Liste des Groupes | Revenir à rb tech |
On Wed Jan 15 19:13:46 2025 Jeff Liebermann wrote:Or by vector pattern matching:On Wed, 15 Jan 2025 20:37:34 -0000 (UTC), Tom KunichLiebermann, when you don't know how something works, stop pretending that you fo. A fingerprint scanner operates by cutting the fingerprint into segments and then attempting to match the same segment line for line. This involves shifting and rotating trying to find a match. The initial scanners only tried to match the center of the finger print but now the CPU's are powerful enough that they can match the entire touchg zone and call it a match if they can achieve a 60% match.
<cyclintom@yahoo.com> wrote:
>perhaps you cqan explain to people here HOW you can have facial OR>
fingerprint recognician without AI?
That's easy. First, how a fingerprint scanner works:
>
"Fingerprint Scanners: How Do They Work?"
<https://www.uscybersecurity.net/fingerprint-scanners/>
See the section titled "How Do Fingerprint Scanners Work".
>
If you skim that article, you won't find any mention of AI. I just
skimmed a few more such "how it works" articles and none of those
mentioned AI.
>
Here's a few pages full of fingerprint locks:
<https://www.google.com/search?q=fingerprint%20lock&udm=2>
These fingerprint sensors are found in door locks, padlocks, cash
boxes, secure flash drives, gun locks, garage doors and so on. Please
look at the pictures and find me a fingerprint lock that is big enough
to have a large language model processor inside. Also, look for one
that is connected to the internet so that it can use a real AI
computer to do the fingerprint matching. You might think that the
fingerprint censor in your swellphone connects to an AI computer
located in order to do the fingerprint matching, but that's obviously
not the case because the swellphone fingerprint security system works
quite nicely without any internet connection (i.e. in airplane mode).
>
Since you introduced facial recognition to this discussion, I'll leave
you with the problem. It's a bit more complexicated, but it's
basically the same method as fingerprint recognition. The software
compares a stored phone with a camera image. The software looks for
matching features. If enough of these match, then the stored image
and the camera image(s) have a sufficient number of matching features,
the are deemed identical and the user is authenticated.
>Do you HAVE to keep showing why you are a failure?>
No, I don't have to. I could ignore you and let you rot in the hell
of your own creation. However, that would be too merciful. You seem
to enjoy our discussions even though most demonstrate that you don't
have even a minimal understanding of how many things work. That
should be sufficient for your daily does of self abuse.
Why don't you simply act like Flunky and pretend that programming is just so boring that you don't want to do it?
Les messages affichés proviennent d'usenet.