Results 1 to 10 of about 11,892,336 (376)
Astronomical Observatory as an identifier of the architectural ensemble of Kazan Imperial University [PDF]
In the article, the author examines the building of the Astronomical Observatory (1833-1837), which was a part of the architectural ensemble of Kazan Imperial University in the first third of the 19th-early 20th centuries (now – Kazan Federal University).
Nadyrova Khanifa
doaj +1 more source
Design of controller and intelligent adaptive neural identifier for innovative knee rehabilitation devices [PDF]
Continuous passive motion devices commonly referred to as "CPM" devices are used to maintain and restore joint range of motions. However, this device has been used for many years in joint rehabilitation.
A.R. Monajjemi lahijani +2 more
doaj +1 more source
Development of Personal Name Authority Records and Identifiers
The library catalog uses authority control to gather topics and works relevant to the search query for improving the accuracy and completeness rate of retrieval results.
Wei-Min Fan
doaj +1 more source
Decentralized and Self-Sovereign Identity: Systematic Mapping Study
Self-Sovereign Identity is an emerging, user-centric, decentralized identity approach utilizing some form of decentralized technology. It provides a means for digital identification without reliance on any external authority, enabling entities to control
Spela Cucko, Muhamed Turkanovic
doaj +1 more source
An introduction to using QR codes in scholarly journals [PDF]
The Quick Response (QR) code was first developed in 1994 by Denso Wave Incorporated, Japan. From that point on, it came into general use as an identification mark for all kinds of commercial products, advertisements, and other public announcements.
Jae Hwa Chang
doaj +1 more source
Real identifiability vs. complex identifiability [PDF]
Let $T$ be a real tensor of (real) rank $r$. $T$ is 'identifiable' when it has a unique decomposition in terms of rank $1$ tensors. There are cases in which the identifiability fails over the complex field, for general tensors of rank $r$. This behavior is quite peculiar when the rank $r$ is submaximal.
Angelini, Elena +2 more
openaire +3 more sources
Using object-oriented databases in face recognition
The aim of the work is to develop an algorithm functioning by a face recognition system using object-oriented databases. The system provides automatic identification of the desired object or identifies someone using a digital photo or video frame from a ...
X. C. Dong, V. I. Ionin
doaj +1 more source
Background: Diagnostic reports contribute not only to the particular patient, but also to constructing massive training dataset in the era of artificial intelligence (AI).
Kenji Hirata +10 more
doaj +1 more source
A Study of Vulnerability Identifiers in Code Comments: Source, Purpose, and Severity
Software vulnerability is one of the weaknesses in computer security that challenges developers to rectify. Software maintainers rely on code comments to maintain their source code, including fixing vulnerability issues.
Yusuf Sulistyo Nugroho +4 more
doaj +1 more source
Identity authentication scheme of Android client based on identifiers
The Android mobile terminal’s own identifier information was used,which was credibly ensured by the Android system,then combining the Hash function and operation such as xor or connection,an algorithm of authentication information generation for the ...
Ya-wei WANG,Chang-gen PENG,Kai ZHOU +1 more
doaj +3 more sources

