Results 81 to 90 of about 375,677 (220)
Verification of feature regions for stops and fricatives in natural speech [PDF]
The presence of acoustic cues and their importance in speech perception have long remained debatable topics. In spite of several studies that exist in this eld, very little is known about what exactly humans perceive in speech.
Menon, Anjali I.
core
A Correlation-Based Fingerprint Verification System [PDF]
In this paper, a correlation-based fingerprint verification system is presented. Unlike the traditional minutiae-based systems, this system directly uses the richer gray-scale information of the fingerprints.
Bazen, Asker M. +4 more
core +3 more sources
A Framework for Exploring and Evaluating Mechanics in Human Computation Games
Human computation games (HCGs) are a crowdsourcing approach to solving computationally-intractable tasks using games. In this paper, we describe the need for generalizable HCG design knowledge that accommodates the needs of both players and tasks.
Krause Markus +3 more
core +1 more source
Politeknik Negeri Tanah Laut in order to improve the new student admission, has adopted numerous type of promotion strategies. The strategies are among others high school visits, banner displays, brochure distribution, and promotions via social media ...
Veri Julianto, Jaka Permadi, Noviyanti
doaj +1 more source
Foundations, Properties, and Security Applications of Puzzles: A Survey
Cryptographic algorithms have been used not only to create robust ciphertexts but also to generate cryptograms that, contrary to the classic goal of cryptography, are meant to be broken.
Ali, Isra Mohamed +2 more
core
ABSTRAK Teknologi informasi dan komunikasi merupakan salah satu bidang yang berkembang pesat saat ini. Berbagai macam inovasi baru dikembangkan oleh para ahli.
Veri Setiawan, Rizal Izmi Kusumawijaya
doaj +1 more source
Comparing BDD and SAT based techniques for model checking Chaum's Dining Cryptographers Protocol [PDF]
We analyse different versions of the Dining Cryptographers protocol by means of automatic verification via model checking. Specifically we model the protocol in terms of a network of communicating automata and verify that the protocol meets the anonymity
Kacprzak, M. +5 more
core
Pemanfaatan Elasticsearch untuk Temu Kembali Informasi Tugas Akhir
Teknologi Informasi (TI) telah menjadi pendukung utama dalam menjalankan operasional di berbagai kebutuhan organisasi, termasuk perguruan tinggi. Bentuk dari produk teknologi informasi yang paling sering digunakan adalah sistem informasi yang dapat ...
Ardian Prima Atmaja +1 more
doaj +1 more source
VERİ, BÜYÜK VERİ VE İŞLETMECİLİK
Büyük veri verinin miktarının çokluğu ve çeşitliliği çağrışımını yapsa da özünde verinin değerinin yeniden keşfi sonrasında geleneksel veri analizi perspektifi yerine yeni araç ve yaklaşımlarla aslında verinin yeniden keşfedilmesini ifade eden trendin adıdır.
openaire +3 more sources
Mapping discourses through Hierarchical Clustering on Principal Components
This article proposes a methodological framework that combines a Q-concourse questionnaire with Multiple Factor Analysis and Hierarchical Clustering on Principal Components (MFA/HCPC) to derive discourse typologies from large-N survey data. The framework
Francesco Veri
doaj +1 more source

