Biometrics, Computer Security Systems and Artificial Intelligence Applications最新文献

筛选
英文 中文
Tandem Models with Blocking in the Computer Subnetworks Performance Analysis 计算机子网性能分析中具有阻塞的串联模型
Biometrics, Computer Security Systems and Artificial Intelligence Applications Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-36503-9_24
W. Oniszczuk
{"title":"Tandem Models with Blocking in the Computer Subnetworks Performance Analysis","authors":"W. Oniszczuk","doi":"10.1007/978-0-387-36503-9_24","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_24","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134284234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Wavelet Transform in Face Recognition 小波变换在人脸识别中的应用
Biometrics, Computer Security Systems and Artificial Intelligence Applications Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-36503-9_3
J. Bobulski
{"title":"Wavelet Transform in Face Recognition","authors":"J. Bobulski","doi":"10.1007/978-0-387-36503-9_3","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_3","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132401619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Image Filtration and Feature Extraction for Face Recognition 人脸识别中的图像滤波和特征提取
Biometrics, Computer Security Systems and Artificial Intelligence Applications Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-36503-9_1
T. Andrysiak, M. Choraś
{"title":"Image Filtration and Feature Extraction for Face Recognition","authors":"T. Andrysiak, M. Choraś","doi":"10.1007/978-0-387-36503-9_1","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_1","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130148907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Properties of Morphological Operators Applied to Analysis of ECG Signals 形态学算子在心电信号分析中的应用
Biometrics, Computer Security Systems and Artificial Intelligence Applications Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-36503-9_26
K. Piekarski, P. Tadejko, W. Rakowski
{"title":"Properties of Morphological Operators Applied to Analysis of ECG Signals","authors":"K. Piekarski, P. Tadejko, W. Rakowski","doi":"10.1007/978-0-387-36503-9_26","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_26","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126605611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Stream Cipher Keys Generation with Low Power Consumption Based on LFSR 基于LFSR的低功耗流密码密钥生成
Biometrics, Computer Security Systems and Artificial Intelligence Applications Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-36503-9_15
M. Puczko, V. Yarmolik
{"title":"Stream Cipher Keys Generation with Low Power Consumption Based on LFSR","authors":"M. Puczko, V. Yarmolik","doi":"10.1007/978-0-387-36503-9_15","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_15","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115060694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Parallelization of Standard Modes of Operation for Symmetric Key Block Ciphers 对称密钥分组密码标准操作模式的并行化
Biometrics, Computer Security Systems and Artificial Intelligence Applications Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-36503-9_10
W. Bielecki, D. Burak
{"title":"Parallelization of Standard Modes of Operation for Symmetric Key Block Ciphers","authors":"W. Bielecki, D. Burak","doi":"10.1007/978-0-387-36503-9_10","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_10","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"522 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116213103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Convergence Analysis of the Boundary Geometry Identification Obtained by Genetic Algorithms in the PIES 遗传算法边界几何识别的收敛性分析
Biometrics, Computer Security Systems and Artificial Intelligence Applications Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-36503-9_31
E. Zieniuk, K. Szerszeń, A. Bołtuć
{"title":"Convergence Analysis of the Boundary Geometry Identification Obtained by Genetic Algorithms in the PIES","authors":"E. Zieniuk, K. Szerszeń, A. Bołtuć","doi":"10.1007/978-0-387-36503-9_31","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_31","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134029144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hash Chaining for Authenticated Data Structures Freshness Checking 验证数据结构新鲜度检查的哈希链
Biometrics, Computer Security Systems and Artificial Intelligence Applications Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-36503-9_14
Eugeniusz Kuriata, W. Macków, P. Sukiennik
{"title":"Hash Chaining for Authenticated Data Structures Freshness Checking","authors":"Eugeniusz Kuriata, W. Macków, P. Sukiennik","doi":"10.1007/978-0-387-36503-9_14","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_14","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"66 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120925160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Enhancement and Image Half-toning Using Fluid Particles Physics Dynamics 使用流体粒子物理动力学的图像增强和图像半色调
Biometrics, Computer Security Systems and Artificial Intelligence Applications Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-36503-9_23
K. Madani
{"title":"Image Enhancement and Image Half-toning Using Fluid Particles Physics Dynamics","authors":"K. Madani","doi":"10.1007/978-0-387-36503-9_23","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_23","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115984695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Quality of Obfuscation and Obfuscation Techniques 混淆的质量和混淆技术
Biometrics, Computer Security Systems and Artificial Intelligence Applications Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-36503-9_16
Joanna Witkowska
{"title":"The Quality of Obfuscation and Obfuscation Techniques","authors":"Joanna Witkowska","doi":"10.1007/978-0-387-36503-9_16","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_16","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131457677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信