Wonder Club world wonders pyramid logo
×

Biometrics, Computer Security Systems and Artificial Intelligence Applications Book

Biometrics, Computer Security Systems and Artificial Intelligence Applications
Biometrics, Computer Security Systems and Artificial Intelligence Applications, , Biometrics, Computer Security Systems and Artificial Intelligence Applications has a rating of 3 stars
   2 Ratings
X
Biometrics, Computer Security Systems and Artificial Intelligence Applications, , Biometrics, Computer Security Systems and Artificial Intelligence Applications
3 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
100 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $175.00
Original Magazine
Physical Format

Sold Out

  • Biometrics, Computer Security Systems and Artificial Intelligence Applications
  • Written by author Khalid Saeed
  • Published by Springer-Verlag New York, LLC, November 2006
  • This book presents the most recent achievements in some fascinating and rapidly developing fields within Computer Science. The scientific works presented in this book have been partitioned into three topical groups: Image Analysis and Biometrics, Comp
Buy Digital  USD$175.00

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Image Analysis and Biometrics
Image Filtration and Feature Extraction for Face Recognition     3
Visualization of Some Multi-Class Erosion Data Using GDA and Supervised SOM     13
Wavelet Transform in Face Recognition     23
Content-Based Image Retrieval - A Survey     31
Method of Speech Recognition and Speaker Identification Using Audio-Visual of Polish Speech and Hidden Markov Models     45
Synthesis of Codebooks with Perceptually Monitored Structure for Multiband CELP-Coders     57
The Color Information as a Feature for Postage Stamps Recognition     69
Iris Shape Evaluation in Face Image with Simple Background     79
Experimental Algorithm for Characteristic Points Evaluation in Static Images of Signatures     89
Computer Security Systems
Parallelization of Standard Modes of Operation for Symmetric Key Block Ciphers     101
On Differentia] and Linear Approximation of S-box Functions     111
Random Generation of S-Boxes for Block Cipliers     121
Problems of Sending Sensitive Information     137
Hash Chaining for Authenticated Data Structures Freshness Checking     155
Stream Cipher Keys Generation with Low Power Consumption Based on LFSR     165
The Quality of Obfuscation and Obfuscation Techniques     175
Artificial Intelligence andApplications
Capability and Functionings: A Fuzzy Way to Measure Interaction between Father and Child     185
Remarks on Computer Simulations     197
Analysis of E-learning System Dynamics     207
Can a Negative Selection Detect an Extremely Few Non-self Among Enormous Amount of Self Cells?     217
An Average Length of Computations of Normalized Probabilistic Algorithms     227
A Marine Environment Simulator for Testing Ship Control Systems in Dangerous Situations     237
Image Enhancement and Image Half-toning Using Fluid Particles Physics Dynamics     247
Tandem Models with Blocking in the Computer Subnetworks Performance Analysis     259
Interchangeable Strategies in Games Without Side Payments on the Base of Uncertain Information on Resources     269
Properties of Morphological Operators Applied to Analysis of ECG Signals     279
Input's Significance Evaluation in a Multi Input-Variable System     289
Calculating the Fractal Dimension of River Basins, Comparison of Several Methods     299
Automatic Management of Tele-Interpretation Knowledge in a Wearable Diagnostic Device     311
Evaluation of Clusters Quality in Artificial Immune Clustering System - SArIS     323
Convergence Analysis of the Boundary Geometry Identification Obtained by Genetic Algorithms in the PIES     333


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Biometrics, Computer Security Systems and Artificial Intelligence Applications, , Biometrics, Computer Security Systems and Artificial Intelligence Applications

X
WonderClub Home

This item is in your Collection

Biometrics, Computer Security Systems and Artificial Intelligence Applications, , Biometrics, Computer Security Systems and Artificial Intelligence Applications

Biometrics, Computer Security Systems and Artificial Intelligence Applications

X
WonderClub Home

This Item is in Your Inventory

Biometrics, Computer Security Systems and Artificial Intelligence Applications, , Biometrics, Computer Security Systems and Artificial Intelligence Applications

Biometrics, Computer Security Systems and Artificial Intelligence Applications

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: