Biometrics, Computer Security Systems and Artificial Intelligence Applications - Khalid Saeed - Books - Springer-Verlag New York Inc. - 9781441942128 - October 29, 2010
In case cover and title do not match, the title is correct

Biometrics, Computer Security Systems and Artificial Intelligence Applications Softcover reprint of hardcover 1st ed. 2006 edition

Khalid Saeed

Price
NZD 403
excl. VAT

Ordered from remote warehouse

Expected delivery Jun 11 - 24
Add to your iMusic wish list

Also available as:

Biometrics, Computer Security Systems and Artificial Intelligence Applications Softcover reprint of hardcover 1st ed. 2006 edition

This book presents the most recent achievements in some rapidly developing fields within Computer Science. This includes the very latest research in biometrics and computer security systems, and descriptions of the latest inroads in artificial intelligence applications. The book contains over 30 articles by well-known scientists and engineers.


Marc Notes: Originally published: 2006.; Includes bibliographical references and index.; This text presents the most recent achievements in some rapidly developing fields within computer science. This includes the very latest research in biometrics and computer security systems, and descriptions of the latest inroads in artificial intelligence applications. Table of Contents: Image Analysis and Biometrics.- Image Filtration and Feature Extraction for Face Recognition.- Visualization of Some Multi-Class Erosion Data Using GDA and Supervised SOM.- Wavelet Transform in Face Recognition.- Content-Based Image Retrieval A Survey.- Method of Speech Recognition and Speaker Identification using Audio-Visual of Polish Speech and Hidden Markov Models.- Synthesis of Codebooks with Perceptually Monitored Structure for Multiband CELP-Coders.- The Color Information as a Feature for Postage Stamps Recognition.- Iris Shape Evaluation in Face Image with Simple Background.- Experimental Algorithm for Characteristic Points Evaluation in Static Images of Signatures.- Computer Security Systems.- Parallelization of Standard Modes of Operation for Symmetric Key Block Ciphers.- On Differential and Linear Approximation of S-box Functions.- Random Generation of S-Boxes for Block Ciphers.- Problems of Sending Sensitive Information.- Hash Chaining for Authenticated Data Structures Freshness Checking.- Stream Cipher Keys Generation with Low Power Consumption Based on LFSR.- The Quality of Obfuscation and Obfuscation Techniques.- Artificial Intelligence and Applications.- Capability and Functionings: A Fuzzy Way to Measure Interaction between Father and Child.- Remarks on Computer Simulations.- Analysis of E-learning System Dynamics.- Can a Negative Selection Detect an Extremely few Non-self among Enormous Amount of Self Cells?.- An Average Length of Computations of Normalized Probabilistic Algorithms.- A Marine Environment Simulator for Testing Ship Control Systems in Dangerous Situations.- Image Enhancement and Image Half-toning Using Fluid Particles Physics Dynamics.- Tandem Models with Blocking in the Computer Subnetworks Performance Analysis.- Interchangeable Strategies in Games without Side Payments on the Base of Uncertain Information on Resources.- Properties of Morphological Operators Applied to Analysis of ECG Signals.- Input s Significance Evaluation in a Multi Input-Variable System.- Calculating the Fractal Dimension of River Basins, Comparison of Several Methods.- Automatic Management of Tele-Interpretation Knowledge in a Wearable Diagnostic Device.- Evaluation of Clusters Quality in Artificial Immune Clustering System - SArIS.- Convergence Analysis of the Boundary Geometry Identification Obtained by Genetic Algorithms in the PIES."Publisher Marketing: The book to which I was asked by the editors to write a foreword is an interesting collection of contributions. It presents the extended versions of the authors' works already introduced at the International Multi-Conference on Advanced Computer Information and Security Systems ACS-CISIM 2005. These contributions had already been reviewed once before the conference for presentation at the conference while some of them passed another selection to be prepared in their current versions for this book. I am convinced the book will be of help to the researchers in the field of Computer Methods in Biometrics, Security Systems and Artificial Intelligence. They would find the contributions of other researchers of real benefit to them. I would encourage those who have the book in hands to read it. Professor Andrzej Salwicki Faculty of Mathematics, Informatics and Mechanics Warsaw University, Poland ACKNOWLEDGEMENTS The editors are thankfUl to all contributors whose works have proved to be of great interest to all participants of the International Conference ACS-CISIM, which was held in Elk, Poland in summer 2005. We also are greatly indebted to the Invited Speakers for their really worth listening and reading keynote talks.

Media Books     Paperback Book   (Book with soft cover and glued back)
Released October 29, 2010
ISBN13 9781441942128
Publishers Springer-Verlag New York Inc.
Pages 342
Dimensions 155 × 235 × 18 mm   ·   498 g
Editor Mosdorf, Romuald
Editor Pejas, Jerzy
Editor Saeed, Khalid

Show all

More by Khalid Saeed