Biometrics, Computer Security Systems and Artificial Intelligence Applications

Author:   Khalid Saeed ,  Jerzy Pejas ,  Romuald Mosdorf
Publisher:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of hardcover 1st ed. 2006
ISBN:  

9781441942128


Pages:   342
Publication Date:   29 October 2010
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $462.00 Quantity:  
Add to Cart

Share |

Biometrics, Computer Security Systems and Artificial Intelligence Applications


Add your own review!

Overview

Full Product Details

Author:   Khalid Saeed ,  Jerzy Pejas ,  Romuald Mosdorf
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of hardcover 1st ed. 2006
Dimensions:   Width: 15.50cm , Height: 1.80cm , Length: 23.50cm
Weight:   0.545kg
ISBN:  

9781441942128


ISBN 10:   1441942122
Pages:   342
Publication Date:   29 October 2010
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Image Analysis and Biometrics.- Image Filtration and Feature Extraction for Face Recognition.- Visualization of Some Multi-Class Erosion Data Using GDA and Supervised SOM.- Wavelet Transform in Face Recognition.- Content-Based Image Retrieval - A Survey.- Method of Speech Recognition and Speaker Identification using Audio-Visual of Polish Speech and Hidden Markov Models.- Synthesis of Codebooks with Perceptually Monitored Structure for Multiband CELP-Coders.- The Color Information as a Feature for Postage Stamps Recognition.- Iris Shape Evaluation in Face Image with Simple Background.- Experimental Algorithm for Characteristic Points Evaluation in Static Images of Signatures.- Computer Security Systems.- Parallelization of Standard Modes of Operation for Symmetric Key Block Ciphers.- On Differential and Linear Approximation of S-box Functions.- Random Generation of S-Boxes for Block Ciphers.- Problems of Sending Sensitive Information.- Hash Chaining for Authenticated Data Structures Freshness Checking.- Stream Cipher Keys Generation with Low Power Consumption Based on LFSR.- The Quality of Obfuscation and Obfuscation Techniques.- Artificial Intelligence and Applications.- Capability and Functionings: A Fuzzy Way to Measure Interaction between Father and Child.- Remarks on Computer Simulations.- Analysis of E-learning System Dynamics.- Can a Negative Selection Detect an Extremely few Non-self among Enormous Amount of Self Cells?.- An Average Length of Computations of Normalized Probabilistic Algorithms.- A Marine Environment Simulator for Testing Ship Control Systems in Dangerous Situations.- Image Enhancement and Image Half-toning Using Fluid Particles Physics Dynamics.- Tandem Models with Blocking in the Computer Subnetworks Performance Analysis.- Interchangeable Strategies in Games without Side Payments on the Base of Uncertain Information on Resources.- Properties of Morphological Operators Applied to Analysis of ECG Signals.- Input's Significance Evaluation in a Multi Input-Variable System.- Calculating the Fractal Dimension of River Basins, Comparison of Several Methods.- Automatic Management of Tele-Interpretation Knowledge in a Wearable Diagnostic Device.- Evaluation of Clusters Quality in Artificial Immune Clustering System - SArIS.- Convergence Analysis of the Boundary Geometry Identification Obtained by Genetic Algorithms in the PIES.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

ls

Shopping Cart
Your cart is empty
Shopping cart
Mailing List