Search Results for Computer security. - Narrowed by: Image processing. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Image$002bprocessing.$002509Image$002bprocessing.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300? 2024-09-23T21:32:01Z Biometric-Based Physical and Cybersecurity Systems ent://SD_ILS/0/SD_ILS:484246 2024-09-23T21:32:01Z 2024-09-23T21:32:01Z Author&#160;Obaidat, Mohammad S. editor.&#160;Traore, Issa. editor. (orcid)0000-0003-2987-8047&#160;Woungang, Isaac. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98734-7">https://doi.org/10.1007/978-3-319-98734-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Trends in Communication, Computing, and Electronics Select Proceedings of IC3E 2018 ent://SD_ILS/0/SD_ILS:484464 2024-09-23T21:32:01Z 2024-09-23T21:32:01Z Author&#160;Khare, Ashish. editor.&#160;Tiwary, Uma Shankar. editor. (orcid)0000-0001-7206-9013&#160;Sethi, Ishwar K. editor.&#160;Singh, Nar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-2685-1">https://doi.org/10.1007/978-981-13-2685-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> International Conference on Advanced Computing Networking and Informatics ICANI-2018 ent://SD_ILS/0/SD_ILS:486202 2024-09-23T21:32:01Z 2024-09-23T21:32:01Z Author&#160;Kamal, Raj. editor.&#160;Henshaw, Michael. editor.&#160;Nair, Pramod S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-2673-8">https://doi.org/10.1007/978-981-13-2673-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Speech Enhancement Techniques for Digital Hearing Aids ent://SD_ILS/0/SD_ILS:482802 2024-09-23T21:32:01Z 2024-09-23T21:32:01Z Author&#160;Borisagar, Komal R. author.&#160;Thanki, Rohit M. author. (orcid)0000-0002-0645-6266&#160;Sedani, Bhavin S. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-96821-6">https://doi.org/10.1007/978-3-319-96821-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Medical Imaging and its Security in Telemedicine Applications ent://SD_ILS/0/SD_ILS:487428 2024-09-23T21:32:01Z 2024-09-23T21:32:01Z Author&#160;Thanki, Rohit. author. (orcid)0000-0002-0645-6266&#160;Borra, Surekha. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93311-5">https://doi.org/10.1007/978-3-319-93311-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Women Securing the Future with TIPPSS for IoT Trust, Identity, Privacy, Protection, Safety, Security for the Internet of Things ent://SD_ILS/0/SD_ILS:484904 2024-09-23T21:32:01Z 2024-09-23T21:32:01Z Author&#160;Hudson, Florence D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-15705-0">https://doi.org/10.1007/978-3-030-15705-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook on soft computing for video surveillance ent://SD_ILS/0/SD_ILS:290796 2024-09-23T21:32:01Z 2024-09-23T21:32:01Z Author&#160;Pal, Sankar K.&#160;Petrosino, Alfredo.&#160;Maddalena, Lucia.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439856857">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>