Enhanced methods in computer security, biometric and artificial intelligence systems
Resource Information
The work Enhanced methods in computer security, biometric and artificial intelligence systems represents a distinct intellectual or artistic creation found in University of Missouri Libraries. This resource is a combination of several types including: Work, Language Material, Books.
The Resource
Enhanced methods in computer security, biometric and artificial intelligence systems
Resource Information
The work Enhanced methods in computer security, biometric and artificial intelligence systems represents a distinct intellectual or artistic creation found in University of Missouri Libraries. This resource is a combination of several types including: Work, Language Material, Books.
- Label
- Enhanced methods in computer security, biometric and artificial intelligence systems
- Statement of responsibility
- edited by Jerzy Pejaś, Andrzej Piegat
- Subject
-
- Artificial Intelligence (incl. Robotics)
- Artificial intelligence
- Artificial intelligence
- Artificial intelligence
- Artificial intelligence
- Biometric identification
- Biometric identification
- Biometric identification
- Biometrie
- COMPUTERS -- Internet | Security
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Coding and Information Theory
- Coding theory
- Computer science
- Computer security
- Computer security
- Computer security
- Computerbeveiliging
- Computing Methodologies
- Data Structures, Cryptology and Information Theory
- Data structures (Computer science)
- Electronic data processing
- Identification biométrique
- Informatique
- Intelligence artificielle
- Kunstmatige intelligentie
- Systèmes informatiques -- Sécurité | Mesures
- Sécurité informatique
- Language
- eng
- Summary
- "Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems" contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research. "Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions analyzing such areas of AI as fuzzy set theory, predicate logic, neural networks, clustering, data mining and others. It also presents applications of AI as possible solutions for problems like firm bankruptcy, soil erosion, flight control and others. "Information Technology Security" covers three important areas of security engineering in information systems: software security, public key infrastructure and the design of new cryptographic protocols and algorithms. "Biometric Systems" comprises 11 contributions dealing with face picture analysis and recognition systems. This chapter focuses on known methods of biometric problem solution as well as the design of new models
- Cataloging source
- COO
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- index present
- LC call number
- QA76.9.A25
- LC item number
- E545 2005
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
Context
Context of Enhanced methods in computer security, biometric and artificial intelligence systemsWork of
No resources found
No enriched resources found
- Enhanced methods in computer security, biometric and artificial intelligence systems, edited by Jerzy Pejaś, Andrzej Piegat
- Enhanced methods in computer security, biometric and artificial intelligence systems, edited by Jerzy Pejaś, Andrzej Piegat
- Enhanced methods in computer security, biometric and artificial intelligence systems, edited by Jerzy Pejaś, Andrzej Piegat
- Enhanced methods in computer security, biometric and artificial intelligence systems, edited by Jerzy Pejaś, Andrzej Piegat
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/OK5zb77OVzM/" typeof="CreativeWork http://bibfra.me/vocab/lite/Work"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/OK5zb77OVzM/">Enhanced methods in computer security, biometric and artificial intelligence systems</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Work Enhanced methods in computer security, biometric and artificial intelligence systems
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/OK5zb77OVzM/" typeof="CreativeWork http://bibfra.me/vocab/lite/Work"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/OK5zb77OVzM/">Enhanced methods in computer security, biometric and artificial intelligence systems</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>