Results 81 to 90 of about 375,677 (220)

Verification of feature regions for stops and fricatives in natural speech [PDF]

open access: yes, 2010
The presence of acoustic cues and their importance in speech perception have long remained debatable topics. In spite of several studies that exist in this eld, very little is known about what exactly humans perceive in speech.
Menon, Anjali I.
core  

A Correlation-Based Fingerprint Verification System [PDF]

open access: yes, 2000
In this paper, a correlation-based fingerprint verification system is presented. Unlike the traditional minutiae-based systems, this system directly uses the richer gray-scale information of the fingerprints.
Bazen, Asker M.   +4 more
core   +3 more sources

A Framework for Exploring and Evaluating Mechanics in Human Computation Games

open access: yes, 2017
Human computation games (HCGs) are a crowdsourcing approach to solving computationally-intractable tasks using games. In this paper, we describe the need for generalizable HCG design knowledge that accommodates the needs of both players and tasks.
Krause Markus   +3 more
core   +1 more source

APLIKASI PEMILIHAN STRATEGI PROMOSI PENERIMAAN MAHASISWABARU POLITEKNIK NEGERI TANAH LAUT MENGGUNAKAN METODE K-MEANS CLUSTERING

open access: yesJurnal Ilmiah Informatika, 2017
Politeknik Negeri Tanah Laut in order to improve the new student admission, has adopted numerous type of promotion strategies. The strategies are among others high school visits, banner displays, brochure distribution, and promotions via social media ...
Veri Julianto, Jaka Permadi, Noviyanti
doaj   +1 more source

Foundations, Properties, and Security Applications of Puzzles: A Survey

open access: yes, 2020
Cryptographic algorithms have been used not only to create robust ciphertexts but also to generate cryptograms that, contrary to the classic goal of cryptography, are meant to be broken.
Ali, Isra Mohamed   +2 more
core  

PENGEMBANGAN MEDIA EVALUASI PEMBELAJARAN SEJARAH BERBASIS ANDROID DI KELAS X SMK PENERBANGAN AAG ADISUTJIPTO

open access: yesIstoria, 2019
ABSTRAK Teknologi informasi dan komunikasi merupakan salah satu bidang yang berkembang pesat saat ini. Berbagai macam inovasi baru dikembangkan oleh para ahli.
Veri Setiawan, Rizal Izmi Kusumawijaya
doaj   +1 more source

Comparing BDD and SAT based techniques for model checking Chaum's Dining Cryptographers Protocol [PDF]

open access: yes, 2006
We analyse different versions of the Dining Cryptographers protocol by means of automatic verification via model checking. Specifically we model the protocol in terms of a network of communicating automata and verify that the protocol meets the anonymity
Kacprzak, M.   +5 more
core  

Pemanfaatan Elasticsearch untuk Temu Kembali Informasi Tugas Akhir

open access: yesJurnal Teknologi dan Sistem Informasi, 2019
Teknologi Informasi (TI) telah menjadi pendukung utama dalam menjalankan operasional di berbagai kebutuhan organisasi, termasuk perguruan tinggi. Bentuk dari produk teknologi informasi yang paling sering digunakan adalah sistem informasi yang dapat ...
Ardian Prima Atmaja   +1 more
doaj   +1 more source

VERİ, BÜYÜK VERİ VE İŞLETMECİLİK

open access: yesBalıkesir Üniversitesi Sosyal Bilimler Enstitüsü Dergisi, 2016
Büyük veri verinin miktarının çokluğu ve çeşitliliği çağrışımını yapsa da özünde verinin değerinin yeniden keşfi sonrasında geleneksel veri analizi perspektifi yerine yeni araç ve yaklaşımlarla aslında verinin yeniden keşfedilmesini ifade eden trendin adıdır.
openaire   +3 more sources

Mapping discourses through Hierarchical Clustering on Principal Components

open access: yesMethodological Innovations
This article proposes a methodological framework that combines a Q-concourse questionnaire with Multiple Factor Analysis and Hierarchical Clustering on Principal Components (MFA/HCPC) to derive discourse typologies from large-N survey data. The framework
Francesco Veri
doaj   +1 more source

Home - About - Disclaimer - Privacy