Biometrics, Computer Security Systems and Artificial Intelligence Applications (eBook)

eBook Download: PDF
2007 | 2006
XII, 342 Seiten
Springer US (Verlag)
978-0-387-36503-9 (ISBN)

Lese- und Medienproben

Biometrics, Computer Security Systems and Artificial Intelligence Applications -
Systemvoraussetzungen
213,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book presents the most recent achievements in some rapidly developing fields within Computer Science. This includes the very latest research in biometrics and computer security systems, and descriptions of the latest inroads in artificial intelligence applications. The book contains over 30 articles by well-known scientists and engineers. The articles are extended versions of works introduced at the ACS-CISIM 2005 conference.


The book to which I was asked by the editors to write a foreword is an interesting collection of contributions. It presents the extended versions of the authors' works already introduced at the International Multi-Conference on Advanced Computer Information and Security Systems ACS-CISIM 2005. These contributions had already been reviewed once before the conference for presentation at the conference while some of them passed another selection to be prepared in their current versions for this book. I am convinced the book will be of help to the researchers in the field of Computer Methods in Biometrics, Security Systems and Artificial Intelligence. They would find the contributions of other researchers of real benefit to them. I would encourage those who have the book in hands to read it. Professor Andrzej Salwicki Faculty of Mathematics, Informatics and Mechanics Warsaw University, Poland ACKNOWLEDGEMENTS The editors are thankfUl to all contributors whose works have proved to be of great interest to all participants of the International Conference ACS-CISIM, which was held in Elk, Poland in summer 2005. We also are greatly indebted to the Invited Speakers for their really worth listening and reading keynote talks.

FOREWORD 5
ACKNOWLEDGEMENTS 6
INTRODUCTION 7
TABLE OF CONTENTS 9
IMAGE ANALYSIS AND BIOMETRICS 12
Image Filtration and Feature Extraction for Face Recognition 13
Visualization of Some Multi-Class Erosion Data Using GDA and Supervised SOM 23
Wavelet Transform in Face Recognition 33
Method of Speech Recognition and Speaker Identification using Audio- Visual of Polish Speech and Hidden Markov Models 54
Synthesis of Codebooks with Perceptually Monitored Structure for Multiband CELP- Coders 65
The Color Information as a Feature for Postage Stamps Recognition 76
Iris Shape Evaluation in Face Image with Simple Background 86
Experimental Algorithm for Characteristic Points Evaluation in Static Images of Signatures 96
COMPUTER SECURITY SYSTEMS 106
Parallelization of Standard Modes of Operation for Symmetric Key Block Ciphers 107
On Differential and Linear Approximation of S- box Functions 117
Random Generation of S- Boxes for Block Ciphers 127
Problems of Sending Sensitive Information 142
Hash Chaining for Authenticated Data Structures Freshness Checking 160
stream Cipher Keys Generation with Low Power Consumption Based on LFSR 170
The Quality of Obfuscation and Obfuscation Techniques 179
ARTIFICIAL INTELLIGENCE AND APPLICATIONS 187
Capability and Functionings: A Fuzzy Way to Measure Interaction between Father and Child 188
Remarks on Computer Simulations 199
Can a Negative Selection Detect an Extremely few Non- self among Enormous Amount of Self Cells? 219
An Average Length of Computations of Normalized Probabilistic Algorithms 229
A Marine Environment Simulator for Testing Ship Control Systems in Dangerous Situations 239
Image Enhancement and Image Half-toning Using Fluid Particles Physics Dynamics 249
Tandem Models with Blocking in the Computer Subnetworks Performance Analysis 261
Interchangeable Strategies in Games without Side Payments on the Base of Uncertain Information on Resources 270
Properties of Morphological Operators Applied to Analysis of ECG Signals 280
Input's Significance Evaluation in a Multi Input- Variable System 290
Calculating the Fractal Dimension of River Basins, Comparison of Several Methods 300
Automatic Management of Tele- Interpretation Knowledge in a Wearable Diagnostic Device 311
Evaluation of Clusters Quality in Artificial Immune Clustering System - SArlS 322
Convergence Analysis of the Boundary Geometry Identification Obtained by Genetic Algorithms in the PIES 331
INDEX 339

Erscheint lt. Verlag 11.1.2007
Zusatzinfo XII, 342 p.
Verlagsort New York
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Naturwissenschaften Biologie
Technik
Schlagworte algorithms • Ambient Intelligence • Artificial Intelligence • biometrics • codebooks • Cognition • content based image retrieval • Cooperative games • E-Learning • face recognition • feature extraction • fractal dimension • fuzzy expert system • Genetic Algorithm • Genetic algorithms • hash chaining • Hidden Markov Model • Image Analysis • image filtration • Information • iris shape evaluation • iterative probabilistic algorithms • key block ciphers • Knowledge • Monitor • multiband CELP-Coders • obfuscation techniques • Performance • psychoacoustics • Public Key Infrastructure • Racter • s-box functions • signature recognition • Simulation • Speech Recognition • ubiquitous computing • Visualization • wavelet transforms
ISBN-10 0-387-36503-6 / 0387365036
ISBN-13 978-0-387-36503-9 / 9780387365039
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 16,9 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99