標(biāo)題: Titlebook: Biometrics, Computer Security Systems and Artificial Intelligence Applications; Khalid Saeed,Jerzy Peja?,Romuald Mosdorf Conference procee [打印本頁] 作者: 不能平庸 時(shí)間: 2025-3-21 17:44
書目名稱Biometrics, Computer Security Systems and Artificial Intelligence Applications影響因子(影響力)
書目名稱Biometrics, Computer Security Systems and Artificial Intelligence Applications影響因子(影響力)學(xué)科排名
書目名稱Biometrics, Computer Security Systems and Artificial Intelligence Applications網(wǎng)絡(luò)公開度
書目名稱Biometrics, Computer Security Systems and Artificial Intelligence Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Biometrics, Computer Security Systems and Artificial Intelligence Applications被引頻次
書目名稱Biometrics, Computer Security Systems and Artificial Intelligence Applications被引頻次學(xué)科排名
書目名稱Biometrics, Computer Security Systems and Artificial Intelligence Applications年度引用
書目名稱Biometrics, Computer Security Systems and Artificial Intelligence Applications年度引用學(xué)科排名
書目名稱Biometrics, Computer Security Systems and Artificial Intelligence Applications讀者反饋
書目名稱Biometrics, Computer Security Systems and Artificial Intelligence Applications讀者反饋學(xué)科排名
作者: Immobilize 時(shí)間: 2025-3-21 22:08 作者: MEEK 時(shí)間: 2025-3-22 03:08
“The Holiest and Greatest Things”O(jiān)ne of the parts person’s identification systems is features extraction. This process is very important because effectiveness of system depend of it. Successful Wavelet Transform can be used in systems of persons’ identification and pattern recognition.作者: Cholecystokinin 時(shí)間: 2025-3-22 05:42
Language and Operational ThoughtA method of stream cipher keys generation with low power consumption based on LFSR (Linear Feedback Shift Register) is presented in this paper. The idea of power consumption minimization by modifying the structure of main element of cipher keys generator (LFSR) have been proposed. In this paper some examples are included.作者: 不可磨滅 時(shí)間: 2025-3-22 12:16 作者: 痛苦一生 時(shí)間: 2025-3-22 14:39 作者: Gudgeon 時(shí)間: 2025-3-22 19:58
Khalid Saeed,Jerzy Peja?,Romuald MosdorfPresents the very latest research in biometrics and computer security systems.Describes the latest inroads in artificial intelligence applications.Includes supplementary material: 作者: 誘惑 時(shí)間: 2025-3-23 01:14
http://image.papertrans.cn/b/image/188196.jpg作者: 熄滅 時(shí)間: 2025-3-23 02:28 作者: Project 時(shí)間: 2025-3-23 08:17 作者: 重力 時(shí)間: 2025-3-23 09:42
Bernard Shaw and His Contemporaries performed. Then the face image is filtered with the bank of Gabor filters. Next in order to localize the face fiducial points we search for the highest symmetry points within the face image. Then in those points we calculate image features corresponding to Gabor filter responses. Our feature vector作者: 遺棄 時(shí)間: 2025-3-23 15:24
“The Holiest and Greatest Things”ch a way that data vectors belonging to different classes (subgroups) appear differentiated as much as possible. We consider for this purpose the traditional CDA (Canonical Discriminant Functions), the GDA .(Generalized Discriminant Analysis, Baudat and Anouar, 2000) and the Supervised SOM .(Kohonen作者: Mercantile 時(shí)間: 2025-3-23 21:47
“The Holiest and Greatest Things”larity of features where features of the query specification are compared with features from the image database to determine which images match similarly with given features. Feature extraction is a crucial part for any of such retrieval systems. So far, the only way of searching these collections w作者: AWL 時(shí)間: 2025-3-23 23:53
“The Holiest and Greatest Things”in the real word in the presence of noise. It was needed novel approaches that use other orthogonal sources of information to the acoustic input that not only considerably improve the performance in severely degraded conditions, but also are independent to the type of noise and reverberation. Visual作者: multiply 時(shí)間: 2025-3-24 04:35 作者: Original 時(shí)間: 2025-3-24 09:48
Introduction: Finding a Way In,mail image processing. The article contains basic processing of the stamps image and calculation of characteristic features, on basis of which it will be recognized. The main objective of this article is to use the color information to obtain a set of features which are invariant under translation a作者: 小官 時(shí)間: 2025-3-24 13:23
https://doi.org/10.1007/978-1-349-06386-4n method and will be base for developing face features extraction procedure. The aim was to locate circles circumscribed about irises (radius and centers of such circles) in frontal face image. Presented algorithm combines known image processing algorithms and developed procedures. Achieved results 作者: Coeval 時(shí)間: 2025-3-24 17:01
Language and Narration in Céline’s Writingse recognition system. The algorithm uses view-based approach and searches for the extreme values with the threshold value being applied. This investigation is a continuation of previous work extended with experiments on classification of resulted feature vectors. The classification of feature vector作者: Adenocarcinoma 時(shí)間: 2025-3-24 20:26
https://doi.org/10.1007/978-1-349-06386-4with the description of exploited parallelization tools. The data dependencies analysis of loops and loop transformations were applied in order to parallelize sequential algorithms. The OpenMP standard was chosen for representing parallelism of the standard modes of operation for block ciphers. The 作者: 劇本 時(shí)間: 2025-3-25 00:43
https://doi.org/10.1007/978-1-349-06386-4itrary functions with . binary inputs and . binary outputs, where 1 ≤ .=m ≤10. For randomly chosen functions from each of the classes, the distribution of the best nonzero approximations is investigated. The based on the definitions of differential and linear approximation algorithms to compute a si作者: 潰爛 時(shí)間: 2025-3-25 07:07 作者: gain631 時(shí)間: 2025-3-25 09:42 作者: Bone-Scan 時(shí)間: 2025-3-25 14:07 作者: angina-pectoris 時(shí)間: 2025-3-25 18:26
Language and Operational Thought is the common way to prevent reverse engineering. Obfuscation is one of the software secrets technique protections and in general, describes a practice that is used intentionally to make something more difficult to understand. Obfuscation techniques convert program into another one with the same be作者: 組裝 時(shí)間: 2025-3-25 21:27 作者: amnesia 時(shí)間: 2025-3-26 03:37
Language and Narration in Céline’s Writingso-phase procedure of the message ciphering. It guarantees the required security level. In addition, all attributes of the physical carrier are satisfied. Furthermore, schemes are presented to illustrate clearly the proposed methodology of generating and deciphering the electronic document containing sensitive information.作者: nugatory 時(shí)間: 2025-3-26 07:33 作者: COWER 時(shí)間: 2025-3-26 12:13 作者: 雕鏤 時(shí)間: 2025-3-26 14:03 作者: Handedness 時(shí)間: 2025-3-26 20:03 作者: 額外的事 時(shí)間: 2025-3-26 23:12
Synthesis of Codebooks with Perceptually Monitored Structure for Multiband CELP-Coders for multiband CELP-coders. Codebooks quality and its dependence on the codebooks structure are studied. The research work presents multiband codebook with multistage organization and reconfigurable structure optimized by SNR, Bark Spectrum Distortion (BSD), Modified Bark Spectrum Distortion (MBSD) 作者: 輕快走過 時(shí)間: 2025-3-27 03:50 作者: 比賽用背帶 時(shí)間: 2025-3-27 08:35 作者: 狗窩 時(shí)間: 2025-3-27 10:52 作者: companion 時(shí)間: 2025-3-27 17:04
Parallelization of Standard Modes of Operation for Symmetric Key Block Cipherswith the description of exploited parallelization tools. The data dependencies analysis of loops and loop transformations were applied in order to parallelize sequential algorithms. The OpenMP standard was chosen for representing parallelism of the standard modes of operation for block ciphers. The 作者: Axon895 時(shí)間: 2025-3-27 18:00
On Differential and Linear Approximation of S-box Functionsitrary functions with . binary inputs and . binary outputs, where 1 ≤ .=m ≤10. For randomly chosen functions from each of the classes, the distribution of the best nonzero approximations is investigated. The based on the definitions of differential and linear approximation algorithms to compute a si作者: Abjure 時(shí)間: 2025-3-27 22:21
Random Generation of S-Boxes for Block Cipherslgorithms for the construction of bent functions and we formulate our algorithm for random generation of perfect nonlinear functions. We present results of experiments performed on S-boxes and we compare them with results obtained using deterministic methods.作者: 暴露他抗議 時(shí)間: 2025-3-28 05:53 作者: anagen 時(shí)間: 2025-3-28 06:39
Hash Chaining for Authenticated Data Structures Freshness Checking popularity of public key infrastructure and its uses led to development of new data distribution methods — distribution based on untrusted publishers. It is possible to publish data by an untrusted publisher, however this data must contain authentication information in it. Validation of that inform作者: 蜿蜒而流 時(shí)間: 2025-3-28 10:58 作者: 愛社交 時(shí)間: 2025-3-28 14:59
Method of Speech Recognition and Speaker Identification using Audio-Visual of Polish Speech and Hidd, corners and contour of mouth. It was proposed synchronous and two asynchronous of methods of fusion of signals audio and video. Finally, the paper will show results of lip-tracking depending on various factors (lighting, beard), results of speech and speaker recognition in noisy environments.作者: 無聊點(diǎn)好 時(shí)間: 2025-3-28 20:54
t to all participants of the International Conference ACS-CISIM, which was held in Elk, Poland in summer 2005. We also are greatly indebted to the Invited Speakers for their really worth lis978-1-4419-4212-8978-0-387-36503-9作者: 使腐爛 時(shí)間: 2025-3-29 01:41
Biometrics, Computer Security Systems and Artificial Intelligence Applications作者: 欲望小妹 時(shí)間: 2025-3-29 04:15
Biometrics, Computer Security Systems and Artificial Intelligence Applications978-0-387-36503-9作者: encomiast 時(shí)間: 2025-3-29 09:35
“The Holiest and Greatest Things”, corners and contour of mouth. It was proposed synchronous and two asynchronous of methods of fusion of signals audio and video. Finally, the paper will show results of lip-tracking depending on various factors (lighting, beard), results of speech and speaker recognition in noisy environments.作者: BURSA 時(shí)間: 2025-3-29 12:53 作者: Outmoded 時(shí)間: 2025-3-29 19:37
Bernard Shaw and His Contemporariess consist of so called Gabor Jets applied to the selected fiducial points (points of the highest symmetry) as well as the statistical features calculated in those points neighborhood. Then feature vectors can be efficiently used in the classification step in different applications of face recognition.作者: extinct 時(shí)間: 2025-3-29 20:13
“The Holiest and Greatest Things”as based on keyword indexing, or simply by browsing. However nowadays digital images databases open the way to content-based efficient searching. In this paper we survey some technical aspects of current content-based image retrieval systems.作者: 寒冷 時(shí)間: 2025-3-30 01:26 作者: CHART 時(shí)間: 2025-3-30 07:30 作者: 臨時(shí)抱佛腳 時(shí)間: 2025-3-30 08:11 作者: 流動才波動 時(shí)間: 2025-3-30 13:06 作者: Debrief 時(shí)間: 2025-3-30 18:30
The Color Information as a Feature for Postage Stamps Recognitionicture. The picture is represented in the color space where classification is done. The today’s systems of recognition often use classification on the basis of shape. Proposed method enables recognition of postal stamps from mail piece. Sources of errors as well as possible improvement of classification results will be discussed.作者: FLORA 時(shí)間: 2025-3-30 23:41
Image Filtration and Feature Extraction for Face Recognitions consist of so called Gabor Jets applied to the selected fiducial points (points of the highest symmetry) as well as the statistical features calculated in those points neighborhood. Then feature vectors can be efficiently used in the classification step in different applications of face recognition.作者: RALES 時(shí)間: 2025-3-31 01:07 作者: Kernel 時(shí)間: 2025-3-31 05:06
On Differential and Linear Approximation of S-box Functionsngle element of the approximation tables, are of exponential complexity. The presented in the paper fast algorithms compute the best nonzero approximations in at worst linear time for a single element, without memory needed for storage of the whole table.作者: 噴出 時(shí)間: 2025-3-31 12:19
ations.Includes supplementary material: The book to which I was asked by the editors to write a foreword is an interesting collection of contributions. It presents the extended versions of the authors‘ works already introduced at the International Multi-Conference on Advanced Computer Information an