Advances in Information Processing and Protection

This book contains a selection of the best papers given at the international Advanced Computer Systems Conference in October 2006 in Miedzyzdroje, Poland. Combining research areas from both Computer Science and Industrial Management, the book is partitioned into four topical areas: Artificial Intell...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Pejaś, Jerzy (Επιμελητής έκδοσης), Saeed, Khalid (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Boston, MA : Springer US, 2007.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 06767nam a22004935i 4500
001 978-0-387-73137-7
003 DE-He213
005 20151204152254.0
007 cr nn 008mamaa
008 100301s2007 xxu| s |||| 0|eng d
020 |a 9780387731377  |9 978-0-387-73137-7 
024 7 |a 10.1007/978-0-387-73137-7  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.82  |2 23 
245 1 0 |a Advances in Information Processing and Protection  |h [electronic resource] /  |c edited by Jerzy Pejaś, Khalid Saeed. 
264 1 |a Boston, MA :  |b Springer US,  |c 2007. 
300 |a XIV, 460 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Artificial Intelligence -- Humatronics and RT-Middleware -- A Fuzzy Way to Measure Quality of Work in a Multidimensional Perspective -- Application of the Peano Curve for the Robot Trajectory Generating -- On Some Properties of the B-Cell Algorithm in Non-Stationary Environments -- The Grouping of Valuations in Probabilistic Algorithms -- Inverted Lists Compression Using Contextual Information -- Hybrid Intelligent Diagnosis Approaches: Analysis and Comparison under a Biomedicine Application -- Predicting Incomplete Data on the Basis of Non Symmetric Similarity Relation -- Methods of Designing and System Analysis of Fast Neural Networks and Linear Tunable Transformations -- Minimal Coverage of Investigated Object when Seeking for its Fractal Dimension -- Networked Robots Personal Tastes Acquisition and Sharing -- Reduction of Rules of a Fuzzy Model with a Chain Model -- Singleton Representation of Fuzzy Set for Computing Fuzzy Model Response for Fuzzy Inputs -- Tuning of Parameters Backstepping Ship Course Controller by Genetic Algorithm -- Visualization of Five Erosion Risk Classes using Kernel Discriminants -- Computer Security and Safety -- Multiple Error Detection in Substitution Blocks for Block Ciphers -- Parallelization Method of Encryption Algorithms -- When a Family of Iris Flower is Normal, Then are Others Abnormal? -- Strong Boolean Functions with Compact ANF Representation -- Visual Cryptography Methods as a Source of Trustworthiness for the Signature Creation and Verification Systems -- Neural Network as a Programmable Block Cipher -- On Intermediate Evaluation of Block Ciphers -- Development of Concealing the Purpose of Processing for Programs in a Distributed Computing Environment -- Covert Channel for Improving VoIP Security -- Cryptanalysis of Chaotic Product Cipher -- Embedding of Stego–Messages in Monochrome Images on the Base of Rank Filtering -- Image Analysis, Graphics and Biometrics -- JPEG 2000 Image Coding Standard - A Review and Applications -- New Experiments on Word Recognition Without Segmentation -- Signature Verification by View-Based Feature Extractor and DTW Classifier -- Increasing Performance of Fingerprint Recognition Systems Using Reconstruction of Ridge Lines Methods -- Design and Prototyping of an Industrial Fault Clustering System Combining Image Processing and Artificial Neural Network Based Approaches -- Image Pre-classification for Biometrics Identification Systems -- Application of Improved Projection Method to Binary Images -- Computer Simulation and Data Analysis -- A Consideration of Processor Utilization on Multi-Processor System -- Reliability of Node Information on Autonomous Load Distribution Method -- Methodology of Developing Computer-Based Training Systems for Operators of Dynamic Objects -- Algorithms of Identification of Multi-connected Boundary Geometry and Material Parameters in Problems Described by Navier-Lame Equation Using the PIES -- Analysis of an Open Linked Series Three-station Network with Blocking -- Hyperplane Method Implementation for Loops Parallelization in the .NET Environment -- On a Nonlinear Production-Inventory Problem. 
520 |a This book contains a selection of the best papers given at the international Advanced Computer Systems Conference in October 2006 in Miedzyzdroje, Poland. Combining research areas from both Computer Science and Industrial Management, the book is partitioned into four topical areas: Artificial Intelligence Computer Security and Safety Image Analysis, Graphics and Biometrics Computer Simulation and Data Analysis The Artificial Intelligence section considers results of the science and engineering of making intelligent algorithms and computer programs. This section includes papers on Humatronics, Fuzzy Logic, Robotics, Cell, Genetic and Probabilistic Algorithms, Incomplete Data and Similarity Relations, and Fast Neural Networks. The Computer Security and Safety section covers a wide range of issues, including Error Detection in Block Ciphers, Parallelization of Encryption Algorithms, Visual Cryptography Methods, Neural Network for Building Programmable Block Ciphers, Security and Safety in Distributed Computing Environments, and Chaotic Product Cipher. The Image Analysis, Graphics and Biometrics section deals with difficult tasks studying the extraction of meaningful information from images as well as methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Included are chapters dealing with Word Recognition, Signature Identification, Fingerprint Recognition, and Biometric Image Pre-classification. The Computer Simulation and Data Analysis section concerns computer programs that attempt to simulate an abstract model of a particular system and transform data with the aim of extracting useful information and facilitating conclusions. It includes papers devoted to Processor Utilization on Multi-Processor Systems, Computer-based Training Systems for Operators of Dynamic Objects, Linked Computer Servers, Loops Parallelization in the .NET Environment to be used for simulation purposes, and related topics. 
650 0 |a Computer science. 
650 0 |a Computer security. 
650 0 |a Data structures (Computer science). 
650 0 |a Data encryption (Computer science). 
650 0 |a Coding theory. 
650 1 4 |a Computer Science. 
650 2 4 |a Data Encryption. 
650 2 4 |a Coding and Information Theory. 
650 2 4 |a Data Structures, Cryptology and Information Theory. 
650 2 4 |a Systems and Data Security. 
700 1 |a Pejaś, Jerzy.  |e editor. 
700 1 |a Saeed, Khalid.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9780387731360 
856 4 0 |u http://dx.doi.org/10.1007/978-0-387-73137-7  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)