Advances in Information Processing and Protection (eBook, PDF)
213,99 €
inkl. MwSt.
Sofort per Download lieferbar
Advances in Information Processing and Protection (eBook, PDF)
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The Computer Science is relatively new field which is developing very fast not only because due to the huge interest of scientists and the market request, but also because this science has created possibilities for people of investigation and solved many problems that some time ago seemed to be insolvable. Such problems had only been described in science fiction novels, like underwater journeys of captain Nemo described by Jules Verne in XIX century. At present, various human dreams are successively becoming reality exactly as the underwater journeys became possible in the XX century. The…mehr
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 11.64MB
- Upload möglich
Andere Kunden interessierten sich auch für
- Aggelos KiayiasEncryption for Digital Content (eBook, PDF)96,29 €
- Song Y. YanCryptanalytic Attacks on RSA (eBook, PDF)96,29 €
- Song Y. YanPrimality Testing and Integer Factorization in Public-Key Cryptography (eBook, PDF)149,79 €
- Jintai DingMultivariate Public Key Cryptosystems (eBook, PDF)117,69 €
- Thomas BaigneresA Classical Introduction to Cryptography Exercise Book (eBook, PDF)46,00 €
- Jonathan KatzDigital Signatures (eBook, PDF)96,29 €
- Christopher KruegelIntrusion Detection and Correlation (eBook, PDF)96,29 €
-
-
-
The Computer Science is relatively new field which is developing very fast not only because due to the huge interest of scientists and the market request, but also because this science has created possibilities for people of investigation and solved many problems that some time ago seemed to be insolvable. Such problems had only been described in science fiction novels, like underwater journeys of captain Nemo described by Jules Verne in XIX century. At present, various human dreams are successively becoming reality exactly as the underwater journeys became possible in the XX century. The proposed book gives you a view of the progress in such domains of Computer Science as Artificial Intelligence, Biometrics, Security of Information Technology, Computer Information Systems and Industrial Management. The works contained in the book describe the newest investigation results of devoted scientists from Europe and Asia. The book is written in a hard scientific language. It is really valuable and I am sure it will deliver you many scientific benefits. Professor Andrzej Piegat Szczecin University of Technology Faculty of Computer Science and Information Systems and University of Szczecin, Poland Faculty of Economic Sciences and Management ACKNOWLEDGMENTS We would like to express our indebtedness to all professors and IPC Members who took upon themselves the task of reviewing the papers presented in this book. They are:
Produktdetails
- Produktdetails
- Verlag: Springer US
- Erscheinungstermin: 29. September 2007
- Englisch
- ISBN-13: 9780387731377
- Artikelnr.: 37288184
- Verlag: Springer US
- Erscheinungstermin: 29. September 2007
- Englisch
- ISBN-13: 9780387731377
- Artikelnr.: 37288184
Artificial Intelligence.- Humatronics and RT-Middleware.- A Fuzzy Way to Measure Quality of Work in a Multidimensional Perspective.- Application of the Peano Curve for the Robot Trajectory Generating.- On Some Properties of the B-Cell Algorithm in Non-Stationary Environments.- The Grouping of Valuations in Probabilistic Algorithms.- Inverted Lists Compression Using Contextual Information.- Hybrid Intelligent Diagnosis Approaches: Analysis and Comparison under a Biomedicine Application.- Predicting Incomplete Data on the Basis of Non Symmetric Similarity Relation.- Methods of Designing and System Analysis of Fast Neural Networks and Linear Tunable Transformations.- Minimal Coverage of Investigated Object when Seeking for its Fractal Dimension.- Networked Robots Personal Tastes Acquisition and Sharing.- Reduction of Rules of a Fuzzy Model with a Chain Model.- Singleton Representation of Fuzzy Set for Computing Fuzzy Model Response for Fuzzy Inputs.- Tuning of Parameters Backstepping Ship Course Controller by Genetic Algorithm.- Visualization of Five Erosion Risk Classes using Kernel Discriminants.- Computer Security and Safety.- Multiple Error Detection in Substitution Blocks for Block Ciphers.- Parallelization Method of Encryption Algorithms.- When a Family of Iris Flower is Normal, Then are Others Abnormal?.- Strong Boolean Functions with Compact ANF Representation.- Visual Cryptography Methods as a Source of Trustworthiness for the Signature Creation and Verification Systems.- Neural Network as a Programmable Block Cipher.- On Intermediate Evaluation of Block Ciphers.- Development of Concealing the Purpose of Processing for Programs in a Distributed Computing Environment.- Covert Channel for Improving VoIP Security.- Cryptanalysis of Chaotic Product Cipher.- Embeddingof Stego–Messages in Monochrome Images on the Base of Rank Filtering.- Image Analysis, Graphics and Biometrics.- JPEG 2000 Image Coding Standard - A Review and Applications.- New Experiments on Word Recognition Without Segmentation.- Signature Verification by View-Based Feature Extractor and DTW Classifier.- Increasing Performance of Fingerprint Recognition Systems Using Reconstruction of Ridge Lines Methods.- Design and Prototyping of an Industrial Fault Clustering System Combining Image Processing and Artificial Neural Network Based Approaches.- Image Pre-classification for Biometrics Identification Systems.- Application of Improved Projection Method to Binary Images.- Computer Simulation and Data Analysis.- A Consideration of Processor Utilization on Multi-Processor System.- Reliability of Node Information on Autonomous Load Distribution Method.- Methodology of Developing Computer-Based Training Systems for Operators of Dynamic Objects.- Algorithms of Identification of Multi-connected Boundary Geometry and Material Parameters in Problems Described by Navier-Lame Equation Using the PIES.- Analysis of an Open Linked Series Three-station Network with Blocking.- Hyperplane Method Implementation for Loops Parallelization in the .NET Environment.- On a Nonlinear Production-Inventory Problem.
Artificial Intelligence.- Humatronics and RT-Middleware.- A Fuzzy Way to Measure Quality of Work in a Multidimensional Perspective.- Application of the Peano Curve for the Robot Trajectory Generating.- On Some Properties of the B-Cell Algorithm in Non-Stationary Environments.- The Grouping of Valuations in Probabilistic Algorithms.- Inverted Lists Compression Using Contextual Information.- Hybrid Intelligent Diagnosis Approaches: Analysis and Comparison under a Biomedicine Application.- Predicting Incomplete Data on the Basis of Non Symmetric Similarity Relation.- Methods of Designing and System Analysis of Fast Neural Networks and Linear Tunable Transformations.- Minimal Coverage of Investigated Object when Seeking for its Fractal Dimension.- Networked Robots Personal Tastes Acquisition and Sharing.- Reduction of Rules of a Fuzzy Model with a Chain Model.- Singleton Representation of Fuzzy Set for Computing Fuzzy Model Response for Fuzzy Inputs.- Tuning of Parameters Backstepping Ship Course Controller by Genetic Algorithm.- Visualization of Five Erosion Risk Classes using Kernel Discriminants.- Computer Security and Safety.- Multiple Error Detection in Substitution Blocks for Block Ciphers.- Parallelization Method of Encryption Algorithms.- When a Family of Iris Flower is Normal, Then are Others Abnormal?.- Strong Boolean Functions with Compact ANF Representation.- Visual Cryptography Methods as a Source of Trustworthiness for the Signature Creation and Verification Systems.- Neural Network as a Programmable Block Cipher.- On Intermediate Evaluation of Block Ciphers.- Development of Concealing the Purpose of Processing for Programs in a Distributed Computing Environment.- Covert Channel for Improving VoIP Security.- Cryptanalysis of Chaotic Product Cipher.- Embeddingof Stego-Messages in Monochrome Images on the Base of Rank Filtering.- Image Analysis, Graphics and Biometrics.- JPEG 2000 Image Coding Standard - A Review and Applications.- New Experiments on Word Recognition Without Segmentation.- Signature Verification by View-Based Feature Extractor and DTW Classifier.- Increasing Performance of Fingerprint Recognition Systems Using Reconstruction of Ridge Lines Methods.- Design and Prototyping of an Industrial Fault Clustering System Combining Image Processing and Artificial Neural Network Based Approaches.- Image Pre-classification for Biometrics Identification Systems.- Application of Improved Projection Method to Binary Images.- Computer Simulation and Data Analysis.- A Consideration of Processor Utilization on Multi-Processor System.- Reliability of Node Information on Autonomous Load Distribution Method.- Methodology of Developing Computer-Based Training Systems for Operators of Dynamic Objects.- Algorithms of Identification of Multi-connected Boundary Geometry and Material Parameters in Problems Described by Navier-Lame Equation Using the PIES.- Analysis of an Open Linked Series Three-station Network with Blocking.- Hyperplane Method Implementation for Loops Parallelization in the .NET Environment.- On a Nonlinear Production-Inventory Problem.
Artificial Intelligence.- Humatronics and RT-Middleware.- A Fuzzy Way to Measure Quality of Work in a Multidimensional Perspective.- Application of the Peano Curve for the Robot Trajectory Generating.- On Some Properties of the B-Cell Algorithm in Non-Stationary Environments.- The Grouping of Valuations in Probabilistic Algorithms.- Inverted Lists Compression Using Contextual Information.- Hybrid Intelligent Diagnosis Approaches: Analysis and Comparison under a Biomedicine Application.- Predicting Incomplete Data on the Basis of Non Symmetric Similarity Relation.- Methods of Designing and System Analysis of Fast Neural Networks and Linear Tunable Transformations.- Minimal Coverage of Investigated Object when Seeking for its Fractal Dimension.- Networked Robots Personal Tastes Acquisition and Sharing.- Reduction of Rules of a Fuzzy Model with a Chain Model.- Singleton Representation of Fuzzy Set for Computing Fuzzy Model Response for Fuzzy Inputs.- Tuning of Parameters Backstepping Ship Course Controller by Genetic Algorithm.- Visualization of Five Erosion Risk Classes using Kernel Discriminants.- Computer Security and Safety.- Multiple Error Detection in Substitution Blocks for Block Ciphers.- Parallelization Method of Encryption Algorithms.- When a Family of Iris Flower is Normal, Then are Others Abnormal?.- Strong Boolean Functions with Compact ANF Representation.- Visual Cryptography Methods as a Source of Trustworthiness for the Signature Creation and Verification Systems.- Neural Network as a Programmable Block Cipher.- On Intermediate Evaluation of Block Ciphers.- Development of Concealing the Purpose of Processing for Programs in a Distributed Computing Environment.- Covert Channel for Improving VoIP Security.- Cryptanalysis of Chaotic Product Cipher.- Embeddingof Stego–Messages in Monochrome Images on the Base of Rank Filtering.- Image Analysis, Graphics and Biometrics.- JPEG 2000 Image Coding Standard - A Review and Applications.- New Experiments on Word Recognition Without Segmentation.- Signature Verification by View-Based Feature Extractor and DTW Classifier.- Increasing Performance of Fingerprint Recognition Systems Using Reconstruction of Ridge Lines Methods.- Design and Prototyping of an Industrial Fault Clustering System Combining Image Processing and Artificial Neural Network Based Approaches.- Image Pre-classification for Biometrics Identification Systems.- Application of Improved Projection Method to Binary Images.- Computer Simulation and Data Analysis.- A Consideration of Processor Utilization on Multi-Processor System.- Reliability of Node Information on Autonomous Load Distribution Method.- Methodology of Developing Computer-Based Training Systems for Operators of Dynamic Objects.- Algorithms of Identification of Multi-connected Boundary Geometry and Material Parameters in Problems Described by Navier-Lame Equation Using the PIES.- Analysis of an Open Linked Series Three-station Network with Blocking.- Hyperplane Method Implementation for Loops Parallelization in the .NET Environment.- On a Nonlinear Production-Inventory Problem.
Artificial Intelligence.- Humatronics and RT-Middleware.- A Fuzzy Way to Measure Quality of Work in a Multidimensional Perspective.- Application of the Peano Curve for the Robot Trajectory Generating.- On Some Properties of the B-Cell Algorithm in Non-Stationary Environments.- The Grouping of Valuations in Probabilistic Algorithms.- Inverted Lists Compression Using Contextual Information.- Hybrid Intelligent Diagnosis Approaches: Analysis and Comparison under a Biomedicine Application.- Predicting Incomplete Data on the Basis of Non Symmetric Similarity Relation.- Methods of Designing and System Analysis of Fast Neural Networks and Linear Tunable Transformations.- Minimal Coverage of Investigated Object when Seeking for its Fractal Dimension.- Networked Robots Personal Tastes Acquisition and Sharing.- Reduction of Rules of a Fuzzy Model with a Chain Model.- Singleton Representation of Fuzzy Set for Computing Fuzzy Model Response for Fuzzy Inputs.- Tuning of Parameters Backstepping Ship Course Controller by Genetic Algorithm.- Visualization of Five Erosion Risk Classes using Kernel Discriminants.- Computer Security and Safety.- Multiple Error Detection in Substitution Blocks for Block Ciphers.- Parallelization Method of Encryption Algorithms.- When a Family of Iris Flower is Normal, Then are Others Abnormal?.- Strong Boolean Functions with Compact ANF Representation.- Visual Cryptography Methods as a Source of Trustworthiness for the Signature Creation and Verification Systems.- Neural Network as a Programmable Block Cipher.- On Intermediate Evaluation of Block Ciphers.- Development of Concealing the Purpose of Processing for Programs in a Distributed Computing Environment.- Covert Channel for Improving VoIP Security.- Cryptanalysis of Chaotic Product Cipher.- Embeddingof Stego-Messages in Monochrome Images on the Base of Rank Filtering.- Image Analysis, Graphics and Biometrics.- JPEG 2000 Image Coding Standard - A Review and Applications.- New Experiments on Word Recognition Without Segmentation.- Signature Verification by View-Based Feature Extractor and DTW Classifier.- Increasing Performance of Fingerprint Recognition Systems Using Reconstruction of Ridge Lines Methods.- Design and Prototyping of an Industrial Fault Clustering System Combining Image Processing and Artificial Neural Network Based Approaches.- Image Pre-classification for Biometrics Identification Systems.- Application of Improved Projection Method to Binary Images.- Computer Simulation and Data Analysis.- A Consideration of Processor Utilization on Multi-Processor System.- Reliability of Node Information on Autonomous Load Distribution Method.- Methodology of Developing Computer-Based Training Systems for Operators of Dynamic Objects.- Algorithms of Identification of Multi-connected Boundary Geometry and Material Parameters in Problems Described by Navier-Lame Equation Using the PIES.- Analysis of an Open Linked Series Three-station Network with Blocking.- Hyperplane Method Implementation for Loops Parallelization in the .NET Environment.- On a Nonlinear Production-Inventory Problem.