Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Machine Vision : Theory, Algorithms, Practicalities
Machine Vision : Theory, Algorithms, Practicalities
In the last 40 years, machine vision has evolved into a mature field embracing a wide range of applications including surveillance, automated inspection, robot assembly, vehicle guidance, traffic monitoring and control, signature verification, biometric measurement, and analysis of remotely sensed images. While researchers and industry specialists...
Python Machine Learning Cookbook
Python Machine Learning Cookbook

100 recipes that teach you how to perform various machine learning tasks in the real world

About This Book

  • Understand which algorithms to use in a given context with the help of this exciting recipe-based guide
  • Learn about perceptrons and see how they are used to build neural...
Multi-Sensor Image Fusion and Its Applications (Signal Processing and Communica)
Multi-Sensor Image Fusion and Its Applications (Signal Processing and Communica)
Imaging sensors are an important resource in today’s world. Further, a single sensor cannot provide a complete view of the environment in many applications. Just as humans use all five senses to great advantage, computers use image fusion algorithms to gain similar advantages. The resulting fused image, if suitably obtained from a set of...
Biometrics For Dummies (Computer/Tech)
Biometrics For Dummies (Computer/Tech)
Biometric technology is a HOT topic. The most recent (ISC)2 Global Workforce Survey of over 7,500 security professionals from around the world have cited biometrics as the number one security project for organizations in North America, and the number two security project in the world overall.

Most companies aren’t using any form of
...
Medical Infrared Imaging
Medical Infrared Imaging

Rapid evolution of technical advances in infrared sensor technology, image processing, “smart” algorithms, databases, and system integration paves the way for new methods of research and use in medical infrared imaging. These breakthroughs permit easy-to-use, high-sensitivity imaging that can address key issues of diagnostic...

The New Communications Technologies, Fifth Edition: Applications, Policy, and Impact
The New Communications Technologies, Fifth Edition: Applications, Policy, and Impact
"Although the book is directed toward technology courses...it makes for interesting, thought-provoking reading." - Monitoring Times

As new communications applications are developed and brought to market, it is vital for communications professionals to keep abreast of these issues. Since the
...
Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
Iris Biometric Model for Secured Network Access
Iris Biometric Model for Secured Network Access

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.

Iris Biometric Model for Secured Network Access proposes a
...

Eating the IT Elephant: Moving from Greenfield Development to Brownfield
Eating the IT Elephant: Moving from Greenfield Development to Brownfield
A Practical, Start-to-Finish Approach to Managing, Evolving, and Transforming Legacy IT Systems

 

For every IT executive, manager, architect, program leader, project leader, and lead analyst

 

...
Handbook of Remote Biometrics: for Surveillance and Security (Advances in Pattern Recognition)
Handbook of Remote Biometrics: for Surveillance and Security (Advances in Pattern Recognition)
This comprehensive and innovative handbook covers aspects of biometrics from the perspective of recognizing individuals at a distance, in motion, and under a surveillance scenario. Features: Starts with a thorough introductory chapter; Provides topics from a range of different perspectives offered by an international collection of leading...
Securing Biometrics Applications
Securing Biometrics Applications
Biometrics is becoming increasingly common in establishments that require high security such as state security and financial sectors. The increased threat to national security by terrorists has led to the explosive popularity of biometrics. A number of biometric devices are now available to capture biometric measurements such as fingerprints, palm,...
Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

Result Page: 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy