Logo - springer
Slogan - springer

Computer Science - Artificial Intelligence | Biometrics, Computer Security Systems and Artificial Intelligence Applications

Biometrics, Computer Security Systems and Artificial Intelligence Applications

Saeed, Khalid, Pejas, Jerzy, Mosdorf, Romuald (Eds.)

2006, XI, 342 p.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$159.00

(net) price for USA

ISBN 978-0-387-36503-9

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase


learn more about Springer eBooks

add to marked items

Hardcover
Information

Hardcover version

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$209.00

(net) price for USA

ISBN 978-0-387-36232-8

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$209.00

(net) price for USA

ISBN 978-1-4419-4212-8

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

This book presents the most recent achievements in some fascinating and rapidly developing fields within Computer Science.  The scientific works presented in this book have been partitioned into three topical groups: Image Analysis and Biometrics, Computer Security Systems, and Artificial Intelligence and Applications.  Image Analysis and Biometrics is the branch of Computer Science dealing with the very difficult task of artificial, visual perception of objects and surroundings, as well as the problems connected with it.  Computer Security and Safety is at present a very important and intensively investigated branch of Computer Science because of the menacing activity of hackers and computer viruses.  Artificial Intelligence remains a constantly evolving field with applications that are really noteworthy.

This book contains over 30 articles by well-known scientists and engineers reflecting the latest developments in these fields.  The articles are extended versions of works introduced at the International Multi-Conference on Advanced Computer Information and Security Systems, ACS-CISIM 2005.

Content Level » Research

Keywords » Performance - Racter - algorithms - artificial intelligence - biometrics - cognition - genetic algorithm - hidden Markov model - image analysis - information - knowledge - monitor - simulation - speech recognition - visualization

Related subjects » Artificial Intelligence - Communication Networks - Image Processing - Security and Cryptology

Table of contents / Sample pages 

Image Analysis and Biometrics.- Image Filtration and Feature Extraction for Face Recognition.- Visualization of Some Multi-Class Erosion Data Using GDA and Supervised SOM.- Wavelet Transform in Face Recognition.- Content-Based Image Retrieval — A Survey.- Method of Speech Recognition and Speaker Identification using Audio-Visual of Polish Speech and Hidden Markov Models.- Synthesis of Codebooks with Perceptually Monitored Structure for Multiband CELP-Coders.- The Color Information as a Feature for Postage Stamps Recognition.- Iris Shape Evaluation in Face Image with Simple Background.- Experimental Algorithm for Characteristic Points Evaluation in Static Images of Signatures.- Computer Security Systems.- Parallelization of Standard Modes of Operation for Symmetric Key Block Ciphers.- On Differential and Linear Approximation of S-box Functions.- Random Generation of S-Boxes for Block Ciphers.- Problems of Sending Sensitive Information.- Hash Chaining for Authenticated Data Structures Freshness Checking.- Stream Cipher Keys Generation with Low Power Consumption Based on LFSR.- The Quality of Obfuscation and Obfuscation Techniques.- Artificial Intelligence and Applications.- Capability and Functionings: A Fuzzy Way to Measure Interaction between Father and Child.- Remarks on Computer Simulations.- Analysis of E-learning System Dynamics.- Can a Negative Selection Detect an Extremely few Non-self among Enormous Amount of Self Cells?.- An Average Length of Computations of Normalized Probabilistic Algorithms.- A Marine Environment Simulator for Testing Ship Control Systems in Dangerous Situations.- Image Enhancement and Image Half-toning Using Fluid Particles Physics Dynamics.- Tandem Models with Blocking in the Computer Subnetworks Performance Analysis.- Interchangeable Strategies in Games without Side Payments on the Base of Uncertain Information on Resources.- Properties of Morphological Operators Applied to Analysis of ECG Signals.- Input’s Significance Evaluation in a Multi Input-Variable System.- Calculating the Fractal Dimension of River Basins, Comparison of Several Methods.- Automatic Management of Tele-Interpretation Knowledge in a Wearable Diagnostic Device.- Evaluation of Clusters Quality in Artificial Immune Clustering System - SArIS.- Convergence Analysis of the Boundary Geometry Identification Obtained by Genetic Algorithms in the PIES.

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Artificial Intelligence (incl. Robotics).