Biometric image discrimination technologies
The book gives an introduction to basic biometric image discrimination technologies including theories that are the foundations of those technologies and new algorithms for biometrics authentication"--Provided by publisher
Saved in:
| Main Authors: | Zhang, David 1949- (Author), Jing, Xiaoyuan (Author), Yang, Jian (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Hershey, PA
Idea Group Pub.
2006
|
| Series: | Computational intelligence and its applications series
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Handbook of biometrics
Published: (2008)
Published: (2008)
Guide to biometrics
by: Bolle, Ruud M., et al.
Published: (2004)
by: Bolle, Ruud M., et al.
Published: (2004)
Biometrics personal identification in networked society
Published: (1999)
Published: (1999)
Biometric authentication a machine learning approach
by: Kung, S. Y. (Sun Yuan)
Published: (2005)
by: Kung, S. Y. (Sun Yuan)
Published: (2005)
Watermarked face recognition scheme-enhancing the security while maintaining the effectiveness of biometric authentication systems
by: Mohd Rizal Mohd Isa
Published: (2016)
by: Mohd Rizal Mohd Isa
Published: (2016)
Biometrics concepts, methodologies, tools, and applications
Published: (2017)
Published: (2017)
Touchless fingerprint biometrics
by: Labati, Ruggero Donida, et al.
Published: (2016)
by: Labati, Ruggero Donida, et al.
Published: (2016)
Automated biometrics technologies and systems
by: Zhang lhDavid D
by: Zhang lhDavid D
Securing biometrics applications
by: Shoniregun, Charles A.
Published: (2008)
by: Shoniregun, Charles A.
Published: (2008)
Pattern recognition and image preprocessing
by: BowlhSing-Tze
by: BowlhSing-Tze
Pattern recognition a quality of data perspective
by: Homenda, Władysław, et al.
Published: (2018)
by: Homenda, Władysław, et al.
Published: (2018)
RFID technology and applications
Published: (2008)
Published: (2008)
Automatic target recognition for amour vehicle using digital image processing for aerial application
by: Muhammad Hafizan Yosri
Published: (2013)
by: Muhammad Hafizan Yosri
Published: (2013)
Handbook of research on multimedia cyber security
Published: (2020)
Published: (2020)
Biometrics in support of military operations lessons from the battlefield
by: Buhrow, William C.
Published: (2017)
by: Buhrow, William C.
Published: (2017)
Principles of system identification theory and practice
by: Tangirala, Arun K.
by: Tangirala, Arun K.
System identification theory for the user
by: Ljung, Lennart
Published: (1999)
by: Ljung, Lennart
Published: (1999)
RFID- A guide to radio frequency identification
by: Hunt
Published: (2007)
by: Hunt
Published: (2007)
RFID applied
Published: (2007)
Published: (2007)
RFID handbook radio-frequency identification fundamentals and applications
by: Finkenzeller
Published: (1999)
by: Finkenzeller
Published: (1999)
RFID+ the complete review of radio frequency identification
by: Cooney
Published: (2006)
by: Cooney
Published: (2006)
Poisonous snakes of Peninsular Malaysia
by: Lim, Boo Liat
by: Lim, Boo Liat
Speech processing for IP networks Media Resource Control Protocol (MRCP)
by: Burke, Dave
Published: (2007)
by: Burke, Dave
Published: (2007)
Forensic footwear evidence
by: Bodziak, William J.
Published: (2017)
by: Bodziak, William J.
Published: (2017)
Butterflies the illustrated identifier to over 100 species
by: Preston-Mafham, Ken
Published: (1999)
by: Preston-Mafham, Ken
Published: (1999)
A field guide to hawks of North America
by: Clark, William H.
Published: (1987)
by: Clark, William H.
Published: (1987)
The RF in RFID UHF RFID in practice
by: Dobkin, Daniel M.
Published: (2013)
by: Dobkin, Daniel M.
Published: (2013)
The RF in RFID UHF RFID in practice
by: Dobkin, Daniel M.
Published: (2013)
by: Dobkin, Daniel M.
Published: (2013)
Classification methods for remotely sensed data
by: Tso, Brandt
Published: (2001)
by: Tso, Brandt
Published: (2001)
Pattern recognition and classification an introduction
by: Dougherty, Geoff, 1950-
Published: (2013)
by: Dougherty, Geoff, 1950-
Published: (2013)
Filtering and system identification a least squares approach
by: Verhaegen, M. (Michel)
Published: (2007)
by: Verhaegen, M. (Michel)
Published: (2007)
RFID design principles
by: Lehpamer, Harvey, 1959-
Published: (2008)
by: Lehpamer, Harvey, 1959-
Published: (2008)
Chipless RFID reader architecture
by: Karmakar, Nemai Chandra, et al.
Published: (2013)
by: Karmakar, Nemai Chandra, et al.
Published: (2013)
RFID design principles
by: Lehpamer, Harvey
Published: (2012)
by: Lehpamer, Harvey
Published: (2012)
Non-linearities in passive RFID systems third harmonic concept and applications
by: Andía, Gianfranco, et al.
Published: (2018)
by: Andía, Gianfranco, et al.
Published: (2018)
RFID design principles
by: Lehpamer 1959-
Published: (2008)
by: Lehpamer 1959-
Published: (2008)
Systems modeling and identification
by: Johanson
Published: (1993)
by: Johanson
Published: (1993)
System identification and control design using P.I.M.+ software
by: Landau lhIoan Dore
by: Landau lhIoan Dore
Explosives and chemical weapons identification
by: Crippin, James B.
Published: (2006)
by: Crippin, James B.
Published: (2006)
Forensic document examination fundamentals and current trends
by: Lewis, Jane A.
Published: (2014)
by: Lewis, Jane A.
Published: (2014)
Similar Items
-
Handbook of biometrics
Published: (2008) -
Guide to biometrics
by: Bolle, Ruud M., et al.
Published: (2004) -
Biometrics personal identification in networked society
Published: (1999) -
Biometric authentication a machine learning approach
by: Kung, S. Y. (Sun Yuan)
Published: (2005) -
Watermarked face recognition scheme-enhancing the security while maintaining the effectiveness of biometric authentication systems
by: Mohd Rizal Mohd Isa
Published: (2016)


