𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems

✍ Scribed by Janusz GΓ³rski (auth.), Jerzy PejaΕ›, Andrzej Piegat (eds.)


Publisher
Springer US
Year
2005
Tongue
English
Leaves
393
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research.

"Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions analyzing such areas of AI as fuzzy set theory, predicate logic, neural networks, clustering, data mining and others. It also presents applications of AI as possible solutions for problems like firm bankruptcy, soil erosion, flight control and others.

"Information Technology Security" covers three important areas of security engineering in information systems: software security, public key infrastructure and the design of new cryptographic protocols and algorithms.

"Biometric Systems" comprises 11 contributions dealing with face picture analysis and recognition systems. This chapter focuses on known methods of biometric problem solution as well as the design of new models.

✦ Table of Contents


Front Matter....Pages 1-1
How can we justify trust in software based systems?....Pages 3-12
The capacity of ciphers fulfilling the accessibility of cryptograms....Pages 13-22
Parallelization of the Data Encryption Standard (DES) algorithm....Pages 23-33
Linked authenticated dictionaries for certificate status verification....Pages 35-46
Integrated Payment System for Public Key Infrastructure Services....Pages 47-59
Some methods of the analysis and risk assessment in the PKI system services providers....Pages 61-70
VAST: Versatile Anonymous System for Web Users....Pages 71-82
Cryptography and Steganography: teaching experience....Pages 83-92
Analysis of non-linear pseudo-noise sequences....Pages 93-102
Tool support for detecting defects in object-oriented models....Pages 103-112
The Proposal of Protocol for Electronic Signature Creation in Public Environment....Pages 113-124
On Arithmetic Subtraction Linear Approximation....Pages 125-134
Secure Data Transmission via Modulation of the Chaotic Sequence Parameters....Pages 135-142
Front Matter....Pages 143-143
Some Advances and Challenges in Live Biometrics, Personnel Management, and Other β€œHuman Being” Applications....Pages 145-156
An environment for recognition systems modeling....Pages 157-164
Modified Gradient Method for Face Localization....Pages 165-176
Three stage face recognition algorithm for visitor identification system....Pages 177-184
A New Approach for Hand-Palm Recognition....Pages 185-194
An Experimental Criterion for Face Classification....Pages 195-202
Contour Objects Recognition Based On UNL-Fourier Descriptors....Pages 203-208
Front Matter....Pages 143-143
Sonar Image Simulation by Means of Ray Tracing and Image Processing....Pages 209-214
The PCA Reconstruction Based Approach for Extending Facial Image Databases for Face Recognition Systems....Pages 215-227
Investigation of fingerprint verification algorithm based on local centers method....Pages 229-238
Czestochowa’s Precise Model of a Face Based on the Facial Asymmetry, Ophthalmogeometry, and Brain Asymmetry Phenomena: the Idea and Algorithm Sketch....Pages 239-251
Front Matter....Pages 253-253
A fuzzy expert approach for comparing alternative end uses for requalification of contaminated sites....Pages 255-265
Training assisting program with hybrid decision supporting system....Pages 267-272
Numerical problems with evaluating the fractal dimension of real data....Pages 273-283
Multi-stage ship control in a fuzzy environment....Pages 285-299
Informative value of the possibilistic extension principle....Pages 301-310
Intelligent Marine Control Systems....Pages 311-319
How to deal with the data in a bankruptcy modelling....Pages 321-328
Dependency Mining in Large Sets of Stock Market Trading Rules....Pages 329-336
Choosing representative data items: Kohonen, Neural Gas or Mixture Model?....Pages 337-344
Application of the Ant Colony Algorithm for the Path Planning....Pages 345-352
Application of fuzzy logic for track corrector formation into flight simulator....Pages 353-359
Algorithm for Automatic Definition of Validated and Non-Validated Region in Multi-Dimensional Space....Pages 361-370
Adaptive simulation of separable dynamical systems in the neural network basis....Pages 371-386
Improvement of the processors operating ratio in task scheduling using the deadline method....Pages 387-394

✦ Subjects


Computing Methodologies;Data Structures, Cryptology and Information Theory;Artificial Intelligence (incl. Robotics);Coding and Information Theory


πŸ“œ SIMILAR VOLUMES


Enhanced Methods in Computer Security, B
✍ Jerzy Pejas, Andrzej Piegat (Editors) πŸ“‚ Library πŸ“… 2004 🌐 English

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research. "Methods of Artificial Intelligence and Intelligent Agents" contains 13

Enhanced Methods in Computer Security, B
✍ Janusz GΓ³rski (auth.), Jerzy PejaΕ›, Andrzej Piegat (eds.) πŸ“‚ Library πŸ“… 2005 πŸ› Springer US 🌐 English

<p><P>Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research.</P><P></P><P>"Methods of Artificial Intelligence and Intelligent A

Enhanced Methods in Computer Security, B
✍ Jerzy Pejas, Andrzej Piegat πŸ“‚ Library πŸ“… 2005 πŸ› Springer 🌐 English

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research.Methods of Artificial Intelligence and Intelligent Agents" contains 13 co

Biometrics, Computer Security Systems an
✍ Khalid Saeed (editor), Jerzy Pejas (editor), Romuald Mosdorf (editor) πŸ“‚ Library πŸ“… 2006 πŸ› Springer 🌐 English

<p><span>This book presents the most recent achievements in some rapidly developing fields within Computer Science. This includes the very latest research in biometrics and computer security systems, and descriptions of the latest inroads in artificial intelligence applications. The book contains ov

Biometrics, Computer Security Systems an
✍ Khalid Saeed, Khalid Saeed;Jerzy Pejas;Romuald Mosdorf πŸ“‚ Library πŸ“… 2006 πŸ› Springer 🌐 English

This book contains over 30 articles by well-known scientists/engineers reflecting the latest developments in advanced computer systems and their applications within Biometrics, Information Technology Security and Artificial Intelligence.

Artificial Intelligence and Heuristics f
✍ Chandrasekar Vuppalapati πŸ“‚ Library πŸ“… 2022 πŸ› Springer 🌐 English

<p><span>This book introduces readers to advanced data science techniques for signal mining in connection with agriculture. It shows how to apply heuristic modeling to improve farm-level efficiency, and how to use sensors and data intelligence to provide closed-loop feedback, while also providing re