Apress Access

Advances in Information Processing and Protection

By Jerzy Pejas , Khalid Saeed

  • eBook Price: $159.00
Buy eBook Buy Print Book

Advances in Information Processing and Protection Cover Image

  • Add to Wishlist
  • ISBN13: 978-0-3877-3136-0
  • 474 Pages
  • User Level: Science
  • Publication Date: September 29, 2007
  • Available eBook Formats: PDF
Full Description
This book contains a selection of the best papers given at the Advanced Computer Systems Conference in October 2006 in Poland. The book is partitioned into four topical areas: The Artificial Intelligence section includes papers on Humatronics, Fuzzy Logic, Robotics, Cell, Genetic and Probabilistic Algorithms, Incomplete Data and Similarity Relations, and Fast Neural Networks. The Computer Security and Safety section covers a wide range of issues, from Error Detection in Block Ciphers to Visual Cryptography Methods. The Image Analysis, Graphics and Biometrics section deals with the extraction of meaningful information from images as well as methods for uniquely recognizing humans based upon intrinsic physical or behavioral traits. The Computer Simulation and Data Analysis section concerns computer programs that attempt to simulate an abstract model of a particular system and transform data with the aim of extracting useful information and facilitating conclusions.
Table of Contents

Table of Contents

  1. Humatronics and RT
  2. Middleware.
  3. The Grouping of Valuations in Probabilistic Algorithms.
  4. Hybrid Diagnosis Approaches.
  5. Networked Robots Personal Tastes Acquisition and Sharing.
  6. Reduction of Rules of a Fuzzy Model Response for Fuzzy Inputs.
  7. Multiple Error Detection in Substitution Blocks for Block Ciphers.
  8. Automatic Parallelization Method of Encryption Algorithms.
  9. Covert Channel for Improving VOIP Security.
  10. Cryptanalysis of Chaotic Product Cipher.
  11. Image Pre
  12. classification for Biometrics Identification Systems.
  13. New Experiments on Word Recognition Without Segmentation.
  14. Reliability of Node Information on Autonomous Load Distribution Method.
  15. A Consideration of Processor Utilization on Multi
  16. Processor Systems.

If you think that you've found an error in this book, please let us know by emailing to editorial@apress.com . You will find any confirmed erratum below, so you can check if your concern has already been addressed.
No errata are currently published