Search Results for Image processing. - Narrowed by: Engineering. - Security Science and Technology.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dImage$002bprocessing.$0026qf$003dSUBJECT$002509Konu$002509Engineering.$002509Engineering.$0026qf$003dSUBJECT$002509Konu$002509Security$002bScience$002band$002bTechnology.$002509Security$002bScience$002band$002bTechnology.$0026ps$003d300$0026isd$003dtrue?2024-07-22T11:02:18ZSignal and Image Processing for Biometricsent://SD_ILS/0/SD_ILS:239532024-07-22T11:02:18Z2024-07-22T11:02:18ZYazar Scharcanski, Jacob. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54080-6">http://dx.doi.org/10.1007/978-3-642-54080-6</a><br/>Format: Electronic Resources<br/>Ear Biometrics in 2D and 3D Localization and Recognitionent://SD_ILS/0/SD_ILS:259072024-07-22T11:02:18Z2024-07-22T11:02:18ZYazar Prakash, Surya. author.<br/><a href="http://dx.doi.org/10.1007/978-981-287-375-0">http://dx.doi.org/10.1007/978-981-287-375-0</a><br/>Format: Electronic Resources<br/>Machine Learning Techniques for Gait Biometric Recognition Using the Ground Reaction Forceent://SD_ILS/0/SD_ILS:173252024-07-22T11:02:18Z2024-07-22T11:02:18ZYazar Mason, James Eric. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29088-1">http://dx.doi.org/10.1007/978-3-319-29088-1</a><br/>Format: Electronic Resources<br/>Battlefield Acousticsent://SD_ILS/0/SD_ILS:224842024-07-22T11:02:18Z2024-07-22T11:02:18ZYazar Damarla, Thyagaraju. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16036-8">http://dx.doi.org/10.1007/978-3-319-16036-8</a><br/>Format: Electronic Resources<br/>Locating, Classifying and Countering Agile Land Vehicles With Applications to Command Architecturesent://SD_ILS/0/SD_ILS:166072024-07-22T11:02:18Z2024-07-22T11:02:18ZYazar Sworder, David D. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19431-8">http://dx.doi.org/10.1007/978-3-319-19431-8</a><br/>Format: Electronic Resources<br/>Iris Image Recognition Wavelet Filter-banks Based Iris Feature Extraction Schemesent://SD_ILS/0/SD_ILS:208802024-07-22T11:02:18Z2024-07-22T11:02:18ZYazar Rahulkar, Amol D. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06767-4">http://dx.doi.org/10.1007/978-3-319-06767-4</a><br/>Format: Electronic Resources<br/>Watermarking Securityent://SD_ILS/0/SD_ILS:190352024-07-22T11:02:18Z2024-07-22T11:02:18ZYazar Bas, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0506-0">http://dx.doi.org/10.1007/978-981-10-0506-0</a><br/>Format: Electronic Resources<br/>Network Radar Countermeasure Systems Integrating Radar and Radar Countermeasuresent://SD_ILS/0/SD_ILS:185922024-07-22T11:02:18Z2024-07-22T11:02:18ZYazar Jiang, Qiuxi. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48471-5">http://dx.doi.org/10.1007/978-3-662-48471-5</a><br/>Format: Electronic Resources<br/>Advanced Technologies in Practical Applications for National Securityent://SD_ILS/0/SD_ILS:2250632024-07-22T11:02:18Z2024-07-22T11:02:18ZYazar Nawrat, Aleksander. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64674-9">https://doi.org/10.1007/978-3-319-64674-9</a><br/>Format: Electronic Resources<br/>