Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Disease Control Through Social Network Surveillance
  • Language: en
  • Pages: 237

Disease Control Through Social Network Surveillance

This book examines modern paradigms of disease control based on social network surveillance applications, including electronic sentinel surveillance and wireless application-based surveillance science. It also highlights topics that integrate statistical and epidemiological sciences with surveillance practice and, in order to reflect the evolution of social networking practices, discusses topics concerning the challenges for surveillance theory and practice. In turn, the book goes a step further by providing insights on how we need to analyse epidemiological trends by following best practices on distinguishing useful information from noise, namely fake news, false reporting of disease incidents and events, etc. At the same time, we need to be able to protect health-focused applications and communication tools via cybersecurity technologies and to ensure that anonymity of reporting and privacy are preserved. In closing, the book discusses the role and impact of social media on disease surveillance, as well as the current role of communities in infectious disease surveillance and control.

Surveillance in Action
  • Language: en
  • Pages: 412

Surveillance in Action

  • Type: Book
  • -
  • Published: 2017-11-14
  • -
  • Publisher: Springer

This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that use biometric technologies. It discusses various novel approaches to areas including gait recognition, face-based physiology-assisted recognition, face recognition in the visible and infrared bands, and cross-spectral iris recognition. The second part of the book, Surveillance for Security and Defense, discusses the ethical issues raised by the use of surveillance systems in the name of combatting terrorism and ensuring security...

Face Recognition Across the Imaging Spectrum
  • Language: en
  • Pages: 383

Face Recognition Across the Imaging Spectrum

  • Type: Book
  • -
  • Published: 2016-02-12
  • -
  • Publisher: Springer

This authoritative text/reference presents a comprehensive review of algorithms and techniques for face recognition (FR), with an emphasis on systems that can be reliably used in operational environments. Insights are provided by an international team of pre-eminent experts into the processing of multispectral and hyperspectral face images captured under uncontrolled environments. These discussions cover a variety of imaging sensors ranging from state-of-the-art visible and infrared imaging sensors, to RGB-D and mobile phone image sensors. A range of different biometric modalities are also examined, including face, periocular and iris. This timely volume is a mine of useful information for researchers, practitioners and students involved in image processing, computer vision, biometrics and security.

Securing Social Identity in Mobile Platforms
  • Language: en
  • Pages: 270

Securing Social Identity in Mobile Platforms

The book presents novel research in the areas of social identity and security when using mobile platforms. The topics cover a broad range of applications related to securing social identity as well as the latest advances in the field, including the presentation of novel research methods that are in the service of all citizens using mobile devices. More specifically, academic, industry-related and government (law enforcement, intelligence and defence) organizations, will benefit from the research topics of this book that cover the concept of identity management and security using mobile platforms from various perspectives, i.e. whether a user navigates to social media, accesses their own phon...

Biometric Authentication
  • Language: en
  • Pages: 820

Biometric Authentication

  • Type: Book
  • -
  • Published: 2004-07-16
  • -
  • Publisher: Springer

The past decade has seen a rapid growth in the demand for biometric-based - thentication solutions for a number of applications. With signi?cant advances in biometrictechnologyandanincreaseinthenumberofapplicationsincorporating biometrics, it is essential that we bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions for the development and successful deployment of state-of-the-art biometric systems. The InternationalConference onBiometric Authentication (ICBA 2004)was the?rst major gathering in the Asia-Paci?c region devoted to facilitating this interaction. We are pleased that this conference attracted a large number of high-qu...

Audio- and Video-Based Biometric Person Authentication
  • Language: en
  • Pages: 1152

Audio- and Video-Based Biometric Person Authentication

  • Type: Book
  • -
  • Published: 2011-04-06
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 5th International Conference on Audio- and Video-Based Biometric Person Authentication, AVBPA 2005, held in Hilton Rye Town, NY, USA, in July 2005. The 66 revised oral papers and 50 revised poster papers presented were carefully reviewed and selected from numerous submissions. The papers discuss all aspects of biometrics including iris, fingerprint, face, palm print, gait, gesture, speaker, and signature; theoretical and algorithmic issues are dealt with as well as systems issues. The industrial side of biometrics is evident from presentations on smart cards, wireless devices, and architectural and implementation aspects.

Computational Surgery and Dual Training
  • Language: en
  • Pages: 316

Computational Surgery and Dual Training

The future of surgery is intrinsically linked to the future of computational sciences: the medical act will be computer assisted at every single step, from planning to post-surgery recovery and through the surgical procedure itself. Looking back at the history of surgery, surgery practice has changed drama- cally with the extensive use of revolutionary techniques, such as medical imaging, laparoscopy, endoscopy, sensors and actuators, and robots. This trend is dependent on the use of computer processing, computational method, and virtualization. Computational surgery will not only improve the ef?ciency and quality of surgery, but will also give new access to very complex operations that requ...

Distributed Video Sensor Networks
  • Language: en
  • Pages: 476

Distributed Video Sensor Networks

Large-scale video networks are of increasing importance in a wide range of applications. However, the development of automated techniques for aggregating and interpreting information from multiple video streams in real-life scenarios is a challenging area of research. Collecting the work of leading researchers from a broad range of disciplines, this timely text/reference offers an in-depth survey of the state of the art in distributed camera networks. The book addresses a broad spectrum of critical issues in this highly interdisciplinary field: current challenges and future directions; video processing and video understanding; simulation, graphics, cognition and video networks; wireless vide...

Collaborative Approaches for Cyber Security in Cyber-Physical Systems
  • Language: en
  • Pages: 234

Collaborative Approaches for Cyber Security in Cyber-Physical Systems

This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods. Special attention is given to those approaches and technologies that unleash the power of collaboration among stakeholders, in a field based often developed in isolation and segregation of information. Given the pervasively growing dependency of society on IT technology, and the corresponding proliferation of cyber-threats, there is both an imperative need and opportunity to develop a coherent set of techniques to cope with the changing nature of the upcom...

Sensemaking for Security
  • Language: en
  • Pages: 283

Sensemaking for Security

This book presents sensemaking strategies to support security planning and design. Threats to security are becoming complex and multifaceted and increasingly challenging traditional notions of security. The security landscape is characterized as ‘messes’ and ‘wicked problems’ that proliferate in this age of complexity. Designing security solutions in the face of interconnectedness, volatility and uncertainty, we run the risk of providing the right answer to the wrong problem thereby resulting in unintended consequences. Sensemaking is the activity that enables us to turn the ongoing complexity of the world into a “situation that is comprehended explicitly in words and that serves a...