Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Medical Infrared Imaging
Medical Infrared Imaging

Rapid evolution of technical advances in infrared sensor technology, image processing, “smart” algorithms, databases, and system integration paves the way for new methods of research and use in medical infrared imaging. These breakthroughs permit easy-to-use, high-sensitivity imaging that can address key issues of diagnostic...

Information Technology Security: Advice from Experts (IT Solutions)
Information Technology Security: Advice from Experts (IT Solutions)

As the value of the information portfolio has increased, IT security has changed from a product focus to a business management process. Today, IT security is not just about controlling internal access to data and systems but managing a portfolio of services including wireless networks, cyberterrorism protection and business continuity planning...

Human Recognition at a Distance in Video (Advances in Pattern Recognition)
Human Recognition at a Distance in Video (Advances in Pattern Recognition)

Most biometric systems employed for human recognition require physical contact with, or close proximity to, a cooperative subject. Far more challenging is the ability to reliably recognize individuals at a distance, when viewed from an arbitrary angle under real-world environmental conditions. Gait and face data are the two biometrics that...

System Software Reliability (Springer Series in Reliability Engineering)
System Software Reliability (Springer Series in Reliability Engineering)
Computer software reliability has never been more important. Today, computers are employed in areas as diverse as air traffic control, nuclear reactors, aircraft, real-time military, industrial process control, security system control, biometric scan-systems, automotive, mechanical and safety control, and hospital patient monitoring systems. Many...
Economics of Identity Theft: Avoidance, Causes and Possible Cures
Economics of Identity Theft: Avoidance, Causes and Possible Cures
Today, identity is more than anything, economic. The technology used to create, utilize and protect identities is increasingly ill-matched to the economics and uses of identities. Identity theft is the misuse of private authenticating information to steal money. Protecting identity requires privacy. Proving identity requires exposing information....
 
   
   
Result Page: 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy