Home | Amazing | Today | Tags | Publishers | Years | Search 
Soft Computing for Recognition based on Biometrics (Studies in Computational Intelligence)
Soft Computing for Recognition based on Biometrics (Studies in Computational Intelligence)
We describe in this book, bio-inspired models and applications of hybrid intelligent systems using soft computing techniques for image analysis and pattern recognition based on biometrics and other information sources. Soft Computing (SC) consists of several intelligent computing paradigms, including fuzzy logic, neural networks,...
Vision with Direction: A Systematic Introduction to Image Processing and Computer Vision
Vision with Direction: A Systematic Introduction to Image Processing and Computer Vision

This introductory textbook presents the modern signal processing concepts used in computer vision and image analysis in a systematic and mathematically coherent way. For the first time in a textbook on image processing, single direction, group direction, corners and edges, Hough transform, and motion estimation are developed in a principled...

Medical Infrared Imaging
Medical Infrared Imaging

Rapid evolution of technical advances in infrared sensor technology, image processing, “smart” algorithms, databases, and system integration paves the way for new methods of research and use in medical infrared imaging. These breakthroughs permit easy-to-use, high-sensitivity imaging that can address key issues of diagnostic...

Routledge Handbook of Surveillance Studies (Routledge International Handbooks)
Routledge Handbook of Surveillance Studies (Routledge International Handbooks)

Surveillance is a central organizing practice. Gathering personal data and processing them in searchable databases drives administrative efficiency but also raises questions about security, governance, civil liberties and privacy. Surveillance is both globalized in cooperative schemes, such as sharing biometric data, and localized in the...

Mobile Authentication: Problems and Solutions (SpringerBriefs in Computer Science)
Mobile Authentication: Problems and Solutions (SpringerBriefs in Computer Science)

Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the old days of computer security-before 2000, the human component was all but disregarded. It was either assumed that people should and...

Python Machine Learning Cookbook
Python Machine Learning Cookbook

100 recipes that teach you how to perform various machine learning tasks in the real world

About This Book

  • Understand which algorithms to use in a given context with the help of this exciting recipe-based guide
  • Learn about perceptrons and see how they are used to build neural...
Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Networking Essentials: A CompTIA Network+ N10-006 Textbook (4th Edition)
Networking Essentials: A CompTIA Network+ N10-006 Textbook (4th Edition)

Thoroughly updated to reflect the CompTIA Network+ N10-006 exam, Networking Essentials, Fourth Edition is a practical, up-to-date, and hands-on guide to the basics of networking. Written from the viewpoint of a working network administrator, it requires absolutely no experience with either network concepts or...

Foundational and Applied Statistics for Biologists Using R
Foundational and Applied Statistics for Biologists Using R

Full of biological applications, exercises, and interactive graphical examples, Foundational and Applied Statistics for Biologists Using R presents comprehensive coverage of both modern analytical methods and statistical foundations. The author harnesses the inherent properties of the R environment to enable students...

Automated Fingerprint Identification Systems (AFIS), First Edition
Automated Fingerprint Identification Systems (AFIS), First Edition
There is a world in which every crime is solved in 60 minutes, DNA matches are made “While U Wait,” and staff work on only one case at a time. But it is a fantasy land, an imaginary land; it is not the real world. This book is about the real world of biometric identification technology. It is a fascinating topic. This technology can...
Biometric Systems: Technology, Design and Performance Evaluation
Biometric Systems: Technology, Design and Performance Evaluation
This book provides practitioners with an overview of the principles & methods needed to build reliable biometric systems. It covers 3 main topics: key biometric technologies, testing & management issues, & the legal and system considerations of biometric systems for personal verification/identification. It focuses on the 4 most widely...
Biometric System and Data Analysis: Design, Evaluation, and Data Mining
Biometric System and Data Analysis: Design, Evaluation, and Data Mining
Biometric systems are being used in more places and on a larger scale than ever before. As these systems mature, it is vital to ensure the practitioners responsible for development and deployment, have a strong understanding of the fundamentals of tuning biometric systems.  The focus of biometric research over the past four decades has...
Result Page: 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy