Advances in Information Processing and Protection
Jerzy Pejas, Khalid Saeed
Springer Science & Business Media, Sep 29, 2007 - Computers - 460 pages
The Computer Science is relatively new field which is developing very fast not only because due to the huge interest of scientists and the market request, but also because this science has created possibilities for people of investigation and solved many problems that some time ago seemed to be insolvable. Such problems had only been described in science fiction novels, like underwater journeys of captain Nemo described by Jules Verne in XIX century. At present, various human dreams are successively becoming reality exactly as the underwater journeys became possible in the XX century. The proposed book gives you a view of the progress in such domains of Computer Science as Artificial Intelligence, Biometrics, Security of Information Technology, Computer Information Systems and Industrial Management. The works contained in the book describe the newest investigation results of devoted scientists from Europe and Asia. The book is written in a hard scientific language. It is really valuable and I am sure it will deliver you many scientific benefits. Professor Andrzej Piegat Szczecin University of Technology Faculty of Computer Science and Information Systems and University of Szczecin, Poland Faculty of Economic Sciences and Management ACKNOWLEDGMENTS We would like to express our indebtedness to all professors and IPC Members who took upon themselves the task of reviewing the papers presented in this book. They are:
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
analysis application approach approximation binary bits block cipher Boolean functions boundary geometry calculated classification coefficients compression Computer coordinates covert channel cryptographic cryptographic algorithm defined denotes described detection diagnosis digital watermarking dimensional document dynamic elements environment equation error example experiments filtering fingerprint fractal dimensions fuzzy model fuzzy sets genetic algorithm graph hyperplane IEEE Information Hiding input Intelligence International inverted lists iteration JPEG JPIP kernel linear logistic map loop matrix module neural network neurons node information nonlinear object obtained ontology operation optimal output paper parallel parameters pattern permutation pixels presented problem processor product cipher protocol random recognition representation robot rules S-box sample server signal signature solution steganography structure Szczecin Szczecin University Table task techniques Technology transformation values variables vector visual Visual Cryptography watermark λ λ λ