Artículos de revistas sobre el tema "Smarty (Computer file)"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Smarty (Computer file)".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Alrobieh, Ziad Saif y Ali Mohammed Abdullah Ali Raqpan. "File Carving Survey on Techniques, Tools and Areas of Use". Transactions on Networks and Communications 8, n.º 1 (28 de febrero de 2020): 16–26. http://dx.doi.org/10.14738/tnc.81.7636.
Texto completoHarabuga, Yu S. "FEATURES OF COMPUTER TECHNICAL RESEARCH OF THE INFORMATION IN THE MEMORY OF SIM, USIM AND R-UIM-CARDS". Theory and Practice of Forensic Science and Criminalistics 17 (29 de noviembre de 2017): 318–24. http://dx.doi.org/10.32353/khrife.2017.40.
Texto completoN. Sangeeta y Seung Yeob Nam. "Blockchain and Interplanetary File System (IPFS)-Based Data Storage System for Vehicular Networks with Keyword Search Capability". Electronics 12, n.º 7 (24 de marzo de 2023): 1545. http://dx.doi.org/10.3390/electronics12071545.
Texto completoCarthen, Chase D., Araam Zaremehrjardi, Vinh Le, Carlos Cardillo, Scotty Strachan, Alireza Tavakkoli, Frederick C. Harris Jr. y Sergiu M. Dascalu. "A Novel Spatial Data Pipeline for Orchestrating Apache NiFi/MiNiFi". International Journal of Software Innovation 12, n.º 1 (1 de noviembre de 2023): 1–14. http://dx.doi.org/10.4018/ijsi.333164.
Texto completoTelagam, Nagarjuna, Nehru Kandasamy, Menakadevi Nanjundan y Arulanandth TS. "Smart Sensor Network based Industrial Parameters Monitoring in IOT Environment using Virtual Instrumentation Server". International Journal of Online Engineering (iJOE) 13, n.º 11 (22 de noviembre de 2017): 111. http://dx.doi.org/10.3991/ijoe.v13i11.7630.
Texto completoAlukwe, Chrispus. "Enhancing Cybersecurity: Smart Intrusion Detection in File Server SYSTEMS". Journal of Science, Innovation and Creativity 2, n.º 1 (17 de agosto de 2023): 1–6. http://dx.doi.org/10.58721/jsic.v2i1.287.
Texto completoSrivastava, Nayan. "A.I.- Smart Assistant". International Journal for Research in Applied Science and Engineering Technology 9, n.º VI (25 de junio de 2021): 2384–87. http://dx.doi.org/10.22214/ijraset.2021.35553.
Texto completoQiao, Yanchen, Weizhe Zhang, Xiaojiang Du y Mohsen Guizani. "Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security". ACM Transactions on Internet Technology 22, n.º 1 (28 de febrero de 2022): 1–22. http://dx.doi.org/10.1145/3436751.
Texto completoChen, Zhenwei, Axin Wu, Yifei Li, Qixuan Xing y Shengling Geng. "Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing". Security and Communication Networks 2021 (20 de enero de 2021): 1–11. http://dx.doi.org/10.1155/2021/6619689.
Texto completoJawdhari, Hayder A. y Alharith A. Abdullah. "A New Environment of Blockchain based Multi Encryption Data Transferring". Webology 18, n.º 2 (30 de diciembre de 2021): 1379–91. http://dx.doi.org/10.14704/web/v18i2/web18396.
Texto completoPrat, Lionel, Cheryl Baker y Nhien An Le-Khac. "MapExif". International Journal of Digital Crime and Forensics 7, n.º 2 (abril de 2015): 53–78. http://dx.doi.org/10.4018/ijdcf.2015040104.
Texto completoLee, Jino y Taeshik Shon. "Forensic Analysis of IoT File Systems for Linux-Compatible Platforms". Electronics 11, n.º 19 (8 de octubre de 2022): 3219. http://dx.doi.org/10.3390/electronics11193219.
Texto completoHammad, Muhammad, Jawaid Iqbal, Ch Anwar ul Hassan, Saddam Hussain, Syed Sajid Ullah, Mueen Uddin, Urooj Ali Malik, Maha Abdelhaq y Raed Alsaqour. "Blockchain-Based Decentralized Architecture for Software Version Control". Applied Sciences 13, n.º 5 (27 de febrero de 2023): 3066. http://dx.doi.org/10.3390/app13053066.
Texto completoAi, Sophy y Jangwoo Kwon. "Extreme Low-Light Image Enhancement for Surveillance Cameras Using Attention U-Net". Sensors 20, n.º 2 (15 de enero de 2020): 495. http://dx.doi.org/10.3390/s20020495.
Texto completoChen, Yeong-Chin, Mariana Syamsudin y Sunneng S. Berutu. "Pretrained Configuration of Power-Quality Grayscale-Image Dataset for Sensor Improvement in Smart-Grid Transmission". Electronics 11, n.º 19 (26 de septiembre de 2022): 3060. http://dx.doi.org/10.3390/electronics11193060.
Texto completoXu, Yuanjin. "Application of Remote Sensing Image Data Scene Generation Method in Smart City". Complexity 2021 (28 de enero de 2021): 1–13. http://dx.doi.org/10.1155/2021/6653841.
Texto completoBanerjee, S., F. Steenkeste, P. Couturier, M. Debray y A. Franco. "Telesurveillance of elderly patients by use of passive infra-red sensors in a 'smart' room". Journal of Telemedicine and Telecare 9, n.º 1 (1 de febrero de 2003): 23–29. http://dx.doi.org/10.1258/135763303321159657.
Texto completoSuseno, Taufiq Rizky Darmawan, Irawan Afrianto y Sufa Atin. "Strengthening data integrity in academic document recording with blockchain and InterPlanetary file system". International Journal of Electrical and Computer Engineering (IJECE) 14, n.º 2 (1 de abril de 2024): 1759. http://dx.doi.org/10.11591/ijece.v14i2.pp1759-1769.
Texto completoJanhavi Satam. "Examination of Approaches for Identifying Vulnerabilities in Smart Contracts". Journal of Electrical Systems 20, n.º 4s (8 de abril de 2024): 2162–67. http://dx.doi.org/10.52783/jes.2322.
Texto completoYu, LiWei, Lei Zhang y Zhen Gong. "An Optimization Model for Landscape Planning and Environmental Design of Smart Cities Based on Big Data Analysis". Scientific Programming 2022 (20 de abril de 2022): 1–12. http://dx.doi.org/10.1155/2022/2955283.
Texto completoMankar, Ishan. "Smart Surveillance System Using RESNET-50 and MTCNN". International Journal for Research in Applied Science and Engineering Technology 12, n.º 5 (31 de mayo de 2024): 4380–86. http://dx.doi.org/10.22214/ijraset.2024.62554.
Texto completoHorvath, Kaleb, Mohamed Riduan Abid, Thomas Merino, Ryan Zimmerman, Yesem Peker y Shamim Khan. "Cloud-Based Infrastructure and DevOps for Energy Fault Detection in Smart Buildings". Computers 13, n.º 1 (16 de enero de 2024): 23. http://dx.doi.org/10.3390/computers13010023.
Texto completoYang, Ting, Guanghua Zhang, Yin Li, Yiyu Yang, He Wang y Yuqing Zhang. "Detecting Privacy Leakage of Smart Home Devices through Traffic Analysis". Security and Communication Networks 2022 (15 de julio de 2022): 1–10. http://dx.doi.org/10.1155/2022/5655314.
Texto completoDurner, Dominik, Badrish Chandramouli y Yinan Li. "Crystal". Proceedings of the VLDB Endowment 14, n.º 11 (julio de 2021): 2432–44. http://dx.doi.org/10.14778/3476249.3476292.
Texto completoDheyaa Ismael, Khansaa y Stanciu Irina. "Face recognition using viola-jones depending on python". Indonesian Journal of Electrical Engineering and Computer Science 20, n.º 3 (1 de diciembre de 2020): 1513. http://dx.doi.org/10.11591/ijeecs.v20.i3.pp1513-1521.
Texto completoTanveer Baig, Z. y Chandrasekar Shastry. "Smart Hybridized Routing Protocol for Animal Monitoring and Tracking Applications". Scalable Computing: Practice and Experience 23, n.º 4 (23 de diciembre de 2022): 339–49. http://dx.doi.org/10.12694/scpe.v23i4.2040.
Texto completoSchwarz, Franziska, Klaus Schwarz, Daniel Fuchs, Reiner Creutzburg y David Akopian. "Firmware Vulnerability Analysis of Widely Used Low-Budget TP-Link Routers". Electronic Imaging 2021, n.º 3 (18 de junio de 2021): 135–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-135.
Texto completoAlhaddad, Mohammed J., Monagi H. Alkinani, Mohammed Salem Atoum y Alaa Abdulsalm Alarood. "Evolutionary Detection Accuracy of Secret Data in Audio Steganography for Securing 5G-Enabled Internet of Things". Symmetry 12, n.º 12 (14 de diciembre de 2020): 2071. http://dx.doi.org/10.3390/sym12122071.
Texto completoPatil, Anand N. y Sujata V. Mallapur. "Novel machine learning based authentication technique in VANET system for secure data transmission". Journal of Autonomous Intelligence 6, n.º 2 (8 de agosto de 2023): 828. http://dx.doi.org/10.32629/jai.v6i2.828.
Texto completoDozias, Anne, Cristian Camilo Otalora-Leguizamón, Marco Bianchetti y Maria Susana Avila-Garcia. "Smart pens to assist fibre optic sensors research: Evaluating OCR tools". Avances en Interacción Humano-Computadora, n.º 1 (31 de octubre de 2018): 41. http://dx.doi.org/10.47756/aihc.y3i1.42.
Texto completoPinheiro, Alexandre, Edna Dias Canedo, Rafael Timoteo De Sousa y Robson De Oliveira Albuquerque. "Monitoring File Integrity Using Blockchain and Smart Contracts". IEEE Access 8 (2020): 198548–79. http://dx.doi.org/10.1109/access.2020.3035271.
Texto completoCiorap, Mariana, Dogan Gures y Cătălin Gabriel Dumitraş. "A Computer Aided Design Software Comparative Study with Applications in Industry 4.0 – Smart Manufacturing". Bulletin of the Polytechnic Institute of Iași. Machine constructions Section 68, n.º 1 (1 de marzo de 2022): 47–68. http://dx.doi.org/10.2478/bipcm-2022-0004.
Texto completoIacobescu, Ciprian, Gabriel Oltean, Camelia Florea y Bogdan Burtea. "Unified InterPlanetary Smart Parking Network for Maximum End-User Flexibility". Sensors 22, n.º 1 (29 de diciembre de 2021): 221. http://dx.doi.org/10.3390/s22010221.
Texto completoS. Jadhav, Vilas, Somnath A Wankhede, Priyanka B. Nikam y Anil L. Tidar. "Greenhouse Monitoring and Controlling Using LabVIEW Automation". Journal of Control System and Control Instrumentation 9, n.º 3 (2023): 27–33. http://dx.doi.org/10.46610/jocsaci.2023.v09i03.005.
Texto completoMohammed, Marwa Sami y Asaad Noori Hashim. "Protect medical records by using blockchain technology". Indonesian Journal of Electrical Engineering and Computer Science 32, n.º 1 (1 de octubre de 2023): 342. http://dx.doi.org/10.11591/ijeecs.v32.i1.pp342-352.
Texto completoPalaiokrassas, Georgios, Petros Skoufis, Orfefs Voutyras, Takafumi Kawasaki, Mathieu Gallissot, Radhouene Azzabi, Akira Tsuge et al. "Combining Blockchains, Smart Contracts, and Complex Sensors Management Platform for Hyper-Connected SmartCities: An IoT Data Marketplace Use Case". Computers 10, n.º 10 (16 de octubre de 2021): 133. http://dx.doi.org/10.3390/computers10100133.
Texto completoPatel, Ochchhav y Hiren Patel. "Enhancing Data Security in Healthcare IoT: An Innovative Blockchain-based Solution". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 10s (7 de octubre de 2023): 69–80. http://dx.doi.org/10.17762/ijritcc.v11i10s.7597.
Texto completoKaneriya, Jayana y Hiren Patel. "A Secure and Privacy-Preserving Student Credential Verification System Using Blockchain Technology". International Journal of Information and Education Technology 13, n.º 8 (2023): 1251–60. http://dx.doi.org/10.18178/ijiet.2023.13.8.1927.
Texto completoRahaman, Major Muhammad Masudur. "Recent Advancement of Cyber Security: Challenges and Future Trends in Bangladesh". Saudi Journal of Engineering and Technology 7, n.º 6 (6 de julio de 2022): 278–89. http://dx.doi.org/10.36348/sjet.2022.v07i06.002.
Texto completoWang, Lixin, Wenlei Sun, Jintao Zhao, Xuedong Zhang, Cheng Lu y Hao Luo. "A Non-Fungible Token and Blockchain-Based Cotton Lint Traceability Solution". Applied Sciences 14, n.º 4 (17 de febrero de 2024): 1610. http://dx.doi.org/10.3390/app14041610.
Texto completoWen, Shengwei. "A study on the big data scientific research model and the key mechanism based on blockchain". Open Computer Science 12, n.º 1 (1 de enero de 2022): 357–63. http://dx.doi.org/10.1515/comp-2022-0258.
Texto completoSung, Huang-Chih. "Prospects and challenges posed by blockchain technology on the copyright legal system". Queen Mary Journal of Intellectual Property 9, n.º 4 (diciembre de 2019): 430–51. http://dx.doi.org/10.4337/qmjip.2019.04.04.
Texto completoLyon, Warrick y Peter De Joux. "A Tracking System for Sharks in Shallow Water". Marine Technology Society Journal 48, n.º 6 (1 de noviembre de 2014): 14–20. http://dx.doi.org/10.4031/mtsj.48.6.2.
Texto completoTayeb, Shahab, Neha Raste, Matin Pirouz y Shahram Latifi. "A Cognitive Framework to Secure Smart Cities". MATEC Web of Conferences 208 (2018): 05001. http://dx.doi.org/10.1051/matecconf/201820805001.
Texto completoBrunner, Kilian, Stephen Dominiak y Martin Ostertag. "Application of G.hn Broadband Powerline Communication for Industrial Control Using COTS Components". Technologies 11, n.º 6 (10 de noviembre de 2023): 160. http://dx.doi.org/10.3390/technologies11060160.
Texto completoMonteiro, Carlos y José Leal. "Managing experiments on cognitive processes in writing with HandSpy". Computer Science and Information Systems 10, n.º 4 (2013): 1747–73. http://dx.doi.org/10.2298/csis121130061m.
Texto completoVásquez-Ramírez, Raquel, Maritza Bustos-Lopez, Giner Alor-Hernández, Cuauhtémoc Sanchez-Ramírez y Jorge García-Alcaraz. "AthenaCloud: A cloud-based platform for multi-device educational software generation". Computer Science and Information Systems 13, n.º 3 (2016): 957–81. http://dx.doi.org/10.2298/csis160807037v.
Texto completoNaeem, Muhammad Rashid, Mansoor Khan, Ako Muhammad Abdullah, Fazal Noor, Muhammad Ijaz Khan, Muhammad Asghar Khan, Insaf Ullah y Shah Room. "A Malware Detection Scheme via Smart Memory Forensics for Windows Devices". Mobile Information Systems 2022 (3 de octubre de 2022): 1–16. http://dx.doi.org/10.1155/2022/9156514.
Texto completoTusa, Francesco, Massimo Villari y Antonio Puliafito. "Credential Management Enforcement and Secure Data Storage in gLite". International Journal of Distributed Systems and Technologies 1, n.º 1 (enero de 2010): 76–97. http://dx.doi.org/10.4018/jdst.2010090805.
Texto completoGómez-Marín, Ernesto, Davide Martintoni, Valerio Senni, Encarnación Castillo y Luis Parrilla. "Fine-Grained Access Control with User Revocation in Smart Manufacturing". Electronics 12, n.º 13 (27 de junio de 2023): 2843. http://dx.doi.org/10.3390/electronics12132843.
Texto completo