Item type Location Call Number Status Date Due
E-Book E-Book AUM Main Library 004.6 (Browse Shelf) Not for loan

What is the Value of Information – Search Engine’s Point of View -- Application of Combined Classifiers to Data Stream Classification -- Efficacy of Some Primary Discriminant Functions in Diagnosing Planetary Gearboxes -- Biometrics and Bioemetrics Applications Identification of Persons by Virtue of Hand Geometry -- User Authentication for Mobile Devices -- Modified kNN Algorithm for Improved Recognition Accuracy of Biometrics System Based on Gait -- An Application of the Curvature Scale Space Shape Descriptor for Forensic Human Identification Based on Orthopantomograms -- The Impact of Temporal Proximity between Samples on Eye Movement Biometric Identification -- Biomedical Distributed Signal Processing and Analysis -- Effect of Slice Thickness on Texture-Based Classification of Liver Dynamic CT Scans -- Independent Component Analysis for EEG Data Preprocessing - Algorithms Comparison -- An Adequate Representation of Medical Data Based on Partial Set Approximation -- Pattern Recognition and Image Processing Bengali Printed Character Recognition – A New Approach -- Eye Location and Eye State Detection in Facial Images Using Circular Hough Transform -- Recognition of Occluded Faces Based on Multi-subspace Classification -- Mahalanobis Distance-Based Algorithm for Ellipse Growing in Iris Preprocessing -- The Data Exploration System for Image Processing Based on Server-Side Operations -- Image Restoration Using Anisotropic Stochastic Diffusion Collaborated with Non Local Means -- Various Aspects of Computer Security A Practical Certificate and Identity Based Encryption Scheme and Related Security Architecture -- Study of Security Issues in Pervasive Environment of Next Generation Internet of Things -- Security Issues of IPv6 Network Autoconfiguration -- Security Aspects of Virtualization in Cloud Computing -- Threshold Method of Detecting Long-Time TPM Synchronization -- The Removal of False Detections from Foreground Regions Extracted Using Adaptive Background Modelling for a Visual Surveillance System -- Using Backward Induction Techniques in (Timed) Security Protocols Verification -- Telecommunications Networks Risk Assessment with Bayesian Networks -- Power Aware Cluster Based Routing (PACBR) Protocol for Wireless Sensor Network -- A Novel Incentive Based Scheme to Contain Selective Forwarding in Wireless Sensor Network -- Synthetic Social Network Based on Competency-Based Description of Human Resources -- Displaying Genealogy with Adoptions and Multiple Remarriages Using the WHIteBasE -- User Relevance for Item-Based Collaborative Filtering -- Extraction of Agent Groups with Similar Behaviour Based on Agent Profiles -- Aesthetic Patterns from the Perturbed Orbits of Discrete Dynamical Systems -- Weighted Approach to Projective Clustering -- Machine Learning with Known Input Data Uncertainty Measure -- Learning Algorithms in the Detection of Unused Functionalities in SOA Systems -- Construction of Sequential Classifier Using Confusion Matrix -- Growing Neural Gas – A Parallel Approach -- Modified Moment Method Estimator for the Shape Parameter of Generalized Gaussian Distribution for a Small Sample Size -- Trajectory Estimation for Exponential Parameterization and Different Samplings -- Searching in the Structured Space of the Braille Music -- Solving Steel Alloying Using Differential Evolution and SOMA -- The Cost Estimation of Production Orders -- Achieving Desired Cycle Times by Modelling Production Systems -- Artificial Neural Networks as Tools for Controlling Production Systems and Ensuring Their Stability -- Generalized Predictive Control for a Flexible Single-Link Manipulator -- A Disruption Recovery Model in a Production-Inventory System with Demand Uncertainty and Process Reliability.

This book constitutes the proceedings of the 12th IFIP TC 8 International Conference, CISIM 2013, held in Cracow, Poland, in September 2013. The 44 papers presented in this volume were carefully reviewed and selected from over 60 submissions. They are organized in topical sections on biometric and biomedical applications; pattern recognition and image processing; various aspects of computer security, networking, algorithms, and industrial applications. The book also contains full papers of a keynote speech and the invited talk.

There are no comments for this item.

Log in to your account to post a comment.