Siga este link para ver outros tipos de publicações sobre o tema: Digital techniques.

Artigos de revistas sobre o tema "Digital techniques"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Digital techniques".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.

1

Abhilasha, Jaiswal. "DIGITAL TECHNIQUES OF PAINTING." International Journal of Research - Granthaalayah 7, no. 11(SE) (December 30, 2019): 150–53. https://doi.org/10.5281/zenodo.3586382.

Texto completo da fonte
Resumo:
As technology is evolving gradually from the ages, the human way of living and different types of arts have also influenced. In these days the old energy consuming process has got extent and a creative fusion of the two worlds of art and technology is prevailing. Inspiringly, the background medium of this force which is fast developing into an indispensable asset is the digital age of computer. It’s effect on the human life can be said to have secured unusual style in past 20th century, where the computer as a machine which uses codes and binary digits computerized to keep and achieve facts provided, were used in various ways to process easier the functions of particular absolutely necessary machines in human attempts to achieve a goal, until then it was done manually or by some other means.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Dr, Avinash Dube. "DIGITAL TECHNIQUES AND ART." International Journal of Research - Granthaalayah 7, no. 11(SE) (December 30, 2019): 89–91. https://doi.org/10.5281/zenodo.3585068.

Texto completo da fonte
Resumo:
Modern age is a digital age. Digitalization is improving the things in all sectors. In electronics digital instruments are replacing conventional analog instruments giving precession and accuracy. Teaching learning methods are greatly improved due to incorporation of digital technology. Life style of common people is also changing due to digital tranjections, online shopping, online banking etc. The field of art and painting is also influenced by digital techniques available now a day. With emergence of new tools and techniques the art of painting is gaining new shapes. Digital technical skills provide a wide platform for imagination of artists. There are pros and cons of each aspects but it is true that art always connect students with their own culture as well as with the wider world. Visual art always improve learners critical thinking.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Indra R Yoganapriya, P. "Pre-Processing Techniques for Digital Mammograms." International Journal of Science and Research (IJSR) 12, no. 2 (February 5, 2023): 647–51. http://dx.doi.org/10.21275/sr23206162028.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Chahal, Prabhjot Kaur, Amritpal Singh, and Palwinder Singh. "Digital Watermarking Techniques." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 8 (November 27, 2013): 2903–9. http://dx.doi.org/10.24297/ijct.v11i8.3009.

Texto completo da fonte
Resumo:
More the development of the multimedia, more the digitalization, the more is the access to internet. This fast rate of enhancement gives a sense of protection and authentication. Digital watermarking technology provides a strong solution to insecurity created by digitalization. In this paper, our focus is on the basic concepts of watermarking, their characterisation, their techniques. Extending more, we will elaborate one of the latest technique of watermarking named as “Discrete Cosine Transform” (DCT).
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Rajagopalan, S. K. "Digital Transmission Techniques." IETE Journal of Education 33, no. 1 (January 1992): 3–11. http://dx.doi.org/10.1080/09747338.1992.11436349.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Challener, P. "Digital logic techniques." Microprocessors and Microsystems 9, no. 1 (January 1985): 34–35. http://dx.doi.org/10.1016/0141-9331(85)90222-4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Babatunde, R. S. "A Techniques for Face Recognition Systems." Advances in Multidisciplinary & Scientific Research Journal Publications 5, no. 1 (March 30, 2017): 95–108. http://dx.doi.org/10.22624/aims/digital/v5n1p20x.

Texto completo da fonte
Resumo:
In this research, a comparison of the various techniques used for face recognition is shown in tabular format to give a precise overview of what different authors have already projected in this particular field. A systematic review of 40 journal articles pertaining to feature dimensionality reduction was carried out. The articles were reviewed to appraise the methodology and to identify the key parameters that were used for testing and evaluation. The dates of publication of the articles were between 2007 and 2015. Ten percent (10%) of the articles reported the training time for their system while twenty four percent (24%) reported their testing time. Sixty seven percent (67%) of the reviewed articles reported the image dimension used in the research. Also, only fourty eight percent (48%) of the reviewed articles compared their result with other existing methods. The main emphasis of this survey is to identify the major trade-offs of parameters and (or) metrics for evaluating the performance of the techniques employed in dimensionality reduction by existing face recognition systems. Findings from the review carried out showed that major performance metrics reported by vast amount of researchers in this review is recognition accuracy in which eighty six percent (86%) of the authors reported in their experiment. Keywords: Optimal Subset, High Dimension, Face Recognition, Biometrics, Feature Vector
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Kumar Saini, Mukesh, Arun Saini, and Sachin Gupta. "Digital Image Processing Techniques for Leukemia Detection." International Journal of Science and Research (IJSR) 13, no. 6 (June 5, 2024): 1710–19. http://dx.doi.org/10.21275/sr24627090927.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Vatsenko, A. "Digital Forensics Techniques Overview." Bulletin of Science and Practice 6, no. 6 (June 15, 2020): 167–74. http://dx.doi.org/10.33619/2414-2948/55/21.

Texto completo da fonte
Resumo:
This article discusses the important issue of the use of forensic technology in computer forensics. The basic techniques of computer forensics existing today, such as real-time tracking, sandboxing, data and password recovery, and so on, are examined. The advantages and disadvantages of existing methods are given and recommendations are made on the development of computer forensics techniques in the future. Conclusions are drawn up on the problem of using forensic technology in computer forensics.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Dube, Avinash. "DIGITAL TECHNIQUES AND ART." International Journal of Research -GRANTHAALAYAH 7, no. 11 (November 30, 2019): 89–91. http://dx.doi.org/10.29121/granthaalayah.v7.i11.2019.3706.

Texto completo da fonte
Resumo:
Modern age is a digital age. Digitalization is improving the things in all sectors. In electronics digital instruments are replacing conventional analog instruments giving precession and accuracy. Teaching learning methods are greatly improved due to incorporation of digital technology. Life style of common people is also changing due to digital tranjections, online shopping, online banking etc. The field of art and painting is also influenced by digital techniques available now a day.
 With emergence of new tools and techniques the art of painting is gaining new shapes. Digital technical skills provide a wide platform for imagination of artists. There are pros and cons of each aspects but it is true that art always connect students with their own culture as well as with the wider world. Visual art always improve learners critical thinking.
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Jaiswal, Abhilasha. "DIGITAL TECHNIQUES OF PAINTING." International Journal of Research -GRANTHAALAYAH 7, no. 11 (November 30, 2019): 150–53. http://dx.doi.org/10.29121/granthaalayah.v7.i11.2019.3727.

Texto completo da fonte
Resumo:
As technology is evolving gradually from the ages, the human way of living and different types of arts have also influenced. In these days the old energy consuming process has got extent and a creative fusion of the two worlds of art and technology is prevailing. Inspiringly, the background medium of this force which is fast developing into an indispensable asset is the digital age of computer. It’s effect on the human life can be said to have secured unusual style in past 20th century, where the computer as a machine which uses codes and binary digits computerized to keep and achieve facts provided, were used in various ways to process easier the functions of particular absolutely necessary machines in human attempts to achieve a goal, until then it was done manually or by some other means.
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Abdul Majeed Haleem, Alyaa, and Nadia Mohammed. "Digital Information Hiding Techniques." AL-Rafidain Journal of Computer Sciences and Mathematics 7, no. 3 (December 30, 2010): 109–20. http://dx.doi.org/10.33899/csmj.2010.163916.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

NAKAMURA, YUTAKA. "RADIONUCLIDE DIGITAL IMAGING TECHNIQUES." Japanese Journal of Radiological Technology 45, no. 11 (1989): 1780–84. http://dx.doi.org/10.6009/jjrt.kj00001359090.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Sundareshan, B. "Digital Modulation—Baseband Techniques." IETE Journal of Education 33, no. 1 (January 1992): 35–44. http://dx.doi.org/10.1080/09747338.1992.11436355.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Bhatnagar, R. C., and B. Sundareshan. "Digital Modulation—Bandpass Techniques." IETE Journal of Education 33, no. 1 (January 1992): 45–56. http://dx.doi.org/10.1080/09747338.1992.11436356.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Monaghan, Mark J. "Digital techniques in echocardiography." International Journal of Cardiology 22, no. 2 (February 1989): 275–76. http://dx.doi.org/10.1016/0167-5273(89)90082-x.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

., Gomathi K. V. "DIGITAL IMAGE COMPRESSION TECHNIQUES." International Journal of Research in Engineering and Technology 03, no. 10 (October 25, 2014): 285–90. http://dx.doi.org/10.15623/ijret.2014.0310044.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Vaman, D. R., C. V. Chakravarthy, and Ioannis S. Dedes. "Digital Speech Interpolation Techniques." IETE Journal of Research 36, no. 5-6 (September 1990): 337–44. http://dx.doi.org/10.1080/03772063.1990.11436904.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Zou, W. Y. "Digital HDTV compression techniques." IEEE Transactions on Broadcasting 37, no. 4 (1991): 131–33. http://dx.doi.org/10.1109/11.106198.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

McNeil, A. J. S., and P. J. Mitchell. "Digital techniques in electrochemistry." Surface Technology 25, no. 3 (July 1985): 195–215. http://dx.doi.org/10.1016/0376-4583(85)90136-0.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Adedibu, O., and M. E. Adeshipo. "A Review of Anomaly Detection Techniques for Intrusion Detection." Advances in Multidisciplinary & Scientific Research Journal Publication 6, no. 4 (December 31, 2018): 1–10. http://dx.doi.org/10.22624/aims/digital/v6n4p1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Zhang, J. F. "VLSI Testing: Digital and Mixed Analogue/Digital Techniques." Measurement Science and Technology 10, no. 12 (December 1, 1999): 1357. http://dx.doi.org/10.1088/0957-0233/10/12/502.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Joshua, Wemegah. "A Review of Various Data Security Techniques in Wireless Communication Systems." Advances in Multidisciplinary and scientific Research Journal Publication 10 (November 30, 2022): 15–24. http://dx.doi.org/10.22624/aims/digital/v10n4p3.

Texto completo da fonte
Resumo:
Sensitive data is constantly being transmitted particularly over wireless communication systems due to how convenient this wireless communication systems are. However, these communication systems are generally weak in terms of privacy protection and security as a whole. This is because anyone within the perimeter of a wireless network can attempt hacking into the network without physically connecting to it. This paper will focus on the two most common data security techniques in wireless communication systems – steganography and cryptography. Steganography is the practice of hiding information in another message or physical item such that its presence cannot be detected by human examination. Cryptography on the other hand is the science of encrypting information in a way that unintended recipients cannot interpret and then decrypting the said message back into plaintext. Keywords: Cryptography, Data Encryption, Data Decryption, Steganography, Wireless Communication
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Anosike, Joseph Ugonna, and Uchenna Petronilla Ogoke. "A Comparative Analysis on the Model Adequacy of Four Transformation Techniques." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 3 (September 30, 2022): 137–47. http://dx.doi.org/10.22624/aims/digital/v10n1p10x.

Texto completo da fonte
Resumo:
ABSTRACT This study compared four different transformation techniques by applying a simple linear regression on raw and transformed data. The R2 of each model was obtained and a test on the significance of these R2 was carried out. Also, the rxy(coefficient of correlation) were also obtained. The data used is a secondary data consisting of 53years (1964-2016) of the infant mortality rate in Nigeria (https://www.ceicdata.com/en/nigeria/health-statistics/ng-mortality-rate-infant-per-1000-live-births). The rxy were also compared and the results, 95.8%, 95.8%, 96.2%, 93.0%, and 92.9% respectively. The R2 obtained for the raw data, logarithm, square-root, square and inverse are as follows: 91.8%, 91.7%, 92.5%, 86.6% and 86.4% respectively. However, the R2 obtained for the raw data, logarithm, square-root, square and inverse compete favourably but the performance of inverse transformation suits the data most in terms of model accuracy. Key Words: Transformation, Raw data, logarithm, square-root, square, inverse
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Ugonna, Anosike Joseph, and Uchenna Petronilla Ogoke. "A Comparative Analysis on the Model Adequacy of Four Transformation Techniques." Advances in Multidisciplinary and scientific Research Journal Publication 10 (September 30, 2022): 137–47. http://dx.doi.org/10.22624/aims/digital/v10n1p9.

Texto completo da fonte
Resumo:
This study compared four different transformation techniques by applying a simple linear regression on raw and transformed data. The R2 of each model was obtained and a test on the significance of these R2 was carried out. Also, the rxy(coefficient of correlation) were also obtained. The data used is a secondary data consisting of 53years (1964-2016) of the infant mortality rate in Nigeria (https://www.ceicdata.com/en/nigeria/health-statistics/ng-mortality-rate-infant-per-1000-live-births). The rxy were also compared and the results, 95.8%, 95.8%, 96.2%, 93.0%, and 92.9% respectively. The R2 obtained for the raw data, logarithm, square-root, square and inverse are as follows: 91.8%, 91.7%, 92.5%, 86.6% and 86.4% respectively. However, the R2 obtained for the raw data, logarithm, square-root, square and inverse compete favourably but the performance of inverse transformation suits the data most in terms of model accuracy. Key Words: Transformation, Raw data, logarithm, square-root, square, inverse A Comparative Analysis on the Model Adequacy of Four Transformation Techniques
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Dan, Man Kan, and Dr T. Meyappan. "WATERMARKING TECHNIQUES." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (June 30, 2012): 122–24. http://dx.doi.org/10.24297/ijct.v2i3c.2709.

Texto completo da fonte
Resumo:
Embedding a hidden stream of bits in a file is called Digital watermarking. The file could be an image, audio, video or text. Nowadays, a digital watermarking has many applications such as broadcast monitoring, owner identification, proof of ownership, transaction tracking, content authentication, copy control, device control and file reconstruction. It is intended to complement cryptographic processes. It is a visible or preferably invisible, identification code that is permanently embedded in the data and remains present within the data after any decryption process. The focus of this paper will detail digital watermarking for multimedia applications and covered by definition of digital watermarking, purpose, techniques and types of watermarking attacks briefly discussed.
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Kulkarni, Pooja, Shraddha Bhise, and Sadhana Khot. "Review of Digital Watermarking Techniques." International Journal of Computer Applications 109, no. 16 (January 16, 2015): 40–44. http://dx.doi.org/10.5120/19275-1029.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Karavasilev, Tony. "Securing Sensitive Digital Data Techniques." IOSR Journal of Computer Engineering 19, no. 03 (June 2017): 53–66. http://dx.doi.org/10.9790/0661-1903055366.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Will, Rachel L. "Digital Techniques in Historic Preservation." Technology|Architecture + Design 6, no. 1 (January 2, 2022): 15–20. http://dx.doi.org/10.1080/24751448.2022.2040298.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Gohokar, V. V. "Simulation of Digital Modulation Techniques." IETE Journal of Education 53, no. 1 (January 2012): 5–8. http://dx.doi.org/10.1080/09747338.2012.10876089.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Bobinsky, E. "Digital modulation techniques [Book Review]." IEEE Communications Magazine 39, no. 6 (June 2001): 24–28. http://dx.doi.org/10.1109/mcom.2001.925668.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Shukla, Deepti, and Nirupama Tiwari. "Survey on Digital Watermarking Techniques." International Journal of Signal Processing, Image Processing and Pattern Recognition 8, no. 9 (September 30, 2015): 121–26. http://dx.doi.org/10.14257/ijsip.2015.8.9.12.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Shukla, Deepti, Nirupama Tiwari, and Deepika Dubey. "Surevey on Digital Watermarking Techniques." International Journal of Signal Processing, Image Processing and Pattern Recognition 9, no. 1 (January 31, 2016): 239–44. http://dx.doi.org/10.14257/ijsip.2016.9.1.23.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Thompson, David L. "An Introduction to Digital Techniques." Electronic Systems News 1986, no. 3 (1986): 34. http://dx.doi.org/10.1049/esn.1986.0083.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Hartmann, H., and E. Steiner. "Synchronization Techniques for Digital Networks." IEEE Journal on Selected Areas in Communications 4, no. 4 (July 1986): 506–13. http://dx.doi.org/10.1109/jsac.1986.1146360.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Rossing, Thomas D. "Digital techniques for sound recording." Physics Teacher 32, no. 8 (November 1994): 458–64. http://dx.doi.org/10.1119/1.2344080.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Gammon, LM. "Macro Techniques and Digital-Microscopy." Microscopy and Microanalysis 12, S02 (July 31, 2006): 1682–83. http://dx.doi.org/10.1017/s1431927606061332.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Hurst, S. L., D. M. Miller, and J. C. Muzio. "Spectral techniques in digital logic." Signal Processing 9, no. 2 (September 1985): 138. http://dx.doi.org/10.1016/0165-1684(85)90052-0.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Moon, Jared L., Carl A. Kihm, Daniel A. Perez, Leslie B. Dowling, and David C. Alder. "Digital Arthrodesis: Current Fixation Techniques." Clinics in Podiatric Medicine and Surgery 28, no. 4 (October 2011): 769–83. http://dx.doi.org/10.1016/j.cpm.2011.07.003.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

D’Angelantonio, Albert M., Kaitlin A. Nelson-Rinaldi, Jade Barnard, and Frank Oware. "Master Techniques in Digital Arthrodesis." Clinics in Podiatric Medicine and Surgery 29, no. 1 (January 2012): 21–40. http://dx.doi.org/10.1016/j.cpm.2011.10.002.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Alina, Ziv, and Ofer Amrani. "On Digital Post-Distortion Techniques." IEEE Transactions on Signal Processing 64, no. 3 (February 2016): 603–14. http://dx.doi.org/10.1109/tsp.2015.2477806.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Kim, Myung K., Lingfeng Yu, and Christopher J. Mann. "Interference techniques in digital holography." Journal of Optics A: Pure and Applied Optics 8, no. 7 (June 8, 2006): S518—S523. http://dx.doi.org/10.1088/1464-4258/8/7/s33.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Stone, Jenny L., Robert L. Peterson, and John E. Wolf. "Digital imaging techniques in dermatology." Journal of the American Academy of Dermatology 23, no. 5 (November 1990): 913–17. http://dx.doi.org/10.1016/0190-9622(90)70314-8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Kawai, Naoki. "Fundamental Techniques for Digital TV Broadcasting; (11). Multiplex and Transmission Techniques for Digital Broadcasting." Journal of the Institute of Television Engineers of Japan 48, no. 11 (1994): 1447–53. http://dx.doi.org/10.3169/itej1978.48.1447.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Babatunde, R. S. "A Systematic Review of Feature Dimensionality Reduction Techniques for Face Recognition Systems." Advances in Multidisciplinary & Scientific Research Journal Publications 5, no. 1 (March 30, 2017): 95–108. http://dx.doi.org/10.22624/aims/digital/v5n1p20.

Texto completo da fonte
Resumo:
In this research, a comparison of the various techniques used for face recognition is shown in tabular format to give a precise overview of what different authors have already projected in this particular field. A systematic review of 40 journal articles pertaining to feature dimensionality reduction was carried out. The articles were reviewed to appraise the methodology and to identify the key parameters that were used for testing and evaluation. The dates of publication of the articles were between 2007 and 2015. Ten percent (10%) of the articles reported the training time for their system while twenty four percent (24%) reported their testing time. Sixty seven percent (67%) of the reviewed articles reported the image dimension used in the research. Also, only fourty eight percent (48%) of the reviewed articles compared their result with other existing methods. The main emphasis of this survey is to identify the major trade-offs of parameters and (or) metrics for evaluating the performance of the techniques employed in dimensionality reduction by existing face recognition systems. Findings from the review carried out showed that major performance metrics reported by vast amount of researchers in this review is recognition accuracy in which eighty six percent (86%) of the authors reported in their experiment. Keywords: Optimal Subset, High Dimension, Face Recognition, Biometrics, Feature Vector
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Vijaya, C. "Digital Modulation & Detection Techniques Using FRFT Basis Functions." Bonfring International Journal of Research in Communication Engineering 6, Special Issue (November 30, 2016): 44–47. http://dx.doi.org/10.9756/bijrce.8198.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Dmytro, Poltavskyi. "Cryptographic techniques in blockchain for enhanced digital asset security." American Journal of Engineering and Technology 07, no. 05 (May 12, 2025): 76–87. https://doi.org/10.37547/tajet/volume07issue05-06.

Texto completo da fonte
Resumo:
This article examines the role cryptographic methods play in protecting digital assets through blockchain systems, with a particular focus on their adjustment to contemporary challenges and technological trends. An endeavor is undertaken to systematize major cryptographic algorithms, their effective appraisal in data protection, and development prospects under quantum computing threats. The study is relevant because centralized systems increasingly depend on cryptography due to greater regulatory pressures and, above all, a need for security through secrecy. The scientific novelty lies in the detailed comparative analysis of the said methodology (hashing, digital signatures, zero-knowledge proofs) for cases relating to major blockchain platforms (Bitcoin, Ethereum, Zcash), which hence demonstrate varied approaches towards security provision. The study's methodological foundation consists of analyzing 13 sources, merging a qualitative examination of algorithms and ECDSA with zk-SNARKs with a quantitative assessment of their effectiveness. Hash functions and Merkle trees ensure data integrity while reducing the computational costs of verification; asymmetric cryptography and Zero-Knowledge Proofs guarantee authenticity and confidentiality for the function of the transaction. Main findings support that cryptography is the cornerstone technology for blockchain security, but it has to be tailored to meet new challenges. Development in post-quantum algorithms and the infusion of homomorphic encryption will soon become imperative for quantum threats. This paper strongly advocates hybrid solutions that would bring traditional ways merged with novelties, which will provide sustainability over time for digital assets. Thus, this article will be useful for Developers of Blockchain Systems, Cryptographers, Cybersecurity Experts, & Regulators willing to know how protection methods for digital assets evolve.
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Eirini, Zoi Kontostavlou, and Maria Driga Anna. "Digital technologies for Gifted Students' Education." Global Journal of Engineering and Technology Advances 15, no. 3 (June 30, 2023): 191–204. https://doi.org/10.5281/zenodo.8285353.

Texto completo da fonte
Resumo:
In order to highlight the finest ICT strategies for talented students, this article will examine the use of information and communications technology (ICT) in gifted education. The application of ICT in gifted education, in particular, has proven successful. Teachers can engage gifted students through ICT techniques, which would be highly beneficial for them as they can grow in their aptitude and proficiency. We give a quick overview of the publications that best represent ICT techniques applied to giftedness in this study. Also shown are pu-pils with ICT talent.
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Li, Yue. "A Survey of Digital Forensic Techniques for Digital Libraries." International Journal of Digital Library Systems 2, no. 3 (2011): 49–66. http://dx.doi.org/10.4018/jdls.2011070106.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

Van Roekel, James L. "Digital creativity: Techniques for digital media and the Internet." Journal of the American Society for Information Science and Technology 54, no. 4 (2003): 357–58. http://dx.doi.org/10.1002/asi.10205.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia