Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - fingerprint
Search - fingerprint - List
一编关于ARM的指纹识别模块的研究的文章,挺有意思的,希望对大家有所帮助-a series of ARM Fingerprint Identification Module of the article quite interesting, and I hope to help everyone
Update : 2024-05-04 Size : 479232 Publisher : 闪智强

指纹识别系统c语言源程序!!强烈推荐-Fingerprint Identification System c language source! ! Strongly recommended!
Update : 2024-05-04 Size : 45056 Publisher : klhkl

经典的c语言指纹识别程序,改进了算法,提高了识别率达到了98%以上-classical language c fingerprint identification procedures improve the algorithm, improving the recognition rate of over 98%
Update : 2024-05-04 Size : 28672 Publisher : 美髯客

DL : 0
这是一个用指纹数据库自动评估指纹算法性能,在VC++ 6.0平台上开发的程序。程序自动读取指定路径下,按FVC2004规格命名的指纹图像文件然后分别进行类内和类间比对,并将结果分别存在两个不同的文件中供分析用。只要替换工程中的指纹识别动态库文件,就可以对指定算法进行分析。-This is a fingerprint database with automatic fingerprint algorithm performance assessment, the VC 6.0 platform development process. Automatically read the specified path, Garbor specifications by naming the fingerprint image files were then category and class than a right, and the results were that there are two different documents for analysis. Replacement work as long as the fingerprint identification dynamic libraries, will be able to designate algorithm for analysis.
Update : 2024-05-04 Size : 30720 Publisher : 林金龙

DL : 0
本文以活体指纹录入仪为指纹采集手段,以个人计算机作为处理平 台,综合运用图像处理和模式识别技术,深入、系统地研究了指纹自动 识别的理论和技术,并且详细的探讨了指纹图像预处理过程的实现,提 出了一种改进的指纹图像全局特征点的提取方法。并在此基层上完成了 指纹分类算法,提出并建立了基于全局特征的指纹识别方法-paper to live fingerprint recording instrument for fingerprint acquisition means a personal computer as a processing platform, comprehensive use of image processing and pattern recognition technology, in-depth, systematic study of the Automatic Fingerprint Identification theory and technology, and detailed exploration of the fingerprint image preprocessing the realization of the process, It proposed a fingerprint image of the overall feature points extraction methods. And in this grassroots completed fingerprint classification algorithm, and the establishment based on the overall characteristics of the fingerprint identification method
Update : 2024-05-04 Size : 2581504 Publisher : 宋波

这个算法是仿真linghong的基于指纹码的方法 内有最新的指纹奇异点检测算法-the simulation algorithm is based on fingerprint linghong the code within the latest fingerprint singular point detection Algorithm
Update : 2024-05-04 Size : 669696 Publisher : zhang

指纹识别的源码,包括图形图像的预处理,平滑,去燥,和细化,是比较全面地变成知道,适合新手学习使用-Fingerprint Identification of the source code, including the graphics image preprocessing, smooth, to the dry, and thinning, is to become a more comprehensive know, learning to use for novice
Update : 2024-05-04 Size : 538624 Publisher : ming

指纹识别的源码,包括图形图像的预处理,平滑,去燥,和细化,是比较全面地变成知道,适合新手学习使用-Fingerprint Identification of the source code, including the graphics image preprocessing, smooth, to the dry, and thinning, is to become a more comprehensive know, learning to use for novice
Update : 2024-05-04 Size : 17408 Publisher : ming

指纹识别的源码,包括图形图像的预处理,平滑,去燥,和细化,是比较全面地变成知道,适合新手学习使用-Fingerprint Identification of the source code, including the graphics image preprocessing, smooth, to the dry, and thinning, is to become a more comprehensive know, learning to use for novice
Update : 2024-05-04 Size : 132096 Publisher : ming

基于c语言的指纹识别程序,实现特征提取和指纹匹配。是一个不错的程序例子!-based on the language c fingerprint identification procedures, feature extraction and matching fingerprints. Is a good example of the procedure!
Update : 2024-05-04 Size : 48128 Publisher :

DL : 0
power spectrum analysis of the audio fingerprint system-power spectrum analysis of the audio finger rprint system
Update : 2024-05-04 Size : 1024 Publisher : 雷柏英

DL : 0
基于DSP指纹识别核心算法的设计与实现.对算法进行了简化-DSP-based fingerprint recognition algorithm core of the design and implementation. For a simplified algorithm
Update : 2024-05-04 Size : 157696 Publisher : 妮妮

指纹增强程序,描述了如何使用该库增强指纹图像。原图像和目标图像都是位图。-fingerprint enhancement procedures, a description of how to enhance the use of the fingerprint image. The original image and objectives are bitmap images.
Update : 2024-05-04 Size : 95232 Publisher : gj

文章主要介绍了基于TMS320VC5402的指纹识别系统的设计,概括说明了系统的硬 件和软件设计,重点阐述了指纹算法在DSP实现中所采用的优化策略,旨在实现代码的高效和运 算速度的改善。-article introduces the TMS320VC5402 based fingerprint recognition system design outline of the system hardware and software design, focus on the fingerprint of the DSP algorithm used by the optimization strategy The code aims to achieve efficient and improve the speed of operation.
Update : 2024-05-04 Size : 103424 Publisher : isaura

This article describes Atmel’s FingerChip technology for electronic fingerprint sensing that combines the advantages of small size, low cost, high accuracy, zero maintenance, low energy consumption and portability. This technology has applications in a wide range of fixed and portable secured devices including access control systems, cash terminals, public transport, PCs, PDAs, Smart Card readers and motor vehicles. It can be used in almost any situation where rapid, reliable and accurate identification or authentication of an individual is required.-Atmel's FingerChi Health technology for electronic fingerprint sensi Vi that combines the advantages of small size, low cost, high accuracy, zero maintenance, low energy consumption and portability. This t echnology has applications in a wide range of fi xed and portable devices including secured d' ess control systems, cash terminals, public transport, PCs, PDAs, Smart Card readers and motor vehicles. It can be used in almost any situation where rapid, reliable and accurate identification or authe ntication of an individual is required.
Update : 2024-05-04 Size : 595968 Publisher : chen

DL : 0
人耳识别技术是20世纪90年代末开始兴起的一种生物特征识别技术,与其它生物特征识别技术比较具有以下几个特点:(1)与人脸识别方法比较,耳识别方法不受面部表情、化妆品和胡须变化的影响,同时保留了面部识别图象采集方便的优点,与人脸相比,整个人耳的颜色更加一致、图像尺寸更小,数据处理量也更小。(2)与指纹识别方法比较,耳图象的获取是一种被动方式,即通过非接触方式获取耳图像,不存在通过接触传染疾病的机会,因此,其信息获取方式具有容易被人接受的优点。(3)与虹膜识别方法比较,首先,由于人脸和头发的存在,需要在耳识别过程中增加一个耳区域定位步骤,这并不影响耳特征的提取,而眼毛对虹膜的遮挡将直接影响虹膜特征的提取。头发对于耳的遮挡可以容易地避免,而眼毛对于虹膜的遮挡是生理结构决定的,也是难以避免的。其次,就目前的技术而言,虹膜采集需要测试者与采集装置之间的位置在机器发出的语言提示下进行不断地调整,同时要瞪大眼睛,使虹膜尽可能暴露,初试者通常要反复多次调整才能够达到要求,而耳采集方式与脸采集方式基本相同,测试者很容易达到拍摄图象的要求条件。最后,虹膜采集装置的成本要高于耳采集装置。-ear recognition technology of the 20th century, the beginning of the end of the 1990s the rise of a biometric identification technology, and other biometric identification technology compared with the following characteristics : (1) and face recognition methods, Ear Recognition from facial expressions, cosmetics and beards change, while retaining a facial recognition image acquisition convenience advantages, and face, the ears of the whole person more consistent color. Image size is smaller, the amount of data processing are even smaller. (2) and fingerprint identification methods, the ear image acquisition is a passive way, through non-contact ear acquire images, and there is no disease transmitted by the opportunity, therefore, its way to obtain information is easily accepted advantages.
Update : 2024-05-04 Size : 202752 Publisher : 蒋建军

a fingerprint program using matlab-a fingerprint program using Matlab
Update : 2024-05-04 Size : 5120 Publisher : 王雨今

一篇关于指纹识别的英文论文,希望对大家有帮助,自己写的-a fingerprint identification on the English papers, we hope to help yourself writing
Update : 2024-05-04 Size : 700416 Publisher : zhulei

一个关于指纹识别的delphi源码,也是对指纹进行特征点提取,匹配,识别身份。-a fingerprint identification on the delphi source, as well as for fingerprint feature extraction, matching, identity.
Update : 2024-05-04 Size : 484352 Publisher : 大头

指纹识别源代码。思路完全是按照文件夹中网页里介绍的方法,即提取指纹中的分叉点和端点的位置作为指纹的特征值。由于今天太忙,对图像的预处理作的很失败,程序会提取出很多伪点,而指纹轮廓也没有想出办法过滤。汗,你看看能不能参考把。 三个m文件,fd.m提取指纹中的分叉点,fd2.m提取指纹中的端点,Cpoint.m则是前两个文件运行中需要调用的掩模函数。-fingerprint identification code. Thinking is entirely in accordance with the folder on the website Lane, that the fingerprints of the bifurcation point and endpoint position as a fingerprint eigenvalues. As today are too busy, the image preprocessing for the failure, the program will extract a lot of pseudo-point, and the fingerprint profile nor find a way to filter. Khan, you can look at the information put. 3 m documents, fingerprints fd.m the bifurcation point, fd2.m fingerprints of endpoint, Cpoint.m are two documents before the operation need to call the mask function.
Update : 2024-05-04 Size : 299008 Publisher : 闫晟
« 1 2 3 4 5 6 7 89 10 11 12 13 ... 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.