Tags
Language
Tags
March 2024
Su Mo Tu We Th Fr Sa
25 26 27 28 29 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31 1 2 3 4 5 6

Cyber Security for Beginners: Your Essential Guide

Posted By: eBookRat
Cyber Security for Beginners: Your Essential Guide

Cyber Security for Beginners: Your Essential Guide: Understand Hacking, Malware, Biometrics, BYOD, and Essential Cyber Defense Strategies
by R. Parvin

English | March 8, 2024 | ASIN: B0CXLTBF1H | 199 pages | PNG (.rar) | 27 Mb

Biometrics: Security and Privacy Considerations

Posted By: IrGens
Biometrics: Security and Privacy Considerations

Biometrics: Security and Privacy Considerations
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 41m | 103 MB
Instructor: Lyron Andrews

Recent Advances in Computer Vision: Theories and Applications (Repost)

Posted By: AvaxGenius
Recent Advances in Computer Vision: Theories and Applications (Repost)

Recent Advances in Computer Vision: Theories and Applications by Mahmoud Hassaballah, Khalid M. Hosny
English | EPUB(True) | 2019 | 430 Pages | ISBN : 3030029999 | 118 MB

This book presents a collection of high-quality research by leading experts in computer vision and its applications. Each of the 16 chapters can be read independently and discusses the principles of a specific topic, reviews up-to-date techniques, presents outcomes, and highlights the challenges and future directions. As such the book explores the latest trends in fashion creative processes, facial features detection, visual odometry, transfer learning, face recognition, feature description, plankton and scene classification, video face alignment, video searching, and object segmentation.

Sequence Data Mining (Repost)

Posted By: AvaxGenius
Sequence Data Mining (Repost)

Sequence Data Mining by Guozhu Dong , Jian Pei
English | PDF (True) | 2007 | 160 Pages | ISBN : 0387699368 | 2.3 MB

Understanding sequence data, and the ability to utilize this hidden knowledge, creates a significant impact on many aspects of our society. Examples of sequence data include DNA, protein, customer purchase history, web surfing history, and more.

Continuous Biometric Authentication Systems: An Overview

Posted By: AvaxGenius
Continuous Biometric Authentication Systems: An Overview

Continuous Biometric Authentication Systems: An Overview by Max Smith-Creasey
English | PDF EPUB (True) | 2024 | 127 Pages | ISBN : 3031490703 | 6.2 MB

This book offers an overview of the field of continuous biometric authentication systems, which capture and continuously authenticate biometrics from user devices. This book first covers the traditional methods of user authentication and discusses how such techniques have become cumbersome in the world of mobile devices and short usage sessions. The concept of continuous biometric authentication systems is introduced and their construction is discussed. The different biometrics that these systems may utilise (e.g.: touchscreen-gesture interactions) are described and relevant studies surveyed. It also surveys important considerations and challenges.

Biometrics: Advanced Identity Verification: The Complete Guide

Posted By: AvaxGenius
Biometrics: Advanced Identity Verification: The Complete Guide

Biometrics: Advanced Identity Verification: The Complete Guide by Julian Ashbourn
English | PDF | 2000 | 215 Pages | ISBN : 1852332433 | 42.1 MB

Biometric identity verification (BIV) offers a radical alternative to passports, PIN numbers, ID cards and driving licences. It uses physiological or behavioural characteristics such as fingerprints, hand geometry, and retinas to check a person's identity. It is therefore much less open to fraudulent use, which makes it ideal for use in voting systems, financial transactions, benefit payment administration, border control, and prison access.

3D Biometrics: Systems and Applications

Posted By: step778
3D Biometrics: Systems and Applications

Guangming Lu, "3D Biometrics: Systems and Applications"
English | 2013 | pages: 291 | ISBN: 1461473993, 1489993428 | PDF | 18,9 mb

When Biometrics Fail: Gender, Race, and the Technology of Identity

Posted By: step778
When Biometrics Fail: Gender, Race, and the Technology of Identity

Shoshana Amielle Magnet, "When Biometrics Fail: Gender, Race, and the Technology of Identity"
English | 2011 | pages: 226 | ISBN: 0822351358, 0822351234 | PDF | 1,4 mb

Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume 1 (Repost)

Posted By: AvaxGenius
Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume 1 (Repost)

Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume 1 by Kohei Arai
English | EPUB | 2022 | 1169 Pages | ISBN : 3030801187 | 173 MB

This book is a comprehensive collection of chapters focusing on the core areas of computing and their further applications in the real world.
Each chapter is a paper presented at the Computing Conference 2021 held on 15-16 July 2021. Computing 2021 attracted a total of 638 submissions which underwent a double-blind peer review process. Of those 638 submissions, 235 submissions have been selected to be included in this book.

Frequent Pattern Mining (Repost)

Posted By: AvaxGenius
Frequent Pattern Mining (Repost)

Frequent Pattern Mining by Charu C. Aggarwal, Jiawei Han
English | PDF (True) | 2014 | 480 Pages | ISBN : 3319078208 | 11.1 MB

This comprehensive reference consists of 18 chapters from prominent researchers in the field. Each chapter is self-contained, and synthesizes one aspect of frequent pattern mining. An emphasis is placed on simplifying the content, so that students and practitioners can benefit from the book. Each chapter contains a survey describing key research on the topic, a case study and future directions. Key topics include: Pattern Growth Methods, Frequent Pattern Mining in Data Streams, Mining Graph Patterns, Big Data Frequent Pattern Mining, Algorithms for Data Clustering and more. Advanced-level students in computer science, researchers and practitioners from industry will find this book an invaluable reference.

Biometric Authentication for iOS in Swift

Posted By: lucky_aut
Biometric Authentication for iOS in Swift

Biometric Authentication for iOS in Swift
Duration: 43m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 152 MB
Genre: eLearning | Language: English

Intelligent Computing: Proceedings of the 2022 Computing Conference, Volume 2

Posted By: AvaxGenius
Intelligent Computing: Proceedings of the 2022 Computing Conference, Volume 2

Intelligent Computing: Proceedings of the 2022 Computing Conference, Volume 2 by Kohei Arai
English | EPUB (True) | 2022 | 940 Pages | ISBN : 3031104633 | 146.8 MB

The book, “Intelligent Computing - Proceedings of the 2022 Computing Conference”, is a comprehensive collection of chapters focusing on the core areas of computing and their further applications in the real world.
Each chapter is a paper presented at the Computing Conference 2022 held on July 14–15, 2022. Computing 2022 attracted a total of 498 submissions which underwent a double-blind peer-review process. Of those 498 submissions, 179 submissions have been selected to be included in this book.

Intelligent Computing: Proceedings of the 2022 Computing Conference, Volume 2 (Repost)

Posted By: AvaxGenius
Intelligent Computing: Proceedings of the 2022 Computing Conference, Volume 2 (Repost)

Intelligent Computing: Proceedings of the 2022 Computing Conference, Volume 2 by Kohei Arai
English | PDF | 2022 | 940 Pages | ISBN : 3031104633 | 99.8 MB

The book, “Intelligent Computing - Proceedings of the 2022 Computing Conference”, is a comprehensive collection of chapters focusing on the core areas of computing and their further applications in the real world.
Each chapter is a paper presented at the Computing Conference 2022 held on July 14–15, 2022. Computing 2022 attracted a total of 498 submissions which underwent a double-blind peer-review process. Of those 498 submissions, 179 submissions have been selected to be included in this book.

Pattern Recognition and Computer Vision (Repost)

Posted By: AvaxGenius
Pattern Recognition and Computer Vision (Repost)

Pattern Recognition and Computer Vision: First Chinese Conference, PRCV 2018, Guangzhou, China, November 23-26, 2018, Proceedings, Part I by Jian-Huang Lai, Cheng-Lin Liu, Xilin Chen, Jie Zhou, Tieniu Tan, Nanning Zheng, Hongbin Zha
English | PDF | 2018 | 603 Pages | ISBN : 303003397X | 121.8 MB

The four-volume set LNCS 11256, 11257, 11258, and 11259 constitutes the refereed proceedings of the First Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2018, held in Guangzhou, China, in November 2018.
The 179 revised full papers presented were carefully reviewed and selected from 399 submissions. The papers have been organized in the following topical sections:

Behavioral Biometrics: A Remote Access Approach

Posted By: AvaxGenius
Behavioral Biometrics: A Remote Access Approach

Behavioral Biometrics: A Remote Access Approach by Kenneth Revett PhD
English | PDF (True) | 2008 | 243 Pages | ISBN : 0470518839 | 6.63 MB

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need for a small footprint, versatile alternative to expensive hardware-based, or physiological, biometrics. As an emerging alternative to these traditional and more well-known physiological biometrics such as fingerprinting or iris scans, behavorial biometrics can offer state-of-the-art solutions to identity management requirements as either a stand-alone system or part of a multi-biometric security system.