|
Table of Contents |
5 |
|
|
Preface |
9 |
|
|
Chapter 1 Information Technology Security |
13 |
|
|
How can we justify trust in software based systems? |
14 |
|
|
The capacity of ciphers fulfilling the accessibility of cryptograms |
24 |
|
|
Parallelization of the Data Encryption Standard ( DES) algorithm |
34 |
|
|
Linked authenticated dictionaries for certificate status verification |
46 |
|
|
Integrated Payment System for Public Key Infrastructure Services |
58 |
|
|
Some methods of the analysis and risk assessment in the system services providers |
72 |
|
|
VAST: Versatile Anonymous System for Web Users |
82 |
|
|
Cryptography and Steganography: teaching experience |
94 |
|
|
Analysis of non-linear pseudo-noise sequences |
104 |
|
|
Tool support for detecting defects in object-oriented models |
114 |
|
|
The Proposal of Protocol for Electronic Signature Creation in Public Environment |
124 |
|
|
On Arithmetic Subtraction Linear Approximation |
136 |
|
|
Secure Data Transmission via Modulation of the Chaotic Sequence Parameters |
146 |
|
|
Chapter 2 Biometric Systems |
155 |
|
|
Some Advances and Challenges in Live Biometrics, Personnel Management, and Other " Human Being" Applications |
156 |
|
|
An environment for recognition systems modeling |
168 |
|
|
Modified Gradient Method for Face Localization |
176 |
|
|
Three stage face recognition algorithm for visitor identification system |
188 |
|
|
A New Approach for Hand-Palm Recognition |
196 |
|
|
An Experimental Criterion for Face Classification |
206 |
|
|
Contour Objects Recognition Based On UNL- Fourier Descriptors |
214 |
|
|
Sonar Image Simulation by Means of Ray Tracing and Image Processing |
220 |
|
|
The PCA Reconstruction Based Approach for Extending Facial Image Databases for Pace Recognition Systems |
226 |
|
|
Investigation of fingerprint verification algorithm based on local centers method |
240 |
|
|
Czestochowa's Precise Model of a Face Based on the Facial Asymmetry, Ophthalmogeometry, and Brain Asymmetry Phenomena: the Idea and Algorithm Sketch |
250 |
|
|
Chapter 3 Methods of Artificial Intelligence and Intelligent Agents |
265 |
|
|
A fuzzy expert approach for comparing alternative end uses for requalification of contaminated sites |
266 |
|
|
Training assisting program with hybrid decision supporting system |
278 |
|
|
Numerical problems with evaluating the fractal dimension of real data |
284 |
|
|
Multi-stage ship control in a fuzzy environment |
296 |
|
|
Informative value of the possibilistic extension principle |
312 |
|
|
Intelligent Marine Control Systems |
322 |
|
|
How to deal with the data in a bankruptcy modelling |
332 |
|
|
Dependency Mining in Large Sets of Stock Market Trading Rules |
340 |
|
|
Choosing representative data items: Kohonen, Neural Gas or Mixture Model? |
348 |
|
|
Application of the Ant Colony Algorithm for the Path Planning |
356 |
|
|
Application of fuzzy logic for track corrector formation into flight simulator |
364 |
|
|
Algorithm for Automatic Definition of Validated and Non-Validated Region in Multi-Dimensional Space |
372 |
|
|
Adaptive simulation of separable dynamical systems in the neural network basis |
382 |
|
|
Improvement of the processors operating ratio in task scheduling using the deadline method |
398 |
|
|
Author Index |
406 |
|