Handbook of remote biometrics
Biometrics at a distance: issues, challenges, and prospects. Advanced technologies for touchless fingerprint recognition. Long-range facial image acquisition and quality. Detection of singularities in fingerprint images using linear phase portraits.
Подобные документы
Rapid application development - a software approach of construction of end-user products in conditions of changing user requirements and limited time resources. Specific features of high-level description of Framework for domain data organization.
дипломная работа, добавлен 13.07.2020Web Service Composition (WSC) is a process that helps to save much programming and cost effort by reusing existing components – web services. This paper presents an overview of current state-of-the-art Web Service Discovery and Selection methods.
статья, добавлен 07.12.2016Application of biomedical signals for the control purposes is currently growing interest of research society. In this paper application domain of using electroencephalographic signals obtained from an inexpensive Emotiv EPOC headset was described.
статья, добавлен 23.06.2016CALS-технология (Continuons Acquisition and Life – cycle Support) как непрерывная информационная поддержка жизненного цикла продукта. Цели применения в системе автоматизированного проектирования и ее концептуальная модель. Группы программных продуктов.
презентация, добавлен 17.03.2014The cognitive simulation of AstroDatabank records by using the artificial intelligence system with the neuron-net training and recognition. Structure of the analytical system. Studying the technology of simulation. Discussing the mostly important results.
статья, добавлен 26.04.2017- 131. Antivirus software
Antivirus is used to prevent, detect and remove malware, including computer viruses and worms. Such programs may also prevent and remove adware, spyware and other forms of malware. Identification methods: signature based detection and file emulation.
доклад, добавлен 04.12.2011 A number of different techniques that people can use to hide information. The sound files and images that float about the network today. Measuring and encrypting information. Error correction and white noise. Analysis of hiding information in JPEG files.
книга, добавлен 08.03.2014Communicating over long distances. The Telegraph and commercial Growth of the Telephone. The Emergence of Broadcasting. International Telecommunications Networks. Hand-Held Radio Transceivers. History and development of communications satellites.
реферат, добавлен 24.12.2013Структура редактора Visual Basic, характеристика его основных элементов. Типы данных, операции и встроенные функции редактора, создание процедур обработки ошибочных ситуаций. Методы объекта Range, использующие команды Excel, процесс создания макросов.
учебное пособие, добавлен 16.11.2015The principle of quantum cryptography. Quantum no-cloning theorem. State detection and random number generator. Verify assumptions used in a security proof. Quantum hacking and countermeasures from this. Introduction of cryptography for engineers.
книга, добавлен 08.03.2014The technical aspects of building a solution to our problem of predicting advertisement banner efficiency. Rectified Linear Units activation function. A simple neural network architecture, trustworthy model. Visualizing convolutional neural networks.
дипломная работа, добавлен 13.07.2020The first public key system - Diffie-Hellman key agreement. Solving discrete logarithm problem. Mutual identification with key establishment. Unicity distance for secret key cipher. Statistical tests for random and pseudo-random number generators.
книга, добавлен 08.03.2014Классический интерфейс, главное меню и стандартная панель инструментов программы AutoCAD. Этапы создания пользовательского профиля. Технология использование Мастеров (Wizard). Создание чертежа с помощью Мастера детальной подготовки (Advanced Setup).
методичка, добавлен 27.09.2017Характеристика имитационной модели NIDPS (Network-based Intrusion Detection and Prevention System) для обнаружения и предотвращения вторжений в телекоммуникационных системах и сетях. Пакет Wireshark для реализации процедур захвата и фильтрации трафика.
статья, добавлен 23.02.2016Enigma cipher machine. Cryptographic ally strong sequences. Shift register-based stream ciphers. Hellman’s time-memory trade-off. Birthday attacks on hash functions. Secondary phase refinement. Implementation attacks. Sigaba rotor in reverse orientation
учебное пособие, добавлен 08.03.2014Исследование степени защиты информации организации, защищенной с применением пароля, а также исследование методов противодействия атакам на пароль. Работа с программным продуктом для раскрытия закрытых паролем архивов: Advanced ZIP Password Recovery.
практическая работа, добавлен 13.12.2014The possibilities of the MS Excel spreadsheet processing system for visualization of large data sets in an easy-to-understand form. Development of tools for practical implementation for visualization of large data arrays by selecting the required range.
статья, добавлен 29.09.2023Analysis of the model of forced exhalation and Fourier transform. Determination of the frequency spectrum of its air volume velocity. Calculation of the error in measuring the process parameters with a spirometer with characteristics in the range 0-15 Hz.
статья, добавлен 30.01.2017Схема взаимодействия браузера и сервера. Сущность технологий AJAX, Long polling, HTTP-streaming и Forever frame. Использование Web Storage для хранения данных в веб-браузере. Создание гибких и быстрых систем коммуникаций в обход ограничений протокола.
статья, добавлен 29.01.2016Resistance of randomized projective coordinates against power analysis. Energy-efficient software implementation of long integer modular arithmetic. Special hardware sieving device for factoring 1024-bit integers. Hardware attacks and countermeasures.
курс лекций, добавлен 08.03.2014Stages of development and analysis of the effectiveness of the mechanism, which will help identify the line with Romanian chromatic words on the basis of computer technology as the first phase of development of the dictionary meanings of poetic colors.
статья, добавлен 23.02.2016Characterization of the foundations of modern cryptography for practitioners. Description of codes for error detection. Definition of advance in coding theory and cryptography. The main advances in algebraic geometry codes and coding in cryptology.
книга, добавлен 08.03.2014The means of digital communications in the field of public administration and cyber education. The definition of "Instant messages" and "chatbot" is defined. The impact of the COVID-19 pandemic on the development of digital communication systems.
статья, добавлен 03.02.2021Review of Basic Statistics With SPSS. Data Coding and Exploratory Analysis. Selecting and Interpreting Inferential Statistics. Several Measures of Reliability. Exploratory Factor Analysis and Principal Components Analysis. Multiple Linear Regression.
книга, добавлен 09.04.2013- 150. Diffusion Maps - a Probabilistic Interpretation for Spectral Embedding and Clustering Algorithms
Spectral embedding and spectral clustering as common methods for non-linear dimensionality reduction and clustering of complex high dimensional datasets. Asymptotics of the diffusion distances and diffusion maps. Clustering of a mixture of gaussians.
учебное пособие, добавлен 08.02.2013