Information Processing and Security Systems

Information Processing and Security Systems is a collection of forty papers that were originally presented at an international multi-conference on Advanced Computer Systems (ACS) and Computer Information Systems and Industrial Management Applications (CISIM) held in Elk, Poland. This volume describe...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Saeed, Khalid (Επιμελητής έκδοσης), Pejaś, Jerzy (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Boston, MA : Springer US, 2005.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Digital Image and Signal Processing
  • Fourier Descritpor-Based Deformable Models for Segmentation of the Distal Femur in CT
  • Hierarchical Segmentation of Sparse Surface Data Using Energy-Minimization Approach
  • Interactive Real-time Image Analysis System for Distant Operation
  • Analysis/Synthesis Speech Model Based on the Pitch-Tracking Periodic-Aperiodic Decomposition
  • Bio-inspired voice activity detector based on the human speech properties in the modulation domain
  • A New Step in Arabic Speech Identification: Spoken Digit Recognition
  • Split Vector Quantization of Psychoacoustical Modified LSF Coefficients in Speech Coder Based on Pitch-Tracking Periodic-Aperiodic Decomposition
  • New results in 3D views of polyhedron generation on view sphere with perspective projection
  • Gram-Schmidt Orthonormalization-Based Color Model for Object Detection
  • Eyes detection with motion interpretation
  • Financial Distress Prediction Using Different Pattern Recognition Methods
  • Genetic algorithms applied to optimal arrangement of collocation points in 3D potential boundary-value problems
  • Computer Security and Safety
  • Fast Computation of Approximation Tables
  • Cryptographic Properties of Some Cryptosystem with Modulation of the Chaotic Sequence Parameters
  • Keys distribution for asymmetric cryptographic systems
  • Two-pattern test generation with low power consumption based on LFSR
  • Unauthorized servers for online certificates status verification
  • Micropayments with Privacy — a New Proposal for E-commerce
  • A model-based approach to analysis of authentication protocols
  • Accessibility of information in realtime systems
  • Protocol for Certificate Based Access Control Policies Description Language
  • Impact of the address changing on the detection of pattern sensitive faults
  • Software IP Protection Based on Watermarking Techniques
  • Probabilistic Analysis of Operational Security for Network Systems
  • Quality of Service Requirements in Computer Networks with Blocking
  • Artificial Intelligence-Oriented Trends and Applications
  • Genetic BDD-oriented Pattern Classifiers
  • A fuzzy way to evaluate the qualitative attributes in bank lending creditworthiness
  • Multidimensional Systems, Signals, Circuits, and Repetitive Processes: Theory, Applications, and Future Trends
  • Modelling using probabilistic algorithms
  • Fuzzy Parametric Integral Equations System in modelling of polygonal potential boundary problems described by the Laplace equation
  • From Integrated Circuits Technology to Silicon Grey Matter: Hardware Implementation of Artificial Neural Networks
  • A Tiny Flat-island in a Huge Lake — How can we search for it if completely flatland elsewhere?
  • A Soft Computing Based Approach Using Signal-To-Image Conversion for Computer Aided Medical Diagnosis (CAMD)
  • The prediction of behaviours of chaotic dynamical systems in 3D state space
  • Idiotypic Networks as a Metaphor for Data Analysis Algorithms
  • Global learning of decision trees by an evolutionary algorithm
  • Ships' domains as collision risk at sea in the evolutionary method of trajectory planning
  • Inputs' Significance Analysis with Rough Sets Theory
  • Semi-Markov process in performance evaluation of asynchronous processors
  • Organization of the modeling and simulation of the discrete processes
  • The Jeep Problem, searching for the best strategy with a genetic algorithm
  • Evaluation of operation and state of an object using artificial intelligence tools.