- mathematical fingerprint
- Безопасность: математический идентификационный признак (напр. контрольная сумма)
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Azizul Haque — (also Azizul Hacque , Khan Bahadur Qazi Azizul Huq and খান বাহাদুর কাজী আজীজুল হক) was a Kolkata (Calcutta) police officer of British India who worked with Edward Henry to develop the Henry Classification System of fingerprints. Haque, reportedly … Wikipedia
Sulston score — The Sulston Score is an equation used in DNA mapping to numerically assess the likelihood that a given fingerprint similarity between two DNA clones is merely a result of chance. Used as such, it is a test of statistical significance. That is,… … Wikipedia
Mathematics and Physical Sciences — ▪ 2003 Introduction Mathematics Mathematics in 2002 was marked by two discoveries in number theory. The first may have practical implications; the second satisfied a 150 year old curiosity. Computer scientist Manindra Agrawal of the… … Universalium
spectroscopy — spectroscopist /spek tros keuh pist/, n. /spek tros keuh pee, spek treuh skoh pee/, n. the science that deals with the use of the spectroscope and with spectrum analysis. [1865 70; SPECTRO + SCOPY] * * * Branch of analysis devoted to identifying… … Universalium
Henry Classification System — The Henry Classification System is a long standing method by which fingerprints are sorted by physiological characteristics for one to many searching. Developed by Sir Edward Henry in the late 1800s for criminal investigations in British India,… … Wikipedia
Edward Henry — Sir Edward Richard Henry,1st Baronet GCVO KCB CSI KPM (26 July, 1850 ndash; 19 February, 1931) was the Commissioner of Police of the Metropolis (head of the Metropolitan Police of London) from 1903 to 1918. His commission saw the introduction of… … Wikipedia
Iris recognition — Infobox Anatomy Name = Iris Latin = Caption = The iris is the green/grey/brown area. The other structures visible are the pupil in the centre and the white sclera surrounding the iris. The overlying cornea is pictured, but not visible, as it is… … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Cellular neural network — Cellular neural networks (CNN) are a parallel computing paradigm similar to neural networks, with the difference that communication is allowed between neighbouring units only. Typical applications include image processing, analyzing 3D surfaces,… … Wikipedia
Ridge detection — The ridges (or the ridge set) of a smooth function of two variables is a set of curves whose points are, loosely speaking, local maxima in at least one dimension. For a function of N variables, its ridges are a set of curves whose points are… … Wikipedia
Authentication — (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic , that is, that claims made by or about the thing are true. This might involve confirming the identity… … Wikipedia