3D Laser Scanning Systems
More sophisticated laser scanning solutions. Uncontrolled movements as breathing, muscle contraction. Special optical systems and mirrors. The result of the scanning process in case a complete surface model of the person. Acquire texture information.
Подобные документы
Methods of traversal of high-level multi-threaded models formalized in the Use Case Map computer language. Advantages and disadvantages of this approach compared to existing ones. Generation character lines that are used to test software systems.
??????, добавлен 28.02.2016A flexible system troubleshooting and emergency operation of stepwise refinement priori probability. Ensuring reliability recognition of failure. Automatic search of breaks with step-by-step variations of parameters of tests in communication systems.
??????, добавлен 30.07.2016Method of continuous pumping of fluids and reagents through the analytical module and detector in the respective volume relations with a fixed speed using an electromagnetic pump. The design parameters and optimum operating conditions of the pump.
??????, добавлен 30.08.2016The advantages of remote access to the information resources of the State treasury service of Ukraine with the aim of automating the process of executing budgets. The implementation of the software and technical complex "Treasury client - Treasury".
??????, добавлен 25.06.2024Design and research of mathematical model for information security system in computer network. Science intensive technology. Modeling of security and risk assessment in information and communication system. Information and computer network technologies.
??????, добавлен 27.05.2021A new model of the take-off weight of the aircraft determining process and the weight distribution of passengers’ law. A simulation of the operations in the preparation for departure process. The effect of weight on the passenger aircraft alignment.
??????, добавлен 27.06.2016Using the analysis of eye movement and gaze direction in online testing systems of students' knowledge. Analysis of creating the same conditions for computer testing for all students and improving the level of knowledge obtained by the test results.
??????, добавлен 12.05.2024Consideration of four major requirements when a biometric template protection algorithm is designed. The definition of a secure authentication model, based on fingerprint template protection by using the approaches of cryptography and watermarking.
??????, добавлен 26.01.2018This systematic literature review aims to identify the impact of artificial intelligence in foreign language learning using learning management systems by systematically reviewing studies related to the area. Application of the PRISMA block diagram.
??????, добавлен 16.01.2024Data flow diagrams as a hierarchy of functional processes related data flows. Familiarity with the main components of a data flow diagram: external entities, systems and subsystems, processes. Analysis of the structure of building hierarchy DFD.
??????, добавлен 25.03.2019Question classification extracts useful information. Mathematical Machinery and Document Processing. State of the Art Query-based Summarization and Question Answering Systems. Answering Simple and Complex Questions, their experimental evaluation.
????????? ??????, добавлен 22.07.2016The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.
?????, добавлен 18.09.2012Android operating system security. Analysis and processing of personal data. Ways to overcome security protection. Analysis of existing systems determines the level of danger. Encryption with a public-key. Structure, components of Android applications.
???????????, добавлен 27.01.2015In the world of sports, modern information technologies are increasingly used to improve the results and training of athletes. Swimming is no exception, and new technologies are revolutionizing this sport. Virtual reality (VR) and virtual simulators.
??????, добавлен 21.03.2024Faster explicit formulas for computing pairings over ordinary curves. Secure authentication from a weak key, without leaking information. Towards a game theoretic view of secure computation. Concurrent composition in the bounded quantum storage model.
?????, добавлен 08.03.2014The data collection algorithm to systematically track gender equality metrics across universities. The advantages of leveraging advanced scraping and analysis techniques to gather nuanced insights from diverse online data sources like university websites.
??????, добавлен 12.12.2024The development of the document "functional requirements" for an automated system of monitoring program execution in company related to oil industry. The process of implementation of information system. The importance of proper writing of such a paper.
??????, добавлен 13.02.2016The problem of information and communication technologies and electronic learning tools and their impact on student achievement is considered. Subjects related to the use of technology in performing tasks with the help of a computer are described.
??????, добавлен 24.08.2022???????????? ???????? CASE-??????????, ??????? ????????? ?????? ???????????? ???????? ? ?????? ??????? ? ??????????????. ???????? ????????? ???????? ??????????? ?????????????? ??????????. ?????????????? ? ????????????? CASE-???????, ??????? ?? ?????????.
??????, добавлен 17.11.2014Analysis of information technology monitoring and correction of the functional state of students in the process learning created based on developed models, complex criteria classification of constituent states models, algorithms normalized estimates.
??????, добавлен 23.06.2016CASE-????????: ????????, ??????????, ????????????. ???????????? ? ?????????? ?????????? CASE-??????????. ?????????????? CASE-???????, ??????????????? ??? ?????????????? ?????????????? ?????? ??????-??????, ????????????? ??? ??????, ???????? ????????????.
???????, добавлен 03.07.2013The impact of the used modeling language for the result of the synthesis models. Generating artificial logs events according to the BPMN 2.0, their implementation in the form of a program that extends the software platform Process Mining Framework (ProM).
???????? ??????, добавлен 30.08.2016The study and practice information Illustration of simple cipher. Cryptography as to encryption, the process of converting ordinary information into unintelligible gibberish. Decryption is the reverse, moving from unintelligible ciphertext to plaintext.
?????, добавлен 08.03.2014Reducing the amount of required memory, reducing the time for data processing and reducing the number of copies of documents when updating information in the automation process. Analysis of the choice of technologies for application development.
??????, добавлен 31.08.2022Procedures for collecting information. The difference between qualitative and quantitative information. Technical characteristics of reliability and validity. Reduction or averaging of non-systematic fluctuations in appraisers, objects and tools.
??????, добавлен 23.09.2018