Artykuły w czasopismach na temat „Smarty (Computer file)”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Smarty (Computer file)”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Alrobieh, Ziad Saif, i Ali Mohammed Abdullah Ali Raqpan. "File Carving Survey on Techniques, Tools and Areas of Use". Transactions on Networks and Communications 8, nr 1 (28.02.2020): 16–26. http://dx.doi.org/10.14738/tnc.81.7636.
Pełny tekst źródłaHarabuga, Yu S. "FEATURES OF COMPUTER TECHNICAL RESEARCH OF THE INFORMATION IN THE MEMORY OF SIM, USIM AND R-UIM-CARDS". Theory and Practice of Forensic Science and Criminalistics 17 (29.11.2017): 318–24. http://dx.doi.org/10.32353/khrife.2017.40.
Pełny tekst źródłaN. Sangeeta i Seung Yeob Nam. "Blockchain and Interplanetary File System (IPFS)-Based Data Storage System for Vehicular Networks with Keyword Search Capability". Electronics 12, nr 7 (24.03.2023): 1545. http://dx.doi.org/10.3390/electronics12071545.
Pełny tekst źródłaCarthen, Chase D., Araam Zaremehrjardi, Vinh Le, Carlos Cardillo, Scotty Strachan, Alireza Tavakkoli, Frederick C. Harris Jr. i Sergiu M. Dascalu. "A Novel Spatial Data Pipeline for Orchestrating Apache NiFi/MiNiFi". International Journal of Software Innovation 12, nr 1 (1.11.2023): 1–14. http://dx.doi.org/10.4018/ijsi.333164.
Pełny tekst źródłaTelagam, Nagarjuna, Nehru Kandasamy, Menakadevi Nanjundan i Arulanandth TS. "Smart Sensor Network based Industrial Parameters Monitoring in IOT Environment using Virtual Instrumentation Server". International Journal of Online Engineering (iJOE) 13, nr 11 (22.11.2017): 111. http://dx.doi.org/10.3991/ijoe.v13i11.7630.
Pełny tekst źródłaAlukwe, Chrispus. "Enhancing Cybersecurity: Smart Intrusion Detection in File Server SYSTEMS". Journal of Science, Innovation and Creativity 2, nr 1 (17.08.2023): 1–6. http://dx.doi.org/10.58721/jsic.v2i1.287.
Pełny tekst źródłaSrivastava, Nayan. "A.I.- Smart Assistant". International Journal for Research in Applied Science and Engineering Technology 9, nr VI (25.06.2021): 2384–87. http://dx.doi.org/10.22214/ijraset.2021.35553.
Pełny tekst źródłaQiao, Yanchen, Weizhe Zhang, Xiaojiang Du i Mohsen Guizani. "Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security". ACM Transactions on Internet Technology 22, nr 1 (28.02.2022): 1–22. http://dx.doi.org/10.1145/3436751.
Pełny tekst źródłaChen, Zhenwei, Axin Wu, Yifei Li, Qixuan Xing i Shengling Geng. "Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing". Security and Communication Networks 2021 (20.01.2021): 1–11. http://dx.doi.org/10.1155/2021/6619689.
Pełny tekst źródłaJawdhari, Hayder A., i Alharith A. Abdullah. "A New Environment of Blockchain based Multi Encryption Data Transferring". Webology 18, nr 2 (30.12.2021): 1379–91. http://dx.doi.org/10.14704/web/v18i2/web18396.
Pełny tekst źródłaPrat, Lionel, Cheryl Baker i Nhien An Le-Khac. "MapExif". International Journal of Digital Crime and Forensics 7, nr 2 (kwiecień 2015): 53–78. http://dx.doi.org/10.4018/ijdcf.2015040104.
Pełny tekst źródłaLee, Jino, i Taeshik Shon. "Forensic Analysis of IoT File Systems for Linux-Compatible Platforms". Electronics 11, nr 19 (8.10.2022): 3219. http://dx.doi.org/10.3390/electronics11193219.
Pełny tekst źródłaHammad, Muhammad, Jawaid Iqbal, Ch Anwar ul Hassan, Saddam Hussain, Syed Sajid Ullah, Mueen Uddin, Urooj Ali Malik, Maha Abdelhaq i Raed Alsaqour. "Blockchain-Based Decentralized Architecture for Software Version Control". Applied Sciences 13, nr 5 (27.02.2023): 3066. http://dx.doi.org/10.3390/app13053066.
Pełny tekst źródłaAi, Sophy, i Jangwoo Kwon. "Extreme Low-Light Image Enhancement for Surveillance Cameras Using Attention U-Net". Sensors 20, nr 2 (15.01.2020): 495. http://dx.doi.org/10.3390/s20020495.
Pełny tekst źródłaChen, Yeong-Chin, Mariana Syamsudin i Sunneng S. Berutu. "Pretrained Configuration of Power-Quality Grayscale-Image Dataset for Sensor Improvement in Smart-Grid Transmission". Electronics 11, nr 19 (26.09.2022): 3060. http://dx.doi.org/10.3390/electronics11193060.
Pełny tekst źródłaXu, Yuanjin. "Application of Remote Sensing Image Data Scene Generation Method in Smart City". Complexity 2021 (28.01.2021): 1–13. http://dx.doi.org/10.1155/2021/6653841.
Pełny tekst źródłaBanerjee, S., F. Steenkeste, P. Couturier, M. Debray i A. Franco. "Telesurveillance of elderly patients by use of passive infra-red sensors in a 'smart' room". Journal of Telemedicine and Telecare 9, nr 1 (1.02.2003): 23–29. http://dx.doi.org/10.1258/135763303321159657.
Pełny tekst źródłaSuseno, Taufiq Rizky Darmawan, Irawan Afrianto i Sufa Atin. "Strengthening data integrity in academic document recording with blockchain and InterPlanetary file system". International Journal of Electrical and Computer Engineering (IJECE) 14, nr 2 (1.04.2024): 1759. http://dx.doi.org/10.11591/ijece.v14i2.pp1759-1769.
Pełny tekst źródłaJanhavi Satam. "Examination of Approaches for Identifying Vulnerabilities in Smart Contracts". Journal of Electrical Systems 20, nr 4s (8.04.2024): 2162–67. http://dx.doi.org/10.52783/jes.2322.
Pełny tekst źródłaYu, LiWei, Lei Zhang i Zhen Gong. "An Optimization Model for Landscape Planning and Environmental Design of Smart Cities Based on Big Data Analysis". Scientific Programming 2022 (20.04.2022): 1–12. http://dx.doi.org/10.1155/2022/2955283.
Pełny tekst źródłaMankar, Ishan. "Smart Surveillance System Using RESNET-50 and MTCNN". International Journal for Research in Applied Science and Engineering Technology 12, nr 5 (31.05.2024): 4380–86. http://dx.doi.org/10.22214/ijraset.2024.62554.
Pełny tekst źródłaHorvath, Kaleb, Mohamed Riduan Abid, Thomas Merino, Ryan Zimmerman, Yesem Peker i Shamim Khan. "Cloud-Based Infrastructure and DevOps for Energy Fault Detection in Smart Buildings". Computers 13, nr 1 (16.01.2024): 23. http://dx.doi.org/10.3390/computers13010023.
Pełny tekst źródłaYang, Ting, Guanghua Zhang, Yin Li, Yiyu Yang, He Wang i Yuqing Zhang. "Detecting Privacy Leakage of Smart Home Devices through Traffic Analysis". Security and Communication Networks 2022 (15.07.2022): 1–10. http://dx.doi.org/10.1155/2022/5655314.
Pełny tekst źródłaDurner, Dominik, Badrish Chandramouli i Yinan Li. "Crystal". Proceedings of the VLDB Endowment 14, nr 11 (lipiec 2021): 2432–44. http://dx.doi.org/10.14778/3476249.3476292.
Pełny tekst źródłaDheyaa Ismael, Khansaa, i Stanciu Irina. "Face recognition using viola-jones depending on python". Indonesian Journal of Electrical Engineering and Computer Science 20, nr 3 (1.12.2020): 1513. http://dx.doi.org/10.11591/ijeecs.v20.i3.pp1513-1521.
Pełny tekst źródłaTanveer Baig, Z., i Chandrasekar Shastry. "Smart Hybridized Routing Protocol for Animal Monitoring and Tracking Applications". Scalable Computing: Practice and Experience 23, nr 4 (23.12.2022): 339–49. http://dx.doi.org/10.12694/scpe.v23i4.2040.
Pełny tekst źródłaSchwarz, Franziska, Klaus Schwarz, Daniel Fuchs, Reiner Creutzburg i David Akopian. "Firmware Vulnerability Analysis of Widely Used Low-Budget TP-Link Routers". Electronic Imaging 2021, nr 3 (18.06.2021): 135–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-135.
Pełny tekst źródłaAlhaddad, Mohammed J., Monagi H. Alkinani, Mohammed Salem Atoum i Alaa Abdulsalm Alarood. "Evolutionary Detection Accuracy of Secret Data in Audio Steganography for Securing 5G-Enabled Internet of Things". Symmetry 12, nr 12 (14.12.2020): 2071. http://dx.doi.org/10.3390/sym12122071.
Pełny tekst źródłaPatil, Anand N., i Sujata V. Mallapur. "Novel machine learning based authentication technique in VANET system for secure data transmission". Journal of Autonomous Intelligence 6, nr 2 (8.08.2023): 828. http://dx.doi.org/10.32629/jai.v6i2.828.
Pełny tekst źródłaDozias, Anne, Cristian Camilo Otalora-Leguizamón, Marco Bianchetti i Maria Susana Avila-Garcia. "Smart pens to assist fibre optic sensors research: Evaluating OCR tools". Avances en Interacción Humano-Computadora, nr 1 (31.10.2018): 41. http://dx.doi.org/10.47756/aihc.y3i1.42.
Pełny tekst źródłaPinheiro, Alexandre, Edna Dias Canedo, Rafael Timoteo De Sousa i Robson De Oliveira Albuquerque. "Monitoring File Integrity Using Blockchain and Smart Contracts". IEEE Access 8 (2020): 198548–79. http://dx.doi.org/10.1109/access.2020.3035271.
Pełny tekst źródłaCiorap, Mariana, Dogan Gures i Cătălin Gabriel Dumitraş. "A Computer Aided Design Software Comparative Study with Applications in Industry 4.0 – Smart Manufacturing". Bulletin of the Polytechnic Institute of Iași. Machine constructions Section 68, nr 1 (1.03.2022): 47–68. http://dx.doi.org/10.2478/bipcm-2022-0004.
Pełny tekst źródłaIacobescu, Ciprian, Gabriel Oltean, Camelia Florea i Bogdan Burtea. "Unified InterPlanetary Smart Parking Network for Maximum End-User Flexibility". Sensors 22, nr 1 (29.12.2021): 221. http://dx.doi.org/10.3390/s22010221.
Pełny tekst źródłaS. Jadhav, Vilas, Somnath A Wankhede, Priyanka B. Nikam i Anil L. Tidar. "Greenhouse Monitoring and Controlling Using LabVIEW Automation". Journal of Control System and Control Instrumentation 9, nr 3 (2023): 27–33. http://dx.doi.org/10.46610/jocsaci.2023.v09i03.005.
Pełny tekst źródłaMohammed, Marwa Sami, i Asaad Noori Hashim. "Protect medical records by using blockchain technology". Indonesian Journal of Electrical Engineering and Computer Science 32, nr 1 (1.10.2023): 342. http://dx.doi.org/10.11591/ijeecs.v32.i1.pp342-352.
Pełny tekst źródłaPalaiokrassas, Georgios, Petros Skoufis, Orfefs Voutyras, Takafumi Kawasaki, Mathieu Gallissot, Radhouene Azzabi, Akira Tsuge i in. "Combining Blockchains, Smart Contracts, and Complex Sensors Management Platform for Hyper-Connected SmartCities: An IoT Data Marketplace Use Case". Computers 10, nr 10 (16.10.2021): 133. http://dx.doi.org/10.3390/computers10100133.
Pełny tekst źródłaPatel, Ochchhav, i Hiren Patel. "Enhancing Data Security in Healthcare IoT: An Innovative Blockchain-based Solution". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 10s (7.10.2023): 69–80. http://dx.doi.org/10.17762/ijritcc.v11i10s.7597.
Pełny tekst źródłaKaneriya, Jayana, i Hiren Patel. "A Secure and Privacy-Preserving Student Credential Verification System Using Blockchain Technology". International Journal of Information and Education Technology 13, nr 8 (2023): 1251–60. http://dx.doi.org/10.18178/ijiet.2023.13.8.1927.
Pełny tekst źródłaRahaman, Major Muhammad Masudur. "Recent Advancement of Cyber Security: Challenges and Future Trends in Bangladesh". Saudi Journal of Engineering and Technology 7, nr 6 (6.07.2022): 278–89. http://dx.doi.org/10.36348/sjet.2022.v07i06.002.
Pełny tekst źródłaWang, Lixin, Wenlei Sun, Jintao Zhao, Xuedong Zhang, Cheng Lu i Hao Luo. "A Non-Fungible Token and Blockchain-Based Cotton Lint Traceability Solution". Applied Sciences 14, nr 4 (17.02.2024): 1610. http://dx.doi.org/10.3390/app14041610.
Pełny tekst źródłaWen, Shengwei. "A study on the big data scientific research model and the key mechanism based on blockchain". Open Computer Science 12, nr 1 (1.01.2022): 357–63. http://dx.doi.org/10.1515/comp-2022-0258.
Pełny tekst źródłaSung, Huang-Chih. "Prospects and challenges posed by blockchain technology on the copyright legal system". Queen Mary Journal of Intellectual Property 9, nr 4 (grudzień 2019): 430–51. http://dx.doi.org/10.4337/qmjip.2019.04.04.
Pełny tekst źródłaLyon, Warrick, i Peter De Joux. "A Tracking System for Sharks in Shallow Water". Marine Technology Society Journal 48, nr 6 (1.11.2014): 14–20. http://dx.doi.org/10.4031/mtsj.48.6.2.
Pełny tekst źródłaTayeb, Shahab, Neha Raste, Matin Pirouz i Shahram Latifi. "A Cognitive Framework to Secure Smart Cities". MATEC Web of Conferences 208 (2018): 05001. http://dx.doi.org/10.1051/matecconf/201820805001.
Pełny tekst źródłaBrunner, Kilian, Stephen Dominiak i Martin Ostertag. "Application of G.hn Broadband Powerline Communication for Industrial Control Using COTS Components". Technologies 11, nr 6 (10.11.2023): 160. http://dx.doi.org/10.3390/technologies11060160.
Pełny tekst źródłaMonteiro, Carlos, i José Leal. "Managing experiments on cognitive processes in writing with HandSpy". Computer Science and Information Systems 10, nr 4 (2013): 1747–73. http://dx.doi.org/10.2298/csis121130061m.
Pełny tekst źródłaVásquez-Ramírez, Raquel, Maritza Bustos-Lopez, Giner Alor-Hernández, Cuauhtémoc Sanchez-Ramírez i Jorge García-Alcaraz. "AthenaCloud: A cloud-based platform for multi-device educational software generation". Computer Science and Information Systems 13, nr 3 (2016): 957–81. http://dx.doi.org/10.2298/csis160807037v.
Pełny tekst źródłaNaeem, Muhammad Rashid, Mansoor Khan, Ako Muhammad Abdullah, Fazal Noor, Muhammad Ijaz Khan, Muhammad Asghar Khan, Insaf Ullah i Shah Room. "A Malware Detection Scheme via Smart Memory Forensics for Windows Devices". Mobile Information Systems 2022 (3.10.2022): 1–16. http://dx.doi.org/10.1155/2022/9156514.
Pełny tekst źródłaTusa, Francesco, Massimo Villari i Antonio Puliafito. "Credential Management Enforcement and Secure Data Storage in gLite". International Journal of Distributed Systems and Technologies 1, nr 1 (styczeń 2010): 76–97. http://dx.doi.org/10.4018/jdst.2010090805.
Pełny tekst źródłaGómez-Marín, Ernesto, Davide Martintoni, Valerio Senni, Encarnación Castillo i Luis Parrilla. "Fine-Grained Access Control with User Revocation in Smart Manufacturing". Electronics 12, nr 13 (27.06.2023): 2843. http://dx.doi.org/10.3390/electronics12132843.
Pełny tekst źródła