Results 51 to 60 of about 6,416 (199)
Annotation of subtitle paraphrases using a new web tool
This paper analyzes the manual annotation effort carried out to produce Opusparcus, the Open Subtitles Paraphrase Corpus for six European languages. Within the scope of the project, a new web-based annotation tool was created.
Mikko Aulamo +2 more
doaj +1 more source
A Study on Replay Attack and Anti-Spoofing for Automatic Speaker Verification
For practical automatic speaker verification (ASV) systems, replay attack poses a true risk. By replaying a pre-recorded speech signal of the genuine speaker, ASV systems tend to be easily fooled.
Chen, Yixiang +3 more
core +1 more source
De-authentification and authentification in and by the contemporary art market. The case of Neo Rauch [PDF]
This short essay outlines briefly Neo Rauch's early career as a painter and his roots in the "New Leipzig School of Painters". It also includes some thoughts about Rauch's authentication of his early, pre-1993 paintings.
openaire +1 more source
Six variants of mathematical models of authentification during users work with mobile applications in cloud area are represented: with application server, with applications forms, on sertification, with one-time parol, on accesses keys, and with tokens ...
U. A. Vishniakou, M. M. Ghondagh Saz
doaj
Transfer of Orally Administered Terpenes in Goat Milk and Cheese [PDF]
The objective of the present study was to investigate the relationships between terpenes’ intake and their presence in animal tissues (blood and milk) as well as in the final product (cheese).
I. Poulopoulou +3 more
doaj +1 more source
L'authentification des pratiques d'élevage par des analyses rapides du lait et/ou du fromage est une préoccupation de nombreuses filières laitières depuis plusieurs années.
Mauro COPPA +8 more
doaj +1 more source
Application Forensique à La Reconnaissance Vocale Du Locuteur
Dans cet article, nous nous intéressons à la Reconnaissance Vocale des Locuteurs Arabophones en vue de la Forensique c’est-à-dire dans le domaine Criminalistique (RVC) en particulier sur les deux tâches majeures l’Identification Vocale d’un Locuteur ...
Ouassila Kenai, Mhania GUERTI
doaj +1 more source
اعتماد البخاري قرينة السماع في رد وقبول الروايات (مختارات من أبواب الطهارة)
Hadith scholars agree on the fact that a narrator hearing a saying from his shaikh is strong evidence of the sanad connection. They also agree that this condition has the highest degree of endurance in proving the connection between the narrator and ...
Hakima Ahmed Hafidi +2 more
doaj +1 more source
Smart business networks: architectural aspects and risks [PDF]
This paper summarizes key attributes and the uniqueness of smart business networks [1], to propose thereafter an operational implementation architecture.
Pau, L-F. (Louis-François)
core +1 more source
COMPULSORY AUTHORIZATION IN THE INTERNET
The article describes a promising idea of solving more and more pressing problem of personality authentication in the Internet. Growing popularity of the Internet carries with itself the problem of man anonymity in a network.
A. S. Oharkov +3 more
doaj

