Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 8 of 8 matches in All Departments
Image technology is a continually evolving field with various
applications such as image processing and analysis, biometrics,
pattern recognition, object tracking, remote sensing, medicine
diagnoses and multimedia. Significant progress has been made in the
level of interest in image morphology, neural networks, full color
image processing, image data compression, image recognition, and
knowledge -based image analysis systems.
Data Management and Internet Computing for Image/Pattern Analysis focuses on the data management issues and Internet computing aspect of image processing and pattern recognition research. The book presents a comprehensive overview of the state of the art, providing detailed case studies that emphasize how image and pattern (IAP) data are distributed and exchanged on sequential and parallel machines, and how the data communication patterns in low- and higher-level IAP computing differ from general numerical computation, what problems they cause and what opportunities they provide. The studies also describe how the images and matrices should be stored, accessed and distributed on different types of machines connected to the Internet, and how Internet resource sharing and data transmission change traditional IAP computing. Data Management and Internet Computing for Image/Pattern Analysis is divided into three parts: the first part describes several software approaches to IAP computing, citing several representative data communication patterns and related algorithms; the second part introduces hardware and Internet resource sharing in which a wide range of computer architectures are described and memory management issues are discussed; and the third part presents applications ranging from image coding, restoration and progressive transmission. Data Management and Internet Computing for Image/Pattern Analysis is an excellent reference for researchers and may be used as a text for advanced courses in image processing and pattern recognition.
Biometrics-based authentication and identification are emerging as the most reliable method to authenticate and identify individuals. Biometrics requires that the person to be identified be physically present at the point-of-identification and relies on something which you are or you do' to provide better security, increased efficiency, and improved accuracy. Automated biometrics deals with physiological or behavioral characteristics such as fingerprints, signature, palmprint, iris, hand, voice and face that can be used to authenticate a person's identity or establish an identity from a database. With rapid progress in electronic and Internet commerce, there is also a growing need to authenticate the identity of a person for secure transaction processing. Designing an automated biometrics system to handle large population identification, accuracy and reliability of authentication are challenging tasks. Currently, there are over ten different biometrics systems that are either widely used or under development. Some automated biometrics, such as fingerprint identification and speaker verification, have received considerable attention over the past 25 years, and some issues like face recognition and iris-based authentication have been studied extensively resulting in successful development of biometrics systems in commercial applications. However, very few books are exclusively devoted to such issues of automated biometrics. Automated Biometrics: Technologies and Systems systematically introduces the technologies and systems, and explores how to design the corresponding systems with in-depth discussion. The issues addressed in this book are highly relevant to many fundamental concerns of both researchers and practitioners of automated biometrics in computer and system security.
Biometric Solutions for Authentication in an E-World provides a
collection of sixteen chapters containing tutorial articles and new
material in a unified manner. This includes the basic concepts,
theories, and characteristic features of integrating/formulating
different facets of biometric solutions for authentication, with
recent developments and significant applications in an E-world.
This book provides the reader with a basic concept of biometrics,
an in-depth discussion exploring biometric technologies in various
applications in an E-world. It also includes a detailed description
of typical biometric-based security systems and up-to-date coverage
of how these issues are developed. Experts from all over the world
demonstrate the various ways this integration can be made to
efficiently design methodologies, algorithms, architectures, and
implementations for biometric-based applications in an E-world.
Data Management and Internet Computing for Image/Pattern Analysis focuses on the data management issues and Internet computing aspect of image processing and pattern recognition research. The book presents a comprehensive overview of the state of the art, providing detailed case studies that emphasize how image and pattern (IAP) data are distributed and exchanged on sequential and parallel machines, and how the data communication patterns in low- and higher-level IAP computing differ from general numerical computation, what problems they cause and what opportunities they provide. The studies also describe how the images and matrices should be stored, accessed and distributed on different types of machines connected to the Internet, and how Internet resource sharing and data transmission change traditional IAP computing. Data Management and Internet Computing for Image/Pattern Analysis is divided into three parts: the first part describes several software approaches to IAP computing, citing several representative data communication patterns and related algorithms; the second part introduces hardware and Internet resource sharing in which a wide range of computer architectures are described and memory management issues are discussed; and the third part presents applications ranging from image coding, restoration and progressive transmission. Data Management and Internet Computing for Image/Pattern Analysis is an excellent reference for researchers and may be used as a text for advanced courses in image processing and pattern recognition.
Biometric Solutions for Authentication in an E-World provides a collection of sixteen chapters containing tutorial articles and new material in a unified manner. This includes the basic concepts, theories, and characteristic features of integrating/formulating different facets of biometric solutions for authentication, with recent developments and significant applications in an E-world. This book provides the reader with a basic concept of biometrics, an in-depth discussion exploring biometric technologies in various applications in an E-world. It also includes a detailed description of typical biometric-based security systems and up-to-date coverage of how these issues are developed. Experts from all over the world demonstrate the various ways this integration can be made to efficiently design methodologies, algorithms, architectures, and implementations for biometric-based applications in an E-world.
Biometrics-based authentication and identification are emerging as the most reliable method to authenticate and identify individuals. Biometrics requires that the person to be identified be physically present at the point-of-identification and relies on `something which you are or you do' to provide better security, increased efficiency, and improved accuracy. Automated biometrics deals with physiological or behavioral characteristics such as fingerprints, signature, palmprint, iris, hand, voice and face that can be used to authenticate a person's identity or establish an identity from a database. With rapid progress in electronic and Internet commerce, there is also a growing need to authenticate the identity of a person for secure transaction processing. Designing an automated biometrics system to handle large population identification, accuracy and reliability of authentication are challenging tasks. Currently, there are over ten different biometrics systems that are either widely used or under development. Some automated biometrics, such as fingerprint identification and speaker verification, have received considerable attention over the past 25 years, and some issues like face recognition and iris-based authentication have been studied extensively resulting in successful development of biometrics systems in commercial applications. However, very few books are exclusively devoted to such issues of automated biometrics. Automated Biometrics: Technologies and Systems systematically introduces the technologies and systems, and explores how to design the corresponding systems with in-depth discussion. The issues addressed in this book are highly relevant to many fundamental concerns of both researchers and practitioners of automated biometrics in computer and system security.
Integrated Image and Graphics Technologies attempts to enhance the
access points to both introductory and advanced material in this
area, and to facilitate the reader with a comprehensive reference
for the study of integrated technologies, systems of image and
graphics conveniently and effectively. This edited volume will
provide a collection of fifteen contributed chapters by experts,
containing tutorial articles and new material describing in a
unified way, the basic concepts, theories, characteristic features
of the technology and the integration of image and graphics
technologies, with recent developments and significant
applications.
|
You may like...
|