Biometrics, Computer Security Systems and Artificial Intelligence Applications

Front Cover
Khalid Saeed, Jerzy Pejas, Romuald Mosdorf
Springer Science & Business Media, Jan 11, 2007 - Computers - 342 pages
0 Reviews
The book to which I was asked by the editors to write a foreword is an interesting collection of contributions. It presents the extended versions of the authors' works already introduced at the International Multi-Conference on Advanced Computer Information and Security Systems ACS-CISIM 2005. These contributions had already been reviewed once before the conference for presentation at the conference while some of them passed another selection to be prepared in their current versions for this book. I am convinced the book will be of help to the researchers in the field of Computer Methods in Biometrics, Security Systems and Artificial Intelligence. They would find the contributions of other researchers of real benefit to them. I would encourage those who have the book in hands to read it. Professor Andrzej Salwicki Faculty of Mathematics, Informatics and Mechanics Warsaw University, Poland ACKNOWLEDGEMENTS The editors are thankfUl to all contributors whose works have proved to be of great interest to all participants of the International Conference ACS-CISIM, which was held in Elk, Poland in summer 2005. We also are greatly indebted to the Invited Speakers for their really worth listening and reading keynote talks.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Image Filtration and Feature Extraction for Face Recognition
3
Visualization of Some MultiClass Erosion Data Using GDA and Supervised SOM
13
Wavelet Transform in Face Recognition
23
ContentBased Image Retrieval A Survey
30
Method of Speech Recognition and Speaker Identification using AudioVisual of Polish Speech and Hidden Markov Models
45
Synthesis of Codebooks with Perceptually Monitored Structure for Multiband CELPCoders
57
The Color Information as a Feature for Postage Stamps Recognition
68
Iris Shape Evaluation in Face Image with Simple Background
79
Artificial Intelligence and Applications
183
A Fuzzy Way to Measure Interaction between Father and Child
184
Remarks on Computer Simulations
197
Analysis of Elearning System Dynamics
207
Can a Negative Selection Detect an Extremely few Nonself among Enormous Amount of Self Cells?
217
An Average Length of Computations of Normalized Probabilistic Algorithms
227
A Marine Environment Simulator for Testing Ship Control Systems in Dangerous Situations
237
Image Enhancement and Image Halftoning Using Fluid Particles Physics Dynamics
247

Experimental Algorithm for Characteristic Points Evaluation in Static Images of Signatures
89
Computer Security Systems
99
Parallelization of Standard Modes of Operation for Symmetric Key Block Ciphers
101
On Differential and Linear Approximation of Sbox Functions
111
Random Generation of SBoxes for Block Ciphers
121
Problems of Sending Sensitive Information
136
Hash Chaining for Authenticated Data Structures Freshness Checking
155
Stream Cipher Keys Generation with Low Power Consumption Based on LFSR
165
The Quality of Obfuscation and Obfuscation Techniques
175
Tandem Models with Blocking in the Computer Subnetworks Performance Analysis
259
Interchangeable Strategies in Games without Side Payments on the Base of Uncertain Information on Resources
268
Properties of Morphological Operators Applied to Analysis of ECG Signals
279
Inputs Significance Evaluation in a Multi InputVariable System
289
Calculating the Fractal Dimension of River Basins Comparison of Several Methods
299
Automatic Management of TeleInterpretation Knowledge in a Wearable Diagnostic Device
311
Evaluation of Clusters Quality in Artificial Immune Clustering System SArIS
322
Convergence Analysis of the Boundary Geometry Identification Obtained by Genetic Algorithms in the PIES
333
Copyright

Other editions - View all

Common terms and phrases