Suggested Topics within your search.
Suggested Topics within your search.
Computer science
58
Computer Science
56
Biometric identification
55
Biometry
48
Artificial intelligence
39
Artificial Intelligence (incl. Robotics)
31
Biometrics
30
Engineering
29
Computer security
28
Image Processing and Computer Vision
28
Image processing
28
Pattern Recognition
26
Pattern perception
26
Information Systems Applications (incl. Internet)
25
Technological innovations
25
Prevention
22
Signal, Image and Speech Processing
21
Computer graphics
20
National security
20
Security measures
18
Systems and Data Security
17
Terrorism
17
Identification
16
Government policy
15
Computational intelligence
14
Computers
13
Computational Intelligence
12
Computer Graphics
12
Computer networks
11
Social aspects
11
-
221
-
222
-
223Published 2015Table of Contents: “…Bio-inspired Optimization Techniques and Their Applications -- Swarm Based Mean-Variance Mapping Optimization for Solving Economic Dispatch with Cubic Fuel Cost Function -- Multi objective Optimization of Bioactive Compound Extraction Process via Evolutionary Strategies -- Hybrid Swarm Intelligence-based Optimization for Charging Plug-in Hybrid Electric Vehicle -- A Genetic Algorithm with Grouping Selection and Searching Operators for the Orienteering Problem -- Solving the Set Covering Problem with a Shuffled Frog Leaping Algorithm -- Machine Learning in Biometrics and Bioinformatics with Applications -- Automatic Evaluation of Area-Related Immunogold Particles Density in Transmission Electron Micrographs -- Fusion of Granular Computing and k–NN Classifiers for Medical Data Support System -- Lip Print Recognition Method Using Bifurcations Analysis -- Detecting the Reference Point in Fingerprint Images with the Use of the High Curvature Points -- Kinect-Based Action Recognition in a Meeting Room Environment -- Advanced Data Mining Techniques and Applications -- Analyzing Users’ Interests with the Temporal Factor Based on Topic Modeling -- Classifying Continuous Classes with Reinforcement Learning RULES -- Fuzzy Association Rule Mining with Type-2 Membership Functions -- Dependence Factor for Association Rules -- Collective Intelligent Systems for E-market Trading, Technology -- Opportunity Discovery and Collaborative Learning A Novel Framework of Consumer Co-creation for New Service Development -- Recognizing and Evaluating the Technology Opportunities via Clustering Method and Google Scholar -- Raising EFL College Learners’ Awareness of Collocations via COCA -- Effects of Question Prompts and Self-explanation on Database Problem Solving in a Peer Tutoring Context -- Intelligent Information Systems in Security and Defense -- FP-tree and SVM for Malicious Web Campaign Detection -- Simulation of Human Behavior in Different Densities as a Part of Crowd Control Systems -- The Qualitative and Quantitative Support Method for Capability Based Planning of Armed Forces Development -- Agent-Based M&S of Smart Sensors for Knowledge Acquisition Inside the Internet of Things and Sensor Networks -- Analysis of Image, Video and Motion Data in Life Sciences -- Camera Calibration and Navigation in Networks of Rotating Cameras -- Expert Group Collaboration Tool for Collective Diagnosis of Parkinson Disease -- Dynamics Modeling of 3D Human Arm Using Switched Linear Systems -- Machine Learning on the Video Basis of Slow Pursuit Eye Movements Can Predict Symptom Development in Parkinson’s Patients -- Optimization of Joint Detector for Ultrasound Images Using Mixtures of Image Feature Descriptors -- Automatic Markers’ Influence Calculation for Facial Animation Based on Performance Capture -- Automated Analysis of Images from Confocal Laser Scanning Microscopy Applied to Observation of Calcium Channel Subunits in Nerve Cell Model Line Subjected Electroporation and Calcium -- Registration of Ultrasound Images for Automated Assessment of Synovitis Activity -- Quantifying Chaotic Behavior in Treadmill Walking -- Augmented Reality and 3D Media -- Human Detection from Omnidirectional Camera Using Feature Tracking and Motion Segmentation -- Automatic Fast Detection of Anchorperson Shots in Temporally Aggregated TV News Videos -- Combined Motion Estimation and Tracking Control for Autonomous Navigation -- Eye Tracking in Gesture Based User Interfaces Usability Testing -- Maximization of AR Effectiveness as a Didactic Tool with Affective States Recognition -- A Method of the Dynamic Generation of an Infinite Terrain in a Virtual 3D Space -- Accuracy Evaluation of a Linear Positioning System for Light Field Capture -- A System for Real-Time Passenger Monitoring System for Bus Rapid Transit System -- Cloud Based Solutions -- Cloud and m-Learning: Longitudinal Case Study of Faculty of Informatics and Management, University of Hradec Kralove -- Granular-Rule Extraction to Simplify Data -- Wireless Positioning as a Cloud Based Service -- HPC Cloud Technologies for Virtual Screening in Drug Discovery -- Internet of Things, Big Data and Cloud Computing -- Delivery of e-Health Services in Next Generation Networks -- Implementation and Performance Testing of ID Layer Nodes for Hierarchized IoT Network -- Modeling Radio Resource Allocation Scheme with Fixed Transmission Zones for Multiservice M2M Communications in Wireless IoT Infrastructure -- Towards On-Demand Resource Provisioning for IoT Environments -- ComSS – Platform for Composition and Execution of Streams Processing Services -- Experience-Oriented Enhancement of Smartness For Internet of Things -- Artificial Intelligent Techniques and Their Application in Engineering and Operational Research -- A Cloud Computing Platform for Automatic Blotch Detection in Large Scale Old Media Archives -- High-Accuracy Phase-Equalizer for Communication-Channel Compensation -- Using Different Norms in Packing Circular Objects -- SCADA Based Operator Support System for Power Plant Fault Diagnosis -- Lino - An Intelligent System for Detecting Malicious Web-Robots -- Optimum Design of Finned Tube Heat Exchanger Using DOE -- Extraction of Event Elements Based on Event Ontology Reasoning.…”
Connect to this title online
Electronic eBook -
224by Stanislav, MarkTable of Contents: “…Chapter 4: Second-Factor TechnologiesA burgeoning world of options; Hardware-based OTP generation; SMS-based OTP delivery; Phone-call-based mechanisms; Geolocation-aware authentication; Push-notification-based authentication; Biometric authentication factors; Smartcard verification; Chapter 5: Standards and Regulations; One security control, many boxes checked; PCI DSS; HIPAA; FFIEC; India; Singapore; Chapter 6: Two Factor for Internet End-Users; Changing the face of two-factor adopters; Early end-user two-factor authentication; Google's impact on driving adoption…”
Published 2015
Connect to this title online (unlimited users allowed)
Electronic eBook -
225by Flynn, JonTable of Contents: “…San Antonio Spurs -- Chapter 2 Using Sports Science to Optimize Player Performance: 2014 FIFA World Cup: Germany's Victory -- Chapter 3 Social Media Takes the Olympics by Storm: 2016 Rio Olympics: The Refugee Olympic Team Is the Winner -- Chapter 4 The Role of Biometric Tech in Shaping the Game: 2016 NBA Finals: Cleveland Cavaliers vs. …”
Published 2024
Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
Electronic eBook -
226by Young, KaliyaTable of Contents: Connect to this title online (unlimited users allowed)
Published 2020
Electronic eBook -
227
-
228
-
229Published 2015Table of Contents: “…Data Mining -- Improvement of the multiple-view learning based on the self-organizing Maps -- Natural Language Processing Methods Used for Automatic Prediction Mechanism of Related Phenomenon -- Visual Exploration of Data with Multithread MIC Computer Architectures -- Random Forests with Weighted Voting for Anomalous Query Access Detection in Relational Databases -- Performance evaluation of the Silhouette index -- Convex Nonnegative Matrix Factorization with Rank-1 Update for Clustering -- Bioinformatics, Biometrics and Medical Applications -- On the Convergence of Quantum and Distributed Computational Models of Consciousness -- Nature-inspired Algorithms for Selecting EEG Sources for Motor Imagery based BCI -- PROCESS: Projection-based Classification of Electroencephalograph Signals -- Feature Extraction of Palm Vein Patterns Based on Two-Dimensional Density Function -- Segmentation Based Feature Selection on Classifying Proteomic Spectral Data -- SOM vs FCM vs PCA in 3d face recognition -- The Fuzzied Quasi-perception in Decision Making Concerning Treatments in Necrotizing Fasciitis -- Mobile Fuzzy System for Detecting Loss of Consciousness and Epileptic Seizure -- Customization of Joint Articulations using Soft Computing Methods -- A new method for the dynamic signature verification based on the stable partitions of the signature -- New fast algorithm for the dynamic signature verification using global features values -- IX Concurrent Parallel Processing -- Parallelization of a Block Cipher Based on Chaotic Neural Networks -- Acceleration of neighborhood evaluation for a multi-objective vehicle Routing -- A concurrent inconsistency reduction algorithm for the pairwise comparisons method -- OpenCL implementation of PSO algorithm for Quadratic Assignment Problem -- Agent Systems, Robotics and Control -- Towards a better understanding and behavior recognition of inhabitants in smart cities. …”
Connect to this title online
Electronic eBook -
230
-
231Published 2015Table of Contents: “…Assessing Provenance and Pathways in Social Media: Case studies, methods and tools -- Robust Aggregation of Inconsistent Information - Concepts and Research Directions -- Weaponized Crowdsourcing -- The Structures of Twitter Crowds and Conversations -- Visible Effort: Visualizing and measuring group structuration through social entropy -- Stepwise segmented regression analysis: An iterative statistical algorithm to detect and quantify evolutionary and revolutionary transformations in longitudinal data -- Towards Bottom-up Decision Making and Collaborative Knowledge Generation in Urban Infrastructure Projects through Online Social Media -- Biometric-Based User Authentication and Activity Level Detection in a Collaborative Environment -- Part III. …”
Connect to this title online
Electronic eBook -
232Published 2023Table of Contents: “…AgriBlockchain: Agriculture supply chain using blockchain -- A Triple Band High Gain Antenna Using Metamaterial -- Hybrid Energy Systems Integrated Power System Imbalance Cost Calculation using Moth Swam Algorithm -- Lightweight Privacy Preserving Framework at Edge Layer in IoT -- Concept drift aware analysis of learning engagement during Covid 19 pandemic using adaptive windowing -- MPA Optimized Model Predictive Controller for Optimal Control of an AVR system -- Optimal Power Flow Considering Uncertainty of Renewable Energy Sources Using Meta-Heuristic Algorithm -- Remote Sensing Image Fusion Based on PCA and Wavelets -- Physical Layer Security in MIMO Relay Based Cognitive Radio Network -- Weighted Low Rank and Sparse Matrix Decomposition Models for Separating Background and Foreground in Dynamic MRI -- A Novel Approach For Bug Triaging Using TOPSIS -- Energy Efficient Resource Allocation in Cognitive Radio Networks -- A Hybrid Feature Selection Framework for Breast Cancer Prediction using Mutual Information and AdaBoost-RFE -- Internet of Things enabled Irrigation System in Precision Agriculture -- Medical Internet of Things and Data Analytics for Post-Covid Care: An Analysis -- ECG Biometric Recognition by Convolutional Neural Networks with Transfer Learning using Random Forest Approach -- Design and Analysis of a Metamaterial Based Butterworth Microstrip Filter -- A Review of Financial Fraud Detection in E-Commerce using Machine Learning.…”
Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
Electronic Conference Proceeding eBook -
233Published 2015Table of Contents: “…Light and Reactive Oxygen Species -- 4 Excitatory Amino Acid Transporters, Xc- Antiporter, Glutamyl Transpeptidase, Glutamine Synthetase Activity and Glutathione in Human Corneal Epithelial Cells -- 5 Transforming Growth Factor – β3 Regulates Cell Metabolism in Corneal Keratocytes and Fibroblasts -- 6 Corneal Stem Cells: a Source of Cell Renewal with Therapeutic Potential -- 7 New Agents for Treating Dry Eye Syndrome -- 8 Investigating Carcinine Transport and the Expression Profile of Transporter Genes in Human Corneal Epithelial Cells -- 9 Basic Review of the Oxidative Stress Role in Age-Related Cataractogenesis -- 10 The Human Lens: A living Biometric Indicator of Health Status and Successful Aging -- 11 Oxidative Stress in Lens -- 12 Protein Serine/Threonine Phosphatases-1 and –2A in Lens Development and Pathogenesis -- 13 Proteases in Lens and Cataract -- 14 Photosensitized Oxidation of Lens Proteins Exposed to UVA-Visible Light at Low Oxygen Concentration: Its Effect on the Proteasome System -- 15 p53 Regulates Developmental Apoptosis and Gene Expression to Modulate Lens Differentiation -- 16 Etiology and Prevention of Cataract -- 17 The Effects of Lutein in Preventing Cataract Progression -- 18 Antioxidant Defense Network in the Lens and Benefits of Glutathione Prodrugs in Cataracts -- 19 Updates and Advanc es in Corneal Surgery -- 20 Cataract and Diabetic Retinopathy -- 21 Traumatic Cataract-a Review -- 22 Cataract in Paediatric Age Group-a Review.…”
Connect to this title online
Electronic eBook -
234
-
235Published 2015Table of Contents: “…Touchless Target Selection Techniques for Wearable Augmented Reality Systems -- Improving User Experience of Cultural Environment Through IoT: the Beauty or the Truth Case Study -- A Multimedia Summarizer Integrating Text And Images -- c-Space: A Mobile Framework for the Visualization of Spatial-temporal 3D Models -- The Method to Verify Facial Shape Model -- Effective Visualization of a Big Data Banking Application -- A Study About the Comprehensibility of Pictograms for Order Picking processes with Disabled People and People with Altered Performance -- Mining Popular Travel Routes from Social Network Geo-Tagged Data -- Enhancing Workspace Composition by Exploiting Linked Open Data as a Polymorphic Data Source -- Benjamin Franklin's Decision Method Is Acceptable and Helpful with a Conversational Agent -- Towards Model-Driven Assessment of Clinical Processes -- A Monitoring System for the Recognition of Sleeping Disorders in Patients with Cognitive Impairment Disease -- Mersenne-Walsh Matrices for Image Processing -- Frequency Characteristics for Video Sequences Processing -- Expansion of the Quasi-Orthogonal Basis to Mask Images -- Performance Analysis of Prediction Methods for Lossless Image Compression -- Non-Stationary Correlation Noise Modeling for Transform Domain Wyner-Ziv Video Coding -- Fusion of Airborne LiDAR and Digital Photography Data for Tree Crowns Segmentation and Measurement -- Digital Gray-Scale Watermarking Based on Biometrics -- New Non-intrusive Speech Quality Assessment Algorithm for Wireless Networks -- Block-Permutation LDPC Codes for Distributed Storage Systems -- Estimation of the Mean Message Delay for Transport Coding -- Sustainable Flat Ride Suspension Design -- Better Road Design for Autonomous Vehicles Using Clothoids -- Towards Formal Modelling of Autonomous Systems -- Developing a Navigation System for Mobile Robots -- Experimental Flight Test for Autonomous Station-Keeping of a Lighter-Than-Air Vehicle -- Experimental Evaluation of Multi-Key Content-Based Image Retrieval -- A Simple Medium Access Scheme Based on Spread Spectrum Suitable For Wireless Ad Hoc Networks -- Implementation of Tree-Based Data Collection Scheme for Arduino-compatible board.…”
Connect to this title online
Electronic eBook -
236
-
237Published 2009Table of Contents: “…History of Behavior Genetics -- Quantitative Methods and Models -- Biometrical Models in Behavioral Genetics -- QTL Methodology in Behavior Genetics -- Multivariate Genetic Analysis -- Models of Human Behavior: Talking to the Animals -- Genetics of Cognition -- Twin Studies of General Mental Ability -- Behavioral Genetic Investigations of Cognitive Aging -- The Genetics and Environments of Reading: A Behavioral Genetic Perspective -- Behavior-Genetic and Molecular Studies of Disorders of Speech and Language: An Overview -- Human Brain Volume: What’s in the Genes# -- Cognition in Rodents -- Neurogenetic Analysis and Cognitive Functions in Trisomy 21 -- Evolution of Complex Acoustic Signals in Drosophila Species -- Drosophila Model of Alzheimer’s Amyloidosis -- Genetics of Personality -- Genotype–Environment Correlation and Family Relationships -- Personality -- Molecular Genetics of Personality: How Our Genes can Bring Us to a Better Understanding of Why We Act the Way We Do -- The Genetics of Childhood Temperament -- Genetic and Environmental Influences on Sexual Orientation -- Some Guidelines for Defining Personality Differences in Rats -- The Genetics of Offensive Aggression in Mice -- Sexual Selection and Aggressive Behavior in Drosophila -- Handedness: A Behavioral Laterality Manifestation -- Genetics of Exercise Behavior -- Genetics of Psychopathology -- Genetics of ADHD, Hyperactivity, and Attention Problems -- Depression and Anxiety in Childhood and Adolescence: Developmental Pathways, Genes and Environment -- Genetics of Autism -- Genetics of Smoking Behavior -- The Genetics of Substance Use and Substance Use Disorders -- Genetic Analysis of Conduct Disorder and Antisocial Behavior -- Schizophrenia and Affective Psychotic Disorders – Inputs from a Genetic Perspective -- Genetic Risks in Schizophrenia: Cross-National Prospective Longitudinal High-Risk Studies -- Attention and Working Memory: Animal Models for Cognitive Symptoms of Schizophrenia – Studies on D2-Like Receptor Knockout Mice -- Conclusion -- Future Directions for Behavior Genetics.…”
Connect to this title online
Electronic eBook -
238Table of Contents: “…Major themes in UPS academic research -- 3.1 User authentication -- 3.1.1 Text passwords -- 3.1.2 Password managers -- 3.1.3 Graphical authentication -- 3.1.4 Biometrics -- 3.1.5 Token-based authentication -- 3.1.6 Mental computation and one-time passwords -- 3.1.7 CAPTCHAs -- 3.1.8 Fallback and backup authentication -- 3.2 Email security and PKI -- 3.2.1 Automatic, transparent encryption -- 3.2.2 Future of secure messaging -- 3.3 Anti-phishing efforts -- 3.3.1 A brief history of phishing -- 3.3.2 Passive security indicators -- 3.3.3 Active security warnings -- 3.3.4 Training -- 3.3.5 Password managers -- 3.4 Storage -- 3.5 Device pairing -- 3.6 Web privacy and fair information practice -- 3.6.1 Privacy policies -- 3.6.2 P3P -- 3.6.3 Behavioral advertising -- 3.6.4 Summary -- 3.7 Policy specification and interaction -- 3.8 Mobile security and privacy -- 3.8.1 Location privacy -- 3.8.2 Application platforms -- 3.8.3 Mobile authentication -- 3.9 Social media privacy -- 3.10 Security administrators.…”
Connect to this title online
Electronic eBook -
239by Lee, Ruby B.Table of Contents: “…Access control -- 3.1 Authentication -- 3.1.1 Passwords and passphrases -- 3.1.2 Biometrics -- 3.1.3 Private keys and security tokens -- 3.1.4 False negatives and false positives -- 3.2 Authorization.…”
Published 2013
Connect to this title online
Electronic eBook -
240Published 2017Table of Contents: “…Keynote Speech -- Governmental IT - Challenges in a Federal State Setup and Possible Solutions -- AKTB Workshop -- Exploring the influence of the use of an ERP system on strategy development in German and Polish manufacturing enterprises: An empirical investigation -- Visual Language and Ontology Based Analysis: Using OWL for Relation Discovery and Query in 4EM -- Targeting Advertising Scenarios for e-Shops Surfers -- A Proposal of an Academic Library Management System based on an RDF Repository -- The Paradigm of Relatedness -- Enterprise Model based UML Interaction Overview Model Generation Process -- Speaker Authentication System Based on Voice Biometrics and Speech Recognition -- Decision Support System for Foreign Exchange Markets -- BITA Workshop -- Visual Analytics in Enterprise Architecture Management: A systematic literature review.…”
Connect to this title online
Electronic eBook