From time immemorial, the security realm and personal identification task had
shown progress by employing technological means like secret knowledge as passwords
and Personal Identification Numbers, and by using personal possessions as
identity cards and Radio Frequency Identification chips. As opposed to these means
which are...
Image registration is the process of finding correspondence between all points in
two images of a scene. This correspondence is required in stereo depth perception,
3-D scene reconstruction, object detection and recognition, change detection, image
fusion, object tracking and motion analysis. Analysis of two or more images of a...
Penetration testers are faced with a combination of firewalls, intrusion detection
systems, host-based protection, hardened systems, and teams of knowledgeable
analysts that pour over data collected by their security information management
systems. In an environment such as this, simply running automated tools will
typically...
The origins of this book can be found in the scientific collaboration (officially
started in March 2003) between Francesco Pulvirenti and me. Besides its obvious technical aim, this collaboration has produced eighteen theses for second-level laurea degree in electronic engineering and fifteen theses for first level laurea degree in...
It has been two decades since environmental science, environmental engineering,
and environmental consulting took root as major disciplines and professions
throughout the developed world. The learning curve has been steep as it relates
to the previously unrecognized physics of contaminant transport. Today those
principles are...
Ruby on Rails has taken the web application development world by storm.
Those of us who have been writing web apps for a few years remember the
good ol’ days when the leading contenders for web programming languages
were PHP and Java, with Perl, Smalltalk, and even C++ as fringe choices.
Either PHP or...
The field of optical thin films continues to expand at a rapid rate in both
commercial application and technology. As individuals and as a technical
community, we continue to gain new understanding as new tools, techniques,
processes, and experimental results become available. Since the publication of the
first edition, enough...
Photographers carry gear. It doesn’t matter whether you’re a pro with
multiple camera bodies and lenses or a casual shooter with an ever-present
point-and-shoot camera—there’s always stuff to pack along. And if you’re
traveling or away from your office or studio, part of that gear typically...
Government agencies are increasingly being called upon to publish data as a means to
increase transparency, deliver government services more efficiently, and innovate busi
ness. Civic Apps Competitions (CACs) further these goals by providing incentives and
a platform for software programmers to build innovative...
The project management discipline is swiftly becoming the catalyst of choice for change in modern business models. The added value project management provides to the bottom line is now considered a corporate lifesaver, not a corporate cost center. Even though the discipline does not usually generate revenue (except in projectized...
The evolution of managing Cloud Computing Services in principles and practices provided
by the best practices IT Service Management framework provides the more holistic
guidance needed for an industry that continues to mature and develop at a rapid pace.
Many organizations and individuals who had previously struggled...
We as a species are probably a little bit smarter than fish: at least we know
that we spend our lives “swimming” at the bottom of an ocean of air. About
4/5th of that ocean is the relatively harmless gas nitrogen. Around another
1/5 of it is the highly reactive and slightly toxic gas oxygen. The...