Software systems and computational methods
Reference:
Savinov A.N.
Analysis of the first and second level error
causes in the systems of authorization
based on the keyboard handwriting recognition.
// Software systems and computational methods.
2012. ¹ 1.
P. 43-52.
URL: https://en.nbpublish.com/library_read_article.php?id=61558
1.
|
Ivanov A.I. Neyrosetevye algoritmy biometricheskoy identifikatsii lichnosti.— Seriya «Neyrokomp'yutery i ikh primenenie». Kn. 15. — M.: Radiotekhnika, 2004. – s. 22-50.
|
2.
|
Rybchenko D.E., Kriterii ustoychivosti i individual'nosti komp'yuternogo pocherka pri vvode klyuchevykh fraz.— Spetsial'naya tekhnika sredstv svyazi. Seriya «Sistemy, seti i tekhnicheskie sredstva konfidentsial'noy svyazi».— Penza, PNIEI, 1997, vyp.¹2 – s. 104-107.
|
3.
|
Obzor tekhnologiy biometricheskoy identifikatsii – 16.11.03. http://center.forever.kz/hard/other/f0003.htm
|
4.
|
Yu.A. Bryukhomitskiy, M.N. Kazarin. Uchebnye biometricheskie sistemy kontrolya dostupa po rukopisnomu i klaviaturnomu pocherkam.— Taganrog, TRGU, 2004 ( http://www.library.mephi.ru/data/scientific-sessions/2006/vnk13/0-1-12.doc)
|
5.
|
Vladimir Vezhnevets. Otsenka kachestva raboty klassifikatorov. Komp'yuternaya grafika i mul'timedia. Vypusk ¹4(1)/2006. http://cgm.computergraphics.ru/content/view/106
|
6.
|
Metodicheskie ukazaniya po matematicheskomu analizu. Ch. 2. Kurs lektsiy po matematicheskomu analizu (dlya studentov 2-go kursa). Ch. 2. MFTI. M., 2005. 213 s.
|
7.
|
http://wapedia.mobi/ru/Moshchnost'_kriteriy
|