Amazon cover image
Image from Amazon.com

Computer information systems and industrial management : 12th IFIP TC8 International Conference, CISIM 2013, Krakow, Poland, September 25-27, 2013. Proceedings / Khalid Saeed, Rituparna Chaki, Agostino Cortesi, Sławomir Wierzchoń (eds.).

By: (12th : International Conference on Computer Information Systems and Industrial Management Applications (12th : 2013 : Krakow, Poland)Contributor(s): Saeed, Khalid (Computer scientist) [editor.]Material type: TextTextSeries: Serienbezeichnung | Lecture notes in computer science ; 8104. | LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.Publisher: Heidelberg : Springer, 2013Description: 1 online resource (xx, 524 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783642409257; 3642409253; 3642409245; 9783642409240Other title: CISIM 2013Subject(s): Computer networks -- Congresses | Computer networks -- Security measures -- Congresses | Database management -- Congresses | Computer Communication Networks | Database Management Systems | Computer Security | Industry | Computer networks | Computer networks -- Security measures | Database managementGenre/Form: Electronic books. | Congress. | Electronic books. | Ebook. | Conference papers and proceedings. Additional physical formats: Printed edition:: No titleDDC classification: 004.6 LOC classification: TK5105.5 | .I58 2013NLM classification: TK 5105.5Other classification: 54.81 | 85.20 Online resources: Click here to access online
Contents:
Full Keynote Papers. What is the Value of Information -- Search Engine's Point of View / Mieczysław A. Kłopotek -- Application of Combined Classifiers to Data Stream Classification / Michał Woźniak -- Invited Paper. Efficacy of Some Primary Discriminant Functions in Diagnosing Planetary Gearboxes / Anna Bartkowiak and Radoslaw Zimroz -- Biometrics and Biometrics Applications. Identification of Persons by Virtue of Hand Geometry / Anna Plichta, Tomasz Gaciarz and Szymon Szomiński -- User Authentication for Mobile Devices / Marcin Rogowski [and others] -- Modified kNN Algorithm for Improved Recognition Accuracy of Biometrics System Based on Gait / Marcin Derlatka -- An Application of the Curvature Scale Space Shape Descriptor for Forensic Human Identification Based on Orthopantomograms / Dariusz Frejlichowski and Piotr Czapiewski -- The Impact of Temporal Proximity between Samples on Eye Movement Biometric Identification / Paweł Kasprowski.
Biomedical Distributed Signal Processing and Analysis / Marek Penhaker, Vladimir Kasik and Vaclav Snasel -- Effect of Slice Thickness on Texture-Based Classification of Liver Dynamic CT Scans / Dorota Duda, Marek Kretowski and Johanne Bezy-Wendling -- Independent Component Analysis for EEG Data Preprocessing -- Algorithms Comparison / Izabela Rejer and Paweł Górski -- An Adequate Representation of Medical Data Based on Partial Set Approximation / Zoltán Ernő Csajbók, Tamás Mihálydeák and József Ködmön -- Pattern Recognition and Image Processing. Bengali Printed Character Recognition -- A New Approach / Soharab Hossain Shaikh [and others] -- Eye Location and Eye State Detection in Facial Images Using Circular Hough Transform / Ömer Faruk Söylemez and Burhan Ergen -- Recognition of Occluded Faces Based on Multi-subspace Classification / Paweł Forczmański and Piotr Łabędź
Mahalanobis Distance-Based Algorithm for Ellipse Growing in Iris Preprocessing / Krzysztof Misztal and Jacek Tabor -- The Data Exploration System for Image Processing Based on Server-Side Operations / Magdalena Ładniak, Adam Piórkowski and Mariusz Młynarczuk -- Image Restoration Using Anisotropic Stochastic Diffusion Collaborated with Non Local Means / Dariusz Borkowski and Katarzyna Jańczak-Borkowska -- Various Aspects of Computer Security. A Practical Certificate and Identity Based Encryption Scheme and Related Security Architecture / Tomasz Hyla and Jerzy Pejaś -- Study of Security Issues in Pervasive Environment of Next Generation Internet of Things / Tapalina Bhattasali, Rituparna Chaki and Nabendu Chaki -- Security Issues of IPv6 Network Autoconfiguration / Maciej Rostański and Taras Mushynskyy.
Security Aspects of Virtualization in Cloud Computing / Muhammad Kazim [and others] -- Threshold Method of Detecting Long-Time TPM Synchronization / Michał Dolecki and Ryszard Kozera -- The Removal of False Detections from Foreground Regions Extracted Using Adaptive Background Modelling for a Visual Surveillance System / Dariusz Frejlichowski [and others] -- Using Backward Induction Techniques in (Timed) Security Protocols Verification / Mirosław Kurkowski, Olga Siedlecka-Lamch and Paweł Dudek -- Telecommunications Networks Risk Assessment with Bayesian Networks / Marcin Szpyrka [and others] -- Networking. Power Aware Cluster Based Routing (PACBR) Protocol for Wireless Sensor Network / Ayan Kumar Das, Rituparna Chaki and Atreyee Biswas -- A Novel Incentive Based Scheme to Contain Selective Forwarding in Wireless Sensor Network / Saswati Mukherjee, Matangini Chattopadhyay and Samiran Chattopadhyay.
Synthetic Social Network Based on Competency-Based Description of Human Resources / Štěpán Kuchař [and others] -- Displaying Genealogy with Adoptions and Multiple Remarriages Using the WHIteBasE / Seiji Sugiyama [and others] -- User Relevance for Item-Based Collaborative Filtering / R. Latha and R. Nadarajan -- Extraction of Agent Groups with Similar Behaviour Based on Agent Profiles / Kateřina Slaninová [and others] -- Algorithms. Aesthetic Patterns from the Perturbed Orbits of Discrete Dynamical Systems / Krzysztof Gdawiec -- Weighted Approach to Projective Clustering / Przemysław Spurek, Jacek Tabor and Krzysztof Misztal -- Machine Learning with Known Input Data Uncertainty Measure / Wojciech M. Czarnecki and Igor T. Podolak -- Learning Algorithms in the Detection of Unused Functionalities in SOA Systems / Ilona Bluemke and Marcin Tarka -- Construction of Sequential Classifier Using Confusion Matrix / Robert Burduk and Pawel Trajdos.
Growing Neural Gas -- A Parallel Approach / Lukáš Vojáček and Jiří Dvorský -- Modified Moment Method Estimator for the Shape Parameter of Generalized Gaussian Distribution for a Small Sample Size / Robert Krupiński -- Trajectory Estimation for Exponential Parameterization and Different Samplings / Ryszard Kozera, Lyle Noakes and Piotr Szmielew -- Searching in the Structured Space of the Braille Music / Wladyslaw Homenda and Mariusz Rybnik -- Industrial Applications. Solving Steel Alloying Using Differential Evolution and SOMA / Michal Holiš [and others] -- The Cost Estimation of Production Orders / Tomasz Chlebus -- Achieving Desired Cycle Times by Modelling Production Systems / Marcin Juszczyński, Arkadiusz Kowalski -- Artificial Neural Networks as Tools for Controlling Production Systems and Ensuring Their Stability / Anna Burduk -- Generalized Predictive Control for a Flexible Single-Link Manipulator / Rahma Boucetta -- A Disruption Recovery Model in a Production-Inventory System with Demand Uncertainty and Process Reliability / Sanjoy Kumar Paul, Ruhul Sarker and Daryl Essam.
Summary: This book constitutes the proceedings of the 12th IFIP TC 8 International Conference, CISIM 2013, held in Cracow, Poland, in September 2013. The 44 papers presented in this volume were carefully reviewed and selected from over 60 submissions. They are organized in topical sections on biometric and biomedical applications; pattern recognition and image processing; various aspects of computer security, networking, algorithms, and industrial applications. The book also contains full papers of a keynote speech and the invited talk.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Full Keynote Papers. What is the Value of Information -- Search Engine's Point of View / Mieczysław A. Kłopotek -- Application of Combined Classifiers to Data Stream Classification / Michał Woźniak -- Invited Paper. Efficacy of Some Primary Discriminant Functions in Diagnosing Planetary Gearboxes / Anna Bartkowiak and Radoslaw Zimroz -- Biometrics and Biometrics Applications. Identification of Persons by Virtue of Hand Geometry / Anna Plichta, Tomasz Gaciarz and Szymon Szomiński -- User Authentication for Mobile Devices / Marcin Rogowski [and others] -- Modified kNN Algorithm for Improved Recognition Accuracy of Biometrics System Based on Gait / Marcin Derlatka -- An Application of the Curvature Scale Space Shape Descriptor for Forensic Human Identification Based on Orthopantomograms / Dariusz Frejlichowski and Piotr Czapiewski -- The Impact of Temporal Proximity between Samples on Eye Movement Biometric Identification / Paweł Kasprowski.

Biomedical Distributed Signal Processing and Analysis / Marek Penhaker, Vladimir Kasik and Vaclav Snasel -- Effect of Slice Thickness on Texture-Based Classification of Liver Dynamic CT Scans / Dorota Duda, Marek Kretowski and Johanne Bezy-Wendling -- Independent Component Analysis for EEG Data Preprocessing -- Algorithms Comparison / Izabela Rejer and Paweł Górski -- An Adequate Representation of Medical Data Based on Partial Set Approximation / Zoltán Ernő Csajbók, Tamás Mihálydeák and József Ködmön -- Pattern Recognition and Image Processing. Bengali Printed Character Recognition -- A New Approach / Soharab Hossain Shaikh [and others] -- Eye Location and Eye State Detection in Facial Images Using Circular Hough Transform / Ömer Faruk Söylemez and Burhan Ergen -- Recognition of Occluded Faces Based on Multi-subspace Classification / Paweł Forczmański and Piotr Łabędź

Mahalanobis Distance-Based Algorithm for Ellipse Growing in Iris Preprocessing / Krzysztof Misztal and Jacek Tabor -- The Data Exploration System for Image Processing Based on Server-Side Operations / Magdalena Ładniak, Adam Piórkowski and Mariusz Młynarczuk -- Image Restoration Using Anisotropic Stochastic Diffusion Collaborated with Non Local Means / Dariusz Borkowski and Katarzyna Jańczak-Borkowska -- Various Aspects of Computer Security. A Practical Certificate and Identity Based Encryption Scheme and Related Security Architecture / Tomasz Hyla and Jerzy Pejaś -- Study of Security Issues in Pervasive Environment of Next Generation Internet of Things / Tapalina Bhattasali, Rituparna Chaki and Nabendu Chaki -- Security Issues of IPv6 Network Autoconfiguration / Maciej Rostański and Taras Mushynskyy.

Security Aspects of Virtualization in Cloud Computing / Muhammad Kazim [and others] -- Threshold Method of Detecting Long-Time TPM Synchronization / Michał Dolecki and Ryszard Kozera -- The Removal of False Detections from Foreground Regions Extracted Using Adaptive Background Modelling for a Visual Surveillance System / Dariusz Frejlichowski [and others] -- Using Backward Induction Techniques in (Timed) Security Protocols Verification / Mirosław Kurkowski, Olga Siedlecka-Lamch and Paweł Dudek -- Telecommunications Networks Risk Assessment with Bayesian Networks / Marcin Szpyrka [and others] -- Networking. Power Aware Cluster Based Routing (PACBR) Protocol for Wireless Sensor Network / Ayan Kumar Das, Rituparna Chaki and Atreyee Biswas -- A Novel Incentive Based Scheme to Contain Selective Forwarding in Wireless Sensor Network / Saswati Mukherjee, Matangini Chattopadhyay and Samiran Chattopadhyay.

Synthetic Social Network Based on Competency-Based Description of Human Resources / Štěpán Kuchař [and others] -- Displaying Genealogy with Adoptions and Multiple Remarriages Using the WHIteBasE / Seiji Sugiyama [and others] -- User Relevance for Item-Based Collaborative Filtering / R. Latha and R. Nadarajan -- Extraction of Agent Groups with Similar Behaviour Based on Agent Profiles / Kateřina Slaninová [and others] -- Algorithms. Aesthetic Patterns from the Perturbed Orbits of Discrete Dynamical Systems / Krzysztof Gdawiec -- Weighted Approach to Projective Clustering / Przemysław Spurek, Jacek Tabor and Krzysztof Misztal -- Machine Learning with Known Input Data Uncertainty Measure / Wojciech M. Czarnecki and Igor T. Podolak -- Learning Algorithms in the Detection of Unused Functionalities in SOA Systems / Ilona Bluemke and Marcin Tarka -- Construction of Sequential Classifier Using Confusion Matrix / Robert Burduk and Pawel Trajdos.

Growing Neural Gas -- A Parallel Approach / Lukáš Vojáček and Jiří Dvorský -- Modified Moment Method Estimator for the Shape Parameter of Generalized Gaussian Distribution for a Small Sample Size / Robert Krupiński -- Trajectory Estimation for Exponential Parameterization and Different Samplings / Ryszard Kozera, Lyle Noakes and Piotr Szmielew -- Searching in the Structured Space of the Braille Music / Wladyslaw Homenda and Mariusz Rybnik -- Industrial Applications. Solving Steel Alloying Using Differential Evolution and SOMA / Michal Holiš [and others] -- The Cost Estimation of Production Orders / Tomasz Chlebus -- Achieving Desired Cycle Times by Modelling Production Systems / Marcin Juszczyński, Arkadiusz Kowalski -- Artificial Neural Networks as Tools for Controlling Production Systems and Ensuring Their Stability / Anna Burduk -- Generalized Predictive Control for a Flexible Single-Link Manipulator / Rahma Boucetta -- A Disruption Recovery Model in a Production-Inventory System with Demand Uncertainty and Process Reliability / Sanjoy Kumar Paul, Ruhul Sarker and Daryl Essam.

International conference proceedings.

Includes author index.

Online resource; title from PDF title page (SpringerLink, viewed September 24, 2013).

This book constitutes the proceedings of the 12th IFIP TC 8 International Conference, CISIM 2013, held in Cracow, Poland, in September 2013. The 44 papers presented in this volume were carefully reviewed and selected from over 60 submissions. They are organized in topical sections on biometric and biomedical applications; pattern recognition and image processing; various aspects of computer security, networking, algorithms, and industrial applications. The book also contains full papers of a keynote speech and the invited talk.

Includes author index.

Powered by Koha