نتایج جستجو برای: identification scheme

تعداد نتایج: 625502  

2011
Ajay Jangra Vedpal Singh

Fingerprint is one of the most important biometric techniques for identification and authentication, which may also reduce the complexity (cost / time) of searching data in large database. Over the past several years various methods have been proposed for fingerprint identification, on the same way, this paper propose a new efficient method for fingerprint identification based on ridge and vall...

Journal: :medical laboratory journal 0
مریم ارم آبادی m eramabadi ، دانشگاه ازاد اسلامی، تنکابن، ایران کیوان تدین k tadayon ، ﻣﻮﺳﺴﻪ ﺗﺤﻘﯿﻘﺎت واﮐﺴﻦ و ﺳﺮم ﺳﺎزی رازی، ﮐﺮج، ایران نادر مصوری n mosavari ﻣﻮﺳﺴﻪ ﺗﺤﻘﯿﻘﺎت واﮐﺴﻦ و ﺳﺮم ﺳﺎزی رازی، ﮐﺮج، ایران روح اله کشاورز r keshavarz رضا بنی هاشمی r banihashemi رایناک قادری r ghaderi محمد سخاوتی

abstract background and objective: a high level of homogeneity observed within all bacteria in the mycobacterium tuberculosis complex makes a property that seriously challenges traditional biochemical-based identification methods of these pathogens in the laboratory. the work presented here was conducted to characterize mycobacterium tuberculosis complex isolates in golestan, northern iran. mat...

2010
Dongchul Park David Du

Hot data identification can be applied to a variety of fields. Particularly in flash memory, it has a critical impact on its performance (due to garbage collection) as well as its lifespan (due to wear leveling). Although this is an issue of paramount importance in flash memory, it is the least investigated one. Moreover, all existing schemes focus only or mainly on a frequency viewpoint. Howev...

2012
Pierre-Louis Cayrel Sidi Mohamed El Yousfi Alaoui Gerhard Hoffmann Pascal Véron

The concept of threshold ring signature in code-based cryptography was introduced by Aguilar et al. in [1]. Their proposal uses Stern’s identification scheme as basis. In this paper we construct a novel threshold ring signature scheme built on the q-SD identification scheme recently proposed by Cayrel et al. in [14]. Our proposed scheme benefits of a performance gain as a result of the reductio...

صمدزادگان, فرهاد, حمیدی, معصومه,

Star identification is one of the most important stages in attitude determination with star trackers. This can be performed using matching algorithms between observed stars and a master star catalogue. The main challenge in this approach is to provide a fast and reliable identification algorithm that is sufficiently robust in different pointing views of the star tracker optical system in the sp...

2008
G. Mamani J. Becedas

This paper presents an adaptive position control scheme for DC motors based on an on-line closed loop continuous-time identification method. A fast, non-asymptotic, algebraic identification method is used to estimate simultaneously the unknown system parameters and the unmeasured states to update an adaptive position control scheme.

Journal: :Brazilian journal of microbiology : [publication of the Brazilian Society for Microbiology] 2018
Carolina Paulino da Costa Capizzani Natália Candido Caçador Elizabeth Andrade Marques Carlos Emílio Levy Ludmilla Tonani Lidia Alice Gomes Monteiro Marin Torres Ana Lúcia da Costa Darini

Identification of nonfermenting Gram-negative bacteria (NFGNB) of cystic fibrosis patients is hard and misidentification could affect clinical outcome. This study aimed to propose a scheme using polymerase chain reaction to identify NFGNB. This scheme leads to reliable identification within 3 days in an economically viable manner when compared to other methods.

2001
Eduardo Reck Miranda

This paper presents a system for the identification of vocal and vocal-like sounds by means of a classificatory scheme based upon their prosodic attributes. The system firstly segments examples of the sound classes in question and performs a number of analyses on these segments in order to determine their prosodic attributes. Then, it builds a classificatory scheme, which will be used to identi...

2004
Nagaraj Anthapadmanabhan Alvaro Cardenas

In a previous class (Lecture 25), we showed how to construct an identification scheme which is secure against a passive adversary using an Honest-Verifier Zero-Knowledge Proof of Knowledge (HVZK-PoK). We also showed that it is possible to construct an Identification Scheme secure against an active adversary using a Witness Indistinguishable Proof of Knowledge (WI-PoK). In this lecture, we will ...

Power system stabilizers have been widely used and successfully implemented for the improvement of power system damping. However, a fixed parameter power system stabilizer tends to be sensitive to variations in generator dynamics so that, for operating conditions away from those used for design, the effectiveness of the stabilizer can be greatly impaired. With the advent of microprocessor techn...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید