Advances in Information Processing and Protection (eBook)

Jerzy Pejas, Khalid Saeed (Herausgeber)

eBook Download: PDF
2007 | 2007
XIV, 460 Seiten
Springer US (Verlag)
978-0-387-73137-7 (ISBN)

Lese- und Medienproben

Advances in Information Processing and Protection -
Systemvoraussetzungen
213,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book contains a selection of the best papers given at an international conference on advanced computer systems. The Advanced Computer Systems Conference was held in October 2006, in Miedzyzdroje, Poland. The book is organized into four topical areas: Artificial Intelligence; Computer Security and Safety; Image Analysis, Graphics and Biometrics; and Computer Simulation and Data Analysis.


The Computer Science is relatively new field which is developing very fast not only because due to the huge interest of scientists and the market request, but also because this science has created possibilities for people of investigation and solved many problems that some time ago seemed to be insolvable. Such problems had only been described in science fiction novels, like underwater journeys of captain Nemo described by Jules Verne in XIX century. At present, various human dreams are successively becoming reality exactly as the underwater journeys became possible in the XX century. The proposed book gives you a view of the progress in such domains of Computer Science as Artificial Intelligence, Biometrics, Security of Information Technology, Computer Information Systems and Industrial Management. The works contained in the book describe the newest investigation results of devoted scientists from Europe and Asia. The book is written in a hard scientific language. It is really valuable and I am sure it will deliver you many scientific benefits. Professor Andrzej Piegat Szczecin University of Technology Faculty of Computer Science and Information Systems and University of Szczecin, Poland Faculty of Economic Sciences and Management ACKNOWLEDGMENTS We would like to express our indebtedness to all professors and IPC Members who took upon themselves the task of reviewing the papers presented in this book. They are:

FOREWORD 5
ACKNOWLEDGMENTS 6
INTRODUCTION 7
TABLE OF CONTENTS 8
PART I ARTIFICIAL INTELLIGENCE 11
Humatronics and RT-Middleware 12
A Fuzzy Way to Measure Quality of Work in a Multidimensional Perspective 22
Application of the Peano Curve for the Robot Trajectory Generating 33
On Some Properties of the B-Cell Algorithm in Non- Stationary Environments 43
The Grouping of Valuations in Probabilistic Algorithms 53
Inverted Lists Compression using Contextual Information 62
Hybrid Intelligent Diagnosis Approaches: Analysis and Comparison under a Biomedicine Application 74
Predicting Incomplete Data on the Basis of Non Symmetric Similarity Relation 84
Methods of Designing and System Analysis of Fast Neural Networks and Linear Tunable Transformations 92
Minimal Coverage of Investigated Object when Seeking for its Fractal Dimension 124
Networked Robots Personal Tastes Acquisition and Sharing 136
Reduction of Rules of a Fuzzy Model with a Chain Model 146
Singleton Representation of Fuzzy Set for Computing Fuzzy Model Response for Fuzzy Inputs 156
Tuning of Parameters Backstepping Ship Course Controller by Genetic Algorithm 166
Visualization of Five Erosion Risk Classes using Kernel Discriminants 176
PART II COMPUTER SECURITY AND SAFETY 186
Multiple Error Detection in Substitution Blocks for Block Ciphers 187
Parallelization Method of Encryption Algorithms 197
When a Family of Iris Flower is Normal, Then are Others Abnormal? 211
Strong Boolean Functions with Compact ANF Representation 221
Visual Cryptography Methods as a Source of Trustworthiness for the Signature Creation and Verification Systems 231
Neural Network as a Programmable Block Cipher 246
On Intermediate Evaluation of Block Ciphers 256
Development of Concealing the Purpose of Processing for Programs in a Distributed Computing Environment 267
Covert Channel for Improving VoIP Security 274
Cryptanalysis of Chaotic Product Cipher 284
Embedding of Stego–Messages in Monochrome Images on the Base of Rank Filtering 294
PART III IMAGE ANALYSIS, GRAPHICS AND BIOMETRICS 304
JPEG 2000 IMAGE CODING STANDARD - A REVIEW AND APPLICATIONS 305
New Experiments on Word Recognition Without Segmentation 324
Signature Verification by View-Based Feature Extractor and DTW Classifier 334
Increasing Performance of Fingerprint Recognition Systems using Reconstruction of Ridge Lines Methods 343
Design and Prototyping of an Industrial Fault Clustering System Combining Image Processing and Artificial Neural Network Based Approaches 351
Image Pre-classification for Biometrics Identification Systems 361
Application of Improved Projection Method to Binary Images 371
PART IV COMPUTER SIMULATION AND DATA ANALYSIS 381
A Consideration of Processor Utilization on Multi- Processor System 382
Reliability of Node Information on Autonomous Load Distribution Method 390
Methodology of Developing Computer-Based Training Systems for Operators of Dynamic Objects 398
Algorithms of Identification of Multi-connected Boundary Geometry and Material Parameters in Problems Described by Navier- Lame Equation using the PIES 408
Analysis of an Open Linked Series Three-station Network with Blocking 418
Hyperplane Method Implementation for Loops Parallelization in the . NET Environment 429
On a Nonlinear Production-Inventory Problem 444
INDEX 455

Erscheint lt. Verlag 29.9.2007
Zusatzinfo XIV, 460 p.
Verlagsort New York
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Algorithmen
Informatik Theorie / Studium Kryptologie
Naturwissenschaften
Schlagworte algorithms • Artificial Intelligence • Automat • autonomous computing • biometrics • Block Ciphers • boolean function • cryptography • Encryption Algorithms • fast neural networks • feature extraction • fingerprint recognition • Fuzzy Models • humatronics • Image Analysis • Information • Logic • probabilistic algorithms • Robotics • signature identification • visual cryptography • VoIP • Word Recognition
ISBN-10 0-387-73137-7 / 0387731377
ISBN-13 978-0-387-73137-7 / 9780387731377
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 25,9 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99