نتایج جستجو برای: system identification
تعداد نتایج: 2568465 فیلتر نتایج به سال:
Paper presents a brief overview of RFID technology and protocols used in it. The paper becomes a foot step in analysis and contrasting Kill Tag, Hash-Lock, Enhanced Hash Lock, Selective Blocker Tag, Tag Broker Model and Molnar Wagner controlled delegation on the basis of security, implementation cost and practical implementation possibility. The discussion results in a selection of protocol as ...
Handwriting recognition is a traditional and natural approach for personal authentication. Compared to signature verification, text-independent writer identification has gained more attention for its advantage of denying imposters in recent years. Dynamic features and static features of the handwriting are usually adopted for writer identification separately. For textindependent writer identifi...
the application of e-learning systems - as one of the solutions to the issue of anywhere and anytime learning – is increasingly spreading in the area of education. content management - one of the most important parts of any e-learning system- is in the concern of tutors and teachers through which they can obtain means and paths to achieve the goals of the course and learning objectives. e-learn...
Background and Aim: The first step in establishing a safety system is hazard identification. If this is not done properly, the subsequent steps steps will not be done effectively either. Since any given identification technique often targets the hazards of one or two of the main elements of a safety system, it is not possible to identify all hazards by a single technique Materials and Methods...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید