill, 1995. 5. W.E. Snyder and H. Qi, Machine Vision, 2nd ed., Cambridge University
Press, 2010. 6. G. Bradski and A. Kaehler, Learning OpenCV: Computer Vision with the
OpenCV Library, O'Reilly Media, 2008.
(Advanced Artificial Intelligence)
GSATWSAT
Bayesian Belief Networks
JTreeBP
MCMC
Statistical Relational Learning
Planning
HMM
Instance based Learning
1. S. Russell and P. Norvig, Artificial Intelligence: A Modern Approach, Prentice-Hall, 3rd ed., 2009.
2. D. Koller and N. Friedman, Probabilistic Graphical Models: Principles and Techniques, MIT Press, 2009.
3. U. Nilsson and J. Maluszynski, Logic, Programming and Prolog, 2nd ed., John Wiley & Sons, 2000.
(Knowledge Engineering and Expert Systems)
CLIPSFact
Rule
JESSJava Expert System Shell
JADEJava Agent Development Framework
Protege
Knowledge Representation
Schemata and Frames
ReasoningInference
WFF
-
1. J. Giarratano, and G. Riley, Expert Systems: Principles and Programming, 4th ed., Thomson, 2004.
2. E. Friedman-Hill, JESS In Action, Manning, 2003. 3. P. Jackson, Introduction to Expert Systems, Addison-Wesley, 1990. 4. D.A. Waterman, A Guide to Expert Systems, Addison-Wesley, 1986. 5. F. Hayes-Roth, D.A. Waterman, and D.B. Lenat (eds.), Building Expert
Systems, Addison-Wesley, 1983. 6. P. Harmon and D. King, Expert Systems, John Wiley, 1985. 7. E. Turban, J. Aronson, T. Liang, and R. Sharda, Decision Support and
Business Intelligence Systems, 9th ed., Prentice Hall, 2010.
1. R. Duda, P. Hart, and D. Stork, Pattern Classification, 2nd. ed., Wiley, 2001. 2. H. Bunke, P. Dickinson, M. Kraetzl, and W. Wallis, A Graph-Theoretic
Approach to Enterprise Network Dynamics, Progress in Computer Science and Applied Logic, Vol. 24, Birkhäuser Boston, 2007.
3. A. Kandel, H. Bunke, and M. Last, Applied Graph Theory in Computer Vision and Pattern Recognition, Studies in Computational Intelligence, Vol. 52, Springer, 2007.
4. M. Neuhaus and H. Bunke, Bridging the Gap between Graph Edit Distance and Kernel Machines, Machine Perception and Artificial Intelligence, Vol. 68, World Scientific, 2007.
5. A. Schenker, A. Kandel, H. Bunke, and M. Last, Graph Theoretic Techniques for Web Content Mining, World Scientific, 2005.
D/AA/D
IIR
FIR
1. A.V. Oppenheim and M.J. Schafer, Discrete Time Signal Processing, 3rd ed., Prentice Hall, 2009.
2. P. Lynn and W. Fuerst, Introductory Digital Signal Processing with Computer Applications, 2nd ed., Wiley, 1998.
3. M. Hayes, Schaums’ Outline Series on Digital Signal Processing, 2nd ed., McGraw Hill, 2011.
4. R.G. Lyons, Understanding Digital Signal Processing, 3rd ed., Prentice Hall, 2010.
(Information Hiding)
stagnographywatermarking
1. I. Cox, M. Miller, J. Bloom, and J. Fridrich, Digital Watermarking and Steganography, 2nd ed., Morgan Kaufmann, 2007.
2. J. Fridrich, Steganography in Digital Media, Principles, Algorithms and Applications, Cambridge University Press, 2010.
3. S. Katzenbeisser and F. Petitcolas (eds.), Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Inc., Norwod, MA, USA, 2000.
4. M. Arnold, M. Schmucker, and S.D. Wolthusen, Techniques and Applications of Digital Watermarking and Content Protection, Artech House Inc., Norwod, MA, USA, 2003.
5. M. Barni and F. Bartolini, Watermarking Systems Engineering Enabling Digital Assets Security and Other Applications, Marcel Dekker, Inc., Basel, Switzerland, 2004.
(Speech Processing and Recognition)
Speech Estimation
HMMGraphical Models
Acoustic-Phonetic Modeling
Robust ASR
1. L. Rabiner and R. Schafer, Theory and Applications of Digital Speech Processing, Prentice-Hall, 2011.
2. J. Benesty, M. Sondhi, and Y. Huang, (eds.), Springer Handbook of Speech Processing and Speech Communication, Springer, 2008.
3. W. Chu, Speech Coding Algorithms Foundation and Evolution of Standardized Coders, John Wiley & Sons, 2003.
4. F. Everest, The Master Handbook of Acoustics, 4th ed., McGraw Hill, 2001.
1. J. Campbell, Introduction to Remote Sensing, 4th ed., Guilford Press, 2006. 2. W. Rees, Physical Principles of Remote Sensing, 3rd ed., Cambridge
University Press, 2012. 3. J. Jensen, Remote Sensing of the Environment: An Earth Perspective,
Prentice Hull, 2007. 4. F.F. Sabins, Remote Sensing: Principles and Interpretation, 3rd ed., Freeman,
1996.
(Video Signal Processing)
-
.
Block Matching
Full SearchCross SearchThree-Step Search
Motion-Compensated Filtering
Frame Rate Conversion
1. M. Tekalp, Digital Video Processing, Prentice Hall International, 1995. 2. A. Bovik, The essential Guide to Video Processing, Academic Press, 2009. 3. J. Watkinson, The Art of Digital Video, 3rd ed., Focal Press, 2000. 4. K. Jack, Video Demystified, 3rd ed., Llh Technology Publishing, 2001.
(Computer Generated 3D Modeling and Interpretation)
(Solid)
Viewing
Patches, Meshes, B-Splines
Object (Model) Space
Image Space Z-Buffer, A-Buffer
(Rendering)
(CAD)(CAM)
1. I.V. Kerlow, The Art of 3-D Computer Animation and Imaging, 3rd ed., A. K. Peters, Ltd., 2008.
2. J.D. Foley, A. Van Dam, S.K. Feiner, and J.F. Hughes, Computer Graphics: Principles and Practice in C, 2nd ed., Addison-Wesley, 1996.
3. E. Lengyel, Mathematics for 3D Game Programming and Computer Graphics, 2nd ed., (Game Development Serie), Charles River Media, 2003.
4. M. O'Rourke, Principles of Three-Dimensional Computer Animation, 3rd ed., W. W. Norton and Company, 2003.
5. J. White, Designing 3D Graphics: How to Create Real-time 3D Models for Games and Virtual Reality, John Wiley and Sons, 1996.
Cellular Computing
Artificial Life
1. D. Ashlock, Evolutionary Computation for Modeling and Optimization, Springer, 2006.
2. R. Poli, B. Langdon, and N. McPhee, A Field Guide to Genetic Programming, Lulu Enterprises, UK Ltd., 2008.
3. D. Floreano and C. Mattiussi, Bio-Inspired Artificial Intelligence: Theories, Methods, and Technologies, MIT Press, 2008.
4. T. Bäck, Evolution Strategies, Evolutionary Programming, Genetic Algorithms, Oxford University Press, New York, 1996.
5. K. De Jong, Evolutionary Computation: A Unified Approach, MIT Press, 2006.
RLS
Clustering
Classification
Fuzzy Linear Programming
Possibilitry Theory
Neuro-Fuzzy
1. L. Wang, A Course in Fuzzy Systems and Control, Prentice Hall, 1997. 2. J. Jang and C. Sun, Neuro-Fuzzy and Soft Computing, Prentice Hall, 1997. 3. M. Bergmann, An Introduction to Many-Valued and Fuzzy Logic:
Semantics, Algebras, and Derivation Systems, Cambridge University Press, 2008.
4. T. Ross, Fuzzy Logic with Engineering Applications, Wiley, 3rd ed., 2010.
1. B. Siciliano, L. Sciavicco, L. Villani, and G. Oriolo, Robotics: Modelling, Planning and Control, Springer, 2009.
2. S. Thrun, Probabilistic Robotics, Communications of the ACM, Vol. 45, No. 3, March 2002.
3. F. Martin, Robotic Explorations: A Hands-On Introduction to Engineering, Prentice Hall, 2001.
4. R. Murphy, Introduction to AI Robotics, MIT Press, 2000.
(Computational Geometry)
CAD/CAMIC
GIS
Polygon Triangulation
Spanning Based on Cones
Voronoi Diagrams
Convex Hulls
Binary Space Partitions
Robot Motion Planning
1. M. De Berg, O. Cheong, M. Van Kreveld, and M. Overmars, Computational Geometry: Algorithms and Applications, 3rd ed., Springer-Verlag, Berlin Heidelberg, 2008.
2. G. Narasimhan and M. Smid, Geometric Spanner Networks, Cambridge University Press, 2007.
3. S. Devadoss and J. O'Rourke, Discrete and Computational Geometry, Princeton University Press, 2011.
4. P.J. Schneider and D.H. Eberly, Geometric Tools for Computer Graphics, Morgan Kaufman, 2002.
(Randomized Algorithms)
Occupancy
Hash Functions
Random Walk
Derandomization
Similarity SearchClustering
1. M. Mitzenmacher, Probability and Computing: Randomized Algorithms and Probabilistic Analysis, Cambridge University Press, 2005.
2. R. Motwani and P. Raghavan, Randomized Algorithms, Cambridge University Press, 1995.
3. D.P. Dubhashi and A. Panconesi, Concentration of Measure for the Analysis of Randomized Algorithms, Cambridge University Press, 2012.
4. W. Feller, An introduction to Probability Theory and Its Applications, Volumes I, 3rd ed., John Wiley, New York, 1986.
5. W. Feller, An introduction to Probability Theory and Its Applications, Volumes II, John Wiley, New York, 1971.
6. P. Billingsley, Probability and Measure, John Wiley and Sons, Anniversary edition, 2012.
(Data Mining)
Hash Functions
1. M. Analysis, Cambridge University Press, 2005. 2. University Press, 1995. 3. .
1. G. Weiss, Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence, MIT-Press, 1999.
2. M. Wooldridge, An Introduction to MultiAgent Systems, John Wiley & Sons, 2nd ed., 2009.
3. J. Ferber, Multi-Agent Systems, Addison-Wesley, 1999. 4. G. O'Hare and N. Jennings (eds.), Foundations of Distributed AI, Wiley
Interscience, 1996. 5. M. Singh and M. Huhns, Readings in Agents, Morgan-Kaufmann Publishers,
1997.
(Symbolic Processing)
Modal
SLDSLDNF
Combinatory Logic
Equational Logic
Order-Sorted Logic
Algebraic Specification and Methods
EagerLazy
1. S. Russell and P. Norvig, Artificial Intelligence: A Modern Approach, 3rd ed., Prentice-Hall, 2009.
2. A. Ramsay, Formal Methods in Artificial Intelligence, Cambridge University Press, 1988.
3. C. Change and R. Lee, Symbolic Logic and Mechanical Theorem Proving, Academic Press, 1973.
4. C.J. Hogger, Essentials of Logic Programming, Oxford University Press, 1990.
5. R. Kowalski, Logic for Problem Solving, Elsevier Pub., 1979.
1. D. Jurafsky and J. Martin, Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition, 2nd ed., Prentice-Hall, 2009.
2. C. Manning and H. Schütze, Foundations of Statistical Natural Language Processing, MIT Press, 1999.
3. J. Allen, Natural Language Understanding, 2nd ed., Benjamin Cumming Pub., 1995.
(Research Methodology and Seminar)
Endnote LatTex
(Plagiarism)
1. Z. Zobel, Writing For Computer Science, Springer-Verlag, New York, 1997. 2. A. Kothari, Research Methodology: Methods and Techniques, New Age
Publications, Academic, 2009. 3. Association of Computing Machinery Computing and Public Policy Page
(including Code of Ethics) , http://www.acm.org/serving/.