SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Awad Ali Ismail) ;mspu:(chapter)"

Sökning: WFRF:(Awad Ali Ismail) > Bokkapitel

  • Resultat 1-7 av 7
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  •  
2.
  • Awad, Ali Ismail, et al. (författare)
  • Impact of Some Biometric Modalities on Forensic Science
  • 2014
  • Ingår i: Computational Intelligence in Digital Forensics: Forensic Investigation and Applications. - Cham : Springer International Publishing. - 9783319058849 - 9783319058856 ; , s. 47-62
  • Bokkapitel (refereegranskat)abstract
    • Recently, forensic science has had many challenges in many different types of crimes and crime scenes, vary from physical crimes to cyber or computer crimes. Accurate and efficient human identification or recognition have become crucial for forensic applications due to the large diversity of crime scenes, and because of the increasing need to accurately identify criminals from the available crime evidences. Biometrics is an emerging technology that provides accurate and highly secure personal identification and verification systems for civilian and forensic applications. The positive impact of biometric modalities on forensic science began with the rapid developments in computer science, computational intelligence, and computing approaches. These advancements have been reflected in the biometric modality capturing process, feature extraction, feature robustness, and features matching. A complete and automatic biometric identification or recognition systems have been built accordingly. This chapter presents a study of the impacts of using some biometric modalities in forensic applications. Although biometrics identification replaces human work with computerized and automatic systems in order to achieve better performance, new challenges have arisen. These challenges lie in biometric system reliability and accuracy, system response time, data mining and classification, and protecting user privacy. This chapter sheds light on the positive and the negative impacts of using some biometric modalities in forensic science. In particular, the impacts of fingerprint image, facial image, and iris patterns are considered. The selected modalities are covered preliminarily before tackling their impact on forensic applications. Furthermore, an extensive look at the future of biometric modalities deployment in forensic applications is covered as the last part of the chapter.
  •  
3.
  • Awad, Ali Ismail (författare)
  • Introduction to Information Security Foundations and Applications
  • 2018
  • Ingår i: Information Security. - : Institution of Engineering and Technology. - 9781849199742 - 9781849199766 ; , s. 3-9
  • Bokkapitel (refereegranskat)abstract
    • Information security has extended to include several research directions like user authentication and authorization, network security, hardware security, software security, and data cryptography. Information security has become a crucial need for protecting almost all information transaction applications. Security is considered as an important science discipline whose many multifaceted complexities deserve the synergy of the computer science and engineering communities.
  •  
4.
  • Awad, Ali Ismail, et al. (författare)
  • Preface
  • 2021
  • Ingår i: Security in Cyber-Physical Systems. - : Springer Nature. ; , s. v-ix
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)
  •  
5.
  • Awad, Ali Ismail, et al. (författare)
  • Preface
  • 2022
  • Ingår i: Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications. - : John Wiley & Sons. ; , s. xix-xxiii
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)
  •  
6.
  • Grzenda, Maciej, et al. (författare)
  • Network Architectures, Security, and Applications : An Introduction
  • 2017
  • Ingår i: Advances in Network Systems. - Berlin : Springer Berlin/Heidelberg. - 9783319443522 - 9783319443546 ; , s. 1-10
  • Bokkapitel (refereegranskat)abstract
    • Owing to the ever growing communication systems, modern networks currently encompass a wide range of solutions and technologies, including wireless and wired networks and provide basis for network systems from multiple partly overlapping domains such as the Internet of Things (IoT), cloud services, and network applications. This appears in numerous active research areas with particular attention paid to the architecture and security of network systems. In parallel, novel applications are developed, in some cases strongly linked to rapidly developing network-based data acquisition and processing frameworks. This chapter presents a general introduction to the topics of network architectures, security, and applications in addition to short descriptions of the chapters included in this volume
  •  
7.
  • Hassaballah, Mahmoud, et al. (författare)
  • Detection and Description of Image Features : An Introduction
  • 2016
  • Ingår i: Image Feature Detectors and Descriptors. - Cham : Encyclopedia of Global Archaeology/Springer Verlag. - 9783319288529 - 9783319288543 ; , s. 1-8
  • Bokkapitel (refereegranskat)abstract
    • Detection and description of image features play a vital role in various application domains such as image processing, computer vision, pattern recognition, and machine learning. There are two type of features that can be extracted from an image content; namely global and local features. Global features describe the image as a whole and can be interpreted as a particular property of the image involving all pixels; while, the local features aim to detect keypoints within the image and describe regions around these keypoints. After extracting the features and their descriptors from images, matching of common structures between images (i.e., features matching) is the next step for these applications. This chapter presents a general and brief introduction to topics of feature extraction for a variety of application domains. Its main aim is to provide short descriptions of the chapters included in this book volume.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-7 av 7

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy