As the Big Data explosion continues at an almost incomprehensible rate, being able to understand and process it becomes even more challenging. With Building Machine Learning Systems with Python, you'll learn everything you need to tackle the modern data deluge - by harnessing the unique capabilities of Python and its extensive range of...
Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The human ear is a new feature in biometrics that has several merits over the more common face, fingerprint and iris biometrics. Unlike the fingerprint and iris, it can be easily captured from a distance without a fully cooperative...
A number of crucial societal applications like international border crossing, electronic
commerce, and welfare disbursement require reliable person recognition systems.
Traditional person authentication methods based on passwords and identity
documents often fail to meet the stringent security and performance demands of
these...
The main motivation to write this book came from all our problems to find suitable material for a textbook that would really help us to teach the practical aspects of data analysis together with the needed theoretical underpinnings. Many books out there tackle either one or the other of these aspects (and, especially for the latter, there are...
In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.
Iris Biometric Model for Secured Network Access proposes a...
This comprehensive and innovative handbook covers aspects of biometrics from the perspective of recognizing individuals at a distance, in motion, and under a surveillance scenario. Features: Starts with a thorough introductory chapter; Provides topics from a range of different perspectives offered by an international collection of leading...
With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...
This book deals with computer viruses envisaged from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas. The theoretical formalization by means of Turing machines, self-reproducing automata and recursive functions...
Welcome to OpenGL SuperBible! The first time I ever heard of OpenGL was at the 1992 Win32 Developers Conference in San Francisco. Windows NT 3.1 was in early beta (or late alpha) and many vendors were present, pledging their future support for this exciting new platform. Among them was a company called Silicon Graphics, Inc. (SGI)....
Everyday we face decisions that carry an element of risk and uncertainty. The ability to analyze, predict, and prepare for the level of risk entailed by these decisions is, therefore, one of the most constant and vital skills needed for analysts, scientists and managers.
Risk analysis can be defined as a systematic use of...
The complete guide to implementing biometric security solutions for your network
Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by...
This latest version of Information Resources in Toxicology (IRT) continues a tradition established in 1982 with the publication of the first edition in presenting an extensive itemization, review, and commentary on the information infrastructure of the field. This book is a unique wide-ranging, international, annotated bibliography and compendium...