Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Unconstrained Face Recognition (International Series on Biometrics)
Unconstrained Face Recognition (International Series on Biometrics)
Face recognition has been actively studied over the past decade and continues to be a big research challenge. Just recently, researchers have begun to investigate face recognition under unconstrained conditions. Unconstrained Face Recognition provides a comprehensive review of this biometric, especially face recognition from video, assembling a...
Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
From the reviews:

"...a useful reference for all biometric security professionals and researchers. The four coauthors have a distinguished combination of academic and professional experience....Overall, readers will be pleased with the style and substance of this book." -Computing Reviews

"This is a comprehensive reviews...

Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)
Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)

Computers have become vital for police work in the twenty-first century. Applications explored in this compelling volume include the capability of searching extensive, internationally synchronized criminal information databases; plotting crime incidents and patterns to anticipate and prevent recurrences; interrogating criminal suspects and...

Security in Computing, Third Edition
Security in Computing, Third Edition

Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike.

This sweeping revision of the field's classic guide to computer...

3D Imaging for Safety and Security (Computational Imaging and Vision)
3D Imaging for Safety and Security (Computational Imaging and Vision)
The past decades have seen significant improvements in 3D imaging where the related techniques and technologies have advanced to a mature state. These exciting developments have sparked increasing interest in industry and academia in the challenges and opportunities afforded by 3D sensing. As a consequence, the emerging area of safety and security...
Circuits, Signals, and Speech and Image Processing (The Electrical Engineering Handbook Third Edition)
Circuits, Signals, and Speech and Image Processing (The Electrical Engineering Handbook Third Edition)

The purpose of The Electrical Engineering Handbook, 3rd Edition is to provide a ready reference for the practicing engineer in industry, government, and academia, as well as aid students of engineering. The third edition has a new look and comprises six volumes including:

Circuits, Signals, and Speech and Image Processing...

Scala for Machine Learning
Scala for Machine Learning

Leverage Scala and Machine Learning to construct and study systems that can learn from data

About This Book

  • Explore a broad variety of data processing, machine learning, and genetic algorithms through diagrams, mathematical formulation, and source code
  • Leverage your expertise in Scala...
Advances in Biometrics: Sensors, Algorithms and Systems
Advances in Biometrics: Sensors, Algorithms and Systems

Biometrics technology continues to stride forward with its wider acceptance and its real need in various new security facets of modern society. From simply logging on to a laptop to crossing the border of a country, biometrics is being called upon to meet the growing challenges of identity management.

With contributions from academia and...

Statistical Methods for Health Sciences, Second Edition
Statistical Methods for Health Sciences, Second Edition
…although the book is apparently intended for non-statisticians, it covers material well beyond an introductory course.
Biometrics, Vol. 56, No. 2, June 2000

Building upon material presented in the first edition, Statistical Methods for Health Sciences, Second Edition continues to address the analytical issues
...
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)

From time immemorial, the security realm and personal identification task had shown progress by employing technological means like secret knowledge as passwords and Personal Identification Numbers, and by using personal possessions as identity cards and Radio Frequency Identification chips. As opposed to these means which are...

Cyber Security and IT Infrastructure Protection
Cyber Security and IT Infrastructure Protection

This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and...

Result Page: 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy