This book delves into the history of biometrics, the different systems that have been developed to date, problems that have arisen from these systems, the necessity of AI-based biometrics systems, different AI techniques developed to date (including machine learning, deep learning, natural language processing, and pattern recognition), their potential uses and applications, security and privacy issues in AI-based Biometric systems, current trends in AI-based biometrics, and presents case studies of AI-based biometrics.
This book offers a pioneering exploration into the integration of safety considerations with operations research, providing a vital toolkit for enhancing decision-making processes in hazardous industries.
Entdecken Sie die psychologischen Tricks und Techniken, mit denen Human Hacker Ihre persönlichen Gefühle, Eigenschaften und digitale Verhaltensmuster ausnutzen, um die Informationssicherheit gezielt zu kompromittieren.
Researching Care with Case Studies offers a fresh perspective on the universe of care practices, using case studies to illuminate their stretch and complexities.
This book offers an autoethnographic exploration of the interplay of art, memory, and resilience in Eastern Europe, weaving together the personal and collective histories of Belarusians - those who survived two World Wars and their contemporaries, who are now looking for a way out of a political crisis in the region.
Innerhalb dieses literaturbasierten Forschungsprojektes werden Einflüsse zum einen durch die Dunkle Triade und zum anderen aus dem strategischen Risikomanagement untersucht.
This second edition brings the definitive empirical work on Japanese youth fashion subcultures up-to-date for the 2020s, featuring three new chapters and essential updates in light of new fieldwork and globalized digital media.
This book integrates research on the causes, responses and protective strategies for vicarious trauma that are recognised in a range of human services and argues their relevance to the legal profession.
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages.
Innerhalb dieses literaturbasierten Forschungsprojektes werden Einflüsse zum einen durch die Dunkle Triade und zum anderen aus dem strategischen Risikomanagement untersucht.
Entdecken Sie die psychologischen Tricks und Techniken, mit denen Human Hacker Ihre persönlichen Gefühle, Eigenschaften und digitale Verhaltensmuster ausnutzen, um die Informationssicherheit gezielt zu kompromittieren.
Knowing how to find, analyse, and write about research papers is a foundational skill of your psychology degree that will set you up to ace your assessments.
This text explores the state-of-the-art in the rapidly developing theory of impulse control and introduces the theory of singular space-time transformations, a new method for studying shock mechanical systems.
This topical textbook provides a thorough insight into the discipline of social psychology, presenting students with a rich and engaging account of the human social experience.
Forensic Engineering Investigation is a compendium of the investigative methodologies used by engineers and scientific investigators to evaluate some of the more common types of failures and catastrophic events.
This book gathers selected high-quality research papers presented at the 3rd International Conference on Advanced Computing and Applications (ICACA 2024), held virtually during 23-24 February 2024.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining, and software analysis.
This book offers a pioneering exploration into the integration of safety considerations with operations research, providing a vital toolkit for enhancing decision-making processes in hazardous industries.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining, and software analysis.
First responders confronted by forensic cases are forced to consider the competing concerns of administering proper medical treatment while at the same time safeguarding vital evidence.
Invisible Seasides positions the seaside as a lens for understanding lived utopia, pinned in a certain place, an immovable feature in a landscape where our hopes and fears continue to unfold.