1 - 20
Next
1. Touchless fingerprint biometrics [2016]
- Labati, Ruggero Donida, author.
- Boca Raton : CRC Press, Taylor & Francis Group, [2016]
- Description
- Book — 1 online resource (xvii, 224 pages) : illustrations Digital: data file.
- Summary
-
- Introduction State of the Art The Performed Research Results Structure of this Book Biometric Systems Biometric Traits Applications Evaluation of Biometric Systems Research Trends Summary Touchless and Less-Constrained Biometrics Less-Constrained Biometric Systems Touchless Biometric Traits Touch-Based Biometric Traits Summary Fingerprint Biometrics Fingerprint Recognition Characteristics of the Fingerprint Applications Analysis of Fingerprint Samples Touch-Based Fingerprint Recognition Touchless Fingerprint Biometrics Summary Touchless Fingerprint Recognition Touchless Fingerprint-Recognition Techniques Methods Based on Two-Dimensional Samples Methods Based on Three-Dimensional Models Computation of Synthetic Touchless Fingerprint Samples Summary Experimental Results Methods Based on Single Touchless Images Methods Based on Three-Dimensional Models Comparison of Biometric-Recognition Methods Computation of Synthetic Three-Dimensional Models Summary Conclusions and Future Work Conclusions Future Work.
- (source: Nielsen Book Data)
- Introduction. Biometric Systems. Touchless and Less-Constrained Biometrics. Fingerprint Biometrics. Touchless Fingerprint Recognition. Experimental Results. Conclusions and Future Work.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
Offering the first comprehensive analysis of touchless fingerprint-recognition technologies, Touchless Fingerprint Biometrics gives an overview of the state of the art and describes relevant industrial applications. It also presents new techniques to efficiently and effectively implement advanced solutions based on touchless fingerprinting.The most.
(source: Nielsen Book Data)
2. Touchless fingerprint biometrics [2016]
- Labati, Ruggero Donida, author.
- Boca Raton : CRC Press, [2016]
- Description
- Book — 1 online resource
- Summary
-
- 1. Introduction
- 2. Biometric systems
- 3. Touchless and less-constrained biometrics
- 4. Fingerprint biometrics
- 5. Touchless fingerprint recognition
- 6. Experimental results
- 7. Conclusions and future work
3. Touchless palmprint recognition systems [2014]
- Genovese, Angelo, 1985- author.
- Cham : Springer, 2014.
- Description
- Book — 1 online resource Digital: text file; PDF.
- Summary
-
- Introduction
- Biometric systems
- Touchless and less-constrained biometric systems
- Palmprint biometrics
- Innovative methods for touchless and less-constrained palmprint recognition
- Application and experimental evaluation of methods
- Conclusions.
- Amato, Alberto.
- New York, NY : Springer, ©2013.
- Description
- Book — 1 online resource : illustrations Digital: text file.PDF.
- Summary
-
- Sensors for Human Behavior Analysis
- Related Work
- Sensor Data Interpretation for Symbolic Analysis
- Semantic Analysis
- Evaluation of the Proposed Methodology
- Conclusions.
(source: Nielsen Book Data)
- ISPEC (Conference) (17th : 2022 : Taipei, Taiwan)
- Cham : Springer, 2022.
- Description
- Book — 1 online resource.
- Summary
-
- Blockchain.- Security for Critical Infrastructure.- IoT Security.- Software Security.- Network.- Web Security.- Authentication.- Biometric Security.- Cryptography.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Cham, Switzerland : Springer, 2018.
- Description
- Book — 1 online resource (xii, 301 pages) Digital: text file.PDF.
- Summary
-
- From von Neumann architecture and Atanasoff's ABC to Neuro-morphic Computation and Kasabov's NeuCube: Principles and Implementations.- Applications of Computational Intelligence in Industrial and Environmental Scenarios.- Real, Imaginary and Complex Sets.- Intercriteria analysis over patterns.- From Primary to Conventional Science.- Intelligent Two-Level Optimization and Model Predictive Control of Degrading Plants.- Collaborative Clustering: New Perspective to Rank Factor Granules.- Learning through Contstraint Applications.- Autonomous Flight Control and Precise Gestural Positioning of a Small Quadrotor.- Introduction to the Theory of Randomized Machine Learning.- Grid-Type Fuzzy Models for Performance Evaluation and Condition Monitoring of Photovoltaic Systems.- Intelligent Control of Uncertain Switched Nonlinear Plants: NFG Optimum Control Synthesis via Switched Fuzzy Time-delay Systems.- Multidimensional Intuitionistic Fuzzy Quantifiers and Level Operators.- Data Processing and Harmonization for Intelligent Transportation Systems. An Application Scenario on Highway Traffic Flows.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- IEEE Symposium on Computational Intelligence in Security and Defense Applications (2007 : Honolulu, Hawaii)
- Piscataway, N.J. : IEEE, 2007.
- Description
- Book — 1 online resource (vii, 219, 2 p.) : ill.
- IEEE Alessandro Volta Memorial Workshop on Low-Power Design (1999 : Como, Italy)
- Los Alamitos, Calif. : IEEE Computer Society, c1999.
- Description
- Book — x, 203 p. : ill. ; 22 cm.
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK7874.66 .I34 1999 | Available |
- International Conference on Research and Applications in Artificial Intelligence (1st : 2020 : Online)
- Singapore : Springer, [2021]
- Description
- Book — 1 online resource : illustrations (some color)
- Summary
-
- Chapter 1. Prediction and Analysis on COVID-19 Using Positive and Negative Association Rule Mining.-
- Chapter 2. Hybrid Algorithm Based on DWT-DCT-RSA with Digital Watermarking for Secure Image Transfer.-
- Chapter 3. Detecting Sexually Predatory Behavior on Open-Access Online Forums.-
- Chapter 4. Swarm based Sudoku Solution: An Optimization Procedure.-
- Chapter 5. Application of Cellular Automata (CA) for Predicting Urban Growth and Loss of Vegetation and Waterbodies in Eastern India.-
- Chapter 6. Parallel Deep Learning-Driven Sarcasm Detection from Pop Culture Text and English Humor Literature.-
- Chapter 7. Sentiment Analysis of Covid-19 Tweets using Evolutionary Classification based LSTM Model.-
- Chapter 8. Clustering as a Brain-Network Detection Tool for Mental Imagery Identification.-
- Chapter 9. Comparative study of the effect of different fitness function in PSO algorithm on band selection of hyper spectral imagery.-
- Chapter 10. Breast Abnormality Detection Using Texture Feature Extracted by difference-based-variable-size Local Filter(DVLF).-
- Chapter 11. Nuclei image boundary detection based on interval type-2 fuzzy set and bat algorithm.-
- Chapter 12. Machine Learning Approach to Sentiment Analysis from Movie Reviews using Word2Vec.-
- Chapter 13. Selection of Edge Detection Techniques Based on Machine Learning Approach.-
- Chapter 14. ANN Based Self-Tuned PID Controller for Temperature Control of Heat Exchanger.-
- Chapter 15. A Novel Partitioning Algorithm to Process Large-Scale Data.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Network and System Security (10th : 2016 : Taipei, Taiwan)
- Cham, Switzerland : Springer, 2016.
- Description
- Book — 1 online resource (xiv, 540 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Invited paper
- While Mobile Encounters with Clouds
- Authentication Mechanism
- Multi-Device Anonymous Authentication
- A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism
- Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications
- Cloud Computing Security
- Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing
- An Energy-Efficient Task Scheduling Heuristic Algorithm without Virtual Machine Migration in Real-time Cloud Environments
- An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms
- Data Mining for Security Application
- Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security
- Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade
- Digital Signature
- Two-in-One Oblivious Signatures Secure in the Random Oracle Model
- A New Transitive Signature Scheme
- Privacy-preserving Technologies
- Privacy-Preserving Profile Matching Protocol Considering Conditions
- Privacy Preserving Credit Systems
- Evading System-Calls Based Intrusion Detection Systems
- Network Security and Forensic
- HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks
- A Network Timestamp Verification Mechanism for Forensic Analysis
- Searchable Encryption
- An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords
- Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards
- A System of Shareable Keyword Search on Encrypted Data
- Security Policy and Access Control
- An Attribute Based Protection Model for JSON Documents
- The GURA-G Administrative Model for User and Group Attribute Assignment.-On the relationship between finite domain ABAM and PreUCONA
- Security Protocols
- MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication
- Expressive Rating Scheme by Signatures with Predications on Ratees
- Symmetric Key Cryptography
- A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers
- Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR
- System Security
- DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern
- PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks
- Iris Cancellable Template Generation based on Indexing-First-One Hashing
- Web Security
- Detecting Malicious URLs Using Lexical Analysis
- Gatekeeping Behavior Analysis for Information Credibility Assessmenton Weibo
- Data Mining for Security Application (Short Paper)
- Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining
- Provable Seucirty (Short Paper)
- Improved Security Proofs for Modular Exponentiation Bits
- Security Protocol (Short Paper)
- Secure Outsourced Bilinear Pairings Computation for Mobile Devices
- The Design and Implementation of Multi-Dimensional Bloom Filter Storage Matrix.
- ICIDA (Conference) (2022 : Kolkata, India)
- Singapore : Springer, 2023.
- Description
- Book — 1 online resource.
- Summary
-
- Intro
- Foreword
- Preface
- Contents
- About the Editors
- Computational Intelligence
- Transience in COVID Patients with Comorbidity Issues-A Systematic Review and Meta-Analysis Based on Indian and Southeast Asian Context
- 1 Introduction
- 1.1 Risk of COVID Patients with Comorbidity Issues
- 2 COVID Patient Statistics with Comorbidity Issues
- 3 Research Methodology
- 3.1 Search Strategy
- 4 Related Literature Survey in This Area
- 5 Discussion
- 6 Conclusion and Future Scope
- References
- NFT HUB-The Decentralized Non-Fungible Token Market Place
- 1 Introduction
- 1.1 Non-Fungible Token
- 1.2 Blockchain
- 2 Literature Survey
- 3 Proposed System
- 3.1 Blockchain
- 3.2 Ethereum Blockchain
- 3.3 Properties of Blockchain
- 3.4 Generic Elements of the Blockchain
- 3.5 Secure Hash Algorithm
- 4 Results and Discussion
- 4.1 Deployment Confirmation
- 4.2 Metamask Wallet
- 4.3 Minting Page
- 4.4 Transaction Address
- 4.5 Dashboard
- 5 Conclusion
- 5.1 Future Scope of the Project
- References
- Hashgraph: A Decentralized Security Approach Based on Blockchain with NFT Transactions
- 1 Introduction
- 1.1 Optimized Blockchain Server
- 2 Literature Survey
- 2.1 Survey Report: On Token Service
- 2.2 Survey Report: On Main-Net Access
- 2.3 Survey Report: Remove Centralized Control: Hala Systems
- 3 Proposed System
- 3.1 Non-Fungible Transaction
- 3.2 Blockchain Methodology
- 3.3 Gossip Protocol
- 3.4 Hashgraph
- 3.5 Consensus Algorithm [In Gossip Protocol]
- 3.6 HCS Implementation
- 4 Performance Evaluation
- 4.1 Transaction Cost Denomination of Our Network
- 4.2 Transaction Cost of Network on Blockchain NFT
- 5 Result and Discussion
- 6 Conclusion
- References
- Med Card: An Innovative Way to Keep Your Medical Records Handy and Safe
- 1 Introduction
- 1.1 What is Blockchain?
- 1.2 What is Machine Learning?
- 2 Literature Review
- 3 Technologies Used
- 3.1 Blockchain in Health Care
- 3.2 Machine Learning in Health Care
- 4 Proposed Idea
- 4.1 What is a Med Card?
- 4.2 Workflow
- 5 Conclusion and Future Scope
- References
- Delta Operator-Based Modelling and Control of High Power Induction Motor Using Novel Chaotic Gorilla Troop Optimizer
- 1 Introduction
- 2 Formulation of the Problem
- 3 New Chaotic Gorilla Troop Optimizer
- 4 Simulation Ouput and Their Analysis
- 5 Conclusions
- References
- An Enhanced Optimize Outlier Detection Using Different Machine Learning Classifier
- 1 Introduction
- 2 Outlier Detection
- 3 Literature Review
- 4 Proposed Methodology
- 5 Simulation Result
- 6 Conclusion
- References
- Prediction of Disease Diagnosis for Smart Healthcare Systems Using Machine Learning Algorithm
- 1 Introduction
- 2 Heart Disease
- 3 Diabetes Mellitus
- 4 Proposed Methodology
- 5 Simulation Results
- 6 Conclusion
- References
- International Conference on Intelligent Systems and Human-Machine Collaboration (2022)
- Singapore : Springer, 2023.
- Description
- Book — 1 online resource
- Summary
-
- Landmark identification from low-resolution real-time image pose estimation
- BLUEBOT A Bluetooth Controlled Robot for Deciding Human Intervention based on the Environment check
- Nirbhaya Naari: An Artificial Intelligence tool for detection of crime against Women
- A Clinical Decision Support System Using Machine Learning To Forecast The Risk Of Chronic Pulmonary Disease And Anthracosis
- Pre-Eclampsia Risk Factors Association with Cardiovascular Disease Prediction and Diagnosing Using Machine Learning
- A Low Resource Machine Learning Approach for Prediction of Dressler Syndrome
- Analysis of Twitter Data for Business Intelligence
- Detection and Classification of Cyber Threats in Tweets towards Prevention
- Artificial Neural Network Design for CMOS NAND Gate Using Sigmoid Function
- A Pioneer Image Steganography Method Using The SOD Algorithm.
13. Machine learning in information and communication technology : proceedings of ICICT 2021, SMIT [2023]
- International Conference on Information and Communication Technology (1st : 2021 ; Sikkim, India).
- Singapore : Springer, [2023]
- Description
- Book — 1 online resource (xvii, 342 pages) : illustrations (chiefly color).
- Summary
-
- Part 1: Healthcare Informatics.-
- Chapter 1. Earth Mover's Distance Based Automated Disease Tagging of Indian ECGs.-
- Chapter 2. Cardial Disease Prediction in Multi-variant Systems: A Short Survey.-
- Chapter 3. SVM-based pre-and post-treatment cancer segmentation from lung and abdominal CT images via neighbourhood-influenced features.-
- Chapter 4. Blood Cancer Detection with Microscopic Images using Machine Learning.-
- Chapter 5. A Survey on Leukemia Detection: A Machine Learning Approach.-
- Chapter 6. Periocular Region Recognition - A Brief Survey.-
- Chapter 7. A Bibliometric Analysis on the relationship between Emotional Intelligence, Self-Management and Health Information Seeking.-
- Chapter 8. Preferences in the Detailing Process Among Young and Senior Physicians.-
- Chapter 9. Perceptual Difference Patient & Physician on Negative Aspects of Social Media.-
- Chapter 10. AUTCD-Net: An Automated Framework for Efficient Covid-19 Diagnosis on Computed Tomography Scans.-
- Chapter 11. Computer aided detection of brain midline using CT images.-
- Chapter 12. Deep neural network based classification of ASD and neuro-typical subjects using functional connectivity features derived from resting state fMRI data.-
- Chapter 13. Application of Deep Learning in Healthcare.-
- Part 2: Recommendation Systems.-
- Chapter 14. A Popularity-based Recommendation System using Machine Learning.-
- Chapter 15. Machine Learning based Movies and Shows Recommendation System. etc.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Advanced Computing and Intelligent Technologies (2021 : New Delhi, India)
- Singapore : Springer, [2022]
- Description
- Book — 1 online resource (652 pages) Digital: text file.PDF.
- Summary
-
- Chapter 1. Recent Trends in Electromyography Signal Processing of Neuromuscular Diseases: An Outlook.-
- Chapter 2. Conceptualization, Visualization and Modeling of Ontologies for Elementary Kinematics.-
- Chapter 3. A Deep Neural approach towards Staining and Tinting of Monochrome Images.-
- Chapter 4. Evaluation of IoT based Automatic Headlight Dimmer Systems.-
- Chapter 5. Enhanced Energy Efficient Fuzzy Logic Clustering and Network Coding Strategy for Wireless Sensor Networks (EEE-FL-NC).-
- Chapter 6. Malware Classification using Automated Transmutation and CNN.-
- Chapter 7. Content-Based Image Retrieval using Energy Based Frequency Domain Features.-
- Chapter 8. Decision Tree Based Event Detection Framework for UWSN Routing to Optimize Energy Consumption During Transmission.-
- Chapter 9. Recognizing Child Unsafe Apps through User Reviews on the Google Play store.-
- Chapter 10. Brain Tumor Classification Using Deep Learning and Big Data Analytics.-
- Chapter 11. Drone Stability Simulation Using Ros And Gazebo.-
- Chapter 12. Knowledge Management framework for the supervision of IT postgraduate research in Sri Lanka.-
- Chapter 13. RFM-based Customer Analysis and Product Recommendation System.-
- Chapter 14. Efficient Hardware Trojan Detection using Generic Feature Extraction and Weighted Ensemble Method.-
- Chapter 15. An Approach for Offline Handwritten Character Shape Reconstruction Using Active Contour and Morphological Techniques.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
15. AI and IoT for smart city applications [2022]
- Singapore : Springer, [2022]
- Description
- Book — 1 online resource (241 pages) : illustrations (chiefly color). Digital: text file; PDF.
- Summary
-
- Smart Drone Controller Framework - Towards an Internet of Drones.- Building of Efficient Communication System in Smart City using Wireless Sensor Network through Hybrid Optimization Technique.- Estimation of Range for Electric Vehicle Using Fuzzy Logic System.- Traffic Light Control using RFID and Deep Reinforcement Learning.- Driver Drowsiness Alert System using Real-Time Detection.- Image Processing Based Smart Traffic Control System for Smart City.- Visual Perception for Smart City Defense Administration and Intelligent Premonition Framework based on DNN.- Application of AI/IoT for Smart Renewable Energy Management in Smart Cities.- Eye-Gaze based Hands Free Access Control System for Smart City Public Interfaces.- Reliability Analysis in Cyber-Physical System Using Deep Learning for Smart Cities Industrial IoT Network Node.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Data Science and Intelligent Applications (2020 : Gujarat, India)
- Singapore : Springer, [2021]
- Description
- Book — 1 online resource (xiii, 576 pages)
- Summary
-
- Archive System Using Big Data for Health care: Analysis, Architecture, and Implementation
- Data Science Team Roles and Need of Data Science: A Review of Different Cases
- Performance Analysis of Indian Stock Market via Sentiment Analysis and Historical Data
- D-Lotto: The Lottery DApp with Verifiable Randomness
- Review of Machine Learning and Data Mining Methods to Predict Different Cyberattacks
- Sentiment Analysis-An Evaluation of the Sentiment of the People: A Survey
- A Comprehensive Review on Content-Based Image Retrieval System: Features and Challenges
- A Comparative Study of Classification Techniques in Context of Microblogs Posted During Natural Disaster
- (Plus 52 other pages).
(source: Nielsen Book Data)
- London : Academic Press, 2021.
- Description
- Book — 1 online resource (xvii, 288 pages) : illustrations.
- Summary
-
- 1. An Introduction/ theoretical understanding to deep learning - challenges, feasibility in domains
- 2. Deep learning for big data
- 3. Deep learning in signal processing
- 4. Deep learning in image processing
- 5. Deep learning in video processing
- 6. Deep learning in audio/speech processing
- 7. Deep learning in data mining
- 8. Deep learning in healthcare
- 9. Deep learning in biomedical research
- 10. Deep learning in agriculture
- 11. Deep learning in environmental sciences
- 12. Deep learning in economics/e-commerce
- 13. Deep learning in forensics (biometrics recognition)
- 14. Deep learning in cybersecurity
- 15. Deep learning for smart cities, smart hospitals, and smart homes.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- London : Academic Press, 2021.
- Description
- Book — 1 online resource (xvii, 288 pages) : illustrations.
- Summary
-
- 1. An Introduction/ theoretical understanding to deep learning - challenges, feasibility in domains
- 2. Deep learning for big data
- 3. Deep learning in signal processing
- 4. Deep learning in image processing
- 5. Deep learning in video processing
- 6. Deep learning in audio/speech processing
- 7. Deep learning in data mining
- 8. Deep learning in healthcare
- 9. Deep learning in biomedical research
- 10. Deep learning in agriculture
- 11. Deep learning in environmental sciences
- 12. Deep learning in economics/e-commerce
- 13. Deep learning in forensics (biometrics recognition)
- 14. Deep learning in cybersecurity
- 15. Deep learning for smart cities, smart hospitals, and smart homes.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Cham, Switzerland : Springer, 2022.
- Description
- Book — 1 online resource Digital: text file; PDF.
- Summary
-
- Introduction.- Introduction about Artificial Intelligence (AI) and Cloud, Fog and Edge Computing.- Internet of Things based Cloud Architecture and Its Applications.- Big Data Analytics of Internet of Things based Cloud Systems.- Machine and Deep Learning Techniques for Internet of Things based Cloud Systems.- Computer Vision: Visualizing the Smart Era with Artificial Intelligence.- Security, Privacy and Trust issues in AI Based Cloud and IoT based Cloud Systems.- AI for Smart data storage in Cloud-based Internet of Things.- Blockchain Based Solutions for AI Based Cloud and IoT based Cloud Systems.- Security and information assurance for Big Data.- Content delivery networks, or schemes using AI on stored at clouds.- Trustworthy Machine Learning for IoT-based Cloud systems.- Authentication and Control: Detecting Cyber Attacks on Cloud Using AI.- Security Management and Security Operations using Artificial Intelligence for Cloud.- Digital Trust and Reputation using Artificial Intelligence for Cloud.- Improving Information Security and Awareness in Society 5.0 and Industry 4.0 using AI.- Open Challenges and New Horizons for IoTs based Cloud Applications and AI based Cloud Applications.- Artificial Intelligence: Hope for future or Hype by Intellectuals.- Real World's Case Studies.- Conclusion.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Computing, Power and Communication Technologies (2019 : Noida, India)
- Singapore : Springer, [2020]
- Description
- Book — 1 online resource (xix, 262 pages) : illustrations (some color)
- Summary
-
The book features selected high-quality papers presented in International Conference on Computing, Power and Communication Technologies 2019 (GUCON 2019), organized by Galgotias University, India, in September 2019. Discussing in detail topics related to electronics devices, circuits and systems; signal processing; and bioinformatics, multimedia and machine learning, the papers in this book provide interesting reading for researchers, engineers, and students.
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.