Journal articles on the topic 'Application file'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Application file.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Liu, Hui, Hanxing Xue, and Hui Lu. "A Sensitive File Abnormal Access Detection Method Based on Application Classification." Security and Communication Networks 2021 (March 13, 2021): 1–7. http://dx.doi.org/10.1155/2021/6684456.
Full textPatil, Vedika, Sakshi Jain, and Yogita Shah. "Secure Cryptography by Using Hash Application." Journal of Cyber Security in Computer System 1, no. 1 (May 11, 2022): 18–24. http://dx.doi.org/10.46610/jcscs.2022.v01i01.002.
Full textHidayat, Rahmat, Marza Ihsan Marzuki, Yuliarman Saragih, Ibrahim Ibrahim, Edmund Ucok Armin, Safrian Andromeda, Imam Budi Santoso, and Suroyo Suroyo. "THE COMPARATIVE STUDY ANALYSIS LOGICAL FILES RECOVERY AND LOW LEVEL FILES RECOVERY USING DIGITAL FORENSIC METHODS." TEKNOKOM 5, no. 2 (November 10, 2022): 143–48. http://dx.doi.org/10.31943/teknokom.v5i2.84.
Full textMoon, Yangchan, and Mingyu Lim. "An Enhanced File Transfer Mechanism Using an Additional Blocking Communication Channel and Thread for IoT Environments." Sensors 19, no. 6 (March 13, 2019): 1271. http://dx.doi.org/10.3390/s19061271.
Full textAqilah Mohd Nahar, Nur Farah, Nurul Hidayah Ab Rahman, and Kamarudin Malik Mohammad. "E-Raser: File Shredder Application With Content Replacement by Using Random Words Function." JOIV : International Journal on Informatics Visualization 2, no. 4-2 (September 10, 2018): 313. http://dx.doi.org/10.30630/joiv.2.4-2.175.
Full textLee, Hoo-Ki, Sung-Hwa Han, and Daesung Lee. "Kernel-Based Container File Access Control Architecture to Protect Important Application Information." Electronics 12, no. 1 (December 23, 2022): 52. http://dx.doi.org/10.3390/electronics12010052.
Full textKolte, Prof Roshan R. "FTS: File Tracking System for Railway Board." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 2278–80. http://dx.doi.org/10.22214/ijraset.2021.39741.
Full textRahim, Robbi, Solly Aryza, Pristisal Wibowo, Adek Khadijatul Z Harahap, Abdul Rahman Suleman, Edi Epron Sihombing, Yuswin Harputra, et al. "Prototype File Transfer Protocol Application for LAN and Wi-Fi Communication." International Journal of Engineering & Technology 7, no. 2.13 (April 15, 2018): 345. http://dx.doi.org/10.14419/ijet.v7i2.13.16917.
Full textMaulana, Moh, Andri Permana Wicaksono, and Atma Deharja. "Pembuatan Aplikasi Peminjaman Berkas Rekam Medik Berbasis Web di RSUP Klaten." J-REMI : Jurnal Rekam Medik dan Informasi Kesehatan 2, no. 1 (December 30, 2020): 149–54. http://dx.doi.org/10.25047/j-remi.v2i1.2153.
Full textParamita, Cinantya, and Usman Sudibyo. "Kriptografi Audio MP3 Menggunakan RSA dan Transposisi Kolom." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 3 (June 19, 2021): 483–88. http://dx.doi.org/10.29207/resti.v5i3.2996.
Full textTejaswini, K. "Cross-Platform File Explore with NW.JS." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 10, 2021): 500–504. http://dx.doi.org/10.22214/ijraset.2021.34950.
Full textCui, Litao. "A Preliminary Study on the Management Strategy of University Personnel Files based on Artificial Intelligence Technology." Journal of Electronic Research and Application 5, no. 2 (June 18, 2021): 1–4. http://dx.doi.org/10.26689/jera.v5i2.2192.
Full textMuryadi, Muryadi, Achmad Udin Zailani, and Yudi Kurniawan. "RANCANG BANGUN APLIKASI CHATTING BERBASIS WEB PADA PT SKEMANUSA CONSULTAMA TEKNIK." Infotech: Journal of Technology Information 6, no. 2 (November 26, 2020): 91–100. http://dx.doi.org/10.37365/jti.v6i2.94.
Full textAdelina. "Rancang Bangun Aplikasi Duplicate Docx Scanner Menerapkan Metode SHA-256." Journal of Informatics Management and Information Technology 2, no. 2 (April 30, 2022): 48–53. http://dx.doi.org/10.47065/jimat.v2i2.150.
Full textALEKSEY S., GERASKIN, and UKOLOV RODION V. "RESEARCH ON APPLICATION OF NEURAL NETWORKS FOR RESTORING DAMAGED VIDEO FILES OF AVI AND MP4 FORMATS." CASPIAN JOURNAL: Control and High Technologies 55, no. 3 (2021): 25–32. http://dx.doi.org/10.21672/2074-1707.2021.55.3.025-032.
Full textYunianta, Arda, Norazah Yusof, Arif Bramantoro, Haviluddin Haviluddin, Mohd Shahizan Othman, and Nataniel Dengen. "Data mapping process to handle semantic data problem on student grading system." International Journal of Advances in Intelligent Informatics 2, no. 3 (December 1, 2016): 157. http://dx.doi.org/10.26555/ijain.v2i3.84.
Full textTaufik, Ichsan, Undang Syaripudin, Faiz M. Kaffah, Jaka Giri Sobirin, Nanang Ismail, and Teddy Surya Gunawan. "Concealment of Files Blocked by Gmail with EOF-Based Image Steganography." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (November 1, 2018): 716. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp716-721.
Full textModi, Krishna, and Prashasti Kanikar. "Application based File System (ABFS)." International Journal of Computer Applications 41, no. 1 (March 31, 2012): 26–30. http://dx.doi.org/10.5120/5506-7526.
Full textJanssen, Curtis L., Helgi Adalsteinsson, Scott Cranford, Joseph P. Kenny, Ali Pinar, David A. Evensky, and Jackson Mayo. "A Simulator for Large-Scale Parallel Computer Architectures." International Journal of Distributed Systems and Technologies 1, no. 2 (April 2010): 57–73. http://dx.doi.org/10.4018/jdst.2010040104.
Full textGao, Jian. "An Improved IPP Planning Algorithm and the Application." Advanced Materials Research 532-533 (June 2012): 1721–25. http://dx.doi.org/10.4028/www.scientific.net/amr.532-533.1721.
Full textWu, Wei Min, Shao Yong Li, Huan Kun Huang, Wei De Chen, and Qing Su. "Research of Disk Operating Technique in UEFI Shell Environment." Applied Mechanics and Materials 263-266 (December 2012): 1888–91. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1888.
Full textKoptyra, Katarzyna, and Marek R. Ogiela. "Imagechain—Application of Blockchain Technology for Images." Sensors 21, no. 1 (December 25, 2020): 82. http://dx.doi.org/10.3390/s21010082.
Full textWestbrook, J. D., S. H. Hsieh, and P. M. D. Fitzgerald. "CIF Applications. VI. CIFLIB: an application program interface to CIF dictionaries and data files." Journal of Applied Crystallography 30, no. 1 (February 1, 1997): 79–83. http://dx.doi.org/10.1107/s0021889896008643.
Full textKrismawan, Andi Danang, and Lekso Budi Handoko. "A Video Quality Testing : Review of Human Visual Aspect." Journal of Applied Intelligent System 6, no. 2 (December 6, 2021): 85–93. http://dx.doi.org/10.33633/jais.v6i2.4613.
Full textSun, C., D. Guo, H. Gao, L. Zou, and H. Wang. "A method of version merging for computer-aided design files based on feature extraction." Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science 225, no. 2 (June 20, 2010): 463–71. http://dx.doi.org/10.1243/09544062jmes2159.
Full textBrik, Vladimir, Patrick Meade, Gonzalo Merino, Jan Oertlin, David Schultz, and Heath Skarlupka. "IceCube File Catalog." EPJ Web of Conferences 214 (2019): 04055. http://dx.doi.org/10.1051/epjconf/201921404055.
Full textLiu, Wen Zhi, Qiu Yan Tao, Qin He, and Li Juan Yu. "Application of Log4j in E-Commerce Services." Applied Mechanics and Materials 635-637 (September 2014): 1517–21. http://dx.doi.org/10.4028/www.scientific.net/amm.635-637.1517.
Full textRobertson, Vishal Snedan, and Krishnakant Vilas Redkar. "Application of RSAA for File Encryption." International Journal of Engineering Research and Applications 07, no. 07 (July 2017): 08–10. http://dx.doi.org/10.9790/9622-0707070810.
Full textJankowski, Michał, and Maria Skublewska-Paszkowska. "Analysis of the use of Java and C# languages for building a mobile application for the Android platform." Journal of Computer Sciences Institute 16 (September 30, 2020): 293–99. http://dx.doi.org/10.35784/jcsi.2059.
Full textRizal, Randi, Ruuhwan Ruuhwan, and Septian Chandra. "Signature File Analysis Using The National Institute Standard Technology Method Base on Digital Forensic Concepts." Jurnal Informatika Universitas Pamulang 5, no. 3 (September 30, 2020): 364. http://dx.doi.org/10.32493/informatika.v5i3.6073.
Full textWei, Chong Yu, Zu Ping Gu, and Shuai Huang. "The Application of an SD Card in Debugging an Embedded System." Advanced Materials Research 468-471 (February 2012): 1622–25. http://dx.doi.org/10.4028/www.scientific.net/amr.468-471.1622.
Full textSchandl, Bernhard, and Bernhard Haslhofer. "Files are Siles." International Journal on Semantic Web and Information Systems 6, no. 3 (July 2010): 1–21. http://dx.doi.org/10.4018/jswis.2010070101.
Full textTeska, Kirk. "Patent Watch: Who's on first?" Mechanical Engineering 134, no. 02 (February 1, 2012): 32–33. http://dx.doi.org/10.1115/1.2012-feb-3.
Full textNing, Zuoting, Lijun Xiao, Wei Liang, Weiqi Shi, and Kuan-Ching Li. "On the Exploitation of Blockchain for Distributed File Storage." Journal of Sensors 2020 (December 12, 2020): 1–11. http://dx.doi.org/10.1155/2020/8861688.
Full textSravanti, Veera Kota Lakshmi, Ruchitha Bandla, and Ravi Kumar Reddy Juturi. "Filing of DMF in the US, EU, and India, and its comparative review." International Journal of Drug Regulatory Affairs 9, no. 1 (March 16, 2021): 22–32. http://dx.doi.org/10.22270/ijdra.v9i1.453.
Full textZhang, Jin Qu. "A Software to Convert ESRI Shapefile to Flash SWF Format and its Extended Application." Key Engineering Materials 480-481 (June 2011): 758–62. http://dx.doi.org/10.4028/www.scientific.net/kem.480-481.758.
Full textLaia, Yonata, Naomi Br Hutagalung, Imanuel Purba, and Juli Rostianita Sitopu. "Improving Population Services With Application of Genetic Algorithm." Paradigma - Jurnal Komputer dan Informatika 24, no. 2 (September 2, 2022): 130–34. http://dx.doi.org/10.31294/paradigma.v24i2.1252.
Full textToby, Inimary, Felix Breden, Adam Buntzman, Scott Christley, Brian Corrie, John Fonner, Namita Gupta, et al. "VDJML – tools for capturing the results of inferring immune receptor rearrangements." Journal of Immunology 196, no. 1_Supplement (May 1, 2016): 209.24. http://dx.doi.org/10.4049/jimmunol.196.supp.209.24.
Full textSitorus, Michael, and Deki Satria. "INSERTING MESSAGE SECRET ON FILE DATA BANK USING STEGANOGRAPHY ENGINEERING WITH EOF (END OF FILE) METHOD." Jurnal Riset Informatika 2, no. 4 (September 2, 2020): 193–200. http://dx.doi.org/10.34288/jri.v2i4.153.
Full textZhang, Zhi Guo, Lei Gong, and Hong Ping Wang. "Application of XML for Telemetry Data Management." Advanced Materials Research 756-759 (September 2013): 3250–53. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.3250.
Full textHan, Sung-Hwa, and Daesung Lee. "Kernel-Based Real-Time File Access Monitoring Structure for Detecting Malware Activity." Electronics 11, no. 12 (June 14, 2022): 1871. http://dx.doi.org/10.3390/electronics11121871.
Full textNguyen The, Cuong, and Dmitry Shashev. "Methods and Algorithms for Detecting Objects in Video Files." MATEC Web of Conferences 155 (2018): 01016. http://dx.doi.org/10.1051/matecconf/201815501016.
Full textZivkovic, Slavoljub, Marijana Popovic-Bajic, and Marija Zivkovic. "Reciprocial movements of endodontic files - simpler and more certain therapeutic procedure." Serbian Dental Journal 69, no. 1 (2022): 22–30. http://dx.doi.org/10.2298/sgs2201022z.
Full textBertolazzi, Marco, and Carlo Caini. "Mars to Earth Data Downloading: A Directory Synchronization Approach." Future Internet 11, no. 8 (August 8, 2019): 173. http://dx.doi.org/10.3390/fi11080173.
Full textXiaolun, ZHOU, CHEN Haifeng, HAO Ganggang, LUO Cheng, and ZHU Wei. "Study on 3D-IDS Based Spacecraft Development Mode." MATEC Web of Conferences 288 (2019): 02006. http://dx.doi.org/10.1051/matecconf/201928802006.
Full textSolanki, Madan, and Prof (Dr ). Vrinda Tokekar. "Design and Implementation of Strong Security Architecture for Amazon Web Service based on Cloud Applications." International Journal of Innovative Technology and Exploring Engineering 11, no. 12 (November 30, 2022): 17–22. http://dx.doi.org/10.35940/ijitee.l9324.11111222.
Full textLou, Ran Miao, and Chang Lu. "Development and Application of GPS Navigator in Ship." Advanced Materials Research 268-270 (July 2011): 1275–82. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1275.
Full textWang, Jing. "The Application of Big Data Information Technology in Archives Management." Learning & Education 10, no. 2 (September 16, 2021): 60. http://dx.doi.org/10.18282/l-e.v10i2.2269.
Full textXie, Ying Xing. "The Application of Reverse Engineering in the Mould Injection Parts." Applied Mechanics and Materials 364 (August 2013): 19–23. http://dx.doi.org/10.4028/www.scientific.net/amm.364.19.
Full textMohan, Prakash, and Saravanakumar Chelliah. "An Authentication Technique for Accessing De-Duplicated Data from Private Cloud using One Time Password." International Journal of Information Security and Privacy 11, no. 2 (April 2017): 1–10. http://dx.doi.org/10.4018/ijisp.2017040101.
Full text