000 | 02932nam a2200277Ia 4500 | ||
---|---|---|---|
999 |
_c126277 _d126277 |
||
003 | LDD | ||
005 | 20200128170447.0 | ||
008 | 181029s9999 xx 000 0 und d | ||
020 |
_a9783319685328 _cE149.99 |
||
040 | _cIGNOU Library | ||
082 |
_223 _a621.38928 Su79 |
||
245 | 0 |
_aSurveillance in action : _ctechnologies for civilian, milltary and cyber surveillance / _bedited by Panagiotis Karampelas and Thirimachos Bourlai |
|
260 |
_aCham : _bSpringer, _c2017 |
||
300 |
_axiv, 412 pages : _billustrations (chiefly color) ; _c25 cm. |
||
365 | _bE149.99 | ||
505 | _aPart I - Surveillance of Human Features.- A Survey of Using Biometrics for Smart Visual Surveillance: Gait Recognition; I. Bouchrika.- Comparative Face Soft Biometrics for Human Identification; N.Y. Almudhahka et al.- Video-Based Human Respiratory Wavelet Extraction and Identity Recognition; X. Yang, T. Bourlai.- A Study on Human Recognition using Auricle and Side View Face Images; S. El-Naggar et al.- Cross-spectral Iris Matching for Surveillance Applications; M.A. M. Abdullah et al.- Facial Surveillance and Recognition in the Passive Infrared Bands; N. Osia et al.- Deep Feature Learning for Classification when using Single Sensor Multi-Wavelength based Facial Recognition Systems in SWIR Band; N. Narang, T. Bourlai.- Part II - Surveillance for Security and Defense.- Managing Uncertainty from the Sky: Surveillance through three Generations of Commercial Earth Observation Satellites; A. Kolovos.- Drones Surveillance - Challenges and Techniques; A. Kokkalis, T.I. Lekas.- Early Warning Against Stealth Aircraft, Missiles and Unmanned Aerial Vehicles; K.C. Zikidis. Mobile Data Fusion for Maritime Surveillance; E. Sakkopoulos et al.- Mobile stand-off and stand-in surveillance against biowarfare and bioterrorism agents; M.E. Kambouris.- Social Networks for Surveillance and Security: 'Using Online Techniques to make something happen in the real or cyber world'; B. Harbisher.- Surveillance, targeted killing and the fight against Terrorism: a fair-played game?; I.K. Lekea.- Part III - Cyber Surveillance Data Hiding in the Wild: Where Computational Intelligence Meets Digital Forensics; V. Pomponiu et al.- Methods to Detect Cyber threats on Twitter; P. Rao et al.- Detecting Users Who Share Extremist Content on Twitter; Y.Wei, L.Singh.- An Organizational Visualization Profiler Tool Based on Social Interactions; P. Karampelas.- Cyber-Surveillance Analysis for Supercomputing Environments; A. D. Clark, J. M. Absher.- | ||
650 |
_aElectronic surveillance. _911306 |
||
650 |
_aVideo surveillance. _911307 |
||
650 |
_aMilitary surveillance. _911308 |
||
700 |
_aKarampelas, Panagiotis _eeditor _911309 |
||
700 |
_aBourlai, Thirimachos _eeditor _911310 |
||
901 |
_a17681 _b30-01-2018 |
||
902 |
_a1566 _b09-02-2018 _cF _dSELECT _e32 |
||
903 |
_aDiscount-20 _bReqst by : Anurag Joshi |
||
942 |
_2ddc _cBK |