Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Signal Processing with Examples in MATLAB® (Electrical Engineering & Applied Signal Processing Series)
Digital Signal Processing with Examples in MATLAB® (Electrical Engineering & Applied Signal Processing Series)

Based on fundamental principles from mathematics, linear systems, and signal analysis, digital signal processing (DSP) algorithms are useful for extracting information from signals collected all around us. Combined with today’s powerful computing capabilities, they can be used in a wide range of application areas, including...

The Wiley Handbook of Global Educational Reform (Wiley Handbooks in Education)
The Wiley Handbook of Global Educational Reform (Wiley Handbooks in Education)

The Wiley Handbook of Global Educational Reform examines educational reform from a global perspective. Comprised of approximately 25 original and specially commissioned essays, which together interrogate educational reform from a critical global and transnational perspective, this volume explores a range of topics and themes...

Integrated Image and Graphics Technologies (The International Series in Engineering and Computer Science)
Integrated Image and Graphics Technologies (The International Series in Engineering and Computer Science)
Image technology is a continually evolving field with various applications such as image processing and analysis, biometrics, pattern recognition, object tracking, remote sensing, medicine diagnoses and multimedia. Significant progress has been made in the level of interest in image morphology, neural networks, full color image processing, image...
Advanced Pattern Recognition Technologies with Applications to Biometrics (Premier Reference Source)
Advanced Pattern Recognition Technologies with Applications to Biometrics (Premier Reference Source)
With the increasing concerns on security breaches and transaction fraud, highly reliable and convenient personal verification and identification technologies are more and more requisite in our social activities and national services. Biometrics, used to recognize the identity of an individual, are gaining ever-growing popularity in an extensive...
Biometrics for Network Security
Biometrics for Network Security

The complete guide to implementing biometric security solutions for your network

Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by...

Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)
Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)

Computers have become vital for police work in the twenty-first century. Applications explored in this compelling volume include the capability of searching extensive, internationally synchronized criminal information databases; plotting crime incidents and patterns to anticipate and prevent recurrences; interrogating criminal suspects and...

Security in Computing, Third Edition
Security in Computing, Third Edition

Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike.

This sweeping revision of the field's classic guide to computer...

3D Imaging for Safety and Security (Computational Imaging and Vision)
3D Imaging for Safety and Security (Computational Imaging and Vision)
The past decades have seen significant improvements in 3D imaging where the related techniques and technologies have advanced to a mature state. These exciting developments have sparked increasing interest in industry and academia in the challenges and opportunities afforded by 3D sensing. As a consequence, the emerging area of safety and security...
Wireless Security: Models, Threats, and Solutions
Wireless Security: Models, Threats, and Solutions
REAL-WORLD WIRELESS SECURITY

This comprehensive guide catalogs and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read this book to...

Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric user authentication techniques have evoked an enormous interest by science, industry and society in the recent past. Scientists and developers have constantly pursued the technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Many biometric...
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
"If you’re even thinking of doing any security engineering, you need to read this book. It’s the first, and only, end-to-end modern security design and engineering book ever written."–Bruce Schneier

"Many people are anxious about Internet security for PCs and servers," says leading expert Ross Anderson,...

Soft Computing for Recognition based on Biometrics (Studies in Computational Intelligence)
Soft Computing for Recognition based on Biometrics (Studies in Computational Intelligence)
We describe in this book, bio-inspired models and applications of hybrid intelligent systems using soft computing techniques for image analysis and pattern recognition based on biometrics and other information sources. Soft Computing (SC) consists of several intelligent computing paradigms, including fuzzy logic, neural networks,...
unlimited object storage image
Result Page: 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy