Results 81 to 90 of about 6,416 (199)

Условная деконволюция образа в области пространственных собственных частот [PDF]

open access: yes, 2009
Запропонована методика переносу алгоритму реставраці методом умовної деконволюції в область власних частот.Offered methods of the carrying the algorithm restorations by method Conditional deconvolution in the domain of spatial own frequencies.Предложена
Natalenko, S.   +5 more
core  

E-Government in Kazakhstan: Realization and Prospects [PDF]

open access: yes, 2010
Kazakhstan tries to develop its own model of public administration in a westernized manner. One of the examples of such a trend in this country is efforts on organization of e-government. One more aspect of the aspiration is e-voting.
Kassen, Maxat
core   +1 more source

Pengamanan Restful API menggunakan JWT untuk Aplikasi Sales Order

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2019
The company has an important role in attracting the attention of customers by promoting its products and services so that it can be widely known by the community through the sales division (sales person).
Edy Edy   +3 more
doaj   +1 more source

Trust in the Digital World The Return of the Kings of Old [PDF]

open access: yes
Drawing principally on examples and literature from the Anglosphere, the author argues that the high salience given to "trust" and "trustworthiness" in recent scholarly literature, and which (notably in Putnam's work) attributes declining trust to a ...
Richard COLLINS
core  

Création automatique de classes de signatures manuscrites pour l'authentification en ligne [PDF]

open access: yes, 2008
International audienceNous nous intéressons dans ce papier à l'optimisation d'un système d'authentification par signature manuscrite. Celui-ci est basé sur une approche Coarse To Fine et utilise l'algorithme Dynamic Time Warping ainsi qu'un seuil de ...
Cardot, H.   +4 more
core   +2 more sources

Erfahrungsformate: Zur anthologischen Produktion von Authentizität in der bundesrepublikanischen Literatur um 1968, um 1980 und heute

open access: yesGenealogy+Critique
The article explores an important strand of German literature from ca. 1968 until today in terms of its inclination towards 'authentic communication', a feature that is part of the historiographical concepts of 'Neue Subjektivität' and 'Neue Sensibilität'
Christopher Busch
doaj   +2 more sources

Применение корреляционной матрицы к решению задачи аутентификации особы по динамически введённой подписи [PDF]

open access: yes, 2009
Проілюстровано роботу методу з використанням кореляційної матриці при розв’язанні задачі аутентифікації особи за динамічно введеним підписом.The work of method with use of correlation matrix for solving the task of authentification of person after the ...
Kuzmenko, O. M.   +8 more
core  

A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash

open access: yes, 2011
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed   +2 more
core   +1 more source

Pembuatan Aplikasi Presensi Perkuliahan Berbasis Fingerprint (Studi Kasus : Jurusan Sistem Informasi Institut Teknologi Sepuluh Nopember Surabaya)

open access: yesJurnal Teknik ITS, 2013
Jurusan Sistem Informasi Institut Teknologi Sepuluh November Surabaya (JSI ITS) dewasa ini telah menerapkan sistem absensi berbasis fingerprint guna menunjang proses belajar mengajar, serta menanggulangi kecurangan presensi di kelas. Teknologi ini memang
Noval Aditya Muhammad   +2 more
doaj  

Network-based business process management: embedding business logic in communications networks [PDF]

open access: yes
Advanced Business Process Management (BPM) tools enable the decomposition of previously integrated and often ill-defined processes into re-usable process modules.
Pau, L-F., Vervest, P.H.M.
core   +1 more source

Home - About - Disclaimer - Privacy