Enhanced Methods in Computer Security Biometric and Artificial Intelligence Systems

Enhanced Methods in Computer Security  Biometric and Artificial Intelligence Systems
Author: Jerzy Pejas,Andrzej Piegat
Publsiher: Springer
Total Pages: 396
Release: 2004-11-02
ISBN: 9781402077760
Category: Computers
Language: EN, FR, DE, ES & NL

Enhanced Methods in Computer Security Biometric and Artificial Intelligence Systems Book Excerpt:

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research. "Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions analyzing such areas of AI as fuzzy set theory, predicate logic, neural networks, clustering, data mining and others. It also presents applications of AI as possible solutions for problems like firm bankruptcy, soil erosion, flight control and others. "Information Technology Security" covers three important areas of security engineering in information systems: software security, public key infrastructure and the design of new cryptographic protocols and algorithms. "Biometric Systems" comprises 11 contributions dealing with face picture analysis and recognition systems. This chapter focuses on known methods of biometric problem solution as well as the design of new models.

Enhanced Methods in Computer Security Biometric and Artificial Intelligence Systems

Enhanced Methods in Computer Security  Biometric and Artificial Intelligence Systems
Author: Jerzy Pejas,Andrzej Piegat
Publsiher: Springer Science & Business Media
Total Pages: 396
Release: 2006-07-18
ISBN: 0387234845
Category: Computers
Language: EN, FR, DE, ES & NL

Enhanced Methods in Computer Security Biometric and Artificial Intelligence Systems Book Excerpt:

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research. "Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions analyzing such areas of AI as fuzzy set theory, predicate logic, neural networks, clustering, data mining and others. It also presents applications of AI as possible solutions for problems like firm bankruptcy, soil erosion, flight control and others. "Information Technology Security" covers three important areas of security engineering in information systems: software security, public key infrastructure and the design of new cryptographic protocols and algorithms. "Biometric Systems" comprises 11 contributions dealing with face picture analysis and recognition systems. This chapter focuses on known methods of biometric problem solution as well as the design of new models.

Enhanced Methods in Computer Security Biometric and Artificial Intelligence Systems

Enhanced Methods in Computer Security  Biometric and Artificial Intelligence Systems
Author: Jerzy Pejas,Andrzej Piegat
Publsiher: Springer
Total Pages: 396
Release: 2008-11-01
ISBN: 9780387522371
Category: Computers
Language: EN, FR, DE, ES & NL

Enhanced Methods in Computer Security Biometric and Artificial Intelligence Systems Book Excerpt:

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research. "Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions analyzing such areas of AI as fuzzy set theory, predicate logic, neural networks, clustering, data mining and others. It also presents applications of AI as possible solutions for problems like firm bankruptcy, soil erosion, flight control and others. "Information Technology Security" covers three important areas of security engineering in information systems: software security, public key infrastructure and the design of new cryptographic protocols and algorithms. "Biometric Systems" comprises 11 contributions dealing with face picture analysis and recognition systems. This chapter focuses on known methods of biometric problem solution as well as the design of new models.

Biometrics Computer Security Systems and Artificial Intelligence Applications

Biometrics  Computer Security Systems and Artificial Intelligence Applications
Author: Khalid Saeed,Jerzy Pejas,Romuald Mosdorf
Publsiher: Springer Science & Business Media
Total Pages: 342
Release: 2007-01-11
ISBN: 0387365036
Category: Computers
Language: EN, FR, DE, ES & NL

Biometrics Computer Security Systems and Artificial Intelligence Applications Book Excerpt:

This book presents the most recent achievements in some rapidly developing fields within Computer Science. This includes the very latest research in biometrics and computer security systems, and descriptions of the latest inroads in artificial intelligence applications. The book contains over 30 articles by well-known scientists and engineers. The articles are extended versions of works introduced at the ACS-CISIM 2005 conference.

Advances in Information Processing and Protection

Advances in Information Processing and Protection
Author: Jerzy Pejas,Khalid Saeed
Publsiher: Springer Science & Business Media
Total Pages: 460
Release: 2007-09-29
ISBN: 0387731377
Category: Computers
Language: EN, FR, DE, ES & NL

Advances in Information Processing and Protection Book Excerpt:

This book contains a selection of the best papers given at an international conference on advanced computer systems. The Advanced Computer Systems Conference was held in October 2006, in Miedzyzdroje, Poland. The book is organized into four topical areas: Artificial Intelligence; Computer Security and Safety; Image Analysis, Graphics and Biometrics; and Computer Simulation and Data Analysis.

Hard and Soft Computing for Artificial Intelligence Multimedia and Security

Hard and Soft Computing for Artificial Intelligence  Multimedia and Security
Author: Shin-ya Kobayashi,Andrzej Piegat,Jerzy Pejaś,Imed El Fray,Janusz Kacprzyk
Publsiher: Springer
Total Pages: 368
Release: 2016-10-19
ISBN: 331948429X
Category: Technology & Engineering
Language: EN, FR, DE, ES & NL

Hard and Soft Computing for Artificial Intelligence Multimedia and Security Book Excerpt:

This book gathers the proceedings of the 20th International Conference on Advanced Computer Systems 2016, held in Międzyzdroje (Poland) on October 19–21, 2016. Addressing topics that include artificial intelligence (AI), software technologies, multimedia systems, IT security and design of information systems, the main purpose of the conference and the book is to create an opportunity to exchange significant insights on this area between science and business. In particular, this expertise concerns the use of hard and soft computational methods for artificial intelligence, image and data processing, and finally, the design of information and security systems. The book contains a collection of carefully selected, peer-reviewed papers, combining high-quality original unpublished research, case studies, and implementation experiences.

Enhancing Information Security and Privacy by Combining Biometrics with Cryptography

Enhancing Information Security and Privacy by Combining Biometrics with Cryptography
Author: Sanjay Kanade,Dijana Petrovska-Delacretaz,Bernadette Dorizzi
Publsiher: Morgan & Claypool Publishers
Total Pages: 140
Release: 2012-06-01
ISBN: 1608458482
Category: Computers
Language: EN, FR, DE, ES & NL

Enhancing Information Security and Privacy by Combining Biometrics with Cryptography Book Excerpt:

This book deals with "crypto-biometrics", a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages, such as, revocability, template diversity, better verification accuracy, and generation of cryptographically usable keys that are strongly linked to the user identity. In this text, a thorough review of the subject is provided and then some of the main categories are illustrated with recently proposed systems by the authors. Beginning with the basics, this text deals with various aspects of crypto-biometrics, including review, cancelable biometrics, cryptographic key generation from biometrics, and crypto-biometric key sharing protocols. Because of the thorough treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy. Table of Contents: Introduction / Cancelable Biometric System / Cryptographic Key Regeneration Using Biometrics / Biometrics-Based Secure Authentication Protocols / Concluding Remarks

Artificial Intelligence Methodology Systems and Applications

Artificial Intelligence  Methodology  Systems  and Applications
Author: Allan Ramsay,Gennady Agre
Publsiher: Springer
Total Pages: 336
Release: 2012-08-29
ISBN: 3642331858
Category: Computers
Language: EN, FR, DE, ES & NL

Artificial Intelligence Methodology Systems and Applications Book Excerpt:

This book constitutes the refereed proceedings of the 15th International Conference on Artificial Intelligence: Methodology, Systems, and Applications, AIMSA 2012, held in Varna, Bulgaria in September 2012. The 36 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on natural language processing, social networks, knowledge representation and reasoning, machine learning, planning and agents, search, and computer vision.

Applications of Evolutionary Computing

Applications of Evolutionary Computing
Author: Anna I. Esparcia-Alcázar
Publsiher: Springer
Total Pages: 639
Release: 2013-03-12
ISBN: 3642371922
Category: Computers
Language: EN, FR, DE, ES & NL

Applications of Evolutionary Computing Book Excerpt:

This book constitutes the refereed proceedings of the International Conference on the Applications of Evolutionary Computation, EvoApplications 2013, held in Vienna, Austria, in April 2013, colocated with the Evo* 2013 events EuroGP, EvoCOP, EvoBIO, and EvoMUSART. The 65 revised full papers presented were carefully reviewed and selected from 119 submissions. EvoApplications 2013 consisted of the following 12 tracks: EvoCOMNET (nature-inspired techniques for telecommunication networks and other parallel and distributed systems), EvoCOMPLEX (evolutionary algorithms and complex systems), EvoENERGY (evolutionary computation in energy applications), EvoFIN (evolutionary and natural computation in finance and economics), EvoGAMES (bio-inspired algorithms in games), EvoIASP (evolutionary computation in image analysis, signal processing, and pattern recognition), EvoINDUSTRY (nature-inspired techniques in industrial settings), EvoNUM (bio-inspired algorithms for continuous parameter optimization), EvoPAR (parallel implementation of evolutionary algorithms), EvoRISK (computational intelligence for risk management, security and defence applications), EvoROBOT (evolutionary computation in robotics), and EvoSTOC (evolutionary algorithms in stochastic and dynamic environments).

Information Processing and Security Systems

Information Processing and Security Systems
Author: Khalid Saeed,Jerzy Pejas
Publsiher: Springer Science & Business Media
Total Pages: 475
Release: 2005-12-06
ISBN: 038726325X
Category: Computers
Language: EN, FR, DE, ES & NL

Information Processing and Security Systems Book Excerpt:

Information Processing and Security Systems is a collection of forty papers that were originally presented at an international multi-conference on Advanced Computer Systems (ACS) and Computer Information Systems and Industrial Management Applications (CISIM) held in Elk, Poland. This volume describes the latest developments in advanced computer systems and their applications within artificial intelligence, biometrics and information technology security. The volume also includes contributions on computational methods, algorithms and applications, computational science, education and industrial management applications.

Image Processing and Communications Challenges 7

Image Processing and Communications Challenges 7
Author: Ryszard S. Choraś
Publsiher: Springer
Total Pages: 310
Release: 2015-10-14
ISBN: 3319238140
Category: Technology & Engineering
Language: EN, FR, DE, ES & NL

Image Processing and Communications Challenges 7 Book Excerpt:

This book contains papers accepted for IP&C 2015, the International Conference on Image Processing and Communications, held at UTP University of Science and Technology, Bydgoszcz, Poland, September 9-11, 2015. This conference was the eighth edition in the IP&C series of annual conferences. This book and the conference have the aim to bring together researchers and scientists in the broad fields of image processing and communications, addressing recent advances in theory, methodology and applications. The book will be of interest to a large group of researchers, engineers and practitioners in image processing and communications.

Fundamentals of Speaker Recognition

Fundamentals of Speaker Recognition
Author: Homayoon Beigi
Publsiher: Springer Science & Business Media
Total Pages: 942
Release: 2011-12-09
ISBN: 0387775927
Category: Technology & Engineering
Language: EN, FR, DE, ES & NL

Fundamentals of Speaker Recognition Book Excerpt:

An emerging technology, Speaker Recognition is becoming well-known for providing voice authentication over the telephone for helpdesks, call centres and other enterprise businesses for business process automation. "Fundamentals of Speaker Recognition" introduces Speaker Identification, Speaker Verification, Speaker (Audio Event) Classification, Speaker Detection, Speaker Tracking and more. The technical problems are rigorously defined, and a complete picture is made of the relevance of the discussed algorithms and their usage in building a comprehensive Speaker Recognition System. Designed as a textbook with examples and exercises at the end of each chapter, "Fundamentals of Speaker Recognition" is suitable for advanced-level students in computer science and engineering, concentrating on biometrics, speech recognition, pattern recognition, signal processing and, specifically, speaker recognition. It is also a valuable reference for developers of commercial technology and for speech scientists. Please click on the link under "Additional Information" to view supplemental information including the Table of Contents and Index.

MultiMedia Modeling

MultiMedia Modeling
Author: Xiangjian He,Suhuai Luo,Dacheng Tao,Changsheng Xu,Jie Yang,Muhammad Abul Hasan
Publsiher: Springer
Total Pages: 586
Release: 2014-12-22
ISBN: 3319144456
Category: Computers
Language: EN, FR, DE, ES & NL

MultiMedia Modeling Book Excerpt:

The two-volume set LNCS 8935 and 8936 constitutes the thoroughly refereed proceedings of the 21st International Conference on Multimedia Modeling, MMM 2015, held in Sydney, Australia, in January 2015. The 49 revised regular papers, 24 poster presentations, were carefully reviewed and selected from 189 submissions. For the three special session, a total of 18 papers were accepted for MMM 2015. The three special sessions are Personal (Big) Data Modeling for Information Access and Retrieval, Social Geo-Media Analytics and Retrieval and Image or video processing, semantic analysis and understanding. In addition, 9 demonstrations and 9 video showcase papers were accepted for MMM 2015. The accepted contributions included in these two volumes represent the state-of-the-art in multimedia modeling research and cover a diverse range of topics including: Image and Video Processing, Multimedia encoding and streaming, applications of multimedia modelling and 3D and augmented reality.

Soft Computing Models in Industrial and Environmental Applications 6th International Conference SOCO 2011

Soft Computing Models in Industrial and Environmental Applications  6th International Conference SOCO 2011
Author: Emilio Corchado,Vaclav Snasael,Javier Sedano,Aboul Ella Hassanien,José Luis Calvo,Dominik Slezak
Publsiher: Springer Science & Business Media
Total Pages: 624
Release: 2011-03-04
ISBN: 3642196446
Category: Technology & Engineering
Language: EN, FR, DE, ES & NL

Soft Computing Models in Industrial and Environmental Applications 6th International Conference SOCO 2011 Book Excerpt:

This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at SOCO 2011 held in the beautiful and historic city of Salamanca, Spain, April 2011. This volume presents the papers accepted for the 2011 edition, both for the main event and the Special Sessions. SOCO 2011 Special Sessions are a very useful tool in order to complement the regular program with new or emerging topics of particular interest to the participating community. Four special sessions were organized related to relevant topics as: Optimization and Control in Industry, Speech Processing and Soft Computing, Systems, Man & Cybernetics and Soft Computing for Medical Applications.

First International Conference on Sustainable Technologies for Computational Intelligence

First International Conference on Sustainable Technologies for Computational Intelligence
Author: Ashish Kumar Luhach,Janos Arpad Kosa,Ramesh Chandra Poonia,Xiao-Zhi Gao,Dharm Singh
Publsiher: Springer Nature
Total Pages: 847
Release: 2019-11-01
ISBN: 9811500290
Category: Technology & Engineering
Language: EN, FR, DE, ES & NL

First International Conference on Sustainable Technologies for Computational Intelligence Book Excerpt:

This book gathers high-quality papers presented at the First International Conference on Sustainable Technologies for Computational Intelligence (ICTSCI 2019), which was organized by Sri Balaji College of Engineering and Technology, Jaipur, Rajasthan, India, on March 29–30, 2019. It covers emerging topics in computational intelligence and effective strategies for its implementation in engineering applications.

Soft Computing in Computer and Information Science

Soft Computing in Computer and Information Science
Author: Antoni Wiliński,Imed El Fray,Jerzy Pejaś
Publsiher: Springer
Total Pages: 446
Release: 2015-03-19
ISBN: 3319151479
Category: Technology & Engineering
Language: EN, FR, DE, ES & NL

Soft Computing in Computer and Information Science Book Excerpt:

This book presents a carefully selected and reviewed collection of papers presented during the 19th Advanced Computer Systems conference ACS-2014. The Advanced Computer Systems conference concentrated from its beginning on methods and algorithms of artificial intelligence. Further future brought new areas of interest concerning technical informatics related to soft computing and some more technological aspects of computer science such as multimedia and computer graphics, software engineering, web systems, information security and safety or project management. These topics are represented in the present book under the categories Artificial Intelligence, Design of Information and Multimedia Systems, Information Technology Security and Software Technologies.

Artificial Intelligence Methodology Systems and Applications

Artificial Intelligence  Methodology  Systems  and Applications
Author: Daniel Dochev,Paolo Traverso,Marco Pistore
Publsiher: Springer Science & Business Media
Total Pages: 416
Release: 2008-08-26
ISBN: 3540857753
Category: Computers
Language: EN, FR, DE, ES & NL

Artificial Intelligence Methodology Systems and Applications Book Excerpt:

The 13th Conference on Arti?cial Intelligence: Methodology, Systems, App- cations (AIMSA 2008) was held in Varna, Bulgaria, on September 4–6, 2008. The AIMSA conference series has provideda biennial forum for the presentation of arti?cial intelligence research and development since 1984. The conference covered the full range of topics in arti?cial intelligence and related disciplines and provided an ideal forum for international scienti?c exchange between C- tral/Eastern Europe and the rest of the world. For AIMSA 2008,wedecided to placespecial emphasisonthe worksonth- ries, experimentations, applications, and case studies that demonstrate in pr- tice the added value and the impact ofAI science,methodologiesand techniques for the market,society,and culture. We believe that this vision of “[email protected]” truly re?ects the original intention of AIMSA, a conference dedicated to ar- ?cial intelligence in its entirety but with a special emphasis on “methodology, systems, and applications”, as explicitly stated in its name. According to this vision, we have also paid special attention to works that “cross the boundaries of AI”, i. e. , works that demonstrate the in?uence of AI on di?erent ?elds of research and di?erent scienti?c communities, such as software engineering, data bases, distributed systems, information systems, information retrieval, etc. Both of these aspects were covered by the papers that were submitted and by those that were accepted for publication. A total of 109 papers were submitted to the conference, and the program committee accepted 30 full papers and 10 posters.

Applications of Evolutionary Computation

Applications of Evolutionary Computation
Author: Anna I. Esparcia-Alcázar,Antonio M. Mora
Publsiher: Springer
Total Pages: 969
Release: 2014-11-28
ISBN: 3662455234
Category: Computers
Language: EN, FR, DE, ES & NL

Applications of Evolutionary Computation Book Excerpt:

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on the Applications of Evolutionary Computation, EvoApplications 2014, held in Granada, Spain, in April 2014, colocated with the Evo* 2014 events EuroGP, EvoCOP, and EvoMUSART. The 79 revised full papers presented were carefully reviewed and selected from 128 submissions. EvoApplications 2014 consisted of the following 13 tracks: EvoCOMNET (nature-inspired techniques for telecommunication networks and other parallel and distributed systems), EvoCOMPLEX (evolutionary algorithms and complex systems), EvoENERGY (evolutionary computation in energy applications), EvoFIN (evolutionary and natural computation in finance and economics), EvoGAMES (bio-inspired algorithms in games), EvoIASP (evolutionary computation in image analysis, signal processing, and pattern recognition), EvoINDUSTRY (nature-inspired techniques in industrial settings), EvoNUM (bio-inspired algorithms for continuous parameter optimization), EvoPAR (parallel implementation of evolutionary algorithms), EvoRISK (computational intelligence for risk management, security and defence applications), EvoROBOT (evolutionary computation in robotics), EvoSTOC (evolutionary algorithms in stochastic and dynamic environments), and EvoBio (EC and related techniques in bioinformatics and computational biology).

Intelligent Data Engineering and Automated Learning IDEAL 2010

Intelligent Data Engineering and Automated Learning    IDEAL 2010
Author: Colin Fyfe,Peter Tino,Darryl Charles,Cesar Garcia Osorio,Hujun Yin
Publsiher: Springer Science & Business Media
Total Pages: 398
Release: 2010-08-19
ISBN: 3642153801
Category: Computers
Language: EN, FR, DE, ES & NL

Intelligent Data Engineering and Automated Learning IDEAL 2010 Book Excerpt:

This book constitutes the refereed proceedings of the 11th International Conference on Intelligent Data Engineering and Automated Learning, IDEAL 2010, held in Paisley, Scotland, in September 2010. The 47 revised full papers presented were carefully reviewed and selected from many submissions for inclusion in the book and present the latest theoretical advances and real-world applications in computational intelligence.

Security Enhanced Applications for Information Systems

Security Enhanced Applications for Information Systems
Author: Christos Kalloniatis
Publsiher: BoD – Books on Demand
Total Pages: 236
Release: 2012-05-30
ISBN: 9535106430
Category: Computers
Language: EN, FR, DE, ES & NL

Security Enhanced Applications for Information Systems Book Excerpt:

Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users’ trust as well as the reputation of the system’s stakeholders. Designing and implementing security enhanced systems is of vital importance. Therefore, this book aims to present a number of innovative security enhanced applications. It is titled “Security Enhanced Applications for Information Systems” and includes 11 chapters. This book is a quality guide for teaching purposes as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems. It involves cases based on the standalone, network and Cloud environments.