책 이미지

책 정보
· 분류 : 외국도서 > 컴퓨터 > 하드웨어 > 네트워크 하드웨어
· ISBN : 9783642409240
· 쪽수 : 524쪽
· 출판일 : 2013-09-12
목차
What is the Value of Information - Search Engine's Point of View.- Application of Combined Classifiers to Data Stream Classification.- Efficacy of Some Primary Discriminant Functions in Diagnosing Planetary Gearboxes.- Biometrics and Bioemetrics Applications Identification of Persons by Virtue of Hand Geometry.- User Authentication for Mobile Devices.- Modified kNN Algorithm for Improved Recognition Accuracy of Biometrics System Based on Gait.- An Application of the Curvature Scale Space Shape Descriptor for Forensic Human Identification Based on Orthopantomograms.- The Impact of Temporal Proximity between Samples on Eye Movement Biometric Identification.- Biomedical Distributed Signal Processing and Analysis.- Effect of Slice Thickness on Texture-Based Classification of Liver Dynamic CT Scans.- Independent Component Analysis for EEG Data Preprocessing - Algorithms Comparison.- An Adequate Representation of Medical Data Based on Partial Set Approximation.- Pattern Recognition and Image Processing Bengali Printed Character Recognition - A New Approach.- Eye Location and Eye State Detection in Facial Images Using Circular Hough Transform.- Recognition of Occluded Faces Based on Multi-subspace Classification.- Mahalanobis Distance-Based Algorithm for Ellipse Growing in Iris Preprocessing.- The Data Exploration System for Image Processing Based on Server-Side Operations.- Image Restoration Using Anisotropic Stochastic Diffusion Collaborated with Non Local Means.- Various Aspects of Computer Security A Practical Certificate and Identity Based Encryption Scheme and Related Security Architecture.- Study of Security Issues in Pervasive Environment of Next Generation Internet of Things.- Security Issues of IPv6 Network Autoconfiguration.- Security Aspects of Virtualization in Cloud Computing.- Threshold Method of Detecting Long-Time TPM Synchronization.- The Removal of False Detections from Foreground Regions Extracted Using Adaptive Background Modelling for a Visual Surveillance System.- Using Backward Induction Techniques in (Timed) Security Protocols Verification.- Telecommunications Networks Risk Assessment with Bayesian Networks.- Power Aware Cluster Based Routing (PACBR) Protocol for Wireless Sensor Network.- A Novel Incentive Based Scheme to Contain Selective Forwarding in Wireless Sensor Network.- Synthetic Social Network Based on Competency-Based Description of Human Resources.- Displaying Genealogy with Adoptions and Multiple Remarriages Using the WHIteBasE.- User Relevance for Item-Based Collaborative Filtering.- Extraction of Agent Groups with Similar Behaviour Based on Agent Profiles.- Aesthetic Patterns from the Perturbed Orbits of Discrete Dynamical Systems.- Weighted Approach to Projective Clustering.- Machine Learning with Known Input Data Uncertainty Measure.- Learning Algorithms in the Detection of Unused Functionalities in SOA Systems.- Construction of Sequential Classifier Using Confusion Matrix.- Growing Neural Gas - A Parallel Approach.- Modified Moment Method Estimator for the Shape Parameter of Generalized Gaussian Distribution for a Small Sample Size.- Trajectory Estimation for Exponential Parameterization and Different Samplings.- Searching in the Structured Space of the Braille Music.- Solving Steel Alloying Using Differential Evolution and SOMA.- The Cost Estimation of Production Orders.- Achieving Desired Cycle Times by Modelling Production Systems.- Artificial Neural Networks as Tools for Controlling Production Systems and Ensuring Their Stability.- Generalized Predictive Control for a Flexible Single-Link Manipulator.- A Disruption Recovery Model in a Production-Inventory System with Demand Uncertainty and Process Reliability.