Results 261 to 270 of about 1,597,742 (299)
Some of the next articles are maybe not open access.
Signatures analysis systems prototype (SASP)
2009 IEEE Conference on Technologies for Homeland Security, 2009Sim-G Technologies, LLC (Sim-G), has developed a prototype collaborative system to aid in countering the threat of improvised explosive devices (IED). This is accomplished through the use of knowledge discovery, collaboration, data mining, signature visualization and GIS tools.
Dennis G. Perry +2 more
openaire +1 more source
Signature management in workflow systems
Proceedings. Twenty-Third Annual International Computer Software and Applications Conference (Cat. No.99CB37032), 2003Signatures have been widely used in paper-based workflow systems for different purposes. Currently, there are many studies on computerizing workflow systems. There are also studies on implementing signatures in electronic media, but the diversified purposes of a signature in workflow makes a straightforward implementation of digital signature schemes ...
Leung, Karl RPH, Hui, Lucas CK
openaire +2 more sources
The increasing reliance on handwritten signatures for personal and legal identification makes it essential to develop secure and automated verification systems. This research presents a Signature Verifier System that uses image processing and deep learning to distinguish between genuine and forged signatures.
Prof. Girish Patil +4 more
openaire +1 more source
Prof. Girish Patil +4 more
openaire +1 more source
1984
A cryptographic system allows, in one exemplary use, a supplier (101) to cryptographically transform a plurality of messages responsive to secret keys; the transformed messages to be digitally signed by a signer (102); and the signed transformed messages returned to the supplier (101) to be transformed by the supplier (101), responsive to the same ...
openaire +1 more source
A cryptographic system allows, in one exemplary use, a supplier (101) to cryptographically transform a plurality of messages responsive to secret keys; the transformed messages to be digitally signed by a signer (102); and the signed transformed messages returned to the supplier (101) to be transformed by the supplier (101), responsive to the same ...
openaire +1 more source
Signatures of indirect majority systems
Journal of Applied Probability, 2001If τ is the lifetime of a coherent system, then the signature of the system is the vector of probabilities that the lifetime coincides with the ith order statistic of the component lifetimes. The signature can be useful in comparing different systems. In this treatment we give a characterization of the signature of a system with independent identically
openaire +2 more sources
An Evolving Signature Recognition System
First International Conference on Industrial and Information Systems, 2006This paper proposed a signature recognition method based on the fuzzy logic and genetic algorithm (GA) methodologies. It consists of two phases; the fuzzy inference system training using GA and the signature recognition. A sample of signatures is used to represent a particular person.
Buddhika Jayasekara +2 more
openaire +1 more source
A multistate monotone system signature
Statistics & Probability Letters, 2013zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +2 more sources
Survival Signature for System Reliability
In system reliability, the structure function models functioning of a system for given states of its components. The survival signature provides a useful summary of the structure function to aid quantification of system reliability with components of multiple types. It is easily applicable to systems with multiple types of components.Coolen, Frank P. A. +1 more
openaire +2 more sources
Matrix Signatures: From MACs to Digital Signatures in Distributed Systems
2008We present a general implementation for providing the properties of digital signatures using MACs in a system consisting of any number of untrusted clients and nservers, up to fof which are Byzantine. At the heart of the implementation is a novel matrix signaturethat captures the collective knowledge of the servers about the authenticity of a message ...
Amitanand S. Aiyer +3 more
openaire +1 more source
Brain and other central nervous system tumor statistics, 2021
Ca-A Cancer Journal for Clinicians, 2021Kimberly D Miller +2 more
exaly

