Mosdorf, Romuald
Biometrics, Computer Security Systems and Artificial Intelligence Applications
Part I.Image Analysis and Biometrics
1. Image Filtration and Feature Extraction for Face Recognition
Tomasz Andrysiak, Michal Choras
2. Visualization of Some Multi-Class Erosion Data Using GDA and Supervised SOM
Anna Bartkowiak, Niki Evelpidou
3. Wavelet Transform in Face Recognition
Janusz Bobulski
4. Content-Based Image Retrieval — A Survey
Ryszard S. Choras
5. Method of Speech Recognition and Speaker Identification using Audio-Visual of Polish Speech and Hidden Markov Models
Mariusz Kubanek
6. Synthesis of Codebooks with Perceptually Monitored Structure for Multiband CELP-Coders
Michael Livshitz, Alexander Petrovsky
7. The Color Information as a Feature for Postage Stamps Recognition
Miroslaw Miciak
8. Iris Shape Evaluation in Face Image with Simple Background
Szymon Rydzek
9. Experimental Algorithm for Characteristic Points Evaluation in Static Images of Signatures
Khalid Saeed, Marcin Adamski
Part II.Computer Security Systems
10. Parallelization of Standard Modes of Operation for Symmetric Key Block Ciphers
Wlodzimierz Bielecki, Dariusz Burak
11. On Differential and Linear Approximation of S-box Functions
Krzysztof Chmiel
12. Random Generation of S-Boxes for Block Ciphers
Anna Grocholewska-Czurylo, Janusz Stoklosa
13. Problems of Sending Sensitive Information
Eugeniusz Kuriata
14. Hash Chaining for Authenticated Data Structures Freshness Checking
Eugeniusz Kuriata, Witold Macków, Pawel Sukiennik
15. Stream Cipher Keys Generation with Low Power Consumption Based on LFSR
Miroslaw Puczko, Vyatcheslav Yarmolik
16. The Quality of Obfuscation and Obfuscation Techniques
Joanna Witkowska
Part III.Artificial Intelligence and Applications
17. Capability and Functionings: A Fuzzy Way to Measure Interaction between Father and Child
Tindara Addabbo, Gisella Facchinetti, Giovanni Mastroleo
18. Remarks on Computer Simulations
Wiktor Danko
19. Analysis of E-learning System Dynamics
B. Ignatowska, R. Mosdorf
20. Can a Negative Selection Detect an Extremely few Non-self among Enormous Amount of Self Cells?
Akira Imada
21. An Average Length of Computations of Normalized Probabilistic Algorithms
Joanna Karbowska-Chilinska
22. A Marine Environment Simulator for Testing Ship Control Systems in Dangerous Situations
Andrzej Lebkowski, Krzysztof Dziedzicki, Marcin Tobiasz, Roman Smierzchalski, Miroslaw Tomera
23. Image Enhancement and Image Half-toning Using Fluid Particles Physics Dynamics
Kurosh Madani
24. Tandem Models with Blocking in the Computer Subnetworks Performance Analysis
Walenty Oniszczuk
25. Interchangeable Strategies in Games without Side Payments on the Base of Uncertain Information on Resources
Henryk Piech, Aleksandra Ptak, Marcin Machura
26. Properties of Morphological Operators Applied to Analysis of ECG Signals
Krzysztof Piekarski, Pawel Tadejko, Waldemar Rakowski
27. Input’s Significance Evaluation in a Multi Input-Variable System
Izabela Rejer
28. Calculating the Fractal Dimension of River Basins, Comparison of Several Methods
Adam Szustalewicz, Andreas Vassilopoulos
29. Automatic Management of Tele-Interpretation Knowledge in a Wearable Diagnostic Device
Ryszard Tadeusiewicz, Piotr Augustyniak
30. Evaluation of Clusters Quality in Artificial Immune Clustering System - SArIS
Slawomir T. Wierzchon, Urszula Kuzelewska
31. Convergence Analysis of the Boundary Geometry Identification Obtained by Genetic Algorithms in the PIES
Eugeniusz Zieniuk, Krzysztof Szerszen, Agnieszka Boltuc
DRM-restrictions
Printing: not available
Clipboard copying: not available
Keywords: COMPUTERS / Computer Science COM014000
- Author(s)
- Mosdorf, Romuald
- Pejaś, Jerzy
- Saeed, Khalid
- Publisher
- Springer
- Publication year
- 2006
- Language
- en
- Edition
- 1
- Category
- Information Technology, Telecommunications
- Format
- Ebook
- eISBN (PDF)
- 9780387365039