{"title":"Tandem Models with Blocking in the Computer Subnetworks Performance Analysis","authors":"W. Oniszczuk","doi":"10.1007/978-0-387-36503-9_24","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_24","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134284234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wavelet Transform in Face Recognition","authors":"J. Bobulski","doi":"10.1007/978-0-387-36503-9_3","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_3","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132401619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Filtration and Feature Extraction for Face Recognition","authors":"T. Andrysiak, M. Choraś","doi":"10.1007/978-0-387-36503-9_1","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_1","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130148907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Properties of Morphological Operators Applied to Analysis of ECG Signals","authors":"K. Piekarski, P. Tadejko, W. Rakowski","doi":"10.1007/978-0-387-36503-9_26","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_26","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126605611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stream Cipher Keys Generation with Low Power Consumption Based on LFSR","authors":"M. Puczko, V. Yarmolik","doi":"10.1007/978-0-387-36503-9_15","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_15","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115060694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallelization of Standard Modes of Operation for Symmetric Key Block Ciphers","authors":"W. Bielecki, D. Burak","doi":"10.1007/978-0-387-36503-9_10","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_10","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"522 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116213103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Convergence Analysis of the Boundary Geometry Identification Obtained by Genetic Algorithms in the PIES","authors":"E. Zieniuk, K. Szerszeń, A. Bołtuć","doi":"10.1007/978-0-387-36503-9_31","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_31","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134029144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hash Chaining for Authenticated Data Structures Freshness Checking","authors":"Eugeniusz Kuriata, W. Macków, P. Sukiennik","doi":"10.1007/978-0-387-36503-9_14","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_14","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"66 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120925160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Enhancement and Image Half-toning Using Fluid Particles Physics Dynamics","authors":"K. Madani","doi":"10.1007/978-0-387-36503-9_23","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_23","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115984695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Quality of Obfuscation and Obfuscation Techniques","authors":"Joanna Witkowska","doi":"10.1007/978-0-387-36503-9_16","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_16","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131457677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}