Biometrics, Computer Security Systems and Artificial Intelligence Applications (eBook, PDF)
213,99 €
inkl. MwSt.
Sofort per Download lieferbar
Biometrics, Computer Security Systems and Artificial Intelligence Applications (eBook, PDF)
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The book to which I was asked by the editors to write a foreword is an interesting collection of contributions. It presents the extended versions of the authors' works already introduced at the International Multi-Conference on Advanced Computer Information and Security Systems ACS-CISIM 2005. These contributions had already been reviewed once before the conference for presentation at the conference while some of them passed another selection to be prepared in their current versions for this book. I am convinced the book will be of help to the researchers in the field of Computer Methods in…mehr
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 15.73MB
- Upload möglich
Andere Kunden interessierten sich auch für
- Stefan AxelssonUnderstanding Intrusion Detection through Visualization (eBook, PDF)96,29 €
- Andreas UhlImage and Video Encryption (eBook, PDF)96,29 €
- Debra CookCryptoGraphics (eBook, PDF)96,29 €
- Methods and Procedures for the Verification and Validation of Artificial Neural Networks (eBook, PDF)96,29 €
- Douglas W. FryeNetwork Security Policies and Procedures (eBook, PDF)96,29 €
- Quality Of Protection (eBook, PDF)213,99 €
- Borko FurhtMultimedia Encryption and Watermarking (eBook, PDF)149,79 €
-
-
-
The book to which I was asked by the editors to write a foreword is an interesting collection of contributions. It presents the extended versions of the authors' works already introduced at the International Multi-Conference on Advanced Computer Information and Security Systems ACS-CISIM 2005. These contributions had already been reviewed once before the conference for presentation at the conference while some of them passed another selection to be prepared in their current versions for this book. I am convinced the book will be of help to the researchers in the field of Computer Methods in Biometrics, Security Systems and Artificial Intelligence. They would find the contributions of other researchers of real benefit to them. I would encourage those who have the book in hands to read it. Professor Andrzej Salwicki Faculty of Mathematics, Informatics and Mechanics Warsaw University, Poland ACKNOWLEDGEMENTS The editors are thankfUl to all contributors whose works have proved to be of great interest to all participants of the International Conference ACS-CISIM, which was held in Elk, Poland in summer 2005. We also are greatly indebted to the Invited Speakers for their really worth listening and reading keynote talks.
Produktdetails
- Produktdetails
- Verlag: Springer US
- Erscheinungstermin: 11. Januar 2007
- Englisch
- ISBN-13: 9780387365039
- Artikelnr.: 37288222
- Verlag: Springer US
- Erscheinungstermin: 11. Januar 2007
- Englisch
- ISBN-13: 9780387365039
- Artikelnr.: 37288222
Khalid Saeed, Bialystok Technical University, Bialystock, Poland / Jerzy Pejas, Szczecin University of Technology, Szczecin, Poland / Romuald Mosdorf, University of Finance and Management in Bialystok, Poland
Image Analysis and Biometrics.- Image Filtration and Feature Extraction for Face Recognition.- Visualization of Some Multi-Class Erosion Data Using GDA and Supervised SOM.- Wavelet Transform in Face Recognition.- Content-Based Image Retrieval — A Survey.- Method of Speech Recognition and Speaker Identification using Audio-Visual of Polish Speech and Hidden Markov Models.- Synthesis of Codebooks with Perceptually Monitored Structure for Multiband CELP-Coders.- The Color Information as a Feature for Postage Stamps Recognition.- Iris Shape Evaluation in Face Image with Simple Background.- Experimental Algorithm for Characteristic Points Evaluation in Static Images of Signatures.- Computer Security Systems.- Parallelization of Standard Modes of Operation for Symmetric Key Block Ciphers.- On Differential and Linear Approximation of S-box Functions.- Random Generation of S-Boxes for Block Ciphers.- Problems of Sending Sensitive Information.- Hash Chaining for Authenticated Data Structures Freshness Checking.- Stream Cipher Keys Generation with Low Power Consumption Based on LFSR.- The Quality of Obfuscation and Obfuscation Techniques.- Artificial Intelligence and Applications.- Capability and Functionings: A Fuzzy Way to Measure Interaction between Father and Child.- Remarks on Computer Simulations.- Analysis of E-learning System Dynamics.- Can a Negative Selection Detect an Extremely few Non-self among Enormous Amount of Self Cells?.- An Average Length of Computations of Normalized Probabilistic Algorithms.- A Marine Environment Simulator for Testing Ship Control Systems in Dangerous Situations.- Image Enhancement and Image Half-toning Using Fluid Particles Physics Dynamics.- Tandem Models with Blocking in the Computer Subnetworks Performance Analysis.- InterchangeableStrategies in Games without Side Payments on the Base of Uncertain Information on Resources.- Properties of Morphological Operators Applied to Analysis of ECG Signals.- Input’s Significance Evaluation in a Multi Input-Variable System.- Calculating the Fractal Dimension of River Basins, Comparison of Several Methods.- Automatic Management of Tele-Interpretation Knowledge in a Wearable Diagnostic Device.- Evaluation of Clusters Quality in Artificial Immune Clustering System - SArIS.- Convergence Analysis of the Boundary Geometry Identification Obtained by Genetic Algorithms in the PIES.
Image Analysis and Biometrics.- Image Filtration and Feature Extraction for Face Recognition.- Visualization of Some Multi-Class Erosion Data Using GDA and Supervised SOM.- Wavelet Transform in Face Recognition.- Content-Based Image Retrieval - A Survey.- Method of Speech Recognition and Speaker Identification using Audio-Visual of Polish Speech and Hidden Markov Models.- Synthesis of Codebooks with Perceptually Monitored Structure for Multiband CELP-Coders.- The Color Information as a Feature for Postage Stamps Recognition.- Iris Shape Evaluation in Face Image with Simple Background.- Experimental Algorithm for Characteristic Points Evaluation in Static Images of Signatures.- Computer Security Systems.- Parallelization of Standard Modes of Operation for Symmetric Key Block Ciphers.- On Differential and Linear Approximation of S-box Functions.- Random Generation of S-Boxes for Block Ciphers.- Problems of Sending Sensitive Information.- Hash Chaining for Authenticated Data Structures Freshness Checking.- Stream Cipher Keys Generation with Low Power Consumption Based on LFSR.- The Quality of Obfuscation and Obfuscation Techniques.- Artificial Intelligence and Applications.- Capability and Functionings: A Fuzzy Way to Measure Interaction between Father and Child.- Remarks on Computer Simulations.- Analysis of E-learning System Dynamics.- Can a Negative Selection Detect an Extremely few Non-self among Enormous Amount of Self Cells?.- An Average Length of Computations of Normalized Probabilistic Algorithms.- A Marine Environment Simulator for Testing Ship Control Systems in Dangerous Situations.- Image Enhancement and Image Half-toning Using Fluid Particles Physics Dynamics.- Tandem Models with Blocking in the Computer Subnetworks Performance Analysis.- InterchangeableStrategies in Games without Side Payments on the Base of Uncertain Information on Resources.- Properties of Morphological Operators Applied to Analysis of ECG Signals.- Input's Significance Evaluation in a Multi Input-Variable System.- Calculating the Fractal Dimension of River Basins, Comparison of Several Methods.- Automatic Management of Tele-Interpretation Knowledge in a Wearable Diagnostic Device.- Evaluation of Clusters Quality in Artificial Immune Clustering System - SArIS.- Convergence Analysis of the Boundary Geometry Identification Obtained by Genetic Algorithms in the PIES.
Image Analysis and Biometrics.- Image Filtration and Feature Extraction for Face Recognition.- Visualization of Some Multi-Class Erosion Data Using GDA and Supervised SOM.- Wavelet Transform in Face Recognition.- Content-Based Image Retrieval — A Survey.- Method of Speech Recognition and Speaker Identification using Audio-Visual of Polish Speech and Hidden Markov Models.- Synthesis of Codebooks with Perceptually Monitored Structure for Multiband CELP-Coders.- The Color Information as a Feature for Postage Stamps Recognition.- Iris Shape Evaluation in Face Image with Simple Background.- Experimental Algorithm for Characteristic Points Evaluation in Static Images of Signatures.- Computer Security Systems.- Parallelization of Standard Modes of Operation for Symmetric Key Block Ciphers.- On Differential and Linear Approximation of S-box Functions.- Random Generation of S-Boxes for Block Ciphers.- Problems of Sending Sensitive Information.- Hash Chaining for Authenticated Data Structures Freshness Checking.- Stream Cipher Keys Generation with Low Power Consumption Based on LFSR.- The Quality of Obfuscation and Obfuscation Techniques.- Artificial Intelligence and Applications.- Capability and Functionings: A Fuzzy Way to Measure Interaction between Father and Child.- Remarks on Computer Simulations.- Analysis of E-learning System Dynamics.- Can a Negative Selection Detect an Extremely few Non-self among Enormous Amount of Self Cells?.- An Average Length of Computations of Normalized Probabilistic Algorithms.- A Marine Environment Simulator for Testing Ship Control Systems in Dangerous Situations.- Image Enhancement and Image Half-toning Using Fluid Particles Physics Dynamics.- Tandem Models with Blocking in the Computer Subnetworks Performance Analysis.- InterchangeableStrategies in Games without Side Payments on the Base of Uncertain Information on Resources.- Properties of Morphological Operators Applied to Analysis of ECG Signals.- Input’s Significance Evaluation in a Multi Input-Variable System.- Calculating the Fractal Dimension of River Basins, Comparison of Several Methods.- Automatic Management of Tele-Interpretation Knowledge in a Wearable Diagnostic Device.- Evaluation of Clusters Quality in Artificial Immune Clustering System - SArIS.- Convergence Analysis of the Boundary Geometry Identification Obtained by Genetic Algorithms in the PIES.
Image Analysis and Biometrics.- Image Filtration and Feature Extraction for Face Recognition.- Visualization of Some Multi-Class Erosion Data Using GDA and Supervised SOM.- Wavelet Transform in Face Recognition.- Content-Based Image Retrieval - A Survey.- Method of Speech Recognition and Speaker Identification using Audio-Visual of Polish Speech and Hidden Markov Models.- Synthesis of Codebooks with Perceptually Monitored Structure for Multiband CELP-Coders.- The Color Information as a Feature for Postage Stamps Recognition.- Iris Shape Evaluation in Face Image with Simple Background.- Experimental Algorithm for Characteristic Points Evaluation in Static Images of Signatures.- Computer Security Systems.- Parallelization of Standard Modes of Operation for Symmetric Key Block Ciphers.- On Differential and Linear Approximation of S-box Functions.- Random Generation of S-Boxes for Block Ciphers.- Problems of Sending Sensitive Information.- Hash Chaining for Authenticated Data Structures Freshness Checking.- Stream Cipher Keys Generation with Low Power Consumption Based on LFSR.- The Quality of Obfuscation and Obfuscation Techniques.- Artificial Intelligence and Applications.- Capability and Functionings: A Fuzzy Way to Measure Interaction between Father and Child.- Remarks on Computer Simulations.- Analysis of E-learning System Dynamics.- Can a Negative Selection Detect an Extremely few Non-self among Enormous Amount of Self Cells?.- An Average Length of Computations of Normalized Probabilistic Algorithms.- A Marine Environment Simulator for Testing Ship Control Systems in Dangerous Situations.- Image Enhancement and Image Half-toning Using Fluid Particles Physics Dynamics.- Tandem Models with Blocking in the Computer Subnetworks Performance Analysis.- InterchangeableStrategies in Games without Side Payments on the Base of Uncertain Information on Resources.- Properties of Morphological Operators Applied to Analysis of ECG Signals.- Input's Significance Evaluation in a Multi Input-Variable System.- Calculating the Fractal Dimension of River Basins, Comparison of Several Methods.- Automatic Management of Tele-Interpretation Knowledge in a Wearable Diagnostic Device.- Evaluation of Clusters Quality in Artificial Immune Clustering System - SArIS.- Convergence Analysis of the Boundary Geometry Identification Obtained by Genetic Algorithms in the PIES.