نتایج جستجو برای: Verification
تعداد نتایج: 75312 فیلتر نتایج به سال:
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
objectives: the aim of this study was to verify the treatment planning systems (tpss). the next aim was to validate imsure qa software for patient-specific qa in radiotherapy clinics. material and methods: we used imsure qa software (standard imaging, v 3.5) for verification of 92 non-imrt plans (540 fields) in 10 radiotherapy clinics. to validate the imsure, dose measurement was performed in ...
location verification system
static verification and software testing are not able to verify software single-handedly. therefore, another approach called run-time verification dealing with verifying software behavior against constraints at run-time received attention. however, the run-time verification faces the problem of verification of run-time activities against the constraints are specified in high-level and abstractl...
human verification using a combination of static and dynamic characteristics in foot pressure images
since gait is the mixture of many complex movements, each individual can define with a unique footpressure image that can be used as a reliable biometric scale for human verification. foot pressure colorimages of center for biometrics and security research (cbsr) dataset from 45 men and five womenwere used in this study. owing to the properties of this dataset, an index of foot pressure in addi...
mathematical models have the potential to provide a cost-effective, objective, and flexible approach to assessing management decisions, particularly when these decisions are strategic alternatives. in some instances, mathematical model is the only means available for evaluating and testing alternatives. however, in order for this potential to be realized, models must be valid for the applicati...
the present study was to construct a parentage verification system for iranian caspian horse. a total number of 45 caspian horse samples including 14 foals for parentage verification, 17 stallion and 14 mare for individual identification were genotyped. genomic dna was extracted from whole blood and the genotype were analysed by pcr procedure and using 7 microsatellite markers (aht04, hms03, hm...
speaker verification from talking a few words of sentences has many applications. many methods as dtw, hmm, vq and mq can be used for speaker verification. we applied mq for its precise, reliable and robust performance with computational simplicity. we also used pitch frequency and log gain contour for further improvement of the system performance.
speaker verification is the process of accepting or rejecting claimed identity in terms of its sound features. a speaker verification system can be used for numerous security systems, including bank account accessing, getting to security points, criminology and etc. when a speaker verification system wants to check the identity of individuals remotely, it confronts problems such as noise effect...
Speaker verification from talking a few words of sentences has many applications. Many methods as DTW, HMM, VQ and MQ can be used for speaker verification. We applied MQ for its precise, reliable and robust performance with computational simplicity. We also used pitch frequency and log gain contour for further improvement of the system performance.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید