Advances in Information Processing and Protection (eBook)
XIV, 460 Seiten
Springer US (Verlag)
978-0-387-73137-7 (ISBN)
This book contains a selection of the best papers given at an international conference on advanced computer systems. The Advanced Computer Systems Conference was held in October 2006, in Miedzyzdroje, Poland. The book is organized into four topical areas: Artificial Intelligence; Computer Security and Safety; Image Analysis, Graphics and Biometrics; and Computer Simulation and Data Analysis.
The Computer Science is relatively new field which is developing very fast not only because due to the huge interest of scientists and the market request, but also because this science has created possibilities for people of investigation and solved many problems that some time ago seemed to be insolvable. Such problems had only been described in science fiction novels, like underwater journeys of captain Nemo described by Jules Verne in XIX century. At present, various human dreams are successively becoming reality exactly as the underwater journeys became possible in the XX century. The proposed book gives you a view of the progress in such domains of Computer Science as Artificial Intelligence, Biometrics, Security of Information Technology, Computer Information Systems and Industrial Management. The works contained in the book describe the newest investigation results of devoted scientists from Europe and Asia. The book is written in a hard scientific language. It is really valuable and I am sure it will deliver you many scientific benefits. Professor Andrzej Piegat Szczecin University of Technology Faculty of Computer Science and Information Systems and University of Szczecin, Poland Faculty of Economic Sciences and Management ACKNOWLEDGMENTS We would like to express our indebtedness to all professors and IPC Members who took upon themselves the task of reviewing the papers presented in this book. They are:
FOREWORD 5
ACKNOWLEDGMENTS 6
INTRODUCTION 7
TABLE OF CONTENTS 8
PART I ARTIFICIAL INTELLIGENCE 11
Humatronics and RT-Middleware 12
A Fuzzy Way to Measure Quality of Work in a Multidimensional Perspective 22
Application of the Peano Curve for the Robot Trajectory Generating 33
On Some Properties of the B-Cell Algorithm in Non- Stationary Environments 43
The Grouping of Valuations in Probabilistic Algorithms 53
Inverted Lists Compression using Contextual Information 62
Hybrid Intelligent Diagnosis Approaches: Analysis and Comparison under a Biomedicine Application 74
Predicting Incomplete Data on the Basis of Non Symmetric Similarity Relation 84
Methods of Designing and System Analysis of Fast Neural Networks and Linear Tunable Transformations 92
Minimal Coverage of Investigated Object when Seeking for its Fractal Dimension 124
Networked Robots Personal Tastes Acquisition and Sharing 136
Reduction of Rules of a Fuzzy Model with a Chain Model 146
Singleton Representation of Fuzzy Set for Computing Fuzzy Model Response for Fuzzy Inputs 156
Tuning of Parameters Backstepping Ship Course Controller by Genetic Algorithm 166
Visualization of Five Erosion Risk Classes using Kernel Discriminants 176
PART II COMPUTER SECURITY AND SAFETY 186
Multiple Error Detection in Substitution Blocks for Block Ciphers 187
Parallelization Method of Encryption Algorithms 197
When a Family of Iris Flower is Normal, Then are Others Abnormal? 211
Strong Boolean Functions with Compact ANF Representation 221
Visual Cryptography Methods as a Source of Trustworthiness for the Signature Creation and Verification Systems 231
Neural Network as a Programmable Block Cipher 246
On Intermediate Evaluation of Block Ciphers 256
Development of Concealing the Purpose of Processing for Programs in a Distributed Computing Environment 267
Covert Channel for Improving VoIP Security 274
Cryptanalysis of Chaotic Product Cipher 284
Embedding of Stego–Messages in Monochrome Images on the Base of Rank Filtering 294
PART III IMAGE ANALYSIS, GRAPHICS AND BIOMETRICS 304
JPEG 2000 IMAGE CODING STANDARD - A REVIEW AND APPLICATIONS 305
New Experiments on Word Recognition Without Segmentation 324
Signature Verification by View-Based Feature Extractor and DTW Classifier 334
Increasing Performance of Fingerprint Recognition Systems using Reconstruction of Ridge Lines Methods 343
Design and Prototyping of an Industrial Fault Clustering System Combining Image Processing and Artificial Neural Network Based Approaches 351
Image Pre-classification for Biometrics Identification Systems 361
Application of Improved Projection Method to Binary Images 371
PART IV COMPUTER SIMULATION AND DATA ANALYSIS 381
A Consideration of Processor Utilization on Multi- Processor System 382
Reliability of Node Information on Autonomous Load Distribution Method 390
Methodology of Developing Computer-Based Training Systems for Operators of Dynamic Objects 398
Algorithms of Identification of Multi-connected Boundary Geometry and Material Parameters in Problems Described by Navier- Lame Equation using the PIES 408
Analysis of an Open Linked Series Three-station Network with Blocking 418
Hyperplane Method Implementation for Loops Parallelization in the . NET Environment 429
On a Nonlinear Production-Inventory Problem 444
INDEX 455
Erscheint lt. Verlag | 29.9.2007 |
---|---|
Zusatzinfo | XIV, 460 p. |
Verlagsort | New York |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Algorithmen | |
Informatik ► Theorie / Studium ► Kryptologie | |
Naturwissenschaften | |
Schlagworte | algorithms • Artificial Intelligence • Automat • autonomous computing • biometrics • Block Ciphers • boolean function • cryptography • Encryption Algorithms • fast neural networks • feature extraction • fingerprint recognition • Fuzzy Models • humatronics • Image Analysis • Information • Logic • probabilistic algorithms • Robotics • signature identification • visual cryptography • VoIP • Word Recognition |
ISBN-10 | 0-387-73137-7 / 0387731377 |
ISBN-13 | 978-0-387-73137-7 / 9780387731377 |
Haben Sie eine Frage zum Produkt? |
Größe: 25,9 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich