Sold Out
Book Categories |
Image Analysis and Biometrics
Image Filtration and Feature Extraction for Face Recognition 3
Visualization of Some Multi-Class Erosion Data Using GDA and Supervised SOM 13
Wavelet Transform in Face Recognition 23
Content-Based Image Retrieval - A Survey 31
Method of Speech Recognition and Speaker Identification Using Audio-Visual of Polish Speech and Hidden Markov Models 45
Synthesis of Codebooks with Perceptually Monitored Structure for Multiband CELP-Coders 57
The Color Information as a Feature for Postage Stamps Recognition 69
Iris Shape Evaluation in Face Image with Simple Background 79
Experimental Algorithm for Characteristic Points Evaluation in Static Images of Signatures 89
Computer Security Systems
Parallelization of Standard Modes of Operation for Symmetric Key Block Ciphers 101
On Differentia] and Linear Approximation of S-box Functions 111
Random Generation of S-Boxes for Block Cipliers 121
Problems of Sending Sensitive Information 137
Hash Chaining for Authenticated Data Structures Freshness Checking 155
Stream Cipher Keys Generation with Low Power Consumption Based on LFSR 165
The Quality of Obfuscation and Obfuscation Techniques 175
Artificial Intelligence andApplications
Capability and Functionings: A Fuzzy Way to Measure Interaction between Father and Child 185
Remarks on Computer Simulations 197
Analysis of E-learning System Dynamics 207
Can a Negative Selection Detect an Extremely Few Non-self Among Enormous Amount of Self Cells? 217
An Average Length of Computations of Normalized Probabilistic Algorithms 227
A Marine Environment Simulator for Testing Ship Control Systems in Dangerous Situations 237
Image Enhancement and Image Half-toning Using Fluid Particles Physics Dynamics 247
Tandem Models with Blocking in the Computer Subnetworks Performance Analysis 259
Interchangeable Strategies in Games Without Side Payments on the Base of Uncertain Information on Resources 269
Properties of Morphological Operators Applied to Analysis of ECG Signals 279
Input's Significance Evaluation in a Multi Input-Variable System 289
Calculating the Fractal Dimension of River Basins, Comparison of Several Methods 299
Automatic Management of Tele-Interpretation Knowledge in a Wearable Diagnostic Device 311
Evaluation of Clusters Quality in Artificial Immune Clustering System - SArIS 323
Convergence Analysis of the Boundary Geometry Identification Obtained by Genetic Algorithms in the PIES 333
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionBiometrics, Computer Security Systems and Artificial Intelligence Applications
X
This Item is in Your InventoryBiometrics, Computer Security Systems and Artificial Intelligence Applications
X
You must be logged in to review the productsX
X
X
Add Biometrics, Computer Security Systems and Artificial Intelligence Applications, , Biometrics, Computer Security Systems and Artificial Intelligence Applications to the inventory that you are selling on WonderClubX
X
Add Biometrics, Computer Security Systems and Artificial Intelligence Applications, , Biometrics, Computer Security Systems and Artificial Intelligence Applications to your collection on WonderClub |