Advances in Information Processing and Protection / Edition 1

Advances in Information Processing and Protection / Edition 1

by Jerzy Pejas

This book contains a selection of the best papers given at the international Advanced Computer Systems Conference in October 2006 in Miedzyzdroje, Poland. Combining research areas tram both Computer Science and Industrial Management, the book is partitioned into four topical areas: See more details below


This book contains a selection of the best papers given at the international Advanced Computer Systems Conference in October 2006 in Miedzyzdroje, Poland. Combining research areas tram both Computer Science and Industrial Management, the book is partitioned into four topical areas:

Product Details

Springer US
Publication date:
Edition description:
Product dimensions:
6.30(w) x 9.30(h) x 1.20(d)

Table of Contents

Part I - Artificial Intelligence

Humatronics and RT-Middleware Toru Yamaguchi Eri Sato 3

A Fuzzy Way to Measure Quality of Work in a Multidimensional Perspective Tindara Addabbo Gisella Facchinetti Giovanni Mastroleo Giovanni Solinas 13

Application of the Peano Curve for the Robot Trajectory Generating Martin Plucinski Martin Korzen 25

On Some Properties of the B-Cell Algorithm in Non-Stationary Environments Krzysztof Trojanowski Slawomir T. Wierzchon 35

The Grouping of Valuations in Probabilistic Algorithms Anna Borowska 45

Inverted Lists Compression using Contextual Information Dariusz Czerski Krzysztof Ciesielski Michal Draminski Mieczyslaw A. Klopotek Slawomir T. Wierzchon 55

Hybrid Intelligent Diagnosis Approaches:Analysis and Comparison under a Biomedicine Application Amine Chohra Nadia Kanaoui Kurosh Madani 67

Predicting Incomplete Data on the Basis of Non Symmetric Similarity Relation Ewa Adamus Andrzej Piegat 77

Methods of Designing and System Analysisof Fast Neural Networks and Linear Tunable Transformations Alexander Dorogov 85

Minimal Coverage of Investigated Object when Seeking for its Fractal Dimension Adam Szustalewicz 117

Networked Robots Personal Tastes Acquisition and Sharing Yoshiharu Yoshida Toru Yamaguchi Eri Sato Toshihiro Shibano 129

Reduction of Rules of a Fuzzy Model with a Chain Mode Izabela Rejer l139

Singleton Representation of Fuzzy Set for Computing Fuzzy Model Response for Fuzzy Inputs Karina Murawko-Wisniewska Andrzej Piegat 149

Tuning of Parameters Backstepping Ship Course Controller by Genetic Algorithm Anna Witkowska Roman Smierzchalski 159

Visualization of Five rosion Risk Classes using Kernel Discriminants AnnaBartkowiak Niki Evelpidou Andreas Vasilopoulos 169

Part II - Computer Security and Safety

Multiple Error Detection in Substitution Blocks for Block Ciphers Krzysztof Bucholc Ewa Idzikowska 181

Parallelization Method of Encryption Algorithms Wlodzimierz Bielecki Dariusz Burak 191

When a Family of Iris Flower is Normal, Then are Others Abnormal? Akira Imada 205

Strong Boolean Functions with Compact ANF Representation Anna Grocholewska Czurylo 215

Visual Cryptography Methods as a Source of Trustworthiness for the Signature Creation and Verification Systems Jerzy Pejas Michal Zawalich 225

Neural Network as a Programmable Block Cipher Piotr Kotlarz Zbigniew Kotulski 241

On Intermediate Evaluation of Block Ciphers Krzysztof Chmiel 251

Development of Concealing the Purpose of Processing for Programs in a Distributed Computing Environment Yuji Kinoshita Koichi Kashiwagi Yoshinobu Higami Shin-Ya Kobayashi 263

Covert Channel for Improving VoIP Security Wojciech Mazurczyk Zbigniew Kotulski 271

Cryptanalysis of Chaotic Product Cipher Adrian Skrobek Pawel Sukiennik 281

Embedding of Stego-Messages in Monochrome Images on the Base of Rank Filtering Larisa Dobryakova Orest Popov 291

Part III - Image Analysis, Graphics and Biometrics

JPEG 2000 Image Coding Standard - a Review and Applications RyszardS. Choras 303

New Experiments on Word Recognition Without Segmentation Khalid Saeed Marek Tabedzki 323

Signature Verification by View-Based Feature Extractor and DTW Classifier Khalid Saeed Martin Adamski 333

Increasing Performance of Fingerprint Recognition Systems using Reconstruction of Ridge Lines Methods Georgy Kukharev Edward Polrolniczak 43

Design and Prototyping of an Industrial Fault Clustering System Combining Image Processing and Artificial Neural Network Based Approaches Matthieu Voiry Veronique Amarger Kurosh Madani Francois Houbre 351

Image Pre-classification for Biometrics Identification Systems Michal Choras 361

Application of Improved Projection Method to Binary Images Dariusz Frejlichowski Alji Maow 371

Part IV - Computer Simulation and Data Analysis

A Consideration of Processor Utilization on Multi-Processor System Koichi Kashiwagi Yoshinobu Higami Shin-Ya Kobayashi 383

Reliability of Node Information on Autonomous Load Distribution Method Michihiko Kudo, Koichi Kashiwagi, Yoshinobu Higami, Shin-Ya Kobayashi 391

Methodology of Developing Computer-Based Training Systems for Operators of Dynamic Objects Orest Popov, Tatiana Tretyakova, Anna Barcz, Piotr Piela 399

Algorithms of Identification of Multi-connected Boundary Geometry and Material Parameters in Problems Described by Navier-Lame Equation Using the PIES Eugeniusz Zieniuk, Agnieszka Boltuc, Andrzej Kuzelewski 409

Analysis of an Open Linked Series Three-station Network with Blocking Walenty Oniszczuk 419

Hyperplane Method Implementation for Loops Parallelization in the .NET Environment Wlodzimierz Bielecki, Maciej Poliwoda 431

On a Nonlinear Production-Inventory Problem Stanislaw Bylka and Ryszarda Rempala 447

Index 459

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network


Most Helpful Customer Reviews

See all customer reviews >