Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Biometrics: Theory, Methods, and Applications (IEEE Press Series on Computational Intelligence)

Buy

An in-depth examination of the cutting edge of biometrics

This book fills a gap in the literature by detailing the recent advances and emerging theories, methods, and applications of biometric systems in a variety of infrastructures. Edited by a panel of experts, it provides comprehensive coverage of:

  • Multilinear discriminant analysis for biometric signal recognition
  • Biometric identity authentication techniques based on neural networks
  • Multimodal biometrics and design of classifiers for biometric fusion
  • Feature selection and facial aging modeling for face recognition
  • Geometrical and statistical models for video-based face authentication
  • Near-infrared and 3D face recognition
  • Recognition based on fingerprints and 3D hand geometry
  • Iris recognition and ECG-based biometrics
  • Online signature-based authentication
  • Identification based on gait
  • Information theory approaches to biometrics
  • Biologically inspired methods and biometric encryption
  • Biometrics based on electroencephalography and event-related potentials

Biometrics: Theory, Methods, and Applications is an indispensable resource for researchers, security experts, policymakers, engineers, and graduate students.

(HTML tags aren't allowed.)

BEA WebLogic Server 8.1 Unleashed
BEA WebLogic Server 8.1 Unleashed
BEA WebLogic Server Unleashed is the definitive reference work for the WebLogic developer, offering an in-depth look at the capabilities provided by WebLogic Server and illustrating the best development practices. The book covers WebLogic's role in every aspect of a J2EE application: from working with Servlets,...
Data Mining Methods and Models
Data Mining Methods and Models
Apply powerful Data Mining Methods and Models to Leverage your Data for Actionable Results

Data Mining Methods and Models provides:

  • The latest techniques for uncovering hidden nuggets of information
  • The insight into how the data mining algorithms actually work
  • The hands-on experience of...
Going Pro with Cubase 5 (Book)
Going Pro with Cubase 5 (Book)

Going Pro with Cubase 5 provides a useful guidebook for those who are ready to jump to the next step with Cubase and would like some expert-level tips, tricks, and advice to help them truly master the program. Do you already know how to record MIDI and audio in Cubase? Do you already know Cubase?s basic tools and terminology? Do you think and...


The Language of the Papyri
The Language of the Papyri

The modern rediscovery of the Greek and Latin papyri from Egypt has transformed our knowledge of the ancient world. We cannot, however, make the same claim in the specific area of language study. Although important studies of the language of the papyri have appeared sporadically over the past century, we are still dealing today with a...

The Photoshop Darkroom 2: Creative Digital Transformations
The Photoshop Darkroom 2: Creative Digital Transformations

Back in the old days, working in a chemical darkroom, I could only have dreamed of a postprocessing tool as wonderful as Photoshop. But for me that’s exactly what Photoshop is—a tool. It’s a tool that helps me as a professional image creator. The image is what matters, not the tool.

The Photoshop...

Implementing Cisco Unified Communications Manager, Part 1 (CIPT1) (Authorized Self-Study Guide)
Implementing Cisco Unified Communications Manager, Part 1 (CIPT1) (Authorized Self-Study Guide)
Professional certifications have been an important part of the computing industry for many years and will continue to become more important. Many reasons exist for these certifications, but the most popularly cited reason is that of credibility. All other considerations held equal, the certified employee/consultant/job candidate is considered more...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy