Information Processing and Security Systems

Lieferzeit: Lieferbar innerhalb 14 Tagen

213,99 

ISBN: 0387250913
ISBN 13: 9780387250915
Herausgeber: Khalid Saeed/Jerzy Pejas
Verlag: Springer Verlag GmbH
Umfang: x, 475 S.
Erscheinungsdatum: 21.06.2005
Auflage: 1/2005
Produktform: Gebunden/Hardback
Einband: GEB

Presents state-of-the-art research in advanced computer systems and their applications within artificial intelligence, biometrics, information technology security, computational methods, algorithms and applications, computational science, education and industrial management applicationsIncludes supplementary material: sn.pub/extras

Artikelnummer: 1648595 Kategorie:

Beschreibung

InhaltsangabePattern Classification and Recognition.- Computer Security and Safety.- Computer Simulation.- Artificial Intelligence and Applications.- Industrial Management.

Inhaltsverzeichnis

Pattern Classification and Recognition.- Computer Security and Safety.- Computer Simulation.- Artificial Intelligence and Applications.- Industrial Management.

Autorenporträt

InhaltsangabeDigital Image and Signal Processing.- Fourier Descritpor-Based Deformable Models for Segmentation of the Distal Femur in CT.- Hierarchical Segmentation of Sparse Surface Data Using Energy-Minimization Approach.- Interactive Real-time Image Analysis System for Distant Operation.- Analysis/Synthesis Speech Model Based on the Pitch-Tracking Periodic-Aperiodic Decomposition.- Bio-inspired voice activity detector based on the human speech properties in the modulation domain.- A New Step in Arabic Speech Identification: Spoken Digit Recognition.- Split Vector Quantization of Psychoacoustical Modified LSF Coefficients in Speech Coder Based on Pitch-Tracking Periodic-Aperiodic Decomposition.- New results in 3D views of polyhedron generation on view sphere with perspective projection.- Gram-Schmidt Orthonormalization-Based Color Model for Object Detection.- Eyes detection with motion interpretation.- Financial Distress Prediction Using Different Pattern Recognition Methods.- Genetic algorithms applied to optimal arrangement of collocation points in 3D potential boundary-value problems.- Computer Security and Safety.- Fast Computation of Approximation Tables.- Cryptographic Properties of Some Cryptosystem with Modulation of the Chaotic Sequence Parameters.- Keys distribution for asymmetric cryptographic systems.- Two-pattern test generation with low power consumption based on LFSR.- Unauthorized servers for online certificates status verification.- Micropayments with Privacy - a New Proposal for E-commerce.- A model-based approach to analysis of authentication protocols.- Accessibility of information in realtime systems.- Protocol for Certificate Based Access Control Policies Description Language.- Impact of the address changing on the detection of pattern sensitive faults.- Software IP Protection Based on Watermarking Techniques.- Probabilistic Analysis of Operational Security for Network Systems.- Quality of Service Requirements in Computer Networks with Blocking.- Artificial Intelligence-Oriented Trends and Applications.- Genetic BDD-oriented Pattern Classifiers.- A fuzzy way to evaluate the qualitative attributes in bank lending creditworthiness.- Multidimensional Systems, Signals, Circuits, and Repetitive Processes: Theory, Applications, and Future Trends.- Modelling using probabilistic algorithms.- Fuzzy Parametric Integral Equations System in modelling of polygonal potential boundary problems described by the Laplace equation.- From Integrated Circuits Technology to Silicon Grey Matter: Hardware Implementation of Artificial Neural Networks.- A Tiny Flat-island in a Huge Lake - How can we search for it if completely flatland elsewhere?.- A Soft Computing Based Approach Using Signal-To-Image Conversion for Computer Aided Medical Diagnosis (CAMD).- The prediction of behaviours of chaotic dynamical systems in 3D state space.- Idiotypic Networks as a Metaphor for Data Analysis Algorithms.- Global learning of decision trees by an evolutionary algorithm.- Ships' domains as collision risk at sea in the evolutionary method of trajectory planning.- Inputs' Significance Analysis with Rough Sets Theory.- Semi-Markov process in performance evaluation of asynchronous processors.- Organization of the modeling and simulation of the discrete processes.- The Jeep Problem, searching for the best strategy with a genetic algorithm.- Evaluation of operation and state of an object using artificial intelligence tools.

Das könnte Ihnen auch gefallen …