Learn More
On-the-fly keyboard user authorization is certainly an interesting option for standard security procedures for high-security computer systems. Unauthorized access to logged-in workstation could threaten the security of data and systems. Conventional authorization methods (passwords, fingerprint scans) verify user identity only during logging process,(More)
A novel planar substrate integrated waveguide cavity resonator technique for measurement of complex permittivity is described, which has applications for dielectric measurement systems in the pharmaceutical industry. The high-<i>Q</i> resonant structure is a modernization of well-known measurement cells where the dielectric constant is deduced by cavity(More)
This paper attempts to describe the process of defining a problem – called a reference mode in Jargon-for building a system dynamics model. System dynamics models represent problems not systems, hence a model cannot exist without first defining a problem. The characteristics of a reference mode and how it might differ from a historical record are stated. A(More)
Three different approaches are considered in this paper to deal with the methods of Pattern Classification and Recognition. The main patterns considered are images representing the alphabet of cursive-scripts languages, particularly Arabic alphabet. The practical results of written scripts recognition led to the possibility of applying the main ideas and(More)
This work presents a new Algorithm to recognize separate voices of some Arabic words, the digits form zero to ten. Firstly we prepare our signal by pre-processing trial. Next the speech signal is processed as an image by Power Spectrum Estimation. For feature extraction, transformation and hence recognition, the algorithm of minimal eigenvalues of Toeplitz(More)
—This paper discusses a speech-and-speaker (SAS) identification system based on spoken Arabic digit recognition. The speech signals of the Arabic digits from zero to ten are processed graphically (the signal is treated as an object image for further processing). The identifying and classifying methods are performed with Burg's estimation model and the(More)
This paper aims at three aspects closely related to each other: first, it presents the state of the art in the area of thinning methodologies, by giving descriptions of general ideas of the most significant algorithms with a comparison between them. Secondly, it proposes a new thinning algorithm that presents interesting properties in terms of processing(More)
This paper is a continuation to the work in [1], in which a new algorithm for skeletonization is introduced. The algorithm given there and implemented for script and text is applied here on images like pictures, medical organs and signatures. This is very important for a lot of applications in pattern recognition, like, for example, data compression,(More)