Consonant Passwords in the Fingers

被引:0
|
作者
Zhu, Yunfeng [1 ]
Qin, Huanchang [1 ]
Wei, Weixing [2 ]
机构
[1] Baise Univ, Dept Phys & Elect Informat Sci, Baise, Guangxi, Peoples R China
[2] Guangxi Natl Univ, Coll Phys & Elect Engn, Nanning, Guangxi, Peoples R China
关键词
Pure-Consonant; Semi-Consonant; Rule;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The first Robot was born in America in 1962, from then on people were hoping to manufacture an Intelligent Robots. People endowed the Robots with the Artificial Intelligence before the Intelligent Science come into the world, the Robots can only achieve vague control and simulation control. People are needed to break through in the Intelligent Science in order to achieve precise control due to the infinite possibilities. Talking with others is a process of language flowing, at least the Chinese Alphabet can be located in the fingers. The 15 consonant passwords will be only discussed in the paper.
引用
收藏
页码:218 / 222
页数:5
相关论文
共 50 条
  • [41] Biometrics harden passwords
    Pfost, Jared
    [J]. CONTROL ENGINEERING, 2007, 54 (11) : C4 - +
  • [42] Keys, wallet, passwords ...
    D'Oliveiro, Lawrence
    [J]. NEW SCIENTIST, 2015, 226 (3020) : 55 - 55
  • [43] PASSWORDS AND PASSAGES IN ARAGON
    VANRENTERGHEM, M
    [J]. EUROPE-REVUE LITTERAIRE MENSUELLE, 1989, 67 (717-18) : 36 - 39
  • [44] Graphical Passwords - A Discussion
    Kayem, Anne V. D. M.
    [J]. IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA 2016), 2016, : 596 - 600
  • [45] Synthesis of Secure Passwords
    Sato, Tomoki
    Kikuchi, Hiroaki
    [J]. PROCEEDINGS OF THE 2012 SEVENTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2012), 2012, : 35 - 43
  • [47] Passwords to Absolutely Avoid
    Violettas, George E.
    Papadopoulos, Kyriakos
    Tasioudis, Christos
    [J]. 2014 FIFTH INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT), 2014, : 60 - 68
  • [48] Analysing Real Students' Passwords and Students' Passwords Characteristics Received From a Questionnaire
    Taneski, Viktor
    Hericko, Marian
    Brumen, Bostjan
    [J]. 2016 39TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2016, : 1436 - 1441
  • [49] NT passwords for sale
    Hancock, B
    [J]. COMPUTERS & SECURITY, 1999, 18 (02) : 92 - 92
  • [50] Pico: No More Passwords!
    Stajano, Frank
    [J]. SECURITY PROTOCOLS XIX, 2011, 7114 : 49 - 81