派博傳思國(guó)際中心

標(biāo)題: Titlebook: Biometric Identification Technologies Based on Modern Data Mining Methods; Stepan Bilan,Mohamed Elhoseny,D. Jude Hemanth Book 2021 Springe [打印本頁(yè)]

作者: 信賴    時(shí)間: 2025-3-21 20:09
書目名稱Biometric Identification Technologies Based on Modern Data Mining Methods影響因子(影響力)




書目名稱Biometric Identification Technologies Based on Modern Data Mining Methods影響因子(影響力)學(xué)科排名




書目名稱Biometric Identification Technologies Based on Modern Data Mining Methods網(wǎng)絡(luò)公開度




書目名稱Biometric Identification Technologies Based on Modern Data Mining Methods網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Biometric Identification Technologies Based on Modern Data Mining Methods被引頻次




書目名稱Biometric Identification Technologies Based on Modern Data Mining Methods被引頻次學(xué)科排名




書目名稱Biometric Identification Technologies Based on Modern Data Mining Methods年度引用




書目名稱Biometric Identification Technologies Based on Modern Data Mining Methods年度引用學(xué)科排名




書目名稱Biometric Identification Technologies Based on Modern Data Mining Methods讀者反饋




書目名稱Biometric Identification Technologies Based on Modern Data Mining Methods讀者反饋學(xué)科排名





作者: 昆蟲    時(shí)間: 2025-3-21 21:16
Identification of a Person by Palm Based on an Analysis of the Areas of the Inner Surface,reference, form a database. Software was developed that implements the method, which made it possible to carry out an experiment with the well-known IIT Delhi Palmprint Image Database version 1.0. The results of the experiments showed high efficiency of biometric identification.
作者: Substance-Abuse    時(shí)間: 2025-3-22 00:59
The Economic Context for Language Choice,s are presented. Algorithms for the formation of characteristic features and user identification are described. For biometric identification, fixed and arbitrary key sequences are used. An experimental analysis based on the FAR and FRR indicators was carried out.
作者: 甜瓜    時(shí)間: 2025-3-22 08:35

作者: 支柱    時(shí)間: 2025-3-22 10:11

作者: 整理    時(shí)間: 2025-3-22 13:55

作者: 占卜者    時(shí)間: 2025-3-22 18:11
-- static and dynamic -- and discusses developing for each.R.This book emphasizes recent advances in the creation of biometric identification systems for various applications in the field of human activity. The book displays the problems that arise in modern systems of biometric identification, as w
作者: 誰在削木頭    時(shí)間: 2025-3-22 21:41

作者: 愉快么    時(shí)間: 2025-3-23 02:20

作者: ACRID    時(shí)間: 2025-3-23 07:04
http://image.papertrans.cn/b/image/188167.jpg
作者: 世俗    時(shí)間: 2025-3-23 13:14

作者: 毛細(xì)血管    時(shí)間: 2025-3-23 16:04
978-3-030-48380-7Springer Nature Switzerland AG 2021
作者: 使糾纏    時(shí)間: 2025-3-23 21:29

作者: eucalyptus    時(shí)間: 2025-3-23 23:15
The Political Context for Language Choice,ystem based on standard parameters is a challenging task as most of the existing systems run into problem while extracting the features that are robust to different gait challenging conditions. The three major problems with the common gait biometric systems are as follows: (1) eliminating temporal o
作者: Valves    時(shí)間: 2025-3-24 04:14
The Economic Context for Language Choice,s require the development and implementation of individual methods, on the basis of which a biometric identification system is developed. This work is devoted to the consideration of biometric identification issues by the keystroke dynamic. The system of biometric identification by keystroke dynamic
作者: RUPT    時(shí)間: 2025-3-24 08:40

作者: 夜晚    時(shí)間: 2025-3-24 13:52
The Assistance Context for Language Choice,ided into static and dynamic features. One of the important dynamic individual characteristics of a person is gait. Many different methods are used to analyze a person’s gait. The most popular method is the video surveillance method based on processing and recognition of images represented by separa
作者: Communal    時(shí)間: 2025-3-24 17:38
The Assistance Context for Language Choice,Handwriting recognition is used for two tasks: determining the meaning of the text and biometric identification of the person who wrote this text. This chapter solves the problem of identifying the user from handwritten images based on cellular automata with hexagonal coating and Radon transform. He
作者: modest    時(shí)間: 2025-3-24 22:12
The Assistance Context for Language Choice,images of the same scene or elaborate video frames. In the literature, we find many techniques that have been proposed for robust estimations, such as RANSAC (random sample consensus), least-squares median (LMeds), and M estimators, are exhaustive. This article presents a comparison between the diff
作者: 集合    時(shí)間: 2025-3-25 01:15

作者: Processes    時(shí)間: 2025-3-25 07:14
https://doi.org/10.1007/0-387-31194-7d for analyzing the geometric shape of the inner side of a person’s palm, which divides the palm into unequal regions and determines their areas, and also calculates the distances between the selected control points of the palm. The method does not require a special arrangement of the fingers of the
作者: FACET    時(shí)間: 2025-3-25 10:03

作者: 吹氣    時(shí)間: 2025-3-25 15:36

作者: 拘留    時(shí)間: 2025-3-25 18:38

作者: 禁止    時(shí)間: 2025-3-25 23:10
Possibilities of Applying the Triangulation Method in the Biometric Identification Process, field of computational geometry (specifically polygon triangulation) in combination with face recognition techniques. The chapter describes some authentication techniques with an emphasis on face recognition technologies and polygon triangulation as a fundamental algorithm in computational geometry
作者: 暴露他抗議    時(shí)間: 2025-3-26 03:25

作者: 不確定    時(shí)間: 2025-3-26 07:46

作者: 事情    時(shí)間: 2025-3-26 09:26
Analysis of the Dynamics of Handwriting for Biometric Personality Identification Based on Cellular r identifying images of handwritten text. However, the use of statistical images of handwritten text often leads to false identification, i.e. the system may falsely identify the imposter. This is because the static image of handwritten text is easy to fake. In connection with this situation, an ana
作者: 畸形    時(shí)間: 2025-3-26 16:33

作者: CHECK    時(shí)間: 2025-3-26 19:31

作者: 驚奇    時(shí)間: 2025-3-26 22:27

作者: Tincture    時(shí)間: 2025-3-27 03:00
Identification of Persons Using Stereo Image Pairs and Perturbation Functions,ure vector, are identified. The method offers the following advantages: continuous and secret identification of the object; it is impossible to use a fake object; twins can be distinguished; weak dependence on head turning (the range of head deflection is substantially increased); weak dependence on
作者: 凹室    時(shí)間: 2025-3-27 06:44
Identification of a Person by Palm Based on an Analysis of the Areas of the Inner Surface,d for analyzing the geometric shape of the inner side of a person’s palm, which divides the palm into unequal regions and determines their areas, and also calculates the distances between the selected control points of the palm. The method does not require a special arrangement of the fingers of the
作者: 解決    時(shí)間: 2025-3-27 09:56
Search of Informative Biometric Characteristic Features of the Palm Based on Parallel Shift Technolnt for each person in more than 90 known parameters. However, a person can be confidently distinguished from another person using all the known biometric characteristics of the palm. Moreover, part of the quantitative values of such characteristics may coincide for several people. This is especially
作者: analogous    時(shí)間: 2025-3-27 15:41
Multitrait Selfie: Low-Cost Multimodal Smartphone User Authentication,ss control for banks) and consumer (e.g., mobile phone unlocking) applications. While, face, fingerprint and inherent behavioral biometrics using inbuilt sensors such as accelerometer for smartphones person authentication, they have yet not achieved the desired or required level of efficiency, secur
作者: 刻苦讀書    時(shí)間: 2025-3-27 18:42
Research of Biometric Characteristics of the Shape of the Ears Based on Multi-Coordinate Methods,e geometric shape of a person’s ear, which divides the image of the ear into regions and determines their area, and calculates the area of images belonging to the image of the ear and forms their references. The possible options for highlighting a separate image of the ear when scanning at a distanc
作者: 誘惑    時(shí)間: 2025-3-27 22:53
Language Choice in a Nation Under Transitionhere is no possibility of stealing the key (as is the case with the approaches: “something you know” and “something you have”). By introducing this procedure of determining the authentication of users, unauthorized access to computers, mobile devices, physical locations, networks, or databases is ma
作者: carotid-bruit    時(shí)間: 2025-3-28 04:27

作者: orient    時(shí)間: 2025-3-28 08:47
https://doi.org/10.1007/0-387-31194-7ized in scale and orientation. Several methods are considered. The first method is based on the presentation of the dynamics of handwritten text using the direction of movement of the writing element in each video frame. Various elements of text images are analyzed, which allows to increase the numb
作者: 不發(fā)音    時(shí)間: 2025-3-28 12:29
The Assistance Context for Language Choice,array, and based on the percentage obtained, a decision was made to identify. An experiment was conducted for various combinations of handwritten characters, based on which the optimal combination of characters for reliable identification was determined and the optimal confidence interval over which
作者: Nmda-Receptor    時(shí)間: 2025-3-28 15:09

作者: 灌溉    時(shí)間: 2025-3-28 20:18

作者: 書法    時(shí)間: 2025-3-29 00:38

作者: tattle    時(shí)間: 2025-3-29 06:29

作者: 排斥    時(shí)間: 2025-3-29 09:02
https://doi.org/10.1007/978-3-030-24989-2 obtained in random access from the Internet and formed by Esther Gonzalez. Experimental studies have shown high identification results for all used methods of preliminary processing of images and all simultaneously used methods of identification.
作者: Misgiving    時(shí)間: 2025-3-29 12:13
Possibilities of Applying the Triangulation Method in the Biometric Identification Process,here is no possibility of stealing the key (as is the case with the approaches: “something you know” and “something you have”). By introducing this procedure of determining the authentication of users, unauthorized access to computers, mobile devices, physical locations, networks, or databases is ma
作者: 補(bǔ)充    時(shí)間: 2025-3-29 18:03

作者: Feckless    時(shí)間: 2025-3-29 20:57

作者: 鉗子    時(shí)間: 2025-3-30 03:12
User Identification Using Images of the Handwritten Characters Based on Cellular Automata and Radonarray, and based on the percentage obtained, a decision was made to identify. An experiment was conducted for various combinations of handwritten characters, based on which the optimal combination of characters for reliable identification was determined and the optimal confidence interval over which
作者: 不朽中國(guó)    時(shí)間: 2025-3-30 06:28

作者: majestic    時(shí)間: 2025-3-30 11:04
Identification of Persons Using Stereo Image Pairs and Perturbation Functions,for more accurate identification. Using the calibrated stereo pair for the face, the depth map is calculated by the correlation algorithm. As a result, a 3D mask of the face is obtained. Using three anthropomorphic points, a coordinate system that ensures a possibility of superposition of the tested




歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
阿拉善左旗| 桂林市| 侯马市| 东明县| 高州市| 峡江县| 四子王旗| 密云县| 常德市| 湖北省| 永胜县| 新晃| 静海县| 健康| 荥阳市| 四川省| 龙井市| 鄂伦春自治旗| 万源市| 和林格尔县| 高雄市| 堆龙德庆县| 松江区| 克什克腾旗| 贺兰县| 河北区| 沅江市| 西丰县| 鹿泉市| 广汉市| 固始县| 金寨县| 南皮县| 温州市| 大港区| 张家港市| 柏乡县| 琼中| 玉环县| 玉林市| 唐山市|