Image Processing And Pattern Recognition Based On Parallel Shift Technology


Download Image Processing And Pattern Recognition Based On Parallel Shift Technology PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Image Processing And Pattern Recognition Based On Parallel Shift Technology book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Image Processing and Pattern Recognition Based on Parallel Shift Technology


Image Processing and Pattern Recognition Based on Parallel Shift Technology

Author: Stepan Bilan

language: en

Publisher: CRC Press

Release Date: 2018-01-29


DOWNLOAD





This book describes the methods and algorithms for image pre-processing and recognition. These methods are based on a parallel shift technology of the imaging copy, as well as simple mathematical operations to allow the generation of a minimum set of features to describe and recognize the image. This book also describes the theoretical foundations of parallel shift technology and pattern recognition. Based on these methods and theories, this book is intended to help researchers with artificial intelligence systems design, robotics, and developing software and hardware applications.

Biometric Identification Technologies Based on Modern Data Mining Methods


Biometric Identification Technologies Based on Modern Data Mining Methods

Author: Stepan Bilan

language: en

Publisher: Springer Nature

Release Date: 2020-12-03


DOWNLOAD





This book emphasizes recent advances in the creation of biometric identification systems for various applications in the field of human activity. The book displays the problems that arise in modern systems of biometric identification, as well as the level of development and prospects for the introduction of biometric technologies. The authors classify biometric technologies into two groups, distinguished according to the type of biometric characteristics used. The first group uses static biometric parameters: fingerprints, hand geometry, retina pattern, vein pattern on the finger, etc. The second group uses dynamic parameters for identification: the dynamics of the reproduction of a signature or a handwritten keyword, voice, gait, dynamics of work on the keyboard, etc. The directions of building information systems that use automatic personality identification based on the analysis of unique biometric characteristics of a person are discussed. The book is intended for professionals working and conducting research in the field of intelligent information processing, information security, and robotics and in the field of real-time identification systems. The book contains examples and problems/solutions throughout.

Handbook of Research on Intelligent Data Processing and Information Security Systems


Handbook of Research on Intelligent Data Processing and Information Security Systems

Author: Bilan, Stepan Mykolayovych

language: en

Publisher: IGI Global

Release Date: 2019-11-29


DOWNLOAD





Intelligent technologies have emerged as imperative tools in computer science and information security. However, advanced computing practices have preceded new methods of attacks on the storage and transmission of data. Developing approaches such as image processing and pattern recognition are susceptible to breaches in security. Modern protection methods for these innovative techniques require additional research. The Handbook of Research on Intelligent Data Processing and Information Security Systems provides emerging research exploring the theoretical and practical aspects of cyber protection and applications within computer science and telecommunications. Special attention is paid to data encryption, steganography, image processing, and recognition, and it targets professionals who want to improve their knowledge in order to increase strategic capabilities and organizational effectiveness. As such, this book is ideal for analysts, programmers, computer engineers, software engineers, mathematicians, data scientists, developers, IT specialists, academicians, researchers, and students within fields of information technology, information security, robotics, artificial intelligence, image processing, computer science, and telecommunications.