Showing 221 - 240 results of 285 for search '"biometrics"', query time: 0.15s Refine Results
  1. 221
    Published 2007
    Connect to this title online
    Electronic eBook
  2. 222
  3. 223
    Published 2015
    Table of Contents: “…Bio-inspired Optimization Techniques and Their Applications -- Swarm Based Mean-Variance Mapping Optimization for Solving Economic Dispatch with Cubic Fuel Cost Function -- Multi objective Optimization of Bioactive Compound Extraction Process via Evolutionary Strategies -- Hybrid Swarm Intelligence-based Optimization for Charging Plug-in Hybrid Electric Vehicle -- A Genetic Algorithm with Grouping Selection and Searching Operators for the Orienteering Problem -- Solving the Set Covering Problem with a Shuffled Frog Leaping Algorithm -- Machine Learning in Biometrics and Bioinformatics with Applications -- Automatic Evaluation of Area-Related Immunogold Particles Density in Transmission Electron Micrographs -- Fusion of Granular Computing and k–NN Classifiers for Medical Data Support System -- Lip Print Recognition Method Using Bifurcations Analysis -- Detecting the Reference Point in Fingerprint Images with the Use of the High Curvature Points -- Kinect-Based Action Recognition in a Meeting Room Environment -- Advanced Data Mining Techniques and Applications -- Analyzing Users’ Interests with the Temporal Factor Based on Topic Modeling -- Classifying Continuous Classes with Reinforcement Learning RULES -- Fuzzy Association Rule Mining with Type-2 Membership Functions -- Dependence Factor for Association Rules -- Collective Intelligent Systems for E-market Trading, Technology -- Opportunity Discovery and Collaborative Learning A Novel Framework of Consumer Co-creation for New Service Development -- Recognizing and Evaluating the Technology Opportunities via Clustering Method and Google Scholar -- Raising EFL College Learners’ Awareness of Collocations via COCA -- Effects of Question Prompts and Self-explanation on Database Problem Solving in a Peer Tutoring Context -- Intelligent Information Systems in Security and Defense -- FP-tree and SVM for Malicious Web Campaign Detection -- Simulation of Human Behavior in Different Densities as a Part of Crowd Control Systems -- The Qualitative and Quantitative Support Method for Capability Based Planning of Armed Forces Development -- Agent-Based M&S of Smart Sensors for Knowledge Acquisition Inside the Internet of Things and Sensor Networks -- Analysis of Image, Video and Motion Data in Life Sciences -- Camera Calibration and Navigation in Networks of Rotating Cameras -- Expert Group Collaboration Tool for Collective Diagnosis of Parkinson Disease -- Dynamics Modeling of 3D Human Arm Using Switched Linear Systems -- Machine Learning on the Video Basis of Slow Pursuit Eye Movements Can Predict Symptom Development in Parkinson’s Patients -- Optimization of Joint Detector for Ultrasound Images Using Mixtures of Image Feature Descriptors -- Automatic Markers’ Influence Calculation for Facial Animation Based on Performance Capture -- Automated Analysis of Images from Confocal Laser Scanning Microscopy Applied to Observation of Calcium Channel Subunits in Nerve Cell Model Line Subjected Electroporation and Calcium -- Registration of Ultrasound Images for Automated Assessment of Synovitis Activity -- Quantifying Chaotic Behavior in Treadmill Walking -- Augmented Reality and 3D Media -- Human Detection from Omnidirectional Camera Using Feature Tracking and Motion Segmentation -- Automatic Fast Detection of Anchorperson Shots in Temporally Aggregated TV News Videos -- Combined Motion Estimation and Tracking Control for Autonomous Navigation -- Eye Tracking in Gesture Based User Interfaces Usability Testing -- Maximization of AR Effectiveness as a Didactic Tool with Affective States Recognition -- A Method of the Dynamic Generation of an Infinite Terrain in a Virtual 3D Space -- Accuracy Evaluation of a Linear Positioning System for Light Field Capture -- A System for Real-Time Passenger Monitoring System for Bus Rapid Transit System -- Cloud Based Solutions -- Cloud and m-Learning: Longitudinal Case Study of Faculty of Informatics and Management, University of Hradec Kralove -- Granular-Rule Extraction to Simplify Data -- Wireless Positioning as a Cloud Based Service -- HPC Cloud Technologies for Virtual Screening in Drug Discovery -- Internet of Things, Big Data and Cloud Computing -- Delivery of e-Health Services in Next Generation Networks -- Implementation and Performance Testing of ID Layer Nodes for Hierarchized IoT Network -- Modeling Radio Resource Allocation Scheme with Fixed Transmission Zones for Multiservice M2M Communications in Wireless IoT Infrastructure -- Towards On-Demand Resource Provisioning for IoT Environments -- ComSS – Platform for Composition and Execution of Streams Processing Services -- Experience-Oriented Enhancement of Smartness For Internet of Things -- Artificial Intelligent Techniques and Their Application in Engineering and Operational Research -- A Cloud Computing Platform for Automatic Blotch Detection in Large Scale Old Media Archives -- High-Accuracy Phase-Equalizer for Communication-Channel Compensation -- Using Different Norms in Packing Circular Objects -- SCADA Based Operator Support System for Power Plant Fault Diagnosis -- Lino - An Intelligent System for Detecting Malicious Web-Robots -- Optimum Design of Finned Tube Heat Exchanger Using DOE -- Extraction of Event Elements Based on Event Ontology Reasoning.…”
    Connect to this title online
    Electronic eBook
  4. 224
    by Stanislav, Mark
    Published 2015
    Table of Contents: “…Chapter 4: Second-Factor TechnologiesA burgeoning world of options; Hardware-based OTP generation; SMS-based OTP delivery; Phone-call-based mechanisms; Geolocation-aware authentication; Push-notification-based authentication; Biometric authentication factors; Smartcard verification; Chapter 5: Standards and Regulations; One security control, many boxes checked; PCI DSS; HIPAA; FFIEC; India; Singapore; Chapter 6: Two Factor for Internet End-Users; Changing the face of two-factor adopters; Early end-user two-factor authentication; Google's impact on driving adoption…”
    Connect to this title online (unlimited users allowed)
    Electronic eBook
  5. 225
    by Flynn, Jon
    Published 2024
    Table of Contents: “…San Antonio Spurs -- Chapter 2 Using Sports Science to Optimize Player Performance: 2014 FIFA World Cup: Germany's Victory -- Chapter 3 Social Media Takes the Olympics by Storm: 2016 Rio Olympics: The Refugee Olympic Team Is the Winner -- Chapter 4 The Role of Biometric Tech in Shaping the Game: 2016 NBA Finals: Cleveland Cavaliers vs. …”
    Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
    Electronic eBook
  6. 226
  7. 227
  8. 228
  9. 229
    Published 2015
    Table of Contents: “…Data Mining -- Improvement of the multiple-view learning based on the self-organizing Maps -- Natural Language Processing Methods Used for Automatic Prediction Mechanism of Related Phenomenon -- Visual Exploration of Data with Multithread MIC Computer Architectures -- Random Forests with Weighted Voting for Anomalous Query Access Detection in Relational Databases -- Performance evaluation of the Silhouette index -- Convex Nonnegative Matrix Factorization with Rank-1 Update for Clustering -- Bioinformatics, Biometrics and Medical Applications -- On the Convergence of Quantum and Distributed Computational Models of Consciousness -- Nature-inspired Algorithms for Selecting EEG Sources for Motor Imagery based BCI -- PROCESS: Projection-based Classification of Electroencephalograph Signals -- Feature Extraction of Palm Vein Patterns Based on Two-Dimensional Density Function -- Segmentation Based Feature Selection on Classifying Proteomic Spectral Data -- SOM vs FCM vs PCA in 3d face recognition -- The Fuzzied Quasi-perception in Decision Making Concerning Treatments in Necrotizing Fasciitis -- Mobile Fuzzy System for Detecting Loss of Consciousness and Epileptic Seizure -- Customization of Joint Articulations using Soft Computing Methods -- A new method for the dynamic signature verification based on the stable partitions of the signature -- New fast algorithm for the dynamic signature verification using global features values -- IX Concurrent Parallel Processing -- Parallelization of a Block Cipher Based on Chaotic Neural Networks -- Acceleration of neighborhood evaluation for a multi-objective vehicle Routing -- A concurrent inconsistency reduction algorithm for the pairwise comparisons method -- OpenCL implementation of PSO algorithm for Quadratic Assignment Problem -- Agent Systems, Robotics and Control -- Towards a better understanding and behavior recognition of inhabitants in smart cities. …”
    Connect to this title online
    Electronic eBook
  10. 230
  11. 231
    Published 2015
    Table of Contents: “…Assessing Provenance and Pathways in Social Media: Case studies, methods and tools -- Robust Aggregation of Inconsistent Information - Concepts and Research Directions -- Weaponized Crowdsourcing -- The Structures of Twitter Crowds and Conversations -- Visible Effort: Visualizing and measuring group structuration through social entropy -- Stepwise segmented regression analysis: An iterative statistical algorithm to detect and quantify evolutionary and revolutionary transformations in longitudinal data -- Towards Bottom-up Decision Making and Collaborative Knowledge Generation in Urban Infrastructure Projects through Online Social Media -- Biometric-Based User Authentication and Activity Level Detection in a Collaborative Environment -- Part III. …”
    Connect to this title online
    Electronic eBook
  12. 232
    Published 2023
    Table of Contents: “…AgriBlockchain: Agriculture supply chain using blockchain -- A Triple Band High Gain Antenna Using Metamaterial -- Hybrid Energy Systems Integrated Power System Imbalance Cost Calculation using Moth Swam Algorithm -- Lightweight Privacy Preserving Framework at Edge Layer in IoT -- Concept drift aware analysis of learning engagement during Covid 19 pandemic using adaptive windowing -- MPA Optimized Model Predictive Controller for Optimal Control of an AVR system -- Optimal Power Flow Considering Uncertainty of Renewable Energy Sources Using Meta-Heuristic Algorithm -- Remote Sensing Image Fusion Based on PCA and Wavelets -- Physical Layer Security in MIMO Relay Based Cognitive Radio Network -- Weighted Low Rank and Sparse Matrix Decomposition Models for Separating Background and Foreground in Dynamic MRI -- A Novel Approach For Bug Triaging Using TOPSIS -- Energy Efficient Resource Allocation in Cognitive Radio Networks -- A Hybrid Feature Selection Framework for Breast Cancer Prediction using Mutual Information and AdaBoost-RFE -- Internet of Things enabled Irrigation System in Precision Agriculture -- Medical Internet of Things and Data Analytics for Post-Covid Care: An Analysis -- ECG Biometric Recognition by Convolutional Neural Networks with Transfer Learning using Random Forest Approach -- Design and Analysis of a Metamaterial Based Butterworth Microstrip Filter -- A Review of Financial Fraud Detection in E-Commerce using Machine Learning.…”
    Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
    Electronic Conference Proceeding eBook
  13. 233
    Published 2015
    Table of Contents: “…Light and Reactive Oxygen Species -- 4 Excitatory Amino Acid Transporters, Xc- Antiporter, Glutamyl Transpeptidase, Glutamine Synthetase Activity and Glutathione in Human Corneal Epithelial Cells -- 5 Transforming Growth Factor – β3 Regulates Cell Metabolism in Corneal Keratocytes and Fibroblasts -- 6 Corneal Stem Cells: a Source of Cell Renewal with Therapeutic Potential -- 7 New Agents for Treating Dry Eye Syndrome -- 8 Investigating Carcinine Transport and the Expression Profile of Transporter Genes in Human Corneal Epithelial Cells -- 9 Basic Review of the Oxidative Stress Role in Age-Related Cataractogenesis -- 10 The Human Lens: A living Biometric Indicator of Health Status and Successful Aging -- 11 Oxidative Stress in Lens -- 12 Protein Serine/Threonine Phosphatases-1 and –2A in Lens Development and Pathogenesis -- 13 Proteases in Lens and Cataract -- 14 Photosensitized Oxidation of Lens Proteins Exposed to UVA-Visible Light at Low Oxygen Concentration: Its Effect on the Proteasome System -- 15 p53 Regulates Developmental Apoptosis and Gene Expression to Modulate Lens Differentiation -- 16 Etiology and Prevention of Cataract -- 17 The Effects of Lutein in Preventing Cataract Progression -- 18 Antioxidant Defense Network in the Lens and Benefits of Glutathione Prodrugs in Cataracts -- 19 Updates and Advanc es in Corneal Surgery -- 20 Cataract and Diabetic Retinopathy -- 21 Traumatic Cataract-a Review -- 22 Cataract in Paediatric Age Group-a Review.…”
    Connect to this title online
    Electronic eBook
  14. 234
  15. 235
    Published 2015
    Table of Contents: “…Touchless Target Selection Techniques for Wearable Augmented Reality Systems --  Improving User Experience of Cultural Environment Through IoT: the Beauty or the Truth Case Study -- A Multimedia Summarizer Integrating Text And Images -- c-Space: A Mobile Framework for the Visualization of Spatial-temporal 3D Models -- The Method to Verify Facial Shape Model -- Effective Visualization of a Big Data Banking Application -- A Study About the Comprehensibility of Pictograms for Order Picking processes with Disabled People and People with Altered Performance -- Mining Popular Travel Routes from Social Network Geo-Tagged Data -- Enhancing Workspace Composition by Exploiting Linked Open Data as a Polymorphic Data Source -- Benjamin Franklin's Decision Method Is Acceptable and Helpful with a Conversational Agent -- Towards Model-Driven Assessment of Clinical Processes -- A Monitoring System for the Recognition of Sleeping Disorders in Patients with Cognitive Impairment Disease -- Mersenne-Walsh Matrices for Image Processing -- Frequency Characteristics for Video Sequences Processing -- Expansion of the Quasi-Orthogonal Basis to Mask Images -- Performance Analysis of Prediction Methods for Lossless Image Compression -- Non-Stationary Correlation Noise Modeling for Transform Domain Wyner-Ziv Video Coding -- Fusion of Airborne LiDAR and Digital Photography Data for Tree Crowns Segmentation and Measurement -- Digital Gray-Scale Watermarking Based on Biometrics -- New Non-intrusive Speech Quality Assessment Algorithm for Wireless Networks -- Block-Permutation LDPC Codes for Distributed Storage Systems -- Estimation of the Mean Message Delay for Transport Coding -- Sustainable Flat Ride Suspension Design -- Better Road Design for Autonomous Vehicles Using Clothoids -- Towards Formal Modelling of Autonomous Systems -- Developing a Navigation System for Mobile Robots -- Experimental Flight Test for Autonomous Station-Keeping of a Lighter-Than-Air Vehicle -- Experimental Evaluation of Multi-Key Content-Based Image Retrieval -- A Simple Medium Access Scheme Based on Spread Spectrum Suitable For Wireless Ad Hoc Networks -- Implementation of Tree-Based Data Collection Scheme for Arduino-compatible board.…”
    Connect to this title online
    Electronic eBook
  16. 236
    Published 2012
    Book
  17. 237
    Published 2009
    Table of Contents: “…History of Behavior Genetics -- Quantitative Methods and Models -- Biometrical Models in Behavioral Genetics -- QTL Methodology in Behavior Genetics -- Multivariate Genetic Analysis -- Models of Human Behavior: Talking to the Animals -- Genetics of Cognition -- Twin Studies of General Mental Ability -- Behavioral Genetic Investigations of Cognitive Aging -- The Genetics and Environments of Reading: A Behavioral Genetic Perspective -- Behavior-Genetic and Molecular Studies of Disorders of Speech and Language: An Overview -- Human Brain Volume: What’s in the Genes# -- Cognition in Rodents -- Neurogenetic Analysis and Cognitive Functions in Trisomy 21 -- Evolution of Complex Acoustic Signals in Drosophila Species -- Drosophila Model of Alzheimer’s Amyloidosis -- Genetics of Personality -- Genotype–Environment Correlation and Family Relationships -- Personality -- Molecular Genetics of Personality: How Our Genes can Bring Us to a Better Understanding of Why We Act the Way We Do -- The Genetics of Childhood Temperament -- Genetic and Environmental Influences on Sexual Orientation -- Some Guidelines for Defining Personality Differences in Rats -- The Genetics of Offensive Aggression in Mice -- Sexual Selection and Aggressive Behavior in Drosophila -- Handedness: A Behavioral Laterality Manifestation -- Genetics of Exercise Behavior -- Genetics of Psychopathology -- Genetics of ADHD, Hyperactivity, and Attention Problems -- Depression and Anxiety in Childhood and Adolescence: Developmental Pathways, Genes and Environment -- Genetics of Autism -- Genetics of Smoking Behavior -- The Genetics of Substance Use and Substance Use Disorders -- Genetic Analysis of Conduct Disorder and Antisocial Behavior -- Schizophrenia and Affective Psychotic Disorders – Inputs from a Genetic Perspective -- Genetic Risks in Schizophrenia: Cross-National Prospective Longitudinal High-Risk Studies -- Attention and Working Memory: Animal Models for Cognitive Symptoms of Schizophrenia – Studies on D2-Like Receptor Knockout Mice -- Conclusion -- Future Directions for Behavior Genetics.…”
    Connect to this title online
    Electronic eBook
  18. 238
    Table of Contents: “…Major themes in UPS academic research -- 3.1 User authentication -- 3.1.1 Text passwords -- 3.1.2 Password managers -- 3.1.3 Graphical authentication -- 3.1.4 Biometrics -- 3.1.5 Token-based authentication -- 3.1.6 Mental computation and one-time passwords -- 3.1.7 CAPTCHAs -- 3.1.8 Fallback and backup authentication -- 3.2 Email security and PKI -- 3.2.1 Automatic, transparent encryption -- 3.2.2 Future of secure messaging -- 3.3 Anti-phishing efforts -- 3.3.1 A brief history of phishing -- 3.3.2 Passive security indicators -- 3.3.3 Active security warnings -- 3.3.4 Training -- 3.3.5 Password managers -- 3.4 Storage -- 3.5 Device pairing -- 3.6 Web privacy and fair information practice -- 3.6.1 Privacy policies -- 3.6.2 P3P -- 3.6.3 Behavioral advertising -- 3.6.4 Summary -- 3.7 Policy specification and interaction -- 3.8 Mobile security and privacy -- 3.8.1 Location privacy -- 3.8.2 Application platforms -- 3.8.3 Mobile authentication -- 3.9 Social media privacy -- 3.10 Security administrators.…”
    Connect to this title online
    Electronic eBook
  19. 239
    by Lee, Ruby B.
    Published 2013
    Table of Contents: “…Access control -- 3.1 Authentication -- 3.1.1 Passwords and passphrases -- 3.1.2 Biometrics -- 3.1.3 Private keys and security tokens -- 3.1.4 False negatives and false positives -- 3.2 Authorization.…”
    Connect to this title online
    Electronic eBook
  20. 240
    Published 2017
    Table of Contents: “…Keynote Speech -- Governmental IT - Challenges in a Federal State Setup and Possible Solutions -- AKTB Workshop -- Exploring the influence of the use of an ERP system on strategy development in German and Polish manufacturing enterprises: An empirical investigation -- Visual Language and Ontology Based Analysis: Using OWL for Relation Discovery and Query in 4EM -- Targeting Advertising Scenarios for e-Shops Surfers -- A Proposal of an Academic Library Management System based on an RDF Repository -- The Paradigm of Relatedness -- Enterprise Model based UML Interaction Overview Model Generation Process -- Speaker Authentication System Based on Voice Biometrics and Speech Recognition -- Decision Support System for Foreign Exchange Markets -- BITA Workshop -- Visual Analytics in Enterprise Architecture Management: A systematic literature review.…”
    Connect to this title online
    Electronic eBook