Cargando…

Information Processing and Security Systems

Information Processing and Security Systems is a collection of forty papers that were originally presented at an international multi-conference on Advanced Computer Systems (ACS) and Computer Information Systems and Industrial Management Applications (CISIM) held in Elk, Poland. This volume describe...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Saeed, Khalid (Editor ), Pejas, Jerzy (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer US : Imprint: Springer, 2005.
Edición:1st ed. 2005.
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-0-387-26325-0
003 DE-He213
005 20220120093514.0
007 cr nn 008mamaa
008 100301s2005 xxu| s |||| 0|eng d
020 |a 9780387263250  |9 978-0-387-26325-0 
024 7 |a 10.1007/b137371  |2 doi 
050 4 |a QA268 
072 7 |a GPJ  |2 bicssc 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
082 0 4 |a 005.824  |2 23 
245 1 0 |a Information Processing and Security Systems  |h [electronic resource] /  |c edited by Khalid Saeed, Jerzy Pejas. 
250 |a 1st ed. 2005. 
264 1 |a New York, NY :  |b Springer US :  |b Imprint: Springer,  |c 2005. 
300 |a X, 475 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Digital Image and Signal Processing -- Fourier Descritpor-Based Deformable Models for Segmentation of the Distal Femur in CT -- Hierarchical Segmentation of Sparse Surface Data Using Energy-Minimization Approach -- Interactive Real-time Image Analysis System for Distant Operation -- Analysis/Synthesis Speech Model Based on the Pitch-Tracking Periodic-Aperiodic Decomposition -- Bio-inspired voice activity detector based on the human speech properties in the modulation domain -- A New Step in Arabic Speech Identification: Spoken Digit Recognition -- Split Vector Quantization of Psychoacoustical Modified LSF Coefficients in Speech Coder Based on Pitch-Tracking Periodic-Aperiodic Decomposition -- New results in 3D views of polyhedron generation on view sphere with perspective projection -- Gram-Schmidt Orthonormalization-Based Color Model for Object Detection -- Eyes detection with motion interpretation -- Financial Distress Prediction Using Different Pattern Recognition Methods -- Genetic algorithms applied to optimal arrangement of collocation points in 3D potential boundary-value problems -- Computer Security and Safety -- Fast Computation of Approximation Tables -- Cryptographic Properties of Some Cryptosystem with Modulation of the Chaotic Sequence Parameters -- Keys distribution for asymmetric cryptographic systems -- Two-pattern test generation with low power consumption based on LFSR -- Unauthorized servers for online certificates status verification -- Micropayments with Privacy - a New Proposal for E-commerce -- A model-based approach to analysis of authentication protocols -- Accessibility of information in realtime systems -- Protocol for Certificate Based Access Control Policies Description Language -- Impact of the address changing on the detection of pattern sensitive faults -- Software IP Protection Based on Watermarking Techniques -- Probabilistic Analysis of Operational Security for Network Systems -- Quality of Service Requirements in Computer Networks with Blocking -- Artificial Intelligence-Oriented Trends and Applications -- Genetic BDD-oriented Pattern Classifiers -- A fuzzy way to evaluate the qualitative attributes in bank lending creditworthiness -- Multidimensional Systems, Signals, Circuits, and Repetitive Processes: Theory, Applications, and Future Trends -- Modelling using probabilistic algorithms -- Fuzzy Parametric Integral Equations System in modelling of polygonal potential boundary problems described by the Laplace equation -- From Integrated Circuits Technology to Silicon Grey Matter: Hardware Implementation of Artificial Neural Networks -- A Tiny Flat-island in a Huge Lake - How can we search for it if completely flatland elsewhere? -- A Soft Computing Based Approach Using Signal-To-Image Conversion for Computer Aided Medical Diagnosis (CAMD) -- The prediction of behaviours of chaotic dynamical systems in 3D state space -- Idiotypic Networks as a Metaphor for Data Analysis Algorithms -- Global learning of decision trees by an evolutionary algorithm -- Ships' domains as collision risk at sea in the evolutionary method of trajectory planning -- Inputs' Significance Analysis with Rough Sets Theory -- Semi-Markov process in performance evaluation of asynchronous processors -- Organization of the modeling and simulation of the discrete processes -- The Jeep Problem, searching for the best strategy with a genetic algorithm -- Evaluation of operation and state of an object using artificial intelligence tools. 
520 |a Information Processing and Security Systems is a collection of forty papers that were originally presented at an international multi-conference on Advanced Computer Systems (ACS) and Computer Information Systems and Industrial Management Applications (CISIM) held in Elk, Poland. This volume describes the latest developments in advanced computer systems and their applications within artificial intelligence, biometrics and information technology security. The volume also includes contributions on computational methods, algorithms and applications, computational science, education and industrial management applications. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Software engineering. 
650 0 |a Artificial intelligence. 
650 0 |a Computers, Special purpose. 
650 0 |a Computer engineering. 
650 0 |a Computer networks . 
650 1 4 |a Cryptology. 
650 2 4 |a Software Engineering. 
650 2 4 |a Artificial Intelligence. 
650 2 4 |a Special Purpose and Application-Based Systems. 
650 2 4 |a Computer Engineering and Networks. 
700 1 |a Saeed, Khalid.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Pejas, Jerzy.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9780387505756 
776 0 8 |i Printed edition:  |z 9780387250915 
776 0 8 |i Printed edition:  |z 9781461498100 
856 4 0 |u https://doi.uam.elogim.com/10.1007/b137371  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)