SHAXSNI OVOZI ASOSIDA IDENTIFIKATSIYALASH TIZIMINING ASOSIY MASALALARI

N Yuldasheva - Потомки Аль-Фаргани, 2024 - al-fargoniy.uz
Аннотация Ushbu maqolada biometrik autentifikatsiya usullaridan biri ovoz asosida
identifikatsiyalash tizimi tahlil qilingan. Shaxsni ovozi asosida identifikatsiyalash tizimi …

[HTML][HTML] The formation and invariance of canine nose pattern of beagle dogs from early puppy to young adult periods

HI Choi, Y Lee, H Shin, S Lee, SS Choi, CY Han… - Animals, 2021 - mdpi.com
Simple Summary In this paper, we examine whether the canine nose pattern, which is an
interlocking pattern of beads and grooves on a dog's nose, is unique to each individual …

[引用][C] Development of mobile face verification based on locally normalized Gabor wavelets

FH Zaman, AA Sulaiman, IM Yassin, NM Tahir… - International Journal on …, 2017

Синтез обучающих выборок для классификации дорожных знаков с помощью нейросетей

ВИ Шахуро, АС Конушин - Компьютерная оптика, 2018 - cyberleninka.ru
В работе исследуется применимость порождающих конкурирующих нейронных сетей
для синтеза обучающих выборок на примере задачи классификации дорожных знаков …

On the Usage of Psychophysiological Data in Software Engineering: An Extended Systematic Mapping Study

R Vieira, K Farias - arXiv preprint arXiv:2105.14059, 2021 - arxiv.org
In recent years, many studies have applied wearable devices to capture
psychophysiological data from software developers. However, the current literature lacks …

[PDF][PDF] Naming services in multi-agent systems: A design for agent-based white pages

T Wright - Proceedings of the Third International Joint Conference …, 2004 - Citeseer
Distributed multi-agent systems require naming services to locate and communicate with
remote agents. In this paper we focus on the design and implementation of the “White …

Multi-filter score-level fusion for fingerprint verification

MAO Ahmed, O Reyad, Y AbdelSatar… - … Conference on Advanced …, 2018 - Springer
Biometric systems are widely used in various applications of today's authentication
technology. The unimodal systems suffer from various stumbling blocks such as noisy …

Сравнение изображений на основе их диффеоморфного преобразования

СВ Лейхтер, СН Чуканов - Компьютерная оптика, 2018 - cyberleninka.ru
Рассмотрена задача сравнения двух диффеоморфных изображений–начального
изображения диффеоморфизма и конечного изображения диффеоморфизма …

An evolutionary approach to address interoperability issues in multi-device signature verification

D Impedovo, G Pirlo, L Sarcinella… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
In the present paper, we propose an evolutionary approach to address interoperability
issues in multi-device signature verification, based on transformation mappings …

[PDF][PDF] Hybrid feature extraction technique for face recognition

SN Kakarwal, RR Deshmukh - International Journal of Advanced …, 2012 - Citeseer
This paper presents novel technique for recognizing faces. The proposed method uses
hybrid feature extraction techniques such as Chi square and entropy are combined together …