Skip to:Content
|
Bottom
Cover image for Biometrics, computer security systems and artificial intelligence applications
Title:
Biometrics, computer security systems and artificial intelligence applications
Publication Information:
New York, NY : Springer, 2006
ISBN:
9780387362328

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010150393 QA76.9.A25 B56 2006 Open Access Book Book
Searching...

On Order

Summary

Summary

The book to which I was asked by the editors to write a foreword is an interesting collection of contributions. It presents the extended versions of the authors' works already introduced at the International Multi-Conference on Advanced Computer Information and Security Systems ACS-CISIM 2005. These contributions had already been reviewed once before the conference for presentation at the conference while some of them passed another selection to be prepared in their current versions for this book. I am convinced the book will be of help to the researchers in the field of Computer Methods in Biometrics, Security Systems and Artificial Intelligence. They would find the contributions of other researchers of real benefit to them. I would encourage those who have the book in hands to read it. Professor Andrzej Salwicki Faculty of Mathematics, Informatics and Mechanics Warsaw University, Poland ACKNOWLEDGEMENTS The editors are thankfUl to all contributors whose works have proved to be of great interest to all participants of the International Conference ACS-CISIM, which was held in Elk, Poland in summer 2005. We also are greatly indebted to the Invited Speakers for their really worth listening and reading keynote talks.


Table of Contents

Tomasz Andrysiak and Michat ChorasAnna Bartkowiak and Niki EvelpidouJanusz BobulskiRyszard S. ChorasMariusz KubanekMichael Livshitz and Alexander PetrovskyMiroslaw MiciakSzymon RydzekKhalid Saeed and Marcin AdamskiWlodzimierz Bielecki and Dariusz BurakKrzysztof ChmielAnna Grocholewska-Czuryto and Janusz StoklosaEugeniusz KuriataEugeniusz Kuriata and Witold Mackow and Pawel SukiennikMirosiaw Fuczko and Vyatcheslav N. YarmolikJoanna WitkowskaTindara Addabbo and Gisella Facchinetti and Giovanni MastroleoWiktor DankoBozena Ignatowska and Romuald MosdorfAkira ImadaJoanna Karbowska-ChilinskaAndrzej Lebkowski and Krzysztof Dziedzicki and Marcin Tobiasz and Roman Smierzchalski and Miroslaw TomeraKurosh MadaniWalenty OniszczukHenryk Piech and Aleksandra Ptak and Marcin MachuraKrzysztof Piekarskl and Pawel Tadejko and Waldemar RakowskiIzabela RejerAdam Szustalewicz and Andreas VassilopoulosRyszard Tadeusiewicz and Piotr AugustyniakSlawomir Wierzchon and Urszula KuzelewskaEugeniusz Zieniuk and Krzysztof Szerszen and Agnieszka Boltuc
Part I Image Analysis and Biometrics
Image Filtration and Feature Extraction for Face Recognitionp. 3
Visualization of Some Multi-Class Erosion Data Using GDA and Supervised SOMp. 13
Wavelet Transform in Face Recognitionp. 23
Content-Based Image Retrieval - A Surveyp. 31
Method of Speech Recognition and Speaker Identification Using Audio-Visual of Polish Speech and Hidden Markov Modelsp. 45
Synthesis of Codebooks with Perceptually Monitored Structure for Multiband CELP-Codersp. 57
The Color Information as a Feature for Postage Stamps Recognitionp. 69
Iris Shape Evaluation in Face Image with Simple Backgroundp. 79
Experimental Algorithm for Characteristic Points Evaluation in Static Images of Signaturesp. 89
Part II Computer Security Systems
Parallelization of Standard Modes of Operation for Symmetric Key Block Ciphersp. 101
On Differentia] and Linear Approximation of S-box Functionsp. 111
Random Generation of S-Boxes for Block Cipliersp. 121
Problems of Sending Sensitive Informationp. 137
Hash Chaining for Authenticated Data Structures Freshness Checkingp. 155
Stream Cipher Keys Generation with Low Power Consumption Based on LFSRp. 165
The Quality of Obfuscation and Obfuscation Techniquesp. 175
Part III Artificial Intelligence and Applications
Capability and Functionings: A Fuzzy Way to Measure Interaction between Father and Childp. 185
Remarks on Computer Simulationsp. 197
Analysis of E-learning System Dynamicsp. 207
Can a Negative Selection Detect an Extremely Few Non-self Among Enormous Amount of Self Cells?p. 217
An Average Length of Computations of Normalized Probabilistic Algorithmsp. 227
A Marine Environment Simulator for Testing Ship Control Systems in Dangerous Situationsp. 237
Image Enhancement and Image Half-toning Using Fluid Particles Physics Dynamicsp. 247
Tandem Models with Blocking in the Computer Subnetworks Performance Analysisp. 259
Interchangeable Strategies in Games Without Side Payments on the Base of Uncertain Information on Resourcesp. 269
Properties of Morphological Operators Applied to Analysis of ECG Signalsp. 279
Input's Significance Evaluation in a Multi Input-Variable Systemp. 289
Calculating the Fractal Dimension of River Basins, Comparison of Several Methodsp. 299
Automatic Management of Tele-Interpretation Knowledge in a Wearable Diagnostic Devicep. 311
Evaluation of Clusters Quality in Artificial Immune Clustering System - SArISp. 323
Convergence Analysis of the Boundary Geometry Identification Obtained by Genetic Algorithms in the PIESp. 333
Go to:Top of Page