The Community for Technology Leaders
2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security (2007)
Edinburgh, United Kingdom
Aug. 9, 2007 to Aug. 10, 2007
ISBN: 0-7695-2919-4
TABLE OF CONTENTS
Introduction

Preface (PDF)

pp. viii
Session A: Biometrics

Evolving the Face of a Criminal: How to Search a Face Space More Effectively (Abstract)

Carol Gannon , University of Central Lancashire, UK
Charlie D. Frowd , University of Central Lancashire, UK
Colin Tredoux , University of Cape Town, SA
Peter J.B. Hancock , University of Stirling, UK
Alex Mcintyre , University of Stirling, UK
Vicki Bruce , University of Edinburgh, UK
Mark Robinson , University of Stirling, UK
Jo Park , University of Stirling, UK
pp. 3-10

Accelerating Decision Making Support in Biometric Assistant for Remote Temperature Measures (Abstract)

R. R. Yager , Iona College, USA
A. Stoica , NASA, USA
H. Moon , University of Calgary, Canada
S. N. Yanushkevich , University of Calgary, Canada
V. P. Shmerko , University of Calgary, Canada
pp. 11-14

Maximum-Likelihood Watermarking Detection on Fingerprint Images (Abstract)

Ahmed Bouridane , Queen's University Belfast, UK
Fouad Khelifi , Queen's University Belfast, UK
Khalil Zebbiche , Queen's University Belfast, UK
pp. 15-18

Sinusoidal Shape of a Papillary Line Crosscut (Abstract)

Martin Drahansky , Brno University of Technology, Czech Republic
pp. 19-24
Session B (Invited): Cyber Security

Block Model Application for Decision Support Systems (Abstract)

Seok-soo Kim , Hannam University, Korea
Tai-hoon Kim , Hannam University, Korea
Gil-cheol Park , Hannam University, Korea
pp. 25-28

Flexible Key Distribution for SCADA Network using Multi-Agent System (Abstract)

Dong-Joo Kang , Korea Electrotechnology Research Institute, Korea
Hak-Man Kim , Korea Electrotechnology Research Institute, Korea
Tai-Hoon Kim , Hannam University, Korea
pp. 29-34

Multi-receiver Certificate-Based Encryption and Application to Public Key Broadcast Encryption (Abstract)

Chae Duk Jung , Pukyong National University, Korea
Chul Sur , Pukyong National University, Korea
Kyung Hyune Rhee , Pukyong National University, Korea
pp. 35-40

Authenticated On-Demand Ad Hoc Routing Protocol without Pre-shared Key Distribution (Abstract)

Won-Young Lee , Pukyong National University, Korea
Kyung-Hyune Rhee , Pukyong National University, Korea
Youngho Park , Pukyong National University, Korea
pp. 41-46

Frameworks of Indexing Mechanism for Mobile Devices (Abstract)

Haeng-kon Kim , Catholic University of Daegu, Korea
pp. 47-50

An Approach to Optimize Local Trust Algorithm in SureMsg Service (Abstract)

Wenmao Zhang , Tsinghua University, China
Jun Bi , Tsinghua University, China
Zheng Qin , Tsinghua University, China
Jianping Wu , Tsinghua University, China
pp. 51-54

A Practical Proxy Device for Protecting RFID Tag?s Identifier (Abstract)

Jin Kwak , Soonchunhyang University, Korea
Kouichi Sakurai , Kyushu University, Japan
Sang-Soo Yeo , Kyushu University, Japan
pp. 55-58

SecureGo: A Hardware-Software Co-Protection against Identity Theft in Online Transaction (Abstract)

Lin Yuan , Synopsys Inc., USA
Kun Lin , University of Maryland, USA
Gang Qu , University of Maryland, USA
pp. 59-64
Session C: Sensor Networks

An Intelligent Decision-Making System for Flood Monitoring from Space (Abstract)

Scott Gleason , EADS Astrium
Siti Yuhaniz , University of Surrey, UK
Tanya Vladimirova , University of Surrey, UK
pp. 65-71

Multi-Objective Evolutionary Optimizations of a Space-Based Reconfigurable Sensor Network under Hard Constraints (Abstract)

Tughrul Arslan , The University of Edinburgh, United Kingdom
Ahmet T. Erdogan , The University of Edinburgh, United Kingdom
Nick Barton , The University of Edinburgh, United Kingdom
Erfu Yang , The University of Edinburgh, United Kingdom
pp. 72-75

An Improved Particle Swarm Optimization Algorithm for Power-Efficient Wireless Sensor Networks (Abstract)

Ahmet T. Erdogan , The University of Edinburgh, United Kingdom
Tughrul Arslan , The University of Edinburgh, United Kingdom
Nick Barton , The University of Edinburgh, United Kingdom
Erfu Yang , The University of Edinburgh, United Kingdom
pp. 76-82
Session D: Adaptive Technqiues for Security

Making Hardware Soft in Intelligent Systems (Abstract)

Jim Torresen , University of Oslo, Norway
Kyrre Glette , University of Oslo, Norway
pp. 87-90
Session E: Image and Signal Processing Techniques

Image Analysis by Means of the Stochastic Matrix Method of Function Recovery (Abstract)

Daniel Howard , Senior Member IEEE
Joseph Kolibal , University of Southern Mississippi, USA
pp. 97-101

Processing Bank Checks with Genetic Programming and Histograms (Abstract)

Oana Muntean , Babes-Bolyai University, Romania
Mihai Oltean , Babes-Bolyai University, Romania
pp. 102-105

An Improved LDA Approach with DFB Preprocessing for Face Recognition (Abstract)

Ahmed Bouridane , Queen's University Belfast, UK
Walid Riad Boukabou , Queen's University Belfast, UK
pp. 106-110

A Multi-Classifier Approach to Modelling Human and Automatic Visual Cognition (Abstract)

Gareth Howells , University of Kent, UK
Michael Fairhurst , University of Kent, UK
Kostantinos Sirlantzis , University of Kent, UK
Toby Lloyd-Jones , University of Kent, UK
pp. 111-114

MAVIS: A Secure Formal Computational Paradigm based on the Mammalian Visual System (Abstract)

K. D. McDonald-Maier , University of Essex, UK
M. P. Young , University of Newcastle, UK
G. Howells , University of Kent, UK
T. Binzegger , University of Newcastle, UK
pp. 115-118

A Threshold Free Clustering Algorithm for Robust Unsupervised Classification (Abstract)

Turgay Temel , Fatih University, Turkey
Nizamettin Aydin , Bahcesehir University, Turkey
pp. 119-122

Spread Transform Watermarking for Digital Multimedia Using the Complex Wavelet Domain (Abstract)

A. Bouridane , Queen's University Belfast, UK
F. Kurugollu , Queen's University Belfast, UK
A. I. Thompson , Queen's University Belfast, UK
pp. 123-132
Session F: Emerging Areas in Security Research

Bio-Inspired Electronic-Mutation with genetic properties for Secured Identification (Abstract)

Bassel Soudan , University of Sharjah, UAE
Wael Adi , Technical University of Braunschweig, Germany
pp. 133-136

I^2 S^3 the Integrated Intelligent Secure Sensor Systems Project (Abstract)

K. D. McDonald-Maier , University of Essex, UK
A. T. Erdogan , University of Edinburgh, UK
W. G. J. Howells , University of Kent, UK
T. Arslan , University of Edinburgh, UK
A. B. T. Hopkins , University of Essex, UK
pp. 137-140

On Some Directions in Security-Oriented Research (Abstract)

Luk? Sekanina , Brno University of Technology, Czech Republic
Jan Cernock? , Brno University of Technology, Czech Republic
Tom? Vojnar , Brno University of Technology, Czech Republic
Tom? Hruska , Brno University of Technology, Czech Republic
Dusan Kol? , Brno University of Technology, Czech Republic
pp. 141-144
Session G: Biological, Chemical, and Medical Applications

Using Genetic Algorithms in Chem-Bio Defense Applications (Abstract)

Randy L. Haupt , The Pennsylvania State University, USA
Sue Ellen Haupt , The Pennsylvania State University, USA
George S. Young , The Pennsylvania State University, USA
pp. 151-154

Prediction of Protein Conformation with Potential Applications to Medical Diagnosis and Defence (Abstract)

H. J. Kadim , Liverpool JM University, UK
C. M. Wood , Liverpool JM University, UK
pp. 155-158

Data Mining Usage in Emboli Detection (Abstract)

Adem Karahoca , Bahcesehir University, Turkey
Turkalp Kucur , Bahcesehir University, Turkey
Nizamettin Aydin , Bahcesehir University, Turkey
pp. 159-162
Author Index

Author Index (PDF)

pp. 163
99 ms
(Ver )