Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems~tqw~ darksiderg

  • Download 5x Faster
  • Download torrent
  • Direct Download
  • Rate this torrent +  |  -

Torrent info

Name:Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems~tqw~ darksiderg

Total Size: 24.29 MB

Magnet: Magnet Link

Seeds: 0

Leechers: 0

Stream: Watch Full Movie @ Movie4u

Last Updated: 2015-05-23 19:26:03 (Update Now)

Torrent added: 2009-08-20 22:53:10

VPN For Torrents

Torrent Files List

tracked_by_h33t_com.txt (Size: 24.29 MB) (Files: 3)


0.02 KB

 Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems~tqw~_darksiderg.pdf

24.29 MB

 Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems~tqw~_darksiderg.nfo

5.75 KB


leech seeds

Torrent description

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems

General Information
Type.................: Ebook
Part Size............: 25,465,864 bytes

Post Information
Posted by............: ~tqw~

Release Notes
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
Systems contains over 30 contributions from leading European researchers showing
the present state and future directions of computer science research.

"Methods of Artificial Intelligence and Intelligent Agents" contains 13
contributions analyzing such areas of AI as fuzzy set theory, predicate logic,
neural networks, clustering, data mining and others. It also presents
applications of AI as possible solutions for problems like firm bankruptcy, soil
erosion, flight control and others.

"Information Technology Security" covers three important areas of security
engineering in information systems: software security, public key infrastructure
and the design of new cryptographic protocols and algorithms.

"Biometric Systems" comprises 11 contributions dealing with face picture
analysis and recognition systems. This chapter focuses on known methods of
biometric problem solution as well as the design of new models.

Table of Contents
Chapter 1 How can we justify trust in software based systems? 3
Chapter 2 The capacity of ciphers fulfilling the accessibility of cryptograms 13
Chapter 3 Parallelization of the data encryption standard (DES) algorithm 23
Chapter 4 Linked authenticated dictionaries for certificate status
verification 35
Chapter 5 Integrated payment system for public key infrastructure services 47
Chapter 6 Some methods of the analysis and risk assessment in the PKI system
services providers 61
Chapter 7 VAST : Versatile Anonymous Systems for Web Users 71
Chapter 8 Cryptography and steganography : teaching experience 83
Chapter 9 Analysis of non-linear pseudo-noise sequences 93
Chapter 10 Tool support for detecting defects in object-oriented models 103
Chapter 11 The proposal of protocol for electronic signature creation in public
environment 113
Chapter 12 On arithmetic subtraction linear approximation 125
Chapter 13 Secure data transmission via modulation of the chaotic sequence
parameters 135
Chapter 14 Some advances and challenges in live biometrics, personnel
management, and other "human being" applications 145
Chapter 15 An environment for recognition systems modeling 157
Chapter 16 Modified gradient method for face localization 165
Chapter 17 Three stage face recognition algorithm for visitor identification
system 177
Chapter 18 A new approach for hand-palm recognition 185
Chapter 19 An experimental criterion for face classification 195
Chapter 20 Contour objects recognition based on UNL-Fourier descriptors 203
Chapter 21 Sonar image simulation by means of ray tracing and image processing
Chapter 22 The PCA reconstruction based approach for extending facial image
databases for face recognition systems 215
Chapter 23 Investigation of fingerprint verification algorithm based on local
centers method 229
Chapter 24 Czestochowa's precise model of a face based on the facial asymmetry,
ophthalmogeometry, and brain asymmetry phenomena : the idea and algorithm sketch
Chapter 25 A fuzzy expert approach for comparing alternative end uses for
requalification of contaminated sites 255
Chapter 26 Training assisting program with hybrid decision supporting system 267
Chapter 27 Numerical problems with evaluating the fractal dimension of real data
Chapter 28 Multi-stage ship control in a fuzzy environment 285
Chapter 29 Informative value of the possibilistic extension principle 301
Chapter 30 Intelligent marine control systems 311
Chapter 31 How to deal with the data in a bankruptcy modeling 321
Chapter 32 Dependency mining in large sets of stock market trading rules 329
Chapter 33 Choosing representative data items : Kohonen, neural gas or mixture
model? 337
Chapter 34 Application of the ant colony algorithm for the path planning 345
Chapter 35 Application of fuzzy logic for track corrector formation into flight
simulator 353
Chapter 36 Algorithm for automatic definition of validated and non-validated
region in multi-dimensional space 361
Chapter 37 Adaptive simulation of separable dynamical systems in the neural
network basis 371
Chapter 38 Improvement of the processors operating ratio in task scheduling
using the deadline method 387

Product Details

* ISBN: 1402077769
* ISBN-13: 9781402077760
* Format: Hardcover, 412pp
* Publisher: Springer-Verlag New York, LLC
* Pub. Date: November 2004

Install Notes
Adobe Acrobat Reader

related torrents

Torrent name

health leech seeds Size

comments (0)

Main Menu