The use of computers to recognize humans from physical and behavioral traits dates back to the digital computer evolution ...
اقرأ المزيد
Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological ...
اقرأ المزيد
This volume constitutes the post-conference proceedings of the First European Workshop on Biometrics and Identity Management, ...
اقرأ المزيد
This book presents the most recent achievements in some fascinating and rapidly developing fields within Computer Science. ...
اقرأ المزيد
This book presents research performed as part of the EU project on biomimeticmultimodal learning in a mirror neuron-based ...
اقرأ المزيد
Covers trends in modern biotechnology All aspects of this interdisciplinary technology, where knowledge, methods and expertise ...
اقرأ المزيد
This book presents a step-by-step manner that eliminates the greatest obstacle to the learner, which is applying the many ...
اقرأ المزيد
This book constitutes the refereed proceedings of the International Workshop on Biosurveillance and Biosecurity, BioSecure ...
اقرأ المزيدThe Smart Helmet for the Blind is a project aimed at providing solutions for the challenges faced by blind individuals in ...
اقرأ المزيد
This book contributes to the creation of a cyber ecosystem supported by blockchain technology in which technology and people ...
اقرأ المزيد
The book explains the security architecture model and the practice of building data sharing from the blockchain infrastructure, ...
اقرأ المزيد
Blockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger ...
اقرأ المزيدPositioning objects has been an important topic since it’s needed to locate people, guide them to a certain place, and ...
اقرأ المزيد
While the problems of long-term stability and biocompatibility are being addressed, several promising prototypes are starting ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 21st IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE ...
اقرأ المزيد
Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based ...
اقرأ المزيد
Boundary representation is the principle solid modelling method used in modern CAD/CAM systems. There have been a long series ...
اقرأ المزيدHumans controlling machines with their minds may sound like something from a scifi movie, but it’s becoming a reality through ...
اقرأ المزيد
This book constitutes the refereed proceedings of the First International Symposium on Brain, Vision and Artificial Intelligence, ...
اقرأ المزيد
This WTEC study gathered information on worldwide status and trends in BCI research to disseminate to government decisionmakers ...
اقرأ المزيد