انتقلت منتديات لكِ النسائية إلى هذا الرابط:
منتديات لكِ النسائية
هذا المنتدى للقراءة فقط.


للبحث في شبكة لكِ النسائية:
عرض النتائج 1 الى 4 من 4

الموضوع: اريد منكم مساعده إذا امكن جزاكم الله كل خير

  1. #1
    تاريخ التسجيل
    Jan 2004
    الموقع
    في مكان واسع
    الردود
    54
    الجنس
    امرأة

    Question اريد منكم مساعده إذا امكن جزاكم الله كل خير

    بسم الله الرحمن الرحيم
    السلام عليكم ورحمة الله وبركاته
    عندي سؤال اريد منكم المساعده إذأستطعتم المساعده فلا تبخلو بالأجابه
    س1-ماهي طرق كيفيه مطابقه الصور او البصمات أو التوقيعات ؟
    how to verify image fingureprints signature?
    methodology use to verifys
    أريد أي معلومات عن هذا السوال سواء بالعربي أو بالأنجليزي

  2. #2
    تاريخ التسجيل
    Feb 2003
    الموقع
    أحب البقاع الى قلبي
    الردود
    1,950
    الجنس
    أنثى
    والله ماادري اعتقد اللي يعرف واحده يكون لها اقارب بالشرطه


    حبيت اساعدك بس ماعرفت
    الله يعينك

  3. #3
    تاريخ التسجيل
    Dec 2001
    الردود
    12,333
    الجنس
    وعليكم السلام ورحمة الله وبركاته ..
    حياك الله أختي الكريمة معنا مفيدة ومستفيدة ..
    بالنسبة لسؤالك أختي ما ذنبنا عن كيفية مطابقة البصمات .. فأقول لكِ أن البصمات والصور تتم مطابقتها عن طريق خبير قانوني مختص وعن طريق أدوات وأجهزة خاصة ..
    أتمنى إني أكون قد أفدتك ..


    -- من أراد أن ينقل أياً من موضوعاتي فله ذلك بدون سؤالي أو إستئذاني وبدون حتى الإشارة إلى المصدر --
    سبحانك اللهم وبحمدك أشهد أن لا إله إلا أنت أستغفرك وأتوب إليك ..


  4. #4
    تاريخ التسجيل
    Sep 2002
    الموقع
    Jordan
    الردود
    2,003
    الجنس
    أنثى
    أختي الطرق تسمى Biometrics "المقاييس الحيوية" و وجدت لك هالمقال عنها



    Biometrics is automated methods of identifying a person or verifying the identity of a person based on a physiological or behavioral characteristic. Examples of physiological characteristics include hand or finger images, facial characteristics, and iris recognition. Behavioral characteristics are traits that are learned or acquired.

    Dynamic signature verification, speaker verification, and keystroke dynamics are examples of behavioral characteristics.

    Biometric authentication requires comparing a registered or enroled biometric sample (biometric template or identifier) against a newly captured biometric sample (for example, a fingerprint captured during a login). During Enrolment, as shown in the picture below, a sample of the biometric trait is captured, processed by a computer, and stored for later comparison.

    Biometric recognition can be used in Identification mode, where the biometric system identifies a person from the entire enroled population by searching a database for a match based solely on the biometric. For example, an entire database can be searched to verify a person has not applied for entitlement benefits under two different names.

    This is sometimes called “one-to-many” matching. A system can also be used in Verification mode, where the biometric system authenticates a person’s claimed identity from their previously enroled pattern. This is also called “one-to-one” matching. In most computer access or network access environments, verification mode would be used. A user enters an account, user name, or inserts a token such as a smart card, but instead of entering a password, a simple touch with a finger or a glance at a camera is enough to authenticate the user.

    Types of Biometrics that are part of Trinity’s Solution are:

    Fingerprints

    The patterns of friction ridges and valleys on an individual's fingertips are unique to that individual. For decades, law enforcement has been classifying and determining identity by matching key points of ridge endings and bifurcations. Fingerprints are unique for each finger of a person including identical twins.

    One of the most commercially available biometric technologies, fingerprint recognition devices for desktop and laptop access are now widely available from many different vendors at a low cost. With these devices, users no longer need to type passwords – instead, only a touch provides instant access. Fingerprint systems can also be used in identification mode. Several states check fingerprints for new applicants to social services benefits to ensure recipients do not fraudulently obtain benefits under fake names. New York State has over 900,000 people enrolled in such a system.

    Facial Recognition

    The identification of a person by their facial image can be done in a number of different ways such as by capturing an image of the face in the visible spectrum using an inexpensive camera or by using the infrared patterns of facial heat emission. Facial recognition in visible light typically model key features from the central portion of a facial image. Using a wide assortment of cameras, the visible light systems extract features from the captured image(s) that do not change over time while avoiding superficial features such as facial expressions or hair.

    Several approaches to modeling facial images in the visible spectrum are Principal Component Analysis, Local Feature Analysis, neural networks, elastic graph theory, and multi-resolution analysis. Some of the challenges of facial recognition in the visual spectrum include reducing the impact of variable lighting and detecting a mask or photograph. Some facial recognition systems may require a stationary or posed user in order to capture the image, though many systems use a real-time process to detect a person's head and locate the face automatically. Major benefits of facial recognition are that it is non-intrusive, hands-free, continuous and accepted by most users.

    Iris Recognition

    This recognition method uses the iris of the eye, which is the colored area that surrounds the pupil. Iris patterns are thought unique. The iris patterns are obtained through a video-based image acquisition system. Iris scanning devices have been used in personal authentication applications for several years. Systems based on iris recognition have substantially decreased in price and this trend is expected to continue. The technology works well in both verification and identification modes (in systems performing one-to-many searches in a database). Current systems can be used even in the presence of eyeglasses and contact lenses. The technology is not intrusive. It does not require physical contact with a scanner. Iris Recognition has been demonstrated to work with individuals from different ethnic groups and nationalities.

    Signature Verification

    This technology uses the dynamic analysis of a signature to authenticate a person. The technology is based on measuring speed, pressure and angle used by the person when a signature is produced. One focus for this technology has been e-business applications and other applications where signature is an accepted method of personal authentication.

    Why Use Biometrics?

    Using biometrics for identifying human beings offers some unique advantages. Biometrics can be used to identify you as you.

    Tokens, such as smart cards, magnetic stripe cards, photo ID cards, physical keys and so forth, can be lost, stolen, duplicated, or left at home.

    Passwords can be forgotten, shared, or observed. Moreover, today's fast-paced electronic world means people are asked to remember a multitude of passwords and personal identification numbers (Pins) for computer accounts, bank ATMs, e-mail accounts, wireless phones, web sites and so forth. Biometrics holds the promise of fast, easy-to-use, and accurate, reliable, and less expensive authentication for a variety of applications.

    The advantage biometric authentication provides is the ability to require more instances of authentication in such a quick and easy manner that users are not bothered by the additional requirements. As biometric technologies mature and come into wide-scale commercial use, dealing with multiple levels of authentication or multiple instances of authentication will become less of a burden for users. An indication of the biometric activities.

    Recent advances in biometric technology have resulted in increased accuracy at reduced costs; biometric technologies are positioning themselves as the foundation for many highly secure identification and personal verification solutions. Today's biometric solutions provide a means to achieve fast, user-friendly authentication with a high level of accuracy and cost savings. Many areas will benefit from biometric technologies. Highly secure and trustworthy electronic commerce, for example, will be essential to the healthy growth of the global Internet economy. Many biometric technology providers are already delivering biometric authentication for a variety of web-based and client/server based applications to meet these and other needs.

مواضيع مشابهه

  1. اريد منكم مساعده ؟ لتزين ملفات
    بواسطة راااما 2007 في الحفلات والهدايا
    الردود: 4
    اخر موضوع: 29-11-2010, 04:55 PM
  2. اريد منكم مساعده ؟ لتزين ملفات
    بواسطة راااما 2007 في ركن الأشغال اليدوية والخياطة
    الردود: 2
    اخر موضوع: 26-11-2010, 09:11 PM
  3. ابي منكم مساعده جزاكم الله خير :(
    بواسطة غدوووش... في ركن الأشغال اليدوية والخياطة
    الردود: 6
    اخر موضوع: 09-05-2007, 01:08 PM
  4. اريد مساعده منكم
    بواسطة sarah_uk في العناية بالجسم والبشرة والمكياج والعطورات
    الردود: 2
    اخر موضوع: 31-03-2007, 04:05 PM
  5. اريد منكم نصيحه و مساعده و افاده الله لا هانكم
    بواسطة غااااااليه في نافذة إجتماعية
    الردود: 11
    اخر موضوع: 29-05-2006, 05:52 PM

أعضاء قرؤوا هذا الموضوع: 0

There are no members to list at the moment.

الروابط المفضلة

الروابط المفضلة
لكِ | مطبخ لكِ