Pejaś, Jerzy
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
Chapter 1. Information Technology Security
1. How can we justify trust in software based systems?
Janusz Górski
2. The capacity of ciphers fulfilling the accessibility of cryptograms
Tomasz Hebisz, Eugeniusz Kuriata
3. Parallelization of the Data Encryption Standard (DES) algorithm
V. Beletskyy, D. Burak
4. Linked authenticated dictionaries for certificate status verification
Witold Ma?ków
5. Integrated Payment System for Public Key Infrastructure Services
Imed Fray, Jerzy Peja?
6. Some methods of the analysis and risk assessment in the PKI system services providers
Jerzy Peja?, Imed Fray
7. VAST: Versatile Anonymous System for Web Users
Igor Margasi?ski, Krzysztof Szczypiorski
8. Cryptography and Steganography: teaching experience
Bartosz Sokó?, V. N. Yarmolik
9. Analysis of non-linear pseudo-noise sequences
Marek Jackiewicz, Eugeniusz Kuriata
10. Tool support for detecting defects in object-oriented models
Janusz Górski, Aleksander Jarz?bowicz, Rafa? Leszczyna, Jakub Miler, Marcin Olszewski
11. The Proposal of Protocol for Electronic Signature Creation in Public Environment
W?odzimierz Chocianowicz, Jerzy Peja?, Andrzej Ruci?ski
12. On Arithmetic Subtraction Linear Approximation
Krzysztof Chmiel
13. Secure Data Transmission via Modulation of the Chaotic Sequence Parameters
S. Berczy?ski, 2)YY. A. Kravtsov, J. Pejas, E. D. Surovyatkina
Chapter 2. Biometric Systems
14. Some Advances and Challenges in Live Biometrics, Personnel Management, and Other “Human Being” Applications
Leonid Kompanets
15. An environment for recognition systems modeling
Georgy Kukharev, Adam Ku?mi?ski
16. Modified Gradient Method for Face Localization
Georgi Kukharev, Pawe? Masicz, Piotr Masicz
17. Three stage face recognition algorithm for visitor identification system
Adam Nowosielski
18. A New Approach for Hand-Palm Recognition
Khalid Saeed, Marcin Werdoni
19. An Experimental Criterion for Face Classification
Khalid Saeed, Piotr Charkiewicz
20. Contour Objects Recognition Based On UNL-Fourier Descriptors
Dariusz Frejlichowski
21. Sonar Image Simulation by Means of Ray Tracing and Image Processing
Mariusz Borawski, Pawe? Forczma?ski
22. The PCA Reconstruction Based Approach for Extending Facial Image Databases for Face Recognition Systems
Liming Chen, Georgy Kukharev, Tomasz Ponikowski
23. Investigation of fingerprint verification algorithm based on local centers method
Edward Pó?rolniczak
24. Czestochowa’s Precise Model of a Face Based on the Facial Asymmetry, Ophthalmogeometry, and Brain Asymmetry Phenomena: the Idea and Algorithm Sketch
Leonid Kompanets, Mariusz Kubanek, Szymon Rydzek
Chapter 3. Methods of Artificial Intelligence and Intelligent Agents
25. A fuzzy expert approach for comparing alternative end uses for requalification of contaminated sites
Gisella Facchinetti, Ilda Mannino, Giovanni Mastroleo, Stefano Soriani
26. Training assisting program with hybrid decision supporting system
Pawe? Bana?
27. Numerical problems with evaluating the fractal dimension of real data
Ada Szustalewicz
28. Multi-stage ship control in a fuzzy environment
Zbigniew Pietrzykowski
29. Informative value of the possibilistic extension principle
Andrzej Piegat
30. Intelligent Marine Control Systems
Roman ?mierzchalski
31. How to deal with the data in a bankruptcy modelling
Rejer Izabela
32. Dependency Mining in Large Sets of Stock Market Trading Rules
Piotr Lipinski
33. Choosing representative data items: Kohonen, Neural Gas or Mixture Model?
Anna Bartkowiak, Joanna Zdziarek, Niki Evelpidou, Andreas Vassilopoulos
34. Application of the Ant Colony Algorithm for the Path Planning
Marcin Pluci?ski
35. Application of fuzzy logic for track corrector formation into flight simulator
Victor J. Mamaev, Dmitry A. Judin
36. Algorithm for Automatic Definition of Validated and Non-Validated Region in Multi-Dimensional Space
Przemys?aw Kl?sk
37. Adaptive simulation of separable dynamical systems in the neural network basis
Walery Rogoza
38. Improvement of the processors operating ratio in task scheduling using the deadline method
Koichi Kashiwagi, Yoshinobu Higami, Shin-Ya Kobayashi
Keywords: Computer Science, Computing Methodologies, Data Structures, Cryptology and Information Theory, Artificial Intelligence (incl. Robotics), Coding and Information Theory
- Author(s)
- Pejaś, Jerzy
- Piegat, Andrzej
- Publisher
- Springer
- Publication year
- 2005
- Language
- en
- Edition
- 1
- Page amount
- 407 pages
- Category
- Information Technology, Telecommunications
- Format
- Ebook
- eISBN (PDF)
- 9780387234847