نتایج جستجو برای: Verification

تعداد نتایج: 75312  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Journal: :journal of biomedical physics and engineering 0
s r mahdavi k keshavarzi e davani

objectives: the aim of this study was to verify the treatment planning systems (tpss). the next aim was to validate imsure qa software for patient-specific qa in radiotherapy clinics.  material and methods: we used imsure qa software (standard imaging, v 3.5) for verification of 92 non-imrt plans (540 fields) in 10 radiotherapy clinics. to validate the imsure, dose measurement was performed in ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - موسسه آموزش عالی غیرانتفاعی و غیردولتی سجاد مشهد - دانشکده فنی 1393

location verification system

Journal: :the modares journal of electrical engineering 2010
seyed morteza - babamir sayed - jalili

static verification and software testing are not able to verify software single-handedly. therefore, another approach called run-time verification dealing with verifying software behavior against constraints at run-time received attention. however, the run-time verification faces the problem of verification of run-time activities against the constraints are specified in high-level and abstractl...

Journal: :journal of medical signals and sensors 0
fereshte eradi zare keivan maghooli

since gait is the mixture of many complex movements, each individual can define with a unique footpressure image that can be used as a reliable biometric scale for human verification. foot pressure colorimages of center for biometrics and security research (cbsr) dataset from 45 men and five womenwere used in this study. owing to the properties of this dataset, an index of foot pressure in addi...

Journal: :the international journal of humanities 2014
mohammad ali khatami firouzabadi

mathematical models have the potential to provide a cost-effective, objective, and flexible approach to assessing management decisions, particularly when these decisions are strategic alternatives. in some instances, mathematical model is the only means available for evaluating and testing alternatives.  however, in order for this potential to be realized, models must be valid for the applicati...

Journal: :iranian journal of biotechnology 2006
hamidreza seyedabadi cyrus amirinia mohammad hossein banabazi hossein emrani

the present study was to construct a parentage verification system for iranian caspian horse. a total number of 45 caspian horse samples including 14 foals for parentage verification, 17 stallion and 14 mare for individual identification were genotyped. genomic dna was extracted from whole blood and the genotype were analysed by pcr procedure and using 7 microsatellite markers (aht04, hms03, hm...

Journal: :روش های عددی در مهندسی (استقلال) 0
ابوالقاسم صیادیان a. sayadian

speaker verification from talking a few words of sentences has many applications. many methods as dtw, hmm, vq and mq can be used for speaker verification. we applied mq for its precise, reliable and robust performance with computational simplicity. we also used pitch frequency and log gain contour for further improvement of the system performance.

Journal: :journal of advances in computer research 2014
mohammad mosleh faraz forootan najmeh hosseinpour

speaker verification is the process of accepting or rejecting claimed identity in terms of its sound features. a speaker verification system can be used for numerous security systems, including bank account accessing, getting to security points, criminology and etc. when a speaker verification system wants to check the identity of individuals remotely, it confronts problems such as noise effect...

A. Sayadian,

Speaker verification from talking a few words of sentences has many applications. Many methods as DTW, HMM, VQ and MQ can be used for speaker verification. We applied MQ for its precise, reliable and robust performance with computational simplicity. We also used pitch frequency and log gain contour for further improvement of the system performance.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید