Pejaś, Jerzy

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems

Pejaś, Jerzy - Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems, ebook


Ebook, PDF with Adobe DRM
ISBN: 9780387234847
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

Chapter 1. Information Technology Security

1. How can we justify trust in software based systems?
Janusz Górski

2. The capacity of ciphers fulfilling the accessibility of cryptograms
Tomasz Hebisz, Eugeniusz Kuriata

3. Parallelization of the Data Encryption Standard (DES) algorithm
V. Beletskyy, D. Burak

4. Linked authenticated dictionaries for certificate status verification
Witold Ma?ków

5. Integrated Payment System for Public Key Infrastructure Services
Imed Fray, Jerzy Peja?

6. Some methods of the analysis and risk assessment in the PKI system services providers
Jerzy Peja?, Imed Fray

7. VAST: Versatile Anonymous System for Web Users
Igor Margasi?ski, Krzysztof Szczypiorski

8. Cryptography and Steganography: teaching experience
Bartosz Sokó?, V. N. Yarmolik

9. Analysis of non-linear pseudo-noise sequences
Marek Jackiewicz, Eugeniusz Kuriata

10. Tool support for detecting defects in object-oriented models
Janusz Górski, Aleksander Jarz?bowicz, Rafa? Leszczyna, Jakub Miler, Marcin Olszewski

11. The Proposal of Protocol for Electronic Signature Creation in Public Environment
W?odzimierz Chocianowicz, Jerzy Peja?, Andrzej Ruci?ski

12. On Arithmetic Subtraction Linear Approximation
Krzysztof Chmiel

13. Secure Data Transmission via Modulation of the Chaotic Sequence Parameters
S. Berczy?ski, 2)YY. A. Kravtsov, J. Pejas, E. D. Surovyatkina

Chapter 2. Biometric Systems

14. Some Advances and Challenges in Live Biometrics, Personnel Management, and Other “Human Being” Applications
Leonid Kompanets

15. An environment for recognition systems modeling
Georgy Kukharev, Adam Ku?mi?ski

16. Modified Gradient Method for Face Localization
Georgi Kukharev, Pawe? Masicz, Piotr Masicz

17. Three stage face recognition algorithm for visitor identification system
Adam Nowosielski

18. A New Approach for Hand-Palm Recognition
Khalid Saeed, Marcin Werdoni

19. An Experimental Criterion for Face Classification
Khalid Saeed, Piotr Charkiewicz

20. Contour Objects Recognition Based On UNL-Fourier Descriptors
Dariusz Frejlichowski

21. Sonar Image Simulation by Means of Ray Tracing and Image Processing
Mariusz Borawski, Pawe? Forczma?ski

22. The PCA Reconstruction Based Approach for Extending Facial Image Databases for Face Recognition Systems
Liming Chen, Georgy Kukharev, Tomasz Ponikowski

23. Investigation of fingerprint verification algorithm based on local centers method
Edward Pó?rolniczak

24. Czestochowa’s Precise Model of a Face Based on the Facial Asymmetry, Ophthalmogeometry, and Brain Asymmetry Phenomena: the Idea and Algorithm Sketch
Leonid Kompanets, Mariusz Kubanek, Szymon Rydzek

Chapter 3. Methods of Artificial Intelligence and Intelligent Agents

25. A fuzzy expert approach for comparing alternative end uses for requalification of contaminated sites
Gisella Facchinetti, Ilda Mannino, Giovanni Mastroleo, Stefano Soriani

26. Training assisting program with hybrid decision supporting system
Pawe? Bana?

27. Numerical problems with evaluating the fractal dimension of real data
Ada Szustalewicz

28. Multi-stage ship control in a fuzzy environment
Zbigniew Pietrzykowski

29. Informative value of the possibilistic extension principle
Andrzej Piegat

30. Intelligent Marine Control Systems
Roman ?mierzchalski

31. How to deal with the data in a bankruptcy modelling
Rejer Izabela

32. Dependency Mining in Large Sets of Stock Market Trading Rules
Piotr Lipinski

33. Choosing representative data items: Kohonen, Neural Gas or Mixture Model?
Anna Bartkowiak, Joanna Zdziarek, Niki Evelpidou, Andreas Vassilopoulos

34. Application of the Ant Colony Algorithm for the Path Planning
Marcin Pluci?ski

35. Application of fuzzy logic for track corrector formation into flight simulator
Victor J. Mamaev, Dmitry A. Judin

36. Algorithm for Automatic Definition of Validated and Non-Validated Region in Multi-Dimensional Space
Przemys?aw Kl?sk

37. Adaptive simulation of separable dynamical systems in the neural network basis
Walery Rogoza

38. Improvement of the processors operating ratio in task scheduling using the deadline method
Koichi Kashiwagi, Yoshinobu Higami, Shin-Ya Kobayashi

Keywords: Computer Science, Computing Methodologies, Data Structures, Cryptology and Information Theory, Artificial Intelligence (incl. Robotics), Coding and Information Theory

Publication year
Page amount
407 pages
Information Technology, Telecommunications

Similar titles