Artykuły w czasopismach na temat „Extranets (Computer networks)”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 47 najlepszych artykułów w czasopismach naukowych na temat „Extranets (Computer networks)”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Morgan, David. "Deploying extranets?" Network Security 2004, nr 12 (grudzień 2004): 12–14. http://dx.doi.org/10.1016/s1353-4858(04)00170-9.
Pełny tekst źródłaLiu, Nan, Zhi Zeng i Ruoyu Jin. "A Survey on Users' Perspectives to Functionalities of Web-Based Construction Collaboration Extranets". International Journal of e-Collaboration 15, nr 4 (październik 2019): 1–17. http://dx.doi.org/10.4018/ijec.2019100101.
Pełny tekst źródłaPhaltankar, Kaustubh. "Practical Guide for Implementing Secure Intranets and Extranets". EDPACS 27, nr 12 (czerwiec 2000): 1–2. http://dx.doi.org/10.1201/1079/43258.27.12.20000601/30345.5.
Pełny tekst źródłaGuo, Jie, Xihao Fu, Liqiang Lin, Hengjun Ma, Yanwen Guo, Shiqiu Liu i Ling-Qi Yan. "ExtraNet". ACM Transactions on Graphics 40, nr 6 (grudzień 2021): 1–16. http://dx.doi.org/10.1145/3478513.3480531.
Pełny tekst źródłaAhmed Ali, Adel, i Ahmed M. Al-Naamany. "Converged Networking: A Review of Concepts and Technologies". Sultan Qaboos University Journal for Science [SQUJS] 5 (1.12.2000): 209. http://dx.doi.org/10.24200/squjs.vol5iss0pp209-225.
Pełny tekst źródłaHu, Xiujian, Guanglei Sheng, Piao Shi i Yuanyuan Ding. "TbsNet: the importance of thin-branch structures in CNNs". PeerJ Computer Science 9 (16.06.2023): e1429. http://dx.doi.org/10.7717/peerj-cs.1429.
Pełny tekst źródłaAbabneh, Nedal. "Performance Evaluation of a Topology Control Algorithm for Wireless Sensor Networks". International Journal of Distributed Sensor Networks 6, nr 1 (1.01.2010): 671385. http://dx.doi.org/10.1155/2010/671385.
Pełny tekst źródłaKaramysheva, N. S., D. S. Svishchev, K. V. Popov i S. A. Zinkin. "Implementation of Agent-Based Metacomputersystems and Applications". Proceedings of the Southwest State University 26, nr 1 (28.06.2022): 148–71. http://dx.doi.org/10.21869/2223-1560-2022-26-1-148-171.
Pełny tekst źródłaMalik, Najeeb ur Rehman, Usman Ullah Sheikh, Syed Abdul Rahman Abu-Bakar i Asma Channa. "Multi-View Human Action Recognition Using Skeleton Based-FineKNN with Extraneous Frame Scrapping Technique". Sensors 23, nr 5 (2.03.2023): 2745. http://dx.doi.org/10.3390/s23052745.
Pełny tekst źródłaMolla, D., R. Schwitter, F. Rinaldi, J. Dowdall i M. Hess. "ExtrAns: Extracting answers from technical texts". IEEE Intelligent Systems 18, nr 4 (lipiec 2003): 12–17. http://dx.doi.org/10.1109/mis.2003.1217623.
Pełny tekst źródłaHameed, Marwah. "Modified Fuzzy Neural Network Approach for Academic Performance Prediction of Students in Early Childhood Education". Bonfring International Journal of Networking Technologies and Applications 11, nr 1 (13.02.2024): 17–20. http://dx.doi.org/10.9756/bijnta/v11i1/bij24007.
Pełny tekst źródłaILYA V., VOLODIN, PUTYATO MICHAEL M., MAKARYAN ALEXANDER S. i EVGLEVSKY VYACHESLAV YU. "CLASSIFICATION OF ATTACK MECHANISMS AND RESEARCH OF PROTECTION METHODS FOR SYSTEMS USING MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE ALGORITHMS". CASPIAN JOURNAL: Control and High Technologies 54, nr 2 (2021): 90–98. http://dx.doi.org/10.21672/2074-1707.2021.53.1.090-098.
Pełny tekst źródłaStyles, K., i M. Goldsworthy. "GI extranet: a case study in applying technology for competitive advantage". International Journal of Networking and Virtual Organisations 1, nr 1 (2002): 82. http://dx.doi.org/10.1504/ijnvo.2002.001464.
Pełny tekst źródłaLiu, Zhen, Yi-Liang Han i Xiao-Yuan Yang. "A compressive sensing–based adaptable secure data collection scheme for distributed wireless sensor networks". International Journal of Distributed Sensor Networks 15, nr 6 (czerwiec 2019): 155014771985651. http://dx.doi.org/10.1177/1550147719856516.
Pełny tekst źródłaYong, Chern Han, i Limsoon Wong. "From the static interactome to dynamic protein complexes: Three challenges". Journal of Bioinformatics and Computational Biology 13, nr 02 (kwiecień 2015): 1571001. http://dx.doi.org/10.1142/s0219720015710018.
Pełny tekst źródłaNuli Namassivaya, Sunkari Nithigna, Sindhu Kovilala i MD Sibli Hussain. "Encrypted chat application using RSA Algorithm". international journal of engineering technology and management sciences 7, nr 2 (2023): 854–59. http://dx.doi.org/10.46647/ijetms.2023.v07i02.095.
Pełny tekst źródłaSychugov, Anton, Vadim Miheychikov i Maksim Chernyshov. "Application of Neural Networks for Object Recognition in Railway Transportation". Proceedings of Petersburg Transport University 20, nr 2 (20.06.2023): 478–91. http://dx.doi.org/10.20295/1815-588x-2023-2-478-491.
Pełny tekst źródłaLaksana, Eugene, Melissa Aczon, Long Ho, Cameron Carlin, David Ledbetter i Randall Wetzel. "The impact of extraneous features on the performance of recurrent neural network models in clinical tasks". Journal of Biomedical Informatics 102 (luty 2020): 103351. http://dx.doi.org/10.1016/j.jbi.2019.103351.
Pełny tekst źródłaGALL, HARALD C., RENÉ R. KLÖSCH i ROLAND T. MITTERMEIR. "USING DOMAIN KNOWLEDGE TO IMPROVE REVERSE ENGINEERING". International Journal of Software Engineering and Knowledge Engineering 06, nr 03 (wrzesień 1996): 477–505. http://dx.doi.org/10.1142/s021819409600020x.
Pełny tekst źródłaM. Sujitha, N. Leela i B. Kanimozhi. "Computer Aided Diagnosis (CAD) and Classification of Microbial and other Wide Range of Dermal Diseases using AI and Medical Image Processing". Journal of Innovative Image Processing 5, nr 3 (wrzesień 2023): 307–22. http://dx.doi.org/10.36548/jiip.2023.3.006.
Pełny tekst źródłaПальчикова, И. Г., И. А. Будаева i Е. С. Смирнов. "Generation of a digital passport for gunshot residues using the computer vision techniques". Вычислительные технологии 29, nr 1 (24.02.2024): 93–106. http://dx.doi.org/10.25743/ict.2024.29.1.009.
Pełny tekst źródłaSun, Jiuyun, Huanhe Dong, Ya Gao, Yong Fang i Yuan Kong. "The Short-Term Load Forecasting Using an Artificial Neural Network Approach with Periodic and Nonperiodic Factors: A Case Study of Tai'an, Shandong Province, China". Computational Intelligence and Neuroscience 2021 (26.10.2021): 1–8. http://dx.doi.org/10.1155/2021/1502932.
Pełny tekst źródłaPeeters, Hendrik, Sebastian Habig i Sabine Fechner. "Does Augmented Reality Help to Understand Chemical Phenomena during Hands-On Experiments?–Implications for Cognitive Load and Learning". Multimodal Technologies and Interaction 7, nr 2 (19.01.2023): 9. http://dx.doi.org/10.3390/mti7020009.
Pełny tekst źródłaJones, R. Kenny, Paul Guerrero, Niloy J. Mitra i Daniel Ritchie. "ShapeCoder: Discovering Abstractions for Visual Programs from Unstructured Primitives". ACM Transactions on Graphics 42, nr 4 (26.07.2023): 1–17. http://dx.doi.org/10.1145/3592416.
Pełny tekst źródłaChen, Xinyue, Shuo Li, Shipeng Liu, Robin Fowler i Xu Wang. "MeetScript: Designing Transcript-based Interactions to Support Active Participation in Group Video Meetings". Proceedings of the ACM on Human-Computer Interaction 7, CSCW2 (28.09.2023): 1–32. http://dx.doi.org/10.1145/3610196.
Pełny tekst źródłaWang, Lei, i Wenqi He. "Analysis of Community Outdoor Public Spaces Based on Computer Vision Behavior Detection Algorithm". Applied Sciences 13, nr 19 (2.10.2023): 10922. http://dx.doi.org/10.3390/app131910922.
Pełny tekst źródłaLin, Hsien-I., i C. S. George Lee. "Neuro-fuzzy-based skill learning for robots". Robotica 30, nr 6 (8.12.2011): 1013–27. http://dx.doi.org/10.1017/s026357471100124x.
Pełny tekst źródłaNguyen, Viet Hung, Ngoc Nam Pham, Cong Thang Truong, Duy Tien Bui, Huu Thanh Nguyen i Thu Huong Truong. "Retina-based quality assessment of tile-coded 360-degree videos". EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 9, nr 32 (21.06.2022): e2. http://dx.doi.org/10.4108/eetinis.v9i32.1058.
Pełny tekst źródłaS.Saravana Kumar, Et al. "Automated Detection of Autism Spectrum Disorder Using Bio-Inspired Swarm Intelligence Based Feature Selection and Classification Techniques". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 9 (5.11.2023): 2342–50. http://dx.doi.org/10.17762/ijritcc.v11i9.9242.
Pełny tekst źródłaMirzazade, Ali, Cosmin Popescu, Thomas Blanksvärd i Björn Täljsten. "Workflow for Off-Site Bridge Inspection Using Automatic Damage Detection-Case Study of the Pahtajokk Bridge". Remote Sensing 13, nr 14 (7.07.2021): 2665. http://dx.doi.org/10.3390/rs13142665.
Pełny tekst źródłaPaudel, Niroj, Bishnu Maya Kharel, Ramesh Prasad Sah i Rajesh Shrestha. "Comparative Study of E-Learning Frameworks: Recommendation for Nepal". International Journal of Advanced Research in Computer Science and Software Engineering 7, nr 8 (30.08.2017): 273. http://dx.doi.org/10.23956/ijarcsse.v7i8.66.
Pełny tekst źródłaMohammed Saleh Al Ansari, Et al. "Nanoparticle Incorporation to Enhance Titanium Alloy Electric Discharge Machining Capabilities". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 9 (5.11.2023): 3722–30. http://dx.doi.org/10.17762/ijritcc.v11i9.9596.
Pełny tekst źródłaHalteh, Khaled, i Hakem Sharari. "Employing Artificial Neural Networks and Multiple Discriminant Analysis to Evaluate the Impact of the COVID-19 Pandemic on the Financial Status of Jordanian Companies". Interdisciplinary Journal of Information, Knowledge, and Management 18 (2023): 251–67. http://dx.doi.org/10.28945/5112.
Pełny tekst źródłaKornilova, Alla A., Sergey N. Gaydamaka, Marina A. Gladchenko, Dmitry Ya Agasarov, Igor V. Kornilov i Maxim A. Gerasimov. "Thermal Waves and Flow Features of Pulsed Thermally Stimulated Biochemical Reactions in Viral Particles Interaction with Cells". Radioelectronics. Nanosystems. Information Technologies. 14, nr 1 (12.04.2022): 87–96. http://dx.doi.org/10.17725/rensit.2022.14.087.
Pełny tekst źródłaShimada, Kunio. "Elucidation of Response and Electrochemical Mechanisms of Bio-Inspired Rubber Sensors with Supercapacitor Paradigm". Electronics 12, nr 10 (19.05.2023): 2304. http://dx.doi.org/10.3390/electronics12102304.
Pełny tekst źródłaDo, Quang-Huy, Rémi Antony, Bernard Ratier i Johann Bouclé. "Improving Device-to-Device Reproducibility of Light-Emitting Diodes Based on Layered Halide Perovskites". Electronics 13, nr 6 (11.03.2024): 1039. http://dx.doi.org/10.3390/electronics13061039.
Pełny tekst źródłaMichel, Janet, David Evans, Marcel Tanner i Thomas C. Sauter. "Identifying Policy Gaps in a COVID-19 Online Tool Using the Five-Factor Framework". Systems 10, nr 6 (15.12.2022): 257. http://dx.doi.org/10.3390/systems10060257.
Pełny tekst źródłaLande-Marghade, Pallavi. "Anaesthesia TV: Beginning of a New Revolution!" Journal of Anaesthesia and Critical Care Reports 4, nr 1 (2018): 1–2. http://dx.doi.org/10.13107/jaccr.2018.v04i01.075.
Pełny tekst źródła"Equant provides extranet". Network Security 2000, nr 10 (październik 2000): 3–4. http://dx.doi.org/10.1016/s1353-4858(00)10008-x.
Pełny tekst źródła"National extranet further secured". Network Security 2000, nr 3 (marzec 2000): 4. http://dx.doi.org/10.1016/s1353-4858(00)03008-7.
Pełny tekst źródłaShi, Yinghui, Huiyun Yang, Zongkai Yang, Wei Liu, Di Wu i Harrison Hao Yang. "Examining the effects of note-taking styles on college students’ learning achievement and cognitive load". Australasian Journal of Educational Technology, 12.08.2022, 1–11. http://dx.doi.org/10.14742/ajet.6688.
Pełny tekst źródłaFaulconer, Emily Kaye, Darryl Chamberlain i Beverly L. Wood. "A Case Study of Community of Inquiry Presences and Cognitive Load in Asynchronous Online STEM Courses". Online Learning 26, nr 3 (1.09.2022). http://dx.doi.org/10.24059/olj.v26i3.3386.
Pełny tekst źródłaBäuerle, Alex, Patrick Albus, Raphael Störk, Tina Seufert i Timo Ropinski. "exploRNN: teaching recurrent neural networks through visual exploration". Visual Computer, 14.07.2022. http://dx.doi.org/10.1007/s00371-022-02593-0.
Pełny tekst źródła"A Secure Electronic Messaging System in Client Server Cryptography-RSA Algorithm". International Journal of Engineering and Advanced Technology 8, nr 6S3 (22.11.2019): 1804–8. http://dx.doi.org/10.35940/ijeat.f1343.0986s319.
Pełny tekst źródłaFatima, Mah Noor, Mohammad S. Obaidat, Khalid Mahmood, Salman Shamshad, Muhammad Asad Saleem i Muhammad Faizan Ayub. "Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks Deployed in Agricultural Field". ACM Transactions on Sensor Networks, 3.07.2023. http://dx.doi.org/10.1145/3607142.
Pełny tekst źródłaRao, Prahalad, Satish Bukkapatnam, Omer Beyca, Zhenyu (James) Kong i Ranga Komanduri. "Real-Time Identification of Incipient Surface Morphology Variations in Ultraprecision Machining Process". Journal of Manufacturing Science and Engineering 136, nr 2 (16.01.2014). http://dx.doi.org/10.1115/1.4026210.
Pełny tekst źródłaRuggill, Judd, i Ken McAllister. "The Wicked Problem of Collaboration". M/C Journal 9, nr 2 (1.05.2006). http://dx.doi.org/10.5204/mcj.2606.
Pełny tekst źródła