- fingerprint comparison algorithm
- Безопасность: алгоритм сличения отпечатков пальцев
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Comparison microscope — A B Two identical microscopes C C Specimens to compare D Comparison eyepiece (optical bridge) A comparison microscope is a device used to analyze side by side specimens. It consists of two microscopes connected by an optical bridge, which results … Wikipedia
Fingerprint recognition — or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify an individual and verify their identity. This article touches on… … Wikipedia
Fingerprint (computing) — In computer science, a fingerprinting algorithm is a procedure that maps an arbitrarily large data item (such as a computer file) to a much shorter bit string, its fingerprint, that uniquely identifies the original data for all practical… … Wikipedia
Biometrics — For the academic journal of statistics in biology, see Biometrics (journal). For the application of statistics to topics in biology, see Biostatistics. At Walt Disney World, biometric measurements are taken from the fingers of guests to ensure… … Wikipedia
Iris recognition — Infobox Anatomy Name = Iris Latin = Caption = The iris is the green/grey/brown area. The other structures visible are the pupil in the centre and the white sclera surrounding the iris. The overlying cornea is pictured, but not visible, as it is… … Wikipedia
Cellular neural network — Cellular neural networks (CNN) are a parallel computing paradigm similar to neural networks, with the difference that communication is allowed between neighbouring units only. Typical applications include image processing, analyzing 3D surfaces,… … Wikipedia
Hash function — A hash function is any well defined procedure or mathematical function for turning some kind of data into a relatively small integer, that may serve as an index into an array. The values returned by a hash function are called hash values, hash… … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Microsoft SQL Server — Developer(s) Microsoft Stable release SQL Server 2008 R2 (10.50.2500.0 Service Pack 1) / July 11, 2011; 4 months ago … Wikipedia
Chemical database — A chemical database is a database specifically designed to store chemical information. This information is about chemical and crystal structures, spectra, reactions and syntheses, and thermophysical data. Contents 1 Types of chemical databases… … Wikipedia
Laserdisc — Not to be confused with disk laser, a flat configuration solid state laser. Not to be confused with VCD, DVD, or Blu ray, optical disc formats employing digital video encoding. Not to be confused with CED, a coincident but incompatible analogue… … Wikipedia