![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems
Palmprint Authentication is the first book to provide a comprehensive introduction to palmprint technologies. It reveals automatic biometric techniques for personal identification using palmprint, from the approach based on offline palmprint images, to the current state-of-the-art algorithm using online palmprint images. Palmprint Authentication provides the reader with a basic concept of Palmprint Authentication. It also includes an in-depth discussion of Palmprint Authentication technologies, a detailed description of Palmprint Authentication systems, and an up-to-date coverage of how these issues are developed. This book is suitable for different levels of readers: those who want to learn more about palmprint technology, and those who wish to understand, participate, and/or develop a palmprint authentication system. Palmprint Authentication is effectively a handbook for biometric research and development. Graduate students and researchers in computer science, electrical engineering, systems science, and information technology will all find it uniquely useful, not only as a reference book, but also as a text book. Researchers and practitioners in industry, and R&D laboratories working in the fields of security system design, biometrics, immigration, law enforcement, control, and pattern recognition will also benefit from this volume.
Access to reliable and affordable energy, water, and services is an important determinant of the prosperity of cities along with effective mission sustainment at military installations. The idea for this book was conceived at the NATO Advanced Research Workshop (ARW) in June 2012 in Hella, Iceland. The workshop was attended by 50 scientists, engineers, and policymakers representing 15 different nations and multiple fields of expertise, reflecting the global and interdisciplinary nature of climate change and sustainability research. The focus of the workshop was on ways in which military installations and small cities can integrate energy, water, and infrastructure sustainability strategies into city and installation management plans that account for climate change uncertainties. The organization of the book reflects major topic sessions and discussions during the workshop.
This volumedescribes fire behavior and fire protection of timbers in outdoors and indoors application mainly in construction industry. The Authors novel approach considers the relationship between various species and age of timbers and its fire behavior at different thermal and fire loads. Quantitative data of ignition speed and flame propagation as well as generation of heat, smoke and toxic products are discussed. Analysis of fire resistance of various types of building materials based on timber of different species as well asthe novel data on theeffect of natural and accelerated aging of timbers on its fire behavior are discussed. The main practical methods of fire protection of new and ancient timber buildings and structures to increase its fire resistance are considered. The book should be useful for a wide range of readers: chemists, physicists, material scientists, architects, engineers, constructors and restorers."
Monitoring of public and private sites is increasingly becoming a very important and critical issue, especially after the recent flurry of terrorist attacks including the one on the Word Trade Center in September 2001. It is, therefore, imperative that effective multisensor surveillance systems be developed to protect the society from similar attacks in the future. The new generation of surveillance systems to be developed have a specific requirement: they must be able to automatically identify criminal and terrorist activity without sacrificing individual privacy to the extent possible. Privacy laws concerning monitoring and surveillance systems vary from country to country but, in general, they try to protect the privacy of their citizens. Monitoring and visual surveillance has numerous other applications. It can be employed to help invalids or handicapped and to monitor the activities of elderly people. It can be used to monitor large events such as sporting events, as well. Nowadays, monitoring is employ d in several different contexts including transport applications, such as monitoring of railway stations and airports, dangerous environments like nuclear facilities or traffic flows on roads and bridges. The latest generation of surveillance systems mainly rely on hybrid analog-digital, or completely digital video communications and processing methods and take advantage of the greater of flexibility offered by video processing algorithms that are capable focusing a human operator's attention on a set of interesting situations.
This book presents the latest developments in biometrics technologies and reports on new approaches, methods, findings, and technologies developed or being developed by the research community and the industry. The book focuses on introducing fundamental principles and concepts of key enabling technologies for biometric systems applied for both physical and cyber security. The authors disseminate recent research and developing efforts in this area, investigate related trends and challenges, and present case studies and examples such as fingerprint, face, iris, retina, keystroke dynamics, and voice applications . The authors also investigate the advances and future outcomes in research and development in biometric security systems. The book is applicable to students, instructors, researchers, industry practitioners, and related government agencies staff. Each chapter is accompanied by a set of PowerPoint slides for use by instructors.
This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used "against" users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. The information on denial of service attacks has been thoroughly updated for the new edition. Also, a major addition to this edition is a section discussing software defined radio and open source tools for mobile phones.
Advanced Video-Based Surveillance Systems presents second generation surveillance systems that automatically process large sets of signals for performance monitoring tasks. Included is coverage of different architecture designs, customization of surveillance architecture for end-users, advances in the processing of imaging sequences, security systems, sensors, and remote monitoring projects. Examples are provided of surveillance applications in highway traffic control, subway stations, wireless communications, and other areas. This work will be of interest to researchers in image processing, computer vision, digital signal processing, and telecommunications.
In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.
Video monitoring has become a vital aspect within the global society as it helps prevent crime, promote safety, and track daily activities such as traffic. As technology in the area continues to improve, it is necessary to evaluate how video is being processed to improve the quality of images. Applied Video Processing in Surveillance and Monitoring Systems investigates emergent techniques in video and image processing by evaluating such topics as segmentation, noise elimination, encryption, and classification. Featuring real-time applications, empirical research, and vital frameworks within the field, this publication is a critical reference source for researchers, professionals, engineers, academicians, advanced-level students, and technology developers.
Information is always required by organizations of coastal states about the movements, identities and intentions of vessels sailing in the waters of interest to them, which may be coastal waters, straits, inland waterways, rivers, lakes or open seas. This interest may stem from defense requirements or from needs for the protection of off-shore resources, enhanced search and rescue services, deterrence of smuggling, drug trafficking and other illegal activities and/or for providing vessel traffic services for safe and efficient navigation and protection of the environment. To meet these needs it is necessary to have a well designed maritime surveillance and control system capable of tracking ships and providing other types of information required by a variety of user groups ranging from port authorities, shipping companies, marine exchanges to governments and the military. Principles of Integrated Maritime Surveillance Systems will be of vital interest to anyone responsible for the design, implementation or provision of a well designed maritime surveillance and control system capable of tracking ships and providing navigational and other types of information required for safe navigation and efficient commercial operation. Principles of Integrated Maritime Surveillance Systems is therefore essential to a variety of user groups ranging from port authorities to shipping companies and marine exchanges as well as civil governments and the military.
This book presents all aspects of situational awareness using acoustic signals. It starts by presenting the science behind understanding and interpretation of sound signals. The book then goes on to provide various signal processing techniques used in acoustics to find the direction of sound source, localize gunfire, track vehicles and detect people. The necessary mathematical background and various classification and fusion techniques are presented. The book contains majority of the things one would need to process acoustic signals for all aspects of situational awareness in one location. The book also presents array theory, which is pivotal in finding the direction of arrival of acoustic signals. In addition, the book presents techniques to fuse the information from multiple homogeneous/heterogeneous sensors for better detection. MATLAB code is provided for majority of the real application, which is a valuable resource in not only understanding the theory but readers can also use the code as a spring-board to develop their own application based software code.
The seven chapters in Part 1, of this volume, focus on the foundations of global leadership. Together, these chapters explore a broad selection of the social and psychological processes underlying effective global leadership. These authors expand ideas currently in use, and they introduce new ideas for our consideration. The seven papers in Part 2 focus on the practice of global leadership. Compared to those in Part 1, these chapters focus more on practical solutions to the problems that leaders face than the analysis of fundamental processes, although this distinction is one of degree. All the authors in Part 1 explore the practical implications of their ideas, and those in Part 2 contribute to the development of fundamental concepts. It provides analysis on the foundation of global leadership principles. It discusses practical solutions to the problems faced by today's global leaders. It offers an international representation.
An up-to-date, comprehensive review of surveillance and reconnaissance (S&R) imaging system modelling and performance prediction. This resource helps the reader predict the information potential of new surveillance system designs, compare and select from alternative measures of information extraction, relate the performance of tactical acquisition sensors and surveillance sensors, and understand the relative importance of each element of the image chain on S&R system performance. It provides system descriptions and characteristics, S&R modelling history, and performance modelling details. With an emphasis on validated prediction of human observer performance, this book addresses the specific design and analysis techniques used with today's S&R imaging systems. It offers in-depth discussions on everything from the conceptual performance prediction model, linear shift invariant systems, and measurement variables used for S&R information extraction to predictor variables, target and environmental considerations, CRT and flat panel display selection, and models for image processing. Conversion methods between alternative modelling approaches are examined to help the reader perform system comparisons.
This book investigates the susceptibility of intrinsic physically unclonable function (PUF) implementations on reconfigurable hardware to optical semi-invasive attacks from the chip backside. It explores different classes of optical attacks, particularly photonic emission analysis, laser fault injection, and optical contactless probing. By applying these techniques, the book demonstrates that the secrets generated by a PUF can be predicted, manipulated or directly probed without affecting the behavior of the PUF. It subsequently discusses the cost and feasibility of launching such attacks against the very latest hardware technologies in a real scenario. The author discusses why PUFs are not tamper-evident in their current configuration, and therefore, PUFs alone cannot raise the security level of key storage. The author then reviews the potential and already implemented countermeasures, which can remedy PUFs' security-related shortcomings and make them resistant to optical side-channel and optical fault attacks. Lastly, by making selected modifications to the functionality of an existing PUF architecture, the book presents a prototype tamper-evident sensor for detecting optical contactless probing attempts.
These proceedings comprise invited papers from highly experienced researchers in THz technology and security applications. THz detection of explosives represents one of the most appealing technologies to have recently emerged in dealing with terrorist attacks encountered by civil security and military forces throughout the world. Discussed are the most advanced technologies and developments, the various points of operational strength and weaknesses as well as are suggestions and predictions the best technological solutions to overcome current operational limits.The current status of various levels of cooling in THz detectors, sources and associated electronics are also addressed. The goal was to provide a clear view on the current technologies available and the required advances needed in order to achieve more efficient systems. This goal was outlined in part by establishing the baseline of current uncertainty estimations in physics-based modelling and the identification of key areas which require additional research and development. "
This book examines the roles of sensors, physics based attributes, classification methods, and performance evaluation in automatic target recognition. It details target classification from small mine like objects to large tactical vehicles. Also explored in the book are invariants of sensor and transmission transformations, which are crucial in the development of low latency and computationally manageable automatic target recognition systems.
Safety and Security Studies is an interdisciplinary area of research and this book includes specially selected papers. These papers encompass the work of engineers, scientists, field researchers and other specialists involved in one or more of the theoretical and practical aspects of safety and security. Due to the interdisciplinary nature of this field it forms an area of research and application that brings together in a systematic way, many disciplines of engineering, from the traditional to the most technologically advanced. This volume covers topics such as crisis management, security engineering, natural and man-made disasters and emergencies, risk management, and control, protection and mitigation issues.
This book, comprising contributions presented at the XIX Edoardo Amaldi Conference, examines important aspects of international cooperation aimed at enhancing nuclear safety, security, safeguards (the "3S"), and non-proliferation, thereby assisting in the development and maintenance of the verification regime and progress toward a nuclear weapon-free world. The Conference served as a forum where eminent scientists, diplomats, and policymakers could compare national perspectives and update international collaborations. The book opens by addressing the political, institutional, and legal dimensions of the 3S and non-proliferation; current challenges are discussed and attempts made to identify possible solutions and future improvements. Subsequent sections consider scientific developments that can contribute to increased effectiveness in the implementation of international regimes, particularly in critical areas, technology foresight, and the ongoing evaluation of current capabilities. The closing sections discuss scientific and technical challenges to the effective implementation of the 3S approach and the role of international cooperation and scientific community actions in leading the world toward peace and security.
Large-scale video networks are of increasing importance in a wide range of applications. However, the development of automated techniques for aggregating and interpreting information from multiple video streams in real-life scenarios is a challenging area of research. Collecting the work of leading researchers from a broad range of disciplines, this timely text/reference offers an in-depth survey of the state of the art in distributed camera networks. The book addresses a broad spectrum of critical issues in this highly interdisciplinary field: current challenges and future directions; video processing and video understanding; simulation, graphics, cognition and video networks; wireless video sensor networks, communications and control; embedded cameras and real-time video analysis; applications of distributed video networks; and educational opportunities and curriculum-development. Topics and features: Presents an overview of research in areas of motion analysis, invariants, multiple cameras for detection, object tracking and recognition, and activities in video networks Provides real-world applications of distributed video networks, including force protection, wide area activities, port security, and recognition in night-time environments Describes the challenges in graphics and simulation, covering virtual vision, network security, human activities, cognitive architecture, and displays Examines issues of multimedia networks, registration, control of cameras (in simulations and real networks), localization and bounds on tracking Discusses system aspects of video networks, with chapters on providing testbed environments, data collection on activities, new integrated sensors for airborne sensors, face recognition, and building sentient spaces Investigates educational opportunities and curriculum development from the perspective of computer science and electrical engineering This unique text will be of great interest to researchers and graduate students of computer vision and pattern recognition, computer graphics and simulation, image processing and embedded systems, and communications, networks and controls. The large number of example applications will also appeal to application engineers.
The present work will discuss relevant theoretical frameworks and applications pertaining to enabling resilience within the risk, crisis and disaster management domain. The contributions to this book focus on resilience thinking along 4 broad themes: Urban Domain; Cyber Domain; Organizational/Social domain; and Socio-ecological domain. This book would serve as a valuable reference for courses on risk, crisis and disaster management, international development, social innovation and resilience. This will be of particular interest to those working in the risk, crisis and disaster management domain as it will provide valuable insights into enabling resilience. This book will be well positioned to inform disaster management professionals, policy makers and academics on strategies and perspectives regarding disaster resilience.
This book provides a comprehensive overview of smart ports and remote technologies in the maritime industry. It demonstrates how modern advances in artificial intelligence and robotics have transformed the shipping industry, and assesses the impact of this technology from a law and governance standpoint. The book covers a range of topics including port autonomous operations systems, cybersecurity, big data analytics, digitalization and blockchain to throw light on the opportunities and benefits of these new technologies in improving security and safety. It also considers the challenges and threats of their application. It concludes by examining the trajectory of national and international regulatory developments. The book will appeal to scholars and students of maritime technology, law and governance, as well as practitioners and policymakers. Chapters 8, 19 and 20 are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
This book discusses in detail the great historical and social significance of the development of Artificial Intelligence (AI). It consists of seven chapters, each focusing on a specific issue related to AI, such as ethical principles, legal regulations, education, employment and security. Adopting a multidisciplinary approach, it appeals to wide readership, ranging from experts and government officials to the general public.
This book shares essential insights into how the social sciences and technology could foster new advances in managing the complexity inherent to the criminal and digital policing landscape. Said landscape is both dynamic and intricate, emanating as it does from crimes that are both persistent and transnational. Globalization, human and drug trafficking, cybercrime, terrorism, and other forms of transnational crime can have significant impacts on societies around the world. This necessitates a reassessment of what crime, national security and policing mean. Recent global events such as human and drug trafficking, the COVID-19 pandemic, violent protests, cyber threats and terrorist activities underscore the vulnerabilities of our current security and digital policing posture. This book presents concepts, theories and digital policing applications, offering a comprehensive analysis of current and emerging trends in digital policing. Pursuing an evidence-based approach, it offers an extraordinarily perceptive and detailed view of issues and solutions regarding the crime and digital policing landscape. To this end, it highlights current technological and methodological solutions as well as advances concerning integrated computational and analytical solutions deployed in digital policing. It also provides a comprehensive analysis of the technical, ethical, legal, privacy and civil liberty challenges stemming from the aforementioned advances in the field of digital policing; and accordingly, offers detailed recommendations supporting the design and implementation of best practices including technical, ethical and legal approaches when conducting digital policing. The research gathered here fits well into the larger body of work on various aspects of AI, cybersecurity, national security, digital forensics, cyberterrorism, ethics, human rights, cybercrime and law. It provides a valuable reference for law enforcement, policymakers, cybersecurity experts, digital forensic practitioners, researchers, graduates and advanced undergraduates, and other stakeholders with an interest in counter-terrorism. In addition to this target audience, it offers a valuable tool for lawyers, criminologist and technology enthusiasts.
The book provides theoretical methods of connecting discrete-variable quantum information processing to continuous-variable one. It covers the two major fields of quantum information processing, quantum communication and quantum computation, leading to achievement of a long-sought full security of continuous-variable quantum key distribution (QKD) and proposal of a resource-efficient method for optical quantum computing. Firstly, the book provides a security of continuous-variable QKD against arbitrary attacks under a realistic condition such as finite communication rounds and the use of digitized information processing. The book also provides the unified view for conventionally used approximate Gottesman-Kitaev-Preskill (GKP) codes, which encodes qudits on a continuous-variable system, enabling direct comparison between researches based on different approximations.  The book finally proposes a resource-efficient method to realize the universal optical quantum computation using the GKP code via the direct preparation of the GKP magic state instead of GKP Pauli states. Feasibility of the proposed protocol is discussed based on the existing experimental proposals for the GKP state preparation.
Multimedia surveillance systems is an emerging field that includes signal and image processing, communications, and computer vision. Multimedia Video-Based Surveillance Systems: Requirements, Issues and Solutions, combines the most recent research results from these areas for use by engineers and end-users involved in the design of surveillance systems in the fields of transportation and services. The book covers emerging surveillance requirements, including new digital sensors for real-time acquisition of surveillance data, low-level image processing algorithms, and event detection methods. It also discusses problems related to knowledge representation in surveillance systems, wireless and wired multimedia networks, and a new generation of surveillance communication tools. Timely information is presented on digital watermarking, broadband multimedia transmission, legal use of surveillance systems, performance evaluation criteria, and other new and emerging topics, along with applications for transports and pedestrian monitoring. The information contained in Multimedia Video-Based Surveillance Systems: Requirements, Issues and Solutions, bridges the distance between present practice and research findings, and the book is an indispensable reference tool for professional engineers. |
You may like...
EAI International Conference on Big Data…
Anandakumar Haldorai, Arulmurugan Ramu, …
Hardcover
R4,074
Discovery Miles 40 740
Neural Networks and Statistical Learning
Ke-Lin Du, M.N.S. Swamy
Hardcover
R4,008
Discovery Miles 40 080
Silicon Photonics, Volume 99
Chennupati Jagadish, Sebastian Lourdudoss, …
Hardcover
R5,217
Discovery Miles 52 170
Cognitive Infocommunications, Theory and…
Ryszard Klempous, Jan Nikodem, …
Hardcover
R2,729
Discovery Miles 27 290
Advances in Intelligent Information…
Jeng-Shyang Pan, Jianpo Li, …
Hardcover
R5,239
Discovery Miles 52 390
Intelligent Processing Algorithms and…
Dewang Chen, Ruijun Cheng
Hardcover
R2,653
Discovery Miles 26 530
Luminescent Metal Nanoclusters…
Sabu Thomas, Joseph Kuruvilla, …
Paperback
R6,671
Discovery Miles 66 710
Developments and Advances in Defense and…
Alvaro Rocha, Robson Pacheco Pereira
Hardcover
R5,241
Discovery Miles 52 410
|