{"title":"Can a Negative Selection Detect an Extremely few Non-self among Enormous Amount of Self Cells?","authors":"A. Imada","doi":"10.1007/978-0-387-36503-9_20","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_20","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114055702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capability and Functionings: A Fuzzy Way to Measure Interaction between Father and Child","authors":"T. Addabbo, G. Facchinetti, Giovanni Mastroleo","doi":"10.1007/978-0-387-36503-9_17","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_17","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130392945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Input's Significance Evaluation in a Multi Input-Variable System","authors":"I. Rejer","doi":"10.1007/978-0-387-36503-9_27","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_27","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115780576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Calculating the Fractal Dimension of River Basins, Comparison of Several Methods","authors":"Adam Szustalewicz, A. Vassilopoulos","doi":"10.1007/978-0-387-36503-9_28","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_28","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134332015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Clusters Quality in Artificial Immune Clustering System - SArIS","authors":"S. Wierzchon, U. Kuzelewska","doi":"10.1007/978-0-387-36503-9_30","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_30","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126129112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Color Information as a Feature for Postage Stamps Recognition","authors":"M. Miciak","doi":"10.1007/978-0-387-36503-9_7","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_7","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"79-82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127588061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Iris Shape Evaluation in Face Image with Simple Background","authors":"S. Rydzek","doi":"10.1007/978-0-387-36503-9_8","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_8","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132567461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Remarks on Computer Simulations","authors":"W. Danko","doi":"10.1007/978-0-387-36503-9_18","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_18","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114481545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrzej Lebkowski, K. Dziedzicki, M. Tobiasz, R. Smierzchalski, M. Tomera
{"title":"A Marine Environment Simulator for Testing Ship Control Systems in Dangerous Situations","authors":"Andrzej Lebkowski, K. Dziedzicki, M. Tobiasz, R. Smierzchalski, M. Tomera","doi":"10.1007/978-0-387-36503-9_22","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_22","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134623664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}