Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fingerprints and Other Ridge Skin Impressions (International Forensic Science and Investigation Series)
Fingerprints and Other Ridge Skin Impressions (International Forensic Science and Investigation Series)
Our aim with this book was to place, under the same roof, two distinct but intertwined aspects of the use of fingerprinting for personal identification and criminal investigation: (1) the aspects associated with the visualization, detection, and recording of friction ridge skin impressions and (2) the issues regarding the identification or...
Biometrics for Network Security
Biometrics for Network Security

The complete guide to implementing biometric security solutions for your network

Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by...

Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric user authentication techniques have evoked an enormous interest by science, industry and society in the recent past. Scientists and developers have constantly pursued the technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Many biometric...
Solid-State Mid-Infrared Laser Sources (Topics in Applied Physics)
Solid-State Mid-Infrared Laser Sources (Topics in Applied Physics)
According to the Encyclopaedia Britannica, the "middle infrared" region covers the portion of the electromagnetic spectrum between 400 and 4000 wave numbers, which corresponds to the wavelength range 2.5-25 gin. This range is of particular interest for many applications, especially for spectroscopy, since the electromagnetic frequencies...
Lee and Gaensslen's Advances in Fingerprint Technology,  Third Edition
Lee and Gaensslen's Advances in Fingerprint Technology, Third Edition

Reflecting new discoveries in fingerprint science, Lee and Gaensslen’s Advances in Fingerprint Technology, Third Edition has been completely updated with new material and nearly double the references contained in the previous edition. The book begins with a detailed review of current, widely used development techniques,...

Interactive Curve Modeling: with Applications to Computer Graphics, Vision and Image Processing
Interactive Curve Modeling: with Applications to Computer Graphics, Vision and Image Processing

Interactive curve modeling techniques and their applications are extremely useful in a number of academic and industrial settings, and specifically play a significant role in multidisciplinary problem solving, such as in font design, designing objects, CAD/CAM, medical operations, scientific data visualization, virtual reality, character...

The Design of Plastic Optical Systems (SPIE Tutorial Text Vol. TT80)
The Design of Plastic Optical Systems (SPIE Tutorial Text Vol. TT80)

Many items we use in our daily lives-the traffic signals, motion sensors, fingerprint readers, cell phone cameras, bar code scanners, and DVD players-rely upon plastic optical systems to perform. Consequently, there is a growing need for individuals who are knowledgeable in the design, development, and production of such systems.

...

Handbook of Pattern Recognition and Computer Vision
Handbook of Pattern Recognition and Computer Vision

Dedicated to the memory of the late Professor King Sun Fu (1930-1985), the handbook series, with first edition (1993), second edition (1999) and third edition (2005), provides a comprehensive, concise and balanced coverage of the progress and achievements in the field of pattern recognition and computer vision in the last twenty years. This is a...

Advances in Biometrics: Sensors, Algorithms and Systems
Advances in Biometrics: Sensors, Algorithms and Systems

Biometrics technology continues to stride forward with its wider acceptance and its real need in various new security facets of modern society. From simply logging on to a laptop to crossing the border of a country, biometrics is being called upon to meet the growing challenges of identity management.

With contributions from academia and...

Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Personal identification and verification both play a critical role in our society.
Today, more and more business activities and work practices are computerized. Ecommerce
applications, such as e-banking, or security applications, such as building
access, demand fast, real-time and accurate personal identification. Traditional
...
Biometric Authentication: First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004
Biometric Authentication: First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004
The past decade has seen a rapid growth in the demand for biometric-based authentication solutions for a number of applications. With significant advances in biometric technology and an increase in the number of applications incorporating biometrics, it is essential that we bring together researchers from academia and industry as well as...
iPhone: The Missing Manual
iPhone: The Missing Manual

Answers found here!

In iOS 7, Apple gave the iPhone the most radical makeover in its history. The new software is powerful, sleek, and a perfect companion to the iPhone 5s and 5c—but it’s wildly different. Fortunately, David Pogue is back with an expanded edition of his witty, full-color guide: the...

unlimited object storage image
Result Page: 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy