| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA990003072750403321 |
|
|
Titolo |
L'etica protestante e lo spirito del capitalismo / Max Weber |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[7. ed.] |
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Locazione |
|
|
|
|
|
|
Collocazione |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
[Tit. orig.: Die protestantische Ethik und der Geist des Kapitalismus] |
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910810218803321 |
|
|
Titolo |
Food oral processing : fundamentals of eating and sensory perception / / edited by Jianshe Chen, Lina Engelen |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Chichester, U.K., : Wiley Blackwell, 2012 |
|
|
|
|
|
|
|
ISBN |
|
1-283-44912-9 |
9786613449122 |
1-4443-6094-9 |
1-4443-6091-4 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (412 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
ChenJianshe <1961-> |
EngelenLina |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Ingestion |
Drinking (Physiology) |
Food habits |
Taste |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
pt. 1. Oral anatomy and physiology -- pt. 2. Food oral management -- pt. 3. Food oral processing and sensory perception -- pt. 4. Principles and practices of instrumental characterisation for eating and sensory perception studies -- pt. 5. Applications and new product developments. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This volume provides an overview of the latest research findings on the physics, physiology, and psychology of food oral consumption, as well as the experimental techniques available for food oral studies. Coverage includes the main physical and physiological functionalities of the mouth; the location and functionalities of various oral receptors; the main sequences of eating and drinking, and the concomitant food disintegration and destabilisation. Chapters also explain oral processing and its relation to flavour release and texture perception, and there is an introduction to the principles o |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910915784703321 |
|
|
Autore |
Chatterjee Amit |
|
|
Titolo |
Biometric Presentation Attack Detection : Towards Securing Biometric Authentication Systems |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Bristol : , : Institute of Physics Publishing, , 2023 |
|
©2023 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (229 pages) |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Soggetti |
|
Biometric identification |
Security systems |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Intro -- Acknowledgements -- Author biography -- Amit Chatterjee -- List of acronyms -- Chapter Biometrics -- 1.1 Introduction -- 1.2 Types of biometrics -- 1.2.1 Physiological identifiers -- 1.2.2 Behavioral identifiers -- 1.3 Applications -- 1.3.1 Generic applications -- 1.3.2 Specific applications -- 1.4 Biometrics authentication architecture -- 1.5 ISO standards -- 1.6 Databases -- References -- Chapter Presentation attack detection in biometrics -- 2.1 Introduction -- 2.2 Historical survey -- 2.3 Types of presentation attacks -- 2.4 Preparation of spoofed specimen -- 2.4.1 2D fake -- 2.4.2 3D fake -- 2.5 Existing PA detection technologies -- 2.6 International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) standards -- 2.7 Databases -- References -- Chapter Fringe projection-based secure biometrics -- 3.1 Introduction -- 3.2 Theory -- 3.2.1 Basic configuration -- 3.2.2 Calibration -- 3.3 Processing strategy -- 3.3.1 Phase shifting -- 3.3.2 Fourier transform -- 3.3.3 Unwrapping -- 3.4 Experiments and results -- 3.4.1 Fingerprint -- 3.4.2 Palmprint -- 3.4.3 Face -- 3.4.4 Photo and video attack -- 3.4.5 Ear: a simulation experiment -- 3.5 Discussion -- References -- Chapter Biometric presentation attack detection using speckle metrology -- 4.1 Introduction -- 4.2 Theory -- 4.2.1 Speckle -- 4.2.2 Biospeckle -- 4.2.3 Quality parameters -- 4.3 Processing |
|
|
|
|
|
|
|
|
|
|
|
strategy -- 4.3.1 Numerical indexing -- 4.3.2 Visual analysis -- 4.3.3 Automated region of interest (ROI) selection -- 4.4 Experimental and results -- 4.4.1 Generalized configuration -- 4.4.2 Fingerprint -- 4.4.3 Retina -- 4.4.4 Palmprint and face -- 4.5 Discussion -- References -- Chapter Presentation attack detection using fringe projection and biospeckle analysis -- 5.1 Introduction -- 5.2 Processing strategies -- 5.2.1 Fringe projection. |
5.2.2 Biospeckle analysis -- 5.3 Experimental descriptions and results -- 5.3.1 Fingerprint anti-spoofing -- 5.3.2 Palmprint anti-spoofing -- 5.3.3 Ear anti-spoofing -- 5.4 Discussion -- References -- Chapter Presentation attack detection using optical coherence tomography -- 6.1 Introduction -- 6.2 Theory -- 6.2.1 Skin physiology -- 6.2.2 OCT imaging -- 6.3 Experimental descriptions and results -- 6.3.1 TD-OCT-based PA detection -- 6.3.2 FD-OCT-based PA detection -- 6.3.3 FF-OCT-based PA detection -- 6.4 Discussion -- 6.4.1 Balancing sensitivity and imaging speed -- References -- Chapter Thermography-based presentation attack detection -- 7.1 Introduction -- 7.2 Theory -- 7.3 Experiments and results -- 7.3.1 Thermal-only approach -- 7.3.2 Multispectral approach -- 7.4 Discussion -- References -- Chapter Miscellaneous -- 8.1 Introduction -- 8.2 Topography-based techniques -- 8.2.1 Color texture analysis -- 8.2.2 Motion detection -- 8.2.3 Laser triangulation -- 8.2.4 Stereo vision -- 8.3 Internal property-based techniques -- 8.3.1 Pulse oximetry -- 8.3.2 Ultrasound sensor -- 8.3.3 Impedance-based technique -- 8.4 Hybrid techniques -- 8.4.1 Fringe projection thermography -- 8.4.2 Multimodal biometrics -- References -- Chapter Patents: basics and selected descriptions -- 9.1 Introduction -- 9.2 Patent process flow -- 9.3 Criteria for patent grant -- 9.4 Selected patents for biometric presentation attack detection -- 9.5 Patentability-an example -- References -- Chapter Preliminary experiments and research ideas -- 10.1 Introduction -- 10.2 Fringe projection -- 10.3 Speckle metrology -- 10.4 Speckle projection -- 10.5 Multiwavelength analysis -- 10.6 Extreme attacks -- References. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book discusses anti-spoofing techniques in detail. For each anti-spoofing technology, different experimental configurations, processing strategies, scope for generalization, advantages and limitations are detailed. The book also considers applicability of artificial intelligence techniques for automated biometric spoof detection, and future scope of research in this direction. |
|
|
|
|
|
|
|
| |