You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Concrete Technology: Theory and Practice" gives students of Civil Engineering a thorough understanding of all aspects of concrete technology from first principles. It covers types of Cement, Admixtures, Concrete strength, durability and testing with reference to national standards.
This exciting new book brings together the most significant information on the procedures that have generated most of the recent progress in hepatobiliary pathophysiology. The authors describe their unique experiences, including specific technical and analytical problems. Since workers in the field often specialize within a limited area, the methodology covering each of the main aspects in hepatobiliary research is particularly useful. The book also includes an exhaustive reference list.
"The book provides an up-to-date and authoritative treatment of pattern recognition and computer vision, with chapters written by leaders in the field. On the basic methods in pattern recognition and computer vision, topics range from statistical pattern recognition to array grammars to projective geometry to skeletonization, and shape and texture measures."--BOOK JACKET.
Biometric Solutions for Authentication in an E-World provides a collection of sixteen chapters containing tutorial articles and new material in a unified manner. This includes the basic concepts, theories, and characteristic features of integrating/formulating different facets of biometric solutions for authentication, with recent developments and significant applications in an E-world. This book provides the reader with a basic concept of biometrics, an in-depth discussion exploring biometric technologies in various applications in an E-world. It also includes a detailed description of typical biometric-based security systems and up-to-date coverage of how these issues are developed. Experts from all over the world demonstrate the various ways this integration can be made to efficiently design methodologies, algorithms, architectures, and implementations for biometric-based applications in an E-world.
Many people think of personal identification as only part of the security/surveillance apparatus. This is likely to be an oversimplification, which largely misrepresents the reality. 'Personal identity' means two separate concepts, namely that an individual belongs to specific categories and also that this individual is distinguished by other persons and understood as one. In other words, there are two different aspects involved in personal recognition: distinguishing between individuals and distinguishing between sets of people. The latter is likely to be the real issue. Dictatorships of any kind and totalitarian regimes have always ruled by categorizing people and by creating different cla...
This book provides ample coverage of theoretical and experimental state-of-the-art work as well as new trends and directions in the biometrics field. It offers students and software engineers a thorough understanding of how some core low-level building blocks of a multi-biometric system are implemented. While this book covers a range of biometric traits, its main emphasis is placed on multi-sensory and multi-modal face biometrics algorithms and systems.
At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called “Y2K” issue. Te Y2K scare was the fear that c- puter networks and the systems that are controlled or operated by sofware would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs) around the world that now work - operatively to exchange expertise and information, and to coordi...