Listing 1 - 5 of 5 |
Sort by
|
Choose an application
'Critical Insights From A Practitioner Mindset' is eminently readable and covers management practices in the government field and the efforts of the Gulf Cooperation Council (GCC) countries and the United Arab Emirates government.
Internet in public administration --- Biometric identification --- Digital government --- E-government --- Electronic government --- Online government --- Public administration --- Biometric person authentication --- Biometrics (Identification) --- Anthropometry --- Identification --- United Arab Emirates --- Politics and government.
Choose an application
This book follows a successful symposium organized in June 2009 at the Human Brain Mapping conference. The topic is at the crossroads of two domains of increasing importance and appeal in the neuroimaging/neuroscience community: multi-modal integration, and social neuroscience. Most of our social interactions involve combining information from both the face and voice of other persons: speech information, but also crucial nonverbal information on the person’s identity and affective state. The cerebral bases of the multimodal integration of speech have been intensively investigated; by contrast only few studies have focused on nonverbal aspects of face-voice integration. This work highlights recent advances in investigations of the behavioral and cerebral bases of face-voice multimodal integration in the context of person perception, focusing on the integration of affective and identity information. Several research domains are brought together. Behavioral and neuroimaging work in normal adult humans included are presented alongside evidence from other domains to provide complementary perspectives: studies in human children for a developmental perspective, studies in non-human primates for an evolutionary perspective, and studies in human clinical populations for a clinical perspective.
Biometric identification. --- Human-computer interaction. --- Computer-human interaction --- Human factors in computing systems --- Interaction, Human-computer --- Biometric person authentication --- Biometrics (Identification) --- Medicine. --- Neurosciences. --- Neurology. --- Cognitive psychology. --- Biomedicine. --- Cognitive Psychology. --- Human engineering --- User-centered system design --- User interfaces (Computer systems) --- Anthropometry --- Identification --- Consciousness. --- Medicine --- Nervous system --- Neuropsychiatry --- Apperception --- Mind and body --- Perception --- Philosophy --- Psychology --- Spirit --- Self --- Neural sciences --- Neurological sciences --- Neuroscience --- Medical sciences --- Diseases --- Neurology . --- Psychology, Cognitive --- Cognitive science
Choose an application
Biometrics-based recognition systems offer many benefits over traditional authentication approaches. However, such systems raise new challenges related to personal data protection. This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: Presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection Examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardization Describes real-world applications, from face and fingerprint-based user recognition, to biometrics-based electronic documents, and biometric systems employing smart cards Reviews the ethical implications of the ubiquity of biometrics in everyday life, and its impact on human dignity Provides guidance on best practices for the processing of biometric data within a legal framework This timely and authoritative volume is essential reading for all practitioners and researchers involved in biometrics-based automatic human recognition. Graduate students of computer science and electrical engineering will also find the text to be an invaluable practical reference. Dr. Patrizio Campisi is a Full Professor in the Department of Engineering, Section of Applied Electronics at the University of Roma Tre, Rome, Italy.
Biometric identification -- Security measures. --- Biometric identification. --- Biometrics. --- Biometry. --- Computer science. --- Computers_xLaw and legislation. --- Data encryption (Computer scienc. --- Data encryption (Computer science). --- Data protection --- Biometric identification --- Data encryption (Computer science) --- Biology --- Health & Biological Sciences --- Biology - General --- Security measures --- Biometric person authentication --- Biometrics (Identification) --- User interfaces (Computer systems). --- Biometrics (Biology). --- Application software. --- Computers. --- Law and legislation. --- Computer Science. --- Data Encryption. --- User Interfaces and Human Computer Interaction. --- Computer Appl. in Social and Behavioral Sciences. --- Legal Aspects of Computing. --- Anthropometry --- Identification --- Social sciences --- Computers --- Cryptology. --- Data processing. --- Cyberspace --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Law and legislation --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Biological statistics --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Statistical methods --- Data protection. --- Security measures.
Choose an application
Iris Biometrics: From Segmentation to Template Security provides critical analysis, challenges and solutions on recent iris biometric research topics, including image segmentation, image compression, watermarking, advanced comparators, template protection and more. Open source software is also provided on a dedicated website which includes feature extraction, segmentation and matching schemes applied in this book to foster scientific exchange. Current state-of-the-art approaches accompanied by comprehensive experimental evaluations are presented as well. This book has been designed as a secondary text book or reference for researchers and advanced-level students in computer science and electrical engineering. Professionals working in this related field will also find this book useful as a reference.
Biometric identification. --- Image processing. --- Signal processing. --- Biometric identification --- Electrical & Computer Engineering --- Biology --- Health & Biological Sciences --- Engineering & Applied Sciences --- Biology - General --- Electrical Engineering --- Processing, Signal --- Pictorial data processing --- Picture processing --- Processing, Image --- Biometric person authentication --- Biometrics (Identification) --- Computer science. --- Computer security. --- Pattern recognition. --- Biometrics (Biology). --- Computer Science. --- Biometrics. --- Pattern Recognition. --- Systems and Data Security. --- Information measurement --- Signal theory (Telecommunication) --- Imaging systems --- Optical data processing --- Anthropometry --- Identification --- Optical pattern recognition. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Pattern perception --- Perceptrons --- Visual discrimination --- Protection --- Security measures --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Biological statistics --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Statistical methods
Choose an application
This book constitutes the refereed proceedings of the Third IFIP WG 11.6 Working Conference on Policies and Research in Identity Management, IDMAN 2013, held in London, UK, in April 2013. The 6 refereed full and 4 short papers presented together with 3 short position papers and a keynote paper were selected from 26 submissions. The papers have been organized into topical sections on privacy and identity management, anonymous credentials, authentication and access control, risk management of identity management, identity management with smart cards, and federated identity management.
Computer science. --- Software engineering. --- Data protection. --- Data encryption (Computer science). --- Biometrics. --- Information Systems. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Special Purpose and Application-Based Systems. --- Management of Computing and Information Systems. --- Engineering & Applied Sciences --- Computer Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer software engineering --- Informatics --- Special purpose computers. --- Computer security. --- Biometrics (Biology). --- Management information systems. --- Software engineering --- Cryptology. --- Engineering --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Special purpose computers --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Statistical methods --- Communication systems --- Cryptography. --- Biometric identification. --- Computers, Special purpose. --- Electronic data processing --- Data and Information Security. --- IT Operations. --- Management. --- Biometric person authentication --- Biometrics (Identification) --- Anthropometry --- Identification --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)
Listing 1 - 5 of 5 |
Sort by
|