|
|
|
The GSA Image Analyser is a program for the scientific evaluation of 2D images (image analysis). The possibilities of the program are varied and can be divided in three main groups; Object surface calculation, Object length calculation and Object counting. The surfaces of all recognised objects are automatically calculated. In addition, the surface calculation of single objects is possible. The program offers the possibility to calculate the relations of the ascertained surfaces to each other and to the whole image or background. The GSA Image Analyser has a set of functions which have been developed especially for the direct length calculation of very complex and very ramified objects. Such objects are for example plant roots. In addition to the direct length calculation, an indirect calculation with a grid intersection (developed by Tennant) is possible. For this function, the grid size can be freely defined. The automatic count function determines the number of all recognised objects and, in addition, offers the possibility to count overlapping objects apart. This separation can made over the object form, the object surface and over the object intensity. The grid intersection count function serves for the indirect object number regulation. Such procedures are described, e.g., by Buerker, Fuchs Rosenthal, Thoma, shilling, Tuerk. Beside the automatic count functions, the program has two manual count procedures included. One method marks the objects inside of the image and the other cuts the image into several smaller parts to make it easier for human eyes to follow many small objects. The GSA Image Analyser can read almost all known picture formats (JEPEG, GIF, TIFF, BMP, PNG). In addition, the program provides interfaces to scanners, microscopes and digital cameras (TWAIN) as well as to video cameras (Video grabber, TV cams). This program is designed to solve many problems. It has been used for counting cells and calculating the size of plant roots (biometry).
|
|
|
biometric authentication
Embedded Speech recognition circuit
cisco devices
biometric passport
portable devices
Biometric time clock
san devices
biometric scanner
-------------------------
|
|
GSA Image Analyser: http://gsa.nothingreal.biz/imageanalyser_demo.exe
|
|
Stop memorizing logins, passwords, Citrix servers and manually entering them; store all your Citrix connections on one USB flash drive, smart card, or token; enjoy automated access - simply insert the USB drive and pass convenient identification. Add the strength of multi-factor authentication for login to Citrix MetaFrame Presentation Server sessions, and eliminate the risks of passwords being lost, forgotten or stolen.
Users simply insert a smart card (or connect a USB flash to the computer) and, optionally, place a finger on a biometric scanner for gaining access to Citrix server. One hardware device, depending on its memory volume, can store many different connections using different user names and servers. User credentials can be securely stored not only on smart cards or USB tokens, but also on USB drives or other removable media (FDD, CD, CD/R, CD/RW, MO, MD, ZIP-disks, Pocket PCs, all types of flash memory cards) preserving the same functionality.
Features:
- No password problem: the need to remember connection details and passwords is eliminated.
- Simplified connection procedure: once configured to start specific connection on KSD insertion event, the connection becomes fully automatic and fast.
- Hardware variety: the ability to choose from a large list of supported devices, from different vendor' smart cards and tokens to ordinary USB flash drives, allows choosing the device which would best satisfy user's needs
- Mobility: The ability to store multiple connections on the same device allows users to enjoy even greater mobility already offered by Citrix.
- Secure Workstation: Dekart Logon for Citrix ICA Client can be configured to either lock the workstation (Disconnect) or to log off from Citrix server upon removal of the card, hardware token or USB drive;
- Multi-factor Authentication: users can be positively identified for access to Citrix-based resources via a wide range of digital identity credentials and biometric devices.
Dekart Logon for Citrix ICA Client: http://www.dekart.com/dp/distr/app-0063181c513/site-001b1da2d96/lng-eng/icalogon.exe
|
|
|
|