Deutsch   English   Français   Italiano  
<vmis6d$278ll$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: zen cycle <funkmasterxx@hotmail.com>
Newsgroups: rec.bicycles.tech
Subject: Re: Artificiqal Intelligence
Date: Sun, 19 Jan 2025 07:46:04 -0500
Organization: A noiseless patient Spider
Lines: 70
Message-ID: <vmis6d$278ll$1@dont-email.me>
References: <twuxO.436943$%lIc.226482@fx13.iad>
 <5k3lcjtvutm46rj9st5n4n37qepa0tgtkr@4ax.com>
 <YBggP.129679$5c34.28021@fx47.iad>
 <43d3ojt1jt3m7vuebq0l2cvfn0jpeq2qug@4ax.com> <vm96ae$33q5f$1@dont-email.me>
 <j3tgojdugu8f0vfvdqfn0qdjcvussa60cf@4ax.com> <IMTiP.163222$5c34.692@fx47.iad>
 <vmh3p1$14atd$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sun, 19 Jan 2025 13:46:05 +0100 (CET)
Injection-Info: dont-email.me; posting-host="99cbaabf28cad0dbd593b2aa377302e6";
	logging-data="2335413"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1/aD5Yy6yQpgMzhgg0RMcWAvjAtiCCdUAg="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:hEzsTwlJ329rBtLqiLU6i+n1w0c=
In-Reply-To: <vmh3p1$14atd$1@dont-email.me>
Content-Language: en-US
Bytes: 4639

On 1/18/2025 3:43 PM, AMuzi wrote:
> On 1/18/2025 2:01 PM, cyclintom wrote:
>> On Wed Jan 15 19:13:46 2025 Jeff Liebermann  wrote:
>>> On Wed, 15 Jan 2025 20:37:34 -0000 (UTC), Tom Kunich
>>> <cyclintom@yahoo.com> wrote:
>>>
>>>> perhaps you cqan explain to people here HOW you can have facial OR
>>>> fingerprint recognician without AI?
>>>
>>> That's easy.  First, how a fingerprint scanner works:
>>>
>>> "Fingerprint Scanners: How Do They Work?"
>>> <https://www.uscybersecurity.net/fingerprint-scanners/>
>>> See the section titled "How Do Fingerprint Scanners Work".
>>>
>>> If you skim that article, you won't find any mention of AI.  I just
>>> skimmed a few more such "how it works" articles and none of those
>>> mentioned AI.
>>>
>>> Here's a few pages full of fingerprint locks:
>>> <https://www.google.com/search?q=fingerprint%20lock&udm=2>
>>> These fingerprint sensors are found in door locks, padlocks, cash
>>> boxes, secure flash drives, gun locks, garage doors and so on.  Please
>>> look at the pictures and find me a fingerprint lock that is big enough
>>> to have a large language model processor inside.  Also, look for one
>>> that is connected to the internet so that it can use a real AI
>>> computer to do the fingerprint matching.  You might think that the
>>> fingerprint censor in your swellphone connects to an AI computer
>>> located in order to do the fingerprint matching, but that's obviously
>>> not the case because the swellphone fingerprint security system works
>>> quite nicely without any internet connection (i.e. in airplane mode).
>>>
>>> Since you introduced facial recognition to this discussion, I'll leave
>>> you with the problem.  It's a bit more complexicated, but it's
>>> basically the same method as fingerprint recognition.  The software
>>> compares a stored phone with a camera image.  The software looks for
>>> matching features.  If enough of these match, then the stored image
>>> and the camera image(s) have a sufficient number of matching features,
>>> the are deemed identical and the user is authenticated.
>>>
>>>> Do you HAVE to keep showing why you are a failure?
>>>
>>> No, I don't have to.  I could ignore you and let you rot in the hell
>>> of your own creation.  However, that would be too merciful.  You seem
>>> to enjoy our discussions even though most demonstrate that you don't
>>> have even a minimal understanding of how many things work.  That
>>> should be sufficient for your daily does of self abuse.
>>
>>
>>
>>
>> Liebermann, when you don't know how something works, stop pretending 
>> that you fo. A fingerprint scanner operates by cutting the fingerprint 
>> into segments and then attempting to match the same segment line for 
>> line. This involves shifting and rotating trying to find a match. The 
>> initial scanners only tried to match the center of the finger print 
>> but now the CPU's are powerful enough that they can match the entire 
>> touchg zone and call it a match if they can achieve a 60% match.
>>
>> Why don't you simply act like Flunky and pretend that programming is 
>> just so boring that you don't want to do it?
> 
> Or by vector pattern matching:
> 
> https://ieeexplore.ieee.org/document/4350704

Trust me when I tell you, I'm not pretending.

>