Journal articles on the topic 'Smarty (Computer file)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Smarty (Computer file).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Alrobieh, Ziad Saif, and Ali Mohammed Abdullah Ali Raqpan. "File Carving Survey on Techniques, Tools and Areas of Use." Transactions on Networks and Communications 8, no. 1 (February 28, 2020): 16–26. http://dx.doi.org/10.14738/tnc.81.7636.
Full textHarabuga, Yu S. "FEATURES OF COMPUTER TECHNICAL RESEARCH OF THE INFORMATION IN THE MEMORY OF SIM, USIM AND R-UIM-CARDS." Theory and Practice of Forensic Science and Criminalistics 17 (November 29, 2017): 318–24. http://dx.doi.org/10.32353/khrife.2017.40.
Full textN. Sangeeta and Seung Yeob Nam. "Blockchain and Interplanetary File System (IPFS)-Based Data Storage System for Vehicular Networks with Keyword Search Capability." Electronics 12, no. 7 (March 24, 2023): 1545. http://dx.doi.org/10.3390/electronics12071545.
Full textCarthen, Chase D., Araam Zaremehrjardi, Vinh Le, Carlos Cardillo, Scotty Strachan, Alireza Tavakkoli, Frederick C. Harris Jr., and Sergiu M. Dascalu. "A Novel Spatial Data Pipeline for Orchestrating Apache NiFi/MiNiFi." International Journal of Software Innovation 12, no. 1 (November 1, 2023): 1–14. http://dx.doi.org/10.4018/ijsi.333164.
Full textTelagam, Nagarjuna, Nehru Kandasamy, Menakadevi Nanjundan, and Arulanandth TS. "Smart Sensor Network based Industrial Parameters Monitoring in IOT Environment using Virtual Instrumentation Server." International Journal of Online Engineering (iJOE) 13, no. 11 (November 22, 2017): 111. http://dx.doi.org/10.3991/ijoe.v13i11.7630.
Full textAlukwe, Chrispus. "Enhancing Cybersecurity: Smart Intrusion Detection in File Server SYSTEMS." Journal of Science, Innovation and Creativity 2, no. 1 (August 17, 2023): 1–6. http://dx.doi.org/10.58721/jsic.v2i1.287.
Full textSrivastava, Nayan. "A.I.- Smart Assistant." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 25, 2021): 2384–87. http://dx.doi.org/10.22214/ijraset.2021.35553.
Full textQiao, Yanchen, Weizhe Zhang, Xiaojiang Du, and Mohsen Guizani. "Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security." ACM Transactions on Internet Technology 22, no. 1 (February 28, 2022): 1–22. http://dx.doi.org/10.1145/3436751.
Full textChen, Zhenwei, Axin Wu, Yifei Li, Qixuan Xing, and Shengling Geng. "Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing." Security and Communication Networks 2021 (January 20, 2021): 1–11. http://dx.doi.org/10.1155/2021/6619689.
Full textJawdhari, Hayder A., and Alharith A. Abdullah. "A New Environment of Blockchain based Multi Encryption Data Transferring." Webology 18, no. 2 (December 30, 2021): 1379–91. http://dx.doi.org/10.14704/web/v18i2/web18396.
Full textPrat, Lionel, Cheryl Baker, and Nhien An Le-Khac. "MapExif." International Journal of Digital Crime and Forensics 7, no. 2 (April 2015): 53–78. http://dx.doi.org/10.4018/ijdcf.2015040104.
Full textLee, Jino, and Taeshik Shon. "Forensic Analysis of IoT File Systems for Linux-Compatible Platforms." Electronics 11, no. 19 (October 8, 2022): 3219. http://dx.doi.org/10.3390/electronics11193219.
Full textHammad, Muhammad, Jawaid Iqbal, Ch Anwar ul Hassan, Saddam Hussain, Syed Sajid Ullah, Mueen Uddin, Urooj Ali Malik, Maha Abdelhaq, and Raed Alsaqour. "Blockchain-Based Decentralized Architecture for Software Version Control." Applied Sciences 13, no. 5 (February 27, 2023): 3066. http://dx.doi.org/10.3390/app13053066.
Full textAi, Sophy, and Jangwoo Kwon. "Extreme Low-Light Image Enhancement for Surveillance Cameras Using Attention U-Net." Sensors 20, no. 2 (January 15, 2020): 495. http://dx.doi.org/10.3390/s20020495.
Full textChen, Yeong-Chin, Mariana Syamsudin, and Sunneng S. Berutu. "Pretrained Configuration of Power-Quality Grayscale-Image Dataset for Sensor Improvement in Smart-Grid Transmission." Electronics 11, no. 19 (September 26, 2022): 3060. http://dx.doi.org/10.3390/electronics11193060.
Full textXu, Yuanjin. "Application of Remote Sensing Image Data Scene Generation Method in Smart City." Complexity 2021 (January 28, 2021): 1–13. http://dx.doi.org/10.1155/2021/6653841.
Full textBanerjee, S., F. Steenkeste, P. Couturier, M. Debray, and A. Franco. "Telesurveillance of elderly patients by use of passive infra-red sensors in a 'smart' room." Journal of Telemedicine and Telecare 9, no. 1 (February 1, 2003): 23–29. http://dx.doi.org/10.1258/135763303321159657.
Full textSuseno, Taufiq Rizky Darmawan, Irawan Afrianto, and Sufa Atin. "Strengthening data integrity in academic document recording with blockchain and InterPlanetary file system." International Journal of Electrical and Computer Engineering (IJECE) 14, no. 2 (April 1, 2024): 1759. http://dx.doi.org/10.11591/ijece.v14i2.pp1759-1769.
Full textJanhavi Satam. "Examination of Approaches for Identifying Vulnerabilities in Smart Contracts." Journal of Electrical Systems 20, no. 4s (April 8, 2024): 2162–67. http://dx.doi.org/10.52783/jes.2322.
Full textYu, LiWei, Lei Zhang, and Zhen Gong. "An Optimization Model for Landscape Planning and Environmental Design of Smart Cities Based on Big Data Analysis." Scientific Programming 2022 (April 20, 2022): 1–12. http://dx.doi.org/10.1155/2022/2955283.
Full textMankar, Ishan. "Smart Surveillance System Using RESNET-50 and MTCNN." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (May 31, 2024): 4380–86. http://dx.doi.org/10.22214/ijraset.2024.62554.
Full textHorvath, Kaleb, Mohamed Riduan Abid, Thomas Merino, Ryan Zimmerman, Yesem Peker, and Shamim Khan. "Cloud-Based Infrastructure and DevOps for Energy Fault Detection in Smart Buildings." Computers 13, no. 1 (January 16, 2024): 23. http://dx.doi.org/10.3390/computers13010023.
Full textYang, Ting, Guanghua Zhang, Yin Li, Yiyu Yang, He Wang, and Yuqing Zhang. "Detecting Privacy Leakage of Smart Home Devices through Traffic Analysis." Security and Communication Networks 2022 (July 15, 2022): 1–10. http://dx.doi.org/10.1155/2022/5655314.
Full textDurner, Dominik, Badrish Chandramouli, and Yinan Li. "Crystal." Proceedings of the VLDB Endowment 14, no. 11 (July 2021): 2432–44. http://dx.doi.org/10.14778/3476249.3476292.
Full textDheyaa Ismael, Khansaa, and Stanciu Irina. "Face recognition using viola-jones depending on python." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 3 (December 1, 2020): 1513. http://dx.doi.org/10.11591/ijeecs.v20.i3.pp1513-1521.
Full textTanveer Baig, Z., and Chandrasekar Shastry. "Smart Hybridized Routing Protocol for Animal Monitoring and Tracking Applications." Scalable Computing: Practice and Experience 23, no. 4 (December 23, 2022): 339–49. http://dx.doi.org/10.12694/scpe.v23i4.2040.
Full textSchwarz, Franziska, Klaus Schwarz, Daniel Fuchs, Reiner Creutzburg, and David Akopian. "Firmware Vulnerability Analysis of Widely Used Low-Budget TP-Link Routers." Electronic Imaging 2021, no. 3 (June 18, 2021): 135–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-135.
Full textAlhaddad, Mohammed J., Monagi H. Alkinani, Mohammed Salem Atoum, and Alaa Abdulsalm Alarood. "Evolutionary Detection Accuracy of Secret Data in Audio Steganography for Securing 5G-Enabled Internet of Things." Symmetry 12, no. 12 (December 14, 2020): 2071. http://dx.doi.org/10.3390/sym12122071.
Full textPatil, Anand N., and Sujata V. Mallapur. "Novel machine learning based authentication technique in VANET system for secure data transmission." Journal of Autonomous Intelligence 6, no. 2 (August 8, 2023): 828. http://dx.doi.org/10.32629/jai.v6i2.828.
Full textDozias, Anne, Cristian Camilo Otalora-Leguizamón, Marco Bianchetti, and Maria Susana Avila-Garcia. "Smart pens to assist fibre optic sensors research: Evaluating OCR tools." Avances en Interacción Humano-Computadora, no. 1 (October 31, 2018): 41. http://dx.doi.org/10.47756/aihc.y3i1.42.
Full textPinheiro, Alexandre, Edna Dias Canedo, Rafael Timoteo De Sousa, and Robson De Oliveira Albuquerque. "Monitoring File Integrity Using Blockchain and Smart Contracts." IEEE Access 8 (2020): 198548–79. http://dx.doi.org/10.1109/access.2020.3035271.
Full textCiorap, Mariana, Dogan Gures, and Cătălin Gabriel Dumitraş. "A Computer Aided Design Software Comparative Study with Applications in Industry 4.0 – Smart Manufacturing." Bulletin of the Polytechnic Institute of Iași. Machine constructions Section 68, no. 1 (March 1, 2022): 47–68. http://dx.doi.org/10.2478/bipcm-2022-0004.
Full textIacobescu, Ciprian, Gabriel Oltean, Camelia Florea, and Bogdan Burtea. "Unified InterPlanetary Smart Parking Network for Maximum End-User Flexibility." Sensors 22, no. 1 (December 29, 2021): 221. http://dx.doi.org/10.3390/s22010221.
Full textS. Jadhav, Vilas, Somnath A Wankhede, Priyanka B. Nikam, and Anil L. Tidar. "Greenhouse Monitoring and Controlling Using LabVIEW Automation." Journal of Control System and Control Instrumentation 9, no. 3 (2023): 27–33. http://dx.doi.org/10.46610/jocsaci.2023.v09i03.005.
Full textMohammed, Marwa Sami, and Asaad Noori Hashim. "Protect medical records by using blockchain technology." Indonesian Journal of Electrical Engineering and Computer Science 32, no. 1 (October 1, 2023): 342. http://dx.doi.org/10.11591/ijeecs.v32.i1.pp342-352.
Full textPalaiokrassas, Georgios, Petros Skoufis, Orfefs Voutyras, Takafumi Kawasaki, Mathieu Gallissot, Radhouene Azzabi, Akira Tsuge, et al. "Combining Blockchains, Smart Contracts, and Complex Sensors Management Platform for Hyper-Connected SmartCities: An IoT Data Marketplace Use Case." Computers 10, no. 10 (October 16, 2021): 133. http://dx.doi.org/10.3390/computers10100133.
Full textPatel, Ochchhav, and Hiren Patel. "Enhancing Data Security in Healthcare IoT: An Innovative Blockchain-based Solution." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10s (October 7, 2023): 69–80. http://dx.doi.org/10.17762/ijritcc.v11i10s.7597.
Full textKaneriya, Jayana, and Hiren Patel. "A Secure and Privacy-Preserving Student Credential Verification System Using Blockchain Technology." International Journal of Information and Education Technology 13, no. 8 (2023): 1251–60. http://dx.doi.org/10.18178/ijiet.2023.13.8.1927.
Full textRahaman, Major Muhammad Masudur. "Recent Advancement of Cyber Security: Challenges and Future Trends in Bangladesh." Saudi Journal of Engineering and Technology 7, no. 6 (July 6, 2022): 278–89. http://dx.doi.org/10.36348/sjet.2022.v07i06.002.
Full textWang, Lixin, Wenlei Sun, Jintao Zhao, Xuedong Zhang, Cheng Lu, and Hao Luo. "A Non-Fungible Token and Blockchain-Based Cotton Lint Traceability Solution." Applied Sciences 14, no. 4 (February 17, 2024): 1610. http://dx.doi.org/10.3390/app14041610.
Full textWen, Shengwei. "A study on the big data scientific research model and the key mechanism based on blockchain." Open Computer Science 12, no. 1 (January 1, 2022): 357–63. http://dx.doi.org/10.1515/comp-2022-0258.
Full textSung, Huang-Chih. "Prospects and challenges posed by blockchain technology on the copyright legal system." Queen Mary Journal of Intellectual Property 9, no. 4 (December 2019): 430–51. http://dx.doi.org/10.4337/qmjip.2019.04.04.
Full textLyon, Warrick, and Peter De Joux. "A Tracking System for Sharks in Shallow Water." Marine Technology Society Journal 48, no. 6 (November 1, 2014): 14–20. http://dx.doi.org/10.4031/mtsj.48.6.2.
Full textTayeb, Shahab, Neha Raste, Matin Pirouz, and Shahram Latifi. "A Cognitive Framework to Secure Smart Cities." MATEC Web of Conferences 208 (2018): 05001. http://dx.doi.org/10.1051/matecconf/201820805001.
Full textBrunner, Kilian, Stephen Dominiak, and Martin Ostertag. "Application of G.hn Broadband Powerline Communication for Industrial Control Using COTS Components." Technologies 11, no. 6 (November 10, 2023): 160. http://dx.doi.org/10.3390/technologies11060160.
Full textMonteiro, Carlos, and José Leal. "Managing experiments on cognitive processes in writing with HandSpy." Computer Science and Information Systems 10, no. 4 (2013): 1747–73. http://dx.doi.org/10.2298/csis121130061m.
Full textVásquez-Ramírez, Raquel, Maritza Bustos-Lopez, Giner Alor-Hernández, Cuauhtémoc Sanchez-Ramírez, and Jorge García-Alcaraz. "AthenaCloud: A cloud-based platform for multi-device educational software generation." Computer Science and Information Systems 13, no. 3 (2016): 957–81. http://dx.doi.org/10.2298/csis160807037v.
Full textNaeem, Muhammad Rashid, Mansoor Khan, Ako Muhammad Abdullah, Fazal Noor, Muhammad Ijaz Khan, Muhammad Asghar Khan, Insaf Ullah, and Shah Room. "A Malware Detection Scheme via Smart Memory Forensics for Windows Devices." Mobile Information Systems 2022 (October 3, 2022): 1–16. http://dx.doi.org/10.1155/2022/9156514.
Full textTusa, Francesco, Massimo Villari, and Antonio Puliafito. "Credential Management Enforcement and Secure Data Storage in gLite." International Journal of Distributed Systems and Technologies 1, no. 1 (January 2010): 76–97. http://dx.doi.org/10.4018/jdst.2010090805.
Full textGómez-Marín, Ernesto, Davide Martintoni, Valerio Senni, Encarnación Castillo, and Luis Parrilla. "Fine-Grained Access Control with User Revocation in Smart Manufacturing." Electronics 12, no. 13 (June 27, 2023): 2843. http://dx.doi.org/10.3390/electronics12132843.
Full text