Deutsch English Français Italiano |
<vmis6d$278ll$1@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail From: zen cycle <funkmasterxx@hotmail.com> Newsgroups: rec.bicycles.tech Subject: Re: Artificiqal Intelligence Date: Sun, 19 Jan 2025 07:46:04 -0500 Organization: A noiseless patient Spider Lines: 70 Message-ID: <vmis6d$278ll$1@dont-email.me> References: <twuxO.436943$%lIc.226482@fx13.iad> <5k3lcjtvutm46rj9st5n4n37qepa0tgtkr@4ax.com> <YBggP.129679$5c34.28021@fx47.iad> <43d3ojt1jt3m7vuebq0l2cvfn0jpeq2qug@4ax.com> <vm96ae$33q5f$1@dont-email.me> <j3tgojdugu8f0vfvdqfn0qdjcvussa60cf@4ax.com> <IMTiP.163222$5c34.692@fx47.iad> <vmh3p1$14atd$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Injection-Date: Sun, 19 Jan 2025 13:46:05 +0100 (CET) Injection-Info: dont-email.me; posting-host="99cbaabf28cad0dbd593b2aa377302e6"; logging-data="2335413"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/aD5Yy6yQpgMzhgg0RMcWAvjAtiCCdUAg=" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:hEzsTwlJ329rBtLqiLU6i+n1w0c= In-Reply-To: <vmh3p1$14atd$1@dont-email.me> Content-Language: en-US Bytes: 4639 On 1/18/2025 3:43 PM, AMuzi wrote: > On 1/18/2025 2:01 PM, cyclintom wrote: >> On Wed Jan 15 19:13:46 2025 Jeff Liebermann wrote: >>> On Wed, 15 Jan 2025 20:37:34 -0000 (UTC), Tom Kunich >>> <cyclintom@yahoo.com> wrote: >>> >>>> perhaps you cqan explain to people here HOW you can have facial OR >>>> fingerprint recognician without AI? >>> >>> That's easy. First, how a fingerprint scanner works: >>> >>> "Fingerprint Scanners: How Do They Work?" >>> <https://www.uscybersecurity.net/fingerprint-scanners/> >>> See the section titled "How Do Fingerprint Scanners Work". >>> >>> If you skim that article, you won't find any mention of AI. I just >>> skimmed a few more such "how it works" articles and none of those >>> mentioned AI. >>> >>> Here's a few pages full of fingerprint locks: >>> <https://www.google.com/search?q=fingerprint%20lock&udm=2> >>> These fingerprint sensors are found in door locks, padlocks, cash >>> boxes, secure flash drives, gun locks, garage doors and so on. Please >>> look at the pictures and find me a fingerprint lock that is big enough >>> to have a large language model processor inside. Also, look for one >>> that is connected to the internet so that it can use a real AI >>> computer to do the fingerprint matching. You might think that the >>> fingerprint censor in your swellphone connects to an AI computer >>> located in order to do the fingerprint matching, but that's obviously >>> not the case because the swellphone fingerprint security system works >>> quite nicely without any internet connection (i.e. in airplane mode). >>> >>> Since you introduced facial recognition to this discussion, I'll leave >>> you with the problem. It's a bit more complexicated, but it's >>> basically the same method as fingerprint recognition. The software >>> compares a stored phone with a camera image. The software looks for >>> matching features. If enough of these match, then the stored image >>> and the camera image(s) have a sufficient number of matching features, >>> the are deemed identical and the user is authenticated. >>> >>>> Do you HAVE to keep showing why you are a failure? >>> >>> No, I don't have to. I could ignore you and let you rot in the hell >>> of your own creation. However, that would be too merciful. You seem >>> to enjoy our discussions even though most demonstrate that you don't >>> have even a minimal understanding of how many things work. That >>> should be sufficient for your daily does of self abuse. >> >> >> >> >> Liebermann, when you don't know how something works, stop pretending >> that you fo. A fingerprint scanner operates by cutting the fingerprint >> into segments and then attempting to match the same segment line for >> line. This involves shifting and rotating trying to find a match. The >> initial scanners only tried to match the center of the finger print >> but now the CPU's are powerful enough that they can match the entire >> touchg zone and call it a match if they can achieve a 60% match. >> >> Why don't you simply act like Flunky and pretend that programming is >> just so boring that you don't want to do it? > > Or by vector pattern matching: > > https://ieeexplore.ieee.org/document/4350704 Trust me when I tell you, I'm not pretending. >