Results 81 to 90 of about 6,416 (199)
Условная деконволюция образа в области пространственных собственных частот [PDF]
Запропонована методика переносу алгоритму реставраці методом умовної деконволюції в область власних частот.Offered methods of the carrying the algorithm restorations by method Conditional deconvolution in the domain of spatial own frequencies.Предложена
Natalenko, S. +5 more
core
E-Government in Kazakhstan: Realization and Prospects [PDF]
Kazakhstan tries to develop its own model of public administration in a westernized manner. One of the examples of such a trend in this country is efforts on organization of e-government. One more aspect of the aspiration is e-voting.
Kassen, Maxat
core +1 more source
Pengamanan Restful API menggunakan JWT untuk Aplikasi Sales Order
The company has an important role in attracting the attention of customers by promoting its products and services so that it can be widely known by the community through the sales division (sales person).
Edy Edy +3 more
doaj +1 more source
Trust in the Digital World The Return of the Kings of Old [PDF]
Drawing principally on examples and literature from the Anglosphere, the author argues that the high salience given to "trust" and "trustworthiness" in recent scholarly literature, and which (notably in Putnam's work) attributes declining trust to a ...
Richard COLLINS
core
Création automatique de classes de signatures manuscrites pour l'authentification en ligne [PDF]
International audienceNous nous intéressons dans ce papier à l'optimisation d'un système d'authentification par signature manuscrite. Celui-ci est basé sur une approche Coarse To Fine et utilise l'algorithme Dynamic Time Warping ainsi qu'un seuil de ...
Cardot, H. +4 more
core +2 more sources
The article explores an important strand of German literature from ca. 1968 until today in terms of its inclination towards 'authentic communication', a feature that is part of the historiographical concepts of 'Neue Subjektivität' and 'Neue Sensibilität'
Christopher Busch
doaj +2 more sources
Применение корреляционной матрицы к решению задачи аутентификации особы по динамически введённой подписи [PDF]
Проілюстровано роботу методу з використанням кореляційної матриці при розв’язанні задачі аутентифікації особи за динамічно введеним підписом.The work of method with use of correlation matrix for solving the task of authentification of person after the ...
Kuzmenko, O. M. +8 more
core
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed +2 more
core +1 more source
Jurusan Sistem Informasi Institut Teknologi Sepuluh November Surabaya (JSI ITS) dewasa ini telah menerapkan sistem absensi berbasis fingerprint guna menunjang proses belajar mengajar, serta menanggulangi kecurangan presensi di kelas. Teknologi ini memang
Noval Aditya Muhammad +2 more
doaj
Network-based business process management: embedding business logic in communications networks [PDF]
Advanced Business Process Management (BPM) tools enable the decomposition of previously integrated and often ill-defined processes into re-usable process modules.
Pau, L-F., Vervest, P.H.M.
core +1 more source

