Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems (eBook)

eBook Download: PDF
2006 | 2005
XII, 396 Seiten
Springer US (Verlag)
978-0-387-23484-7 (ISBN)

Lese- und Medienproben

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems -
Systemvoraussetzungen
213,99 inkl. MwSt
(CHF 208,95)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research.

'Methods of Artificial Intelligence and Intelligent Agents' contains 13 contributions analyzing such areas of AI as fuzzy set theory, predicate logic, neural networks, clustering, data mining and others. It also presents applications of AI as possible solutions for problems like firm bankruptcy, soil erosion, flight control and others.

'Information Technology Security' covers three important areas of security engineering in information systems: software security, public key infrastructure and the design of new cryptographic protocols and algorithms.

'Biometric Systems' comprises 11 contributions dealing with face picture analysis and recognition systems. This chapter focuses on known methods of biometric problem solution as well as the design of new models.


Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research."e;Methods of Artificial Intelligence and Intelligent Agents"e; contains 13 contributions analyzing such areas of AI as fuzzy set theory, predicate logic, neural networks, clustering, data mining and others. It also presents applications of AI as possible solutions for problems like firm bankruptcy, soil erosion, flight control and others. "e;Information Technology Security"e; covers three important areas of security engineering in information systems: software security, public key infrastructure and the design of new cryptographic protocols and algorithms. "e;Biometric Systems"e; comprises 11 contributions dealing with face picture analysis and recognition systems. This chapter focuses on known methods of biometric problem solution as well as the design of new models.

Table of Contents 5
Preface 9
Chapter 1 Information Technology Security 13
How can we justify trust in software based systems? 14
The capacity of ciphers fulfilling the accessibility of cryptograms 24
Parallelization of the Data Encryption Standard ( DES) algorithm 34
Linked authenticated dictionaries for certificate status verification 46
Integrated Payment System for Public Key Infrastructure Services 58
Some methods of the analysis and risk assessment in the system services providers 72
VAST: Versatile Anonymous System for Web Users 82
Cryptography and Steganography: teaching experience 94
Analysis of non-linear pseudo-noise sequences 104
Tool support for detecting defects in object-oriented models 114
The Proposal of Protocol for Electronic Signature Creation in Public Environment 124
On Arithmetic Subtraction Linear Approximation 136
Secure Data Transmission via Modulation of the Chaotic Sequence Parameters 146
Chapter 2 Biometric Systems 155
Some Advances and Challenges in Live Biometrics, Personnel Management, and Other " Human Being" Applications 156
An environment for recognition systems modeling 168
Modified Gradient Method for Face Localization 176
Three stage face recognition algorithm for visitor identification system 188
A New Approach for Hand-Palm Recognition 196
An Experimental Criterion for Face Classification 206
Contour Objects Recognition Based On UNL- Fourier Descriptors 214
Sonar Image Simulation by Means of Ray Tracing and Image Processing 220
The PCA Reconstruction Based Approach for Extending Facial Image Databases for Pace Recognition Systems 226
Investigation of fingerprint verification algorithm based on local centers method 240
Czestochowa's Precise Model of a Face Based on the Facial Asymmetry, Ophthalmogeometry, and Brain Asymmetry Phenomena: the Idea and Algorithm Sketch 250
Chapter 3 Methods of Artificial Intelligence and Intelligent Agents 265
A fuzzy expert approach for comparing alternative end uses for requalification of contaminated sites 266
Training assisting program with hybrid decision supporting system 278
Numerical problems with evaluating the fractal dimension of real data 284
Multi-stage ship control in a fuzzy environment 296
Informative value of the possibilistic extension principle 312
Intelligent Marine Control Systems 322
How to deal with the data in a bankruptcy modelling 332
Dependency Mining in Large Sets of Stock Market Trading Rules 340
Choosing representative data items: Kohonen, Neural Gas or Mixture Model? 348
Application of the Ant Colony Algorithm for the Path Planning 356
Application of fuzzy logic for track corrector formation into flight simulator 364
Algorithm for Automatic Definition of Validated and Non-Validated Region in Multi-Dimensional Space 372
Adaptive simulation of separable dynamical systems in the neural network basis 382
Improvement of the processors operating ratio in task scheduling using the deadline method 398
Author Index 406

Erscheint lt. Verlag 18.7.2006
Zusatzinfo XII, 396 p.
Verlagsort New York
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Algorithmen
Informatik Theorie / Studium Kryptologie
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Naturwissenschaften
Schlagworte Artificial Intelligence • artificial intelligence system • biometrics • classification • Cognition • Data Mining • Dynamical Systems • extension • Image Processing • information system • Modeling • neural gas • neural network • Simulation • verification
ISBN-10 0-387-23484-5 / 0387234845
ISBN-13 978-0-387-23484-7 / 9780387234847
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 25,2 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
CHF 78,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
CHF 41,95