Biometrics, Computer Security Systems and Artificial Intelligence Applications (eBook)
XII, 342 Seiten
Springer US (Verlag)
978-0-387-36503-9 (ISBN)
This book presents the most recent achievements in some rapidly developing fields within Computer Science. This includes the very latest research in biometrics and computer security systems, and descriptions of the latest inroads in artificial intelligence applications. The book contains over 30 articles by well-known scientists and engineers. The articles are extended versions of works introduced at the ACS-CISIM 2005 conference.
The book to which I was asked by the editors to write a foreword is an interesting collection of contributions. It presents the extended versions of the authors' works already introduced at the International Multi-Conference on Advanced Computer Information and Security Systems ACS-CISIM 2005. These contributions had already been reviewed once before the conference for presentation at the conference while some of them passed another selection to be prepared in their current versions for this book. I am convinced the book will be of help to the researchers in the field of Computer Methods in Biometrics, Security Systems and Artificial Intelligence. They would find the contributions of other researchers of real benefit to them. I would encourage those who have the book in hands to read it. Professor Andrzej Salwicki Faculty of Mathematics, Informatics and Mechanics Warsaw University, Poland ACKNOWLEDGEMENTS The editors are thankfUl to all contributors whose works have proved to be of great interest to all participants of the International Conference ACS-CISIM, which was held in Elk, Poland in summer 2005. We also are greatly indebted to the Invited Speakers for their really worth listening and reading keynote talks.
FOREWORD 5
ACKNOWLEDGEMENTS 6
INTRODUCTION 7
TABLE OF CONTENTS 9
IMAGE ANALYSIS AND BIOMETRICS 12
Image Filtration and Feature Extraction for Face Recognition 13
Visualization of Some Multi-Class Erosion Data Using GDA and Supervised SOM 23
Wavelet Transform in Face Recognition 33
Method of Speech Recognition and Speaker Identification using Audio- Visual of Polish Speech and Hidden Markov Models 54
Synthesis of Codebooks with Perceptually Monitored Structure for Multiband CELP- Coders 65
The Color Information as a Feature for Postage Stamps Recognition 76
Iris Shape Evaluation in Face Image with Simple Background 86
Experimental Algorithm for Characteristic Points Evaluation in Static Images of Signatures 96
COMPUTER SECURITY SYSTEMS 106
Parallelization of Standard Modes of Operation for Symmetric Key Block Ciphers 107
On Differential and Linear Approximation of S- box Functions 117
Random Generation of S- Boxes for Block Ciphers 127
Problems of Sending Sensitive Information 142
Hash Chaining for Authenticated Data Structures Freshness Checking 160
stream Cipher Keys Generation with Low Power Consumption Based on LFSR 170
The Quality of Obfuscation and Obfuscation Techniques 179
ARTIFICIAL INTELLIGENCE AND APPLICATIONS 187
Capability and Functionings: A Fuzzy Way to Measure Interaction between Father and Child 188
Remarks on Computer Simulations 199
Can a Negative Selection Detect an Extremely few Non- self among Enormous Amount of Self Cells? 219
An Average Length of Computations of Normalized Probabilistic Algorithms 229
A Marine Environment Simulator for Testing Ship Control Systems in Dangerous Situations 239
Image Enhancement and Image Half-toning Using Fluid Particles Physics Dynamics 249
Tandem Models with Blocking in the Computer Subnetworks Performance Analysis 261
Interchangeable Strategies in Games without Side Payments on the Base of Uncertain Information on Resources 270
Properties of Morphological Operators Applied to Analysis of ECG Signals 280
Input's Significance Evaluation in a Multi Input- Variable System 290
Calculating the Fractal Dimension of River Basins, Comparison of Several Methods 300
Automatic Management of Tele- Interpretation Knowledge in a Wearable Diagnostic Device 311
Evaluation of Clusters Quality in Artificial Immune Clustering System - SArlS 322
Convergence Analysis of the Boundary Geometry Identification Obtained by Genetic Algorithms in the PIES 331
INDEX 339
Erscheint lt. Verlag | 11.1.2007 |
---|---|
Zusatzinfo | XII, 342 p. |
Verlagsort | New York |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik | |
Naturwissenschaften ► Biologie | |
Technik | |
Schlagworte | algorithms • Ambient Intelligence • Artificial Intelligence • biometrics • codebooks • Cognition • content based image retrieval • Cooperative games • E-Learning • face recognition • feature extraction • fractal dimension • fuzzy expert system • Genetic Algorithm • Genetic algorithms • hash chaining • Hidden Markov Model • Image Analysis • image filtration • Information • iris shape evaluation • iterative probabilistic algorithms • key block ciphers • Knowledge • Monitor • multiband CELP-Coders • obfuscation techniques • Performance • psychoacoustics • Public Key Infrastructure • Racter • s-box functions • signature recognition • Simulation • Speech Recognition • ubiquitous computing • Visualization • wavelet transforms |
ISBN-10 | 0-387-36503-6 / 0387365036 |
ISBN-13 | 978-0-387-36503-9 / 9780387365039 |
Haben Sie eine Frage zum Produkt? |
Größe: 16,9 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich