000 02932nam a2200277Ia 4500
999 _c126277
_d126277
003 LDD
005 20200128170447.0
008 181029s9999 xx 000 0 und d
020 _a9783319685328
_cE149.99
040 _cIGNOU Library
082 _223
_a621.38928 Su79
245 0 _aSurveillance in action :
_ctechnologies for civilian, milltary and cyber surveillance /
_bedited by Panagiotis Karampelas and Thirimachos Bourlai
260 _aCham :
_bSpringer,
_c2017
300 _axiv, 412 pages :
_billustrations (chiefly color) ;
_c25 cm.
365 _bE149.99
505 _aPart I - Surveillance of Human Features.- A Survey of Using Biometrics for Smart Visual Surveillance: Gait Recognition; I. Bouchrika.- Comparative Face Soft Biometrics for Human Identification; N.Y. Almudhahka et al.- Video-Based Human Respiratory Wavelet Extraction and Identity Recognition; X. Yang, T. Bourlai.- A Study on Human Recognition using Auricle and Side View Face Images; S. El-Naggar et al.- Cross-spectral Iris Matching for Surveillance Applications; M.A. M. Abdullah et al.- Facial Surveillance and Recognition in the Passive Infrared Bands; N. Osia et al.- Deep Feature Learning for Classification when using Single Sensor Multi-Wavelength based Facial Recognition Systems in SWIR Band; N. Narang, T. Bourlai.- Part II - Surveillance for Security and Defense.- Managing Uncertainty from the Sky: Surveillance through three Generations of Commercial Earth Observation Satellites; A. Kolovos.- Drones Surveillance - Challenges and Techniques; A. Kokkalis, T.I. Lekas.- Early Warning Against Stealth Aircraft, Missiles and Unmanned Aerial Vehicles; K.C. Zikidis. Mobile Data Fusion for Maritime Surveillance; E. Sakkopoulos et al.- Mobile stand-off and stand-in surveillance against biowarfare and bioterrorism agents; M.E. Kambouris.- Social Networks for Surveillance and Security: 'Using Online Techniques to make something happen in the real or cyber world'; B. Harbisher.- Surveillance, targeted killing and the fight against Terrorism: a fair-played game?; I.K. Lekea.- Part III - Cyber Surveillance Data Hiding in the Wild: Where Computational Intelligence Meets Digital Forensics; V. Pomponiu et al.- Methods to Detect Cyber threats on Twitter; P. Rao et al.- Detecting Users Who Share Extremist Content on Twitter; Y.Wei, L.Singh.- An Organizational Visualization Profiler Tool Based on Social Interactions; P. Karampelas.- Cyber-Surveillance Analysis for Supercomputing Environments; A. D. Clark, J. M. Absher.-
650 _aElectronic surveillance.
_911306
650 _aVideo surveillance.
_911307
650 _aMilitary surveillance.
_911308
700 _aKarampelas, Panagiotis
_eeditor
_911309
700 _aBourlai, Thirimachos
_eeditor
_911310
901 _a17681
_b30-01-2018
902 _a1566
_b09-02-2018
_cF
_dSELECT
_e32
903 _aDiscount-20
_bReqst by : Anurag Joshi
942 _2ddc
_cBK