ВУЗ:
Составители:
55
16. 9.A ?.&. ?.)( 6 ;. – '.:',
1989. – 250 .
17. •( -.&., ' @.?., •( 8.g. 9)2 =
(.)( 3(. •.1. – (: (
2A A( '@ 9, 1997. – 175 c.
18. . /.0., \ @.'., '() *.+. 0 ( 2 6
3( .= . // &,.
)-()( .
«83. ,6 – • 9 ». – : 9 2000. –
55 – 60 .
19. '() *.+., \ @.'., . /.0. 0. 3(
,6 (6. 3( (.
//g(.<2: 96,(, ., 2001. –7,8. 82 – 86 c.
20. @ /.&. . – '.: g(, 1969.
21. . >. '.)( .2 (. – '.: ', 1975.
22. 9, -.9., _3 9.@. a3 ,,( )2= . – '.,
"9 6", 1981.
23. '( :., > ?. - (6 ). – '.: "&6", 1980.
– 302 .
24. ?=. g., 9 .9. *2 ,6 ,,(
32= / 0. .; 0 . 8.+.\.(. – '.: &6,
1980.
25. Neural Networks A comprehensive foundation, Simon Haykin, Prentice Hall,
1998.
26. M.W. Mak, W.G. Allen, G.G. Sexton Speaker identification using multilayer
perceptrons and radial basis function networks, Neurocomputing, 1994. 6.
27. Becket @. Introduction to cryptology and PC security. McGrow-Hill, London,
1997.
28. DigitalPersona White Paper Guide to Fingerprint Identification,
http://www.digitalpersona.com/Technology/fingerprint.html
.
29. DigitalPersona Technical White Paper Enterprise Security Architecture for
Biometric User Authentification systems,
http://www.digitalpersona.com/Technology/security.html
.
30. SentryCom technology white paper,
http://www.voiceprove.com/technology_all.htm
.