- Table View
- List View
Biometamorfosi Sociale: Teoria di una società ideale dalla transcomplessità
by Raquel PeñaBiometamorfosi sociale di Raquel Peña. Teoria di una società ideale dalla transcomplessità. Siamo tutti capaci di trasformarci. Siamo tutti capaci di trasformarci. La società richiede che gli individui che la compongono prendano coscienza dell'importanza di essere persone migliori, sotto una concezione etica, morale e spirituale. Questo libro mostra i risultati di un'indagine condotta in un settore popolare venezuelano dalla percezione degli attori sociali e come la conoscenza che possiedono come fonte generatrice emerga dalle loro esperienze. È da questa ricerca che è nata la teoria: Biometamorfosi Sociale.
Biomethane through Resource Circularity: Research, Technology and Practices (The Circular Economy in Sustainable Solid and Liquid Waste Management)
by Sadhan Kumar Ghosh H. N. Chanakya Debendra Chandra Baruah Michael M. NellesBiomethane through resource circularity: Research, Technology and Practices is an invaluable resource for researchers, policy makers, implementers and PhD and Marsters level students in universities analyzing the present status, waste biomass including agro wastes, success in experimentation & commercial production, future needs and other relevant areas. While huge biomass is wasted by open burning, there is potential of energy generation that can be extracted from the biomass preventing GHG emission and creating business opportunities. Abundance and renewable bioenergy can contribute to a more secure, sustainable, and economically sound future through biomethanation process by selecting followings: Supply chain sustainability of clean energy sources Appropriate Anaerobic Digestion technology with different feedstock Processes Parameter Optimization and best fit conditions, Productivity, Purification of biogas and end use Economic feasibility as business case, Commercialization, generating employment and Revitalizing rural economies This book addresses most of the above issues in lucid manner by experts in the field from different countries which are helpful for the related stakeholders edited by experts in the field.
Biomethane: Production and Applications (Green Energy and Technology)
by James Moran Sirichai Koonaphapdeelert Pruk AggarangsiThis book discusses biomethane and the processes and applications downstream from biogas production. Biogas is a result of anaerobic digestion of agricultural or general household waste, such as manure, plants or food waste, and as such is considered a renewable energy source. Biomethane is a gas that results from any process that improves the quality of biogas by reducing the levels of carbon dioxide, hydrogen sulfide, moisture and other contaminant gases. Chemically, biomethane is the same as methane, and its name refers to the method of production rather than the content. Biomethane plants are generally found in locations with a low population density that are close to farms or food processing plants. In situations where there is no natural gas pipeline nearby, biomethane downstream applications can include storage, transportation, home heating, industrial use and distribution through small-scale local gas grids. This book discusses each of these applications and lists some of the design criteria as well as various issues relating to them.
Biometric Data in Smart Cities: Methods and Models of Collective Behavior (Sensors Communication for Urban Intelligence)
by Stepan Bilan Mykola Bilan Ruslan Motornyuk Serhii YuzhakovIn modern conditions of the development of intelligent systems to solve the problems of smart cities, more and more attention is paid to the construction of distributed intelligent systems, which, based on a network of sensors and specialized calculators, help residents and visitors of the city in real time to solve a whole range of complex problems that arise in an urban environment. In a smart city, much attention is paid to the processing of biometric information that comes from biometric sensors distributed throughout the city. Such biometric systems are multimodal and allow you to control the general condition of a person, and also help a person to move around the city and predict events within the city. This book describes methods for processing biometric information in a smart city environment. The theoretical foundations of building a biometric multisensor network, which allows you to create a unified urban biometric community, are considered. The theoretical foundations of the parallel shift technology and the Radon transformation on cellular automata with a hexagonal covering are presented. On the basis of these technologies, methods of biometric identification by gait parameters and the geometric shape of the auricle are described, which are effectively used in a smart city. A method for tracking dynamic changes in the state of a smart city in real time is considered. Models of behavior of colonies of living organisms, their formation, movement and interaction are described on the basis of the technology of cellular automata with active cells. Models of behavior of active cells in meeting with unwanted cells and models of combining and destruction of active cell colonies are also described. This book is intended for undergraduate, graduate students and specialists working and conducting research in the field of biometric information processing, as well as in the development and construction of distributed intelligent systems.
Biometric Identification Technologies Based on Modern Data Mining Methods
by Mohamed Elhoseny D. Jude Hemanth Stepan BilanThis book emphasizes recent advances in the creation of biometric identification systems for various applications in the field of human activity. The book displays the problems that arise in modern systems of biometric identification, as well as the level of development and prospects for the introduction of biometric technologies. The authors classify biometric technologies into two groups, distinguished according to the type of biometric characteristics used. The first group uses static biometric parameters: fingerprints, hand geometry, retina pattern, vein pattern on the finger, etc. The second group uses dynamic parameters for identification: the dynamics of the reproduction of a signature or a handwritten keyword, voice, gait, dynamics of work on the keyboard, etc. The directions of building information systems that use automatic personality identification based on the analysis of unique biometric characteristics of a person are discussed. The book is intended for professionals working and conducting research in the field of intelligent information processing, information security, and robotics and in the field of real-time identification systems. The book contains examples and problems/solutions throughout.
Biometric Identification, Law and Ethics (SpringerBriefs in Ethics)
by Seumas Miller Marcus SmithThis book is open access. This book undertakes a multifaceted and integrated examination of biometric identification, including the current state of the technology, how it is being used, the key ethical issues, and the implications for law and regulation. The five chapters examine the main forms of contemporary biometrics–fingerprint recognition, facial recognition and DNA identification– as well the integration of biometric data with other forms of personal data, analyses key ethical concepts in play, including privacy, individual autonomy, collective responsibility, and joint ownership rights, and proposes a raft of principles to guide the regulation of biometrics in liberal democracies.Biometric identification technology is developing rapidly and being implemented more widely, along with other forms of information technology. As products, services and communication moves online, digital identity and security is becoming more important. Biometric identification facilitates this transition. Citizens now use biometrics to access a smartphone or obtain a passport; law enforcement agencies use biometrics in association with CCTV to identify a terrorist in a crowd, or identify a suspect via their fingerprints or DNA; and companies use biometrics to identify their customers and employees. In some cases the use of biometrics is governed by law, in others the technology has developed and been implemented so quickly that, perhaps because it has been viewed as a valuable security enhancement, laws regulating its use have often not been updated to reflect new applications. However, the technology associated with biometrics raises significant ethical problems, including in relation to individual privacy, ownership of biometric data, dual use and, more generally, as is illustrated by the increasing use of biometrics in authoritarian states such as China, the potential for unregulated biometrics to undermine fundamental principles of liberal democracy. Resolving these ethical problems is a vital step towards more effective regulation.
Biometric Inverse Problems
by Svetlana N. Yanushkevich Vlad P. Shmerko Adrian Stoica Denis V. PopelTraditional methods of biometric analysis are unable to overcome the limitations of existing approaches, mainly due to the lack of standards for input data, privacy concerns involving use and storage of actual biometric data, and unacceptable accuracy. Exploring solutions to inverse problems in biometrics transcends such limits and allows rich analysis of biometric information and systems for improved performance and testing. Although some particular inverse problems appear in the literature, until now there has been no comprehensive reference for these problems. Biometric Inverse Problems provides the first comprehensive treatment of biometric data synthesis and modeling. This groundbreaking reference comprises eight self-contained chapters that cover the principles of biometric inverse problems; basics of data structure design; new automatic synthetic signature, fingerprint, and iris design; synthetic faces and DNA; and new tools for biometrics based on Voronoi diagrams. Based on the authors' vast experience in the field, the book authoritatively examines new approaches and methodologies in both direct and inverse biometrics, providing invaluable analytical and benchmarking tools. The authors include case studies, examples, and implementation codes for practical illustration of the methods. Loaded with approximately 200 figures, 60 problems, 50 MATLAB® code fragments, and 200 examples, Biometric Inverse Problems sets the standard for innovation and authority in biometric data synthesis, modeling, and analysis.
Biometric Recognition: 11th Chinese Conference, CCBR 2016, Chengdu, China, October 14-16, 2016, Proceedings (Lecture Notes in Computer Science #9967)
by Jie Zhou Shiguang Shan Zhisheng You Yunhong Wang Zhenan Sun Weishi Zheng Jianjiang Feng Qijun ZhaoThis book constitutes the refereed proceedings of the 11th Chinese Conference on Biometric Recognition, CCBR 2016, held in Chengdu, China, in October 2016. The 84 revised full papers presented in this book were carefully reviewed and selected from 138 submissions. The papers focus on Face Recognition and Analysis; Fingerprint, Palm-print and Vascular Biometrics; Iris and Ocular Biometrics; Behavioral Biometrics; Affective Computing; Feature Extraction and Classification Theory; Anti-Spoofing and Privacy; Surveillance; and DNA and Emerging Biometrics.
Biometric Recognition: 12th Chinese Conference, CCBR 2017, Shenzhen, China, October 28-29, 2017, Proceedings (Lecture Notes in Computer Science #10568)
by Jie Zhou Zhenhua Guo Yong Xu Shiguang Shan Yunhong Wang Zhenan Sun Jianjiang Feng Linlin Shen Yu Qiao Shiqi YuWith the increasing concerns on security breaches and transaction fraud, highly reliable and convenient personal verification and identification technologies are more and more requisite in our social activities and national services. Biometrics, used to recognize the identity of an individual, are gaining ever-growing popularity in an extensive array of governmental, military, forensic, and commercial security applications. ""Advanced Biometric Recognition Technologies: Discriminant Criterion and Fusion Applications"" focuses on two kinds of advanced biometric recognition technologies, biometric data discrimination and multi-biometrics, while systematically introducing recent research in developing effective biometric recognition technologies. Organized into three main sections, this cutting-edge book explores advanced biometric data discrimination technologies, describes tensor-based biometric data discrimination technologies, and develops the fundamental conception and categories of multi-biometrics technologies.
Biometric Recognition: 13th Chinese Conference, CCBR 2018, Urumqi, China, August 11-12, 2018, Proceedings (Lecture Notes in Computer Science #10996)
by Jie Zhou Zhenhua Guo Shiguang Shan Yunhong Wang Zhenan Sun Jianjiang Feng Zhenhong Jia Kurban UbulThe LNCS volume 10996 constitutes the proceedings of the 13th Chinese Conference on Biometric Recognition, held in Urumchi, China, in August 2018. The 79 full papers and 67 poster papers presented were carefully reviewed and selected from 112 submissions. The papers cover a wide range of topics such as Biometrics, Speech recognition, Activity recognition and understanding, Online handwriting recognition, System forensics, Multi-factor authentication, Graphical and visual passwords.
Biometric Recognition: 14th Chinese Conference, CCBR 2019, Zhuzhou, China, October 12–13, 2019, Proceedings (Lecture Notes in Computer Science #11818)
by Ran He Zhenhua Guo Shiguang Shan Zhenan Sun Jianjiang FengThe LNCS volume 11818 constitutes the proceedings of the 14th Chinese Conference on Biometric Recognition, held in Zhuzhou, China, in October 2019. The 56 papers presented in this book were carefully reviewed and selected from 74 submissions. The papers cover a wide range of topics such as face recognition and analysis; hand-based biometrics; eye-based biometrics; gesture, gait, and action; emerging biometrics; feature extraction and classification theory; and behavioral biometrics.
Biometric Recognition: 15th Chinese Conference, CCBR 2021, Shanghai, China, September 10–12, 2021, Proceedings (Lecture Notes in Computer Science #12878)
by Jianjiang Feng Junping Zhang Manhua Liu Yuchun FangThe LNCS volume 12878 constitutes the proceedings of the 15th Chinese Conference on Biometric Recognition, held in Shanghai, China, in September 2021.The 53 papers presented in this book were carefully reviewed and selected from 72 submissions. The papers cover a wide range of topics such as multi-modal biometrics and emerging biometrics; hand biometrics; facial biometrics; and speech biometrics.
Biometric Recognition: 16th Chinese Conference, CCBR 2022, Beijing, China, November 11–13, 2022, Proceedings (Lecture Notes in Computer Science #13628)
by Zhenan Sun Jianjiang Feng Wenfeng Wang Meina Kan Weihong Deng Di Huang Fang Zheng Zhaofeng HeThis book constitutes the proceedings of the 16th Chinese Conference on Biometric Recognition, CCBR 2022, which took place in Beijing, China, in November 2022.The 70 papers presented in this volume were carefully reviewed and selected from 115 submissions. The papers cover a wide range of topics such as Fingerprint, Palmprint and Vein Recognition; Face Detection, Recognition and Tracking; Gesture and Action Recognition; Affective Computing and Human-Computer Interface; Speaker and Speech Recognition; Gait, Iris and Other Biometrics; Multi-modal Biometric Recognition and Fusion; Quality Evaluation and Enhancement of Biometric Signals; Animal Biometrics; Trustworthy, Privacy and Personal Data Security; Medical and Other Applications.
Biometric Recognition: 17th Chinese Conference, CCBR 2023, Xuzhou, China, December 1–3, 2023, Proceedings (Lecture Notes in Computer Science #14463)
by Jun Wang Shiqi Yu Zhaofeng He Wei Jia Wenxiong Kang Zaiyu Pan Xianye Ben Zhengfu BianThis book constitutes the proceedings of the 17th Chinese Conference, CCBR 2023, held in Xuzhou, China, during December 1–3, 2023. The 41 full papers included in this volume were carefully reviewed and selected from 79 submissions. The volume is divided in topical sections named: Fingerprint, Palmprint and Vein Recognition; Face Detection, Recognition and Tracking; Affective Computing and Human-Computer Interface; Trustworthy, Privacy and Personal Data Security; Medical and Other Applications.
Biometric Recognition: 18th Chinese Conference, CCBR 2024, Nanjing, China, November 22–24, 2024, Proceedings, Part I (Lecture Notes in Computer Science #15352)
by Caifeng Shan Xiaotong Yuan Qingshan Liu Shiqi Yu Jinhui Tang Wei Jia Xiangbo Shu Jie GuiThis two-volume set, LNCS 15352 and LNCS 15353, constitutes the proceedings of the 18th Chinese Conference on Biometric Recognition, CCBR 2024, held in Nanjing, China, during November 22–24, 2024. The 52 full papers presented here were carefully reviewed and selected from 82 submissions. These papers have been categorized under the following topical sections in these two volumes: - Part I: Fingerprint, Palmprint and Vein Recognition; Face Detection, Recognition and Tracking. Part II: Face Detection, Recognition and Tracking; Affective Computing and Human-Computer Interface; Gait, Iris and Other Biometrics; Trustworthy, Privacy and Personal Data Security; Medical and Other Applications.
Biometric Recognition: 18th Chinese Conference, CCBR 2024, Nanjing, China, November 22–24, 2024, Proceedings, Part II (Lecture Notes in Computer Science #15353)
by Caifeng Shan Xiaotong Yuan Qingshan Liu Shiqi Yu Jinhui Tang Wei Jia Xiangbo Shu Jie GuiThis two-volume set, LNCS 15352 and LNCS 15353, constitutes the proceedings of the 18th Chinese Conference on Biometric Recognition, CCBR 2024, held in Nanjing, China, during November 22–24, 2024. The 52 full papers presented here were carefully reviewed and selected from 82 submissions. These papers have been categorized under the following topical sections in these two volumes: - Part I: Fingerprint, Palmprint and Vein Recognition; Face Detection, Recognition and Tracking. Part II: Face Detection, Recognition and Tracking; Affective Computing and Human-Computer Interface; Gait, Iris and Other Biometrics; Trustworthy, Privacy and Personal Data Security; Medical and Other Applications.
Biometric Recognition: Challenges and Opportunities
by National Research Council of the National AcademiesBiometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric recognition has been applied to identification of criminals, patient tracking in medical informatics, and the personalization of social services, among other things. In spite of substantial effort, however, there remain unresolved questions about the effectiveness and management of systems for biometric recognition, as well as the appropriateness and societal impact of their use. Moreover, the general public has been exposed to biometrics largely as high-technology gadgets in spy thrillers or as fear-instilling instruments of state or corporate surveillance in speculative fiction. Now, as biometric technologies appear poised for broader use, increased concerns about national security and the tracking of individuals as they cross borders have caused passports, visas, and border-crossing records to be linked to biometric data. A focus on fighting insurgencies and terrorism has led to the military deployment of biometric tools to enable recognition of individuals as friend or foe. Commercially, finger-imaging sensors, whose cost and physical size have been reduced, now appear on many laptop personal computers, handheld devices, mobile phones, and other consumer devices. Biometric Recognition: Challenges and Opportunities addresses the issues surrounding broader implementation of this technology, making two main points: first, biometric recognition systems are incredibly complex, and need to be addressed as such. Second, biometric recognition is an inherently probabilistic endeavor. Consequently, even when the technology and the system in which it is embedded are behaving as designed, there is inevitable uncertainty and risk of error. This book elaborates on these themes in detail to provide policy makers, developers, and researchers a comprehensive assessment of biometric recognition that examines current capabilities, future possibilities, and the role of government in technology and system development.
Biometric Security and Privacy: Opportunities & Challenges in The Big Data Era (Signal Processing for Security Technologies)
by Ahmed Bouridane Richard Jiang Somaya Al-Maadeed Danny Crookes Azeddine BeghdadiThis book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as cancellable biometrics and soft biometrics. The book also focuses on several emerging topics such as big data issues, internet of things, medical biometrics, healthcare, and robot-human interactions. The authors show how these new applications have triggered a number of new biometric approaches. They show, as an example, how fuzzy extractor has become a useful tool for key generation in biometric banking, and vein/heart rates from medical records can also be used to identify patients. The contributors cover the topics, their methods, and their applications in depth.
Biometric State
by Keith BreckenridgeGroundbreaking study of South Africa's role as a site for global experiments in biometric identification throughout the twentieth century.
Biometric Technology and Authentication: Biocryptography and Cloud-Based Architecture
by Ravi DasThis book is an update to the first edition of this book. Some of the updates include newer images and an extensive review as to how both AWS and Microsoft Azure can be used to host a biometrics in the cloud infrastructure, which will be a hot topic going into 2025 and beyond. Finally, the last chapter of this book previews some of the latest trends for biometric technology going into 2025 and beyond.
Biometric Technology: Authentication, Biocryptography, and Cloud-Based Architecture
by Ravi DasMost biometric books are either extraordinarily technical for technophiles or extremely elementary for the lay person. Striking a balance, this book is geared toward the business, IT, or security manager required to make purchasing, migration, or adoption decisions. Presenting technical background on the various biometric technologies and how they work, it looks at optimal application in various settings and their respective strengths and weaknesses considering ease of use, false positives and negatives, and privacy and security issues. It also discusses exciting trends in biotechnology such as biocryptography and biometrics in the cloud.
Biometric and Intelligent Decision Making Support (Intelligent Systems Reference Library #81)
by Arturas KaklauskasThis book presents different methods for analyzing the body language (movement, position, use of personal space, silences, pauses and tone, the eyes, pupil dilation or constriction, smiles, body temperature and the like) for better understanding people's needs and actions, including biometric data gathering and reading. Different studies described in this book indicate that sufficiently much data, information and knowledge can be gained by utilizing biometric technologies. This is the first, wide-ranging book that is devoted completely to the area of intelligent decision support systems, biometrics technologies and their integrations. This book is designated for scholars, practitioners and doctoral and master's degree students in various areas and those who are interested in the latest biometric and intelligent decision making support problems and means for their resolutions, biometric and intelligent decision making support systems and the theory and practice of their integration and the opportunities for the practical use of biometric and intelligent decision making support.
Biometric-Based Physical and Cybersecurity Systems
by Isaac Woungang Mohammad S. Obaidat Issa TraoreThis book presents the latest developments in biometrics technologies and reports on new approaches, methods, findings, and technologies developed or being developed by the research community and the industry. The book focuses on introducing fundamental principles and concepts of key enabling technologies for biometric systems applied for both physical and cyber security. The authors disseminate recent research and developing efforts in this area, investigate related trends and challenges, and present case studies and examples such as fingerprint, face, iris, retina, keystroke dynamics, and voice applications . The authors also investigate the advances and future outcomes in research and development in biometric security systems. The book is applicable to students, instructors, researchers, industry practitioners, and related government agencies staff. Each chapter is accompanied by a set of PowerPoint slides for use by instructors.
Biometrics For Dummies
by Michael A. Simon Peter H. GregoryWhat is biometrics? Whether you're just curious about how biometrics can benefit society or you need to learn how to integrate biometrics with an existing security system in your organization, Biometrics For Dummies can help.Here's a friendly introduction to biometrics -- the science of identifying humans based on unique physical characteristics. With the government's use of biometrics -- for example, biometric passport readers -- and application of the technology for law enforcement, biometrics is growing more popular among security experts. Biometrics For Dummies explains biometric technology, explores biometrics policy and privacy issues with biometrics, and takes a look at where the science is heading. You'll discover:How pattern recognition and fingerprint recognition are usedThe many vulnerabilities of biometric systems and how to guard against themHow various countries are handling the privacy issues and what can be done to protect citizens' privacyHow a scan of the palm, veins in the hand, and sonar imagery establish identityWhat it takes to fully authenticate a signatureHow gait, speech, linguistic analysis, and other types of biometric identification come into playThe criteria for setting up an implementation planHow to use authentication, authorization, and access principlesWritten by a pair of security experts, Biometrics For Dummies gives you the basics in an easy-to-understand format that doesn't scrimp on substance. You'll get up to speed and enjoy getting there!
Biometrics and Kansei Engineering
by Tomomasa Nagashima Khalid SaeedBiometrics and Kansei Engineering is the first book to bring together the principles and applications of each discipline. The future of biometrics is in need of new technologies that can depend on people's emotions and the prediction of their intention to take an action. Behavioral biometrics studies the way people walk, talk, and express their emotions, and Kansei Engineering focuses on interactions between users, products/services and product psychology. They are becoming quite complementary. This book also introduces biometric applications in our environment, which further illustrates the close relationship between Biometrics and Kansei Engineering. Examples and case studies are provided throughout this book. Biometrics and Kansei Engineering is designed as a reference book for professionals working in these related fields. Advanced-level students and researchers studying computer science and engineering will find this book useful as a reference or secondary text book as well.