Artigos de revistas sobre o tema "Smarty (Computer file)"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Smarty (Computer file)".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Alrobieh, Ziad Saif, e Ali Mohammed Abdullah Ali Raqpan. "File Carving Survey on Techniques, Tools and Areas of Use". Transactions on Networks and Communications 8, n.º 1 (28 de fevereiro de 2020): 16–26. http://dx.doi.org/10.14738/tnc.81.7636.
Texto completo da fonteHarabuga, Yu S. "FEATURES OF COMPUTER TECHNICAL RESEARCH OF THE INFORMATION IN THE MEMORY OF SIM, USIM AND R-UIM-CARDS". Theory and Practice of Forensic Science and Criminalistics 17 (29 de novembro de 2017): 318–24. http://dx.doi.org/10.32353/khrife.2017.40.
Texto completo da fonteN. Sangeeta e Seung Yeob Nam. "Blockchain and Interplanetary File System (IPFS)-Based Data Storage System for Vehicular Networks with Keyword Search Capability". Electronics 12, n.º 7 (24 de março de 2023): 1545. http://dx.doi.org/10.3390/electronics12071545.
Texto completo da fonteCarthen, Chase D., Araam Zaremehrjardi, Vinh Le, Carlos Cardillo, Scotty Strachan, Alireza Tavakkoli, Frederick C. Harris Jr. e Sergiu M. Dascalu. "A Novel Spatial Data Pipeline for Orchestrating Apache NiFi/MiNiFi". International Journal of Software Innovation 12, n.º 1 (1 de novembro de 2023): 1–14. http://dx.doi.org/10.4018/ijsi.333164.
Texto completo da fonteTelagam, Nagarjuna, Nehru Kandasamy, Menakadevi Nanjundan e Arulanandth TS. "Smart Sensor Network based Industrial Parameters Monitoring in IOT Environment using Virtual Instrumentation Server". International Journal of Online Engineering (iJOE) 13, n.º 11 (22 de novembro de 2017): 111. http://dx.doi.org/10.3991/ijoe.v13i11.7630.
Texto completo da fonteAlukwe, Chrispus. "Enhancing Cybersecurity: Smart Intrusion Detection in File Server SYSTEMS". Journal of Science, Innovation and Creativity 2, n.º 1 (17 de agosto de 2023): 1–6. http://dx.doi.org/10.58721/jsic.v2i1.287.
Texto completo da fonteSrivastava, Nayan. "A.I.- Smart Assistant". International Journal for Research in Applied Science and Engineering Technology 9, n.º VI (25 de junho de 2021): 2384–87. http://dx.doi.org/10.22214/ijraset.2021.35553.
Texto completo da fonteQiao, Yanchen, Weizhe Zhang, Xiaojiang Du e Mohsen Guizani. "Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security". ACM Transactions on Internet Technology 22, n.º 1 (28 de fevereiro de 2022): 1–22. http://dx.doi.org/10.1145/3436751.
Texto completo da fonteChen, Zhenwei, Axin Wu, Yifei Li, Qixuan Xing e Shengling Geng. "Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing". Security and Communication Networks 2021 (20 de janeiro de 2021): 1–11. http://dx.doi.org/10.1155/2021/6619689.
Texto completo da fonteJawdhari, Hayder A., e Alharith A. Abdullah. "A New Environment of Blockchain based Multi Encryption Data Transferring". Webology 18, n.º 2 (30 de dezembro de 2021): 1379–91. http://dx.doi.org/10.14704/web/v18i2/web18396.
Texto completo da fontePrat, Lionel, Cheryl Baker e Nhien An Le-Khac. "MapExif". International Journal of Digital Crime and Forensics 7, n.º 2 (abril de 2015): 53–78. http://dx.doi.org/10.4018/ijdcf.2015040104.
Texto completo da fonteLee, Jino, e Taeshik Shon. "Forensic Analysis of IoT File Systems for Linux-Compatible Platforms". Electronics 11, n.º 19 (8 de outubro de 2022): 3219. http://dx.doi.org/10.3390/electronics11193219.
Texto completo da fonteHammad, Muhammad, Jawaid Iqbal, Ch Anwar ul Hassan, Saddam Hussain, Syed Sajid Ullah, Mueen Uddin, Urooj Ali Malik, Maha Abdelhaq e Raed Alsaqour. "Blockchain-Based Decentralized Architecture for Software Version Control". Applied Sciences 13, n.º 5 (27 de fevereiro de 2023): 3066. http://dx.doi.org/10.3390/app13053066.
Texto completo da fonteAi, Sophy, e Jangwoo Kwon. "Extreme Low-Light Image Enhancement for Surveillance Cameras Using Attention U-Net". Sensors 20, n.º 2 (15 de janeiro de 2020): 495. http://dx.doi.org/10.3390/s20020495.
Texto completo da fonteChen, Yeong-Chin, Mariana Syamsudin e Sunneng S. Berutu. "Pretrained Configuration of Power-Quality Grayscale-Image Dataset for Sensor Improvement in Smart-Grid Transmission". Electronics 11, n.º 19 (26 de setembro de 2022): 3060. http://dx.doi.org/10.3390/electronics11193060.
Texto completo da fonteXu, Yuanjin. "Application of Remote Sensing Image Data Scene Generation Method in Smart City". Complexity 2021 (28 de janeiro de 2021): 1–13. http://dx.doi.org/10.1155/2021/6653841.
Texto completo da fonteBanerjee, S., F. Steenkeste, P. Couturier, M. Debray e A. Franco. "Telesurveillance of elderly patients by use of passive infra-red sensors in a 'smart' room". Journal of Telemedicine and Telecare 9, n.º 1 (1 de fevereiro de 2003): 23–29. http://dx.doi.org/10.1258/135763303321159657.
Texto completo da fonteSuseno, Taufiq Rizky Darmawan, Irawan Afrianto e Sufa Atin. "Strengthening data integrity in academic document recording with blockchain and InterPlanetary file system". International Journal of Electrical and Computer Engineering (IJECE) 14, n.º 2 (1 de abril de 2024): 1759. http://dx.doi.org/10.11591/ijece.v14i2.pp1759-1769.
Texto completo da fonteJanhavi Satam. "Examination of Approaches for Identifying Vulnerabilities in Smart Contracts". Journal of Electrical Systems 20, n.º 4s (8 de abril de 2024): 2162–67. http://dx.doi.org/10.52783/jes.2322.
Texto completo da fonteYu, LiWei, Lei Zhang e Zhen Gong. "An Optimization Model for Landscape Planning and Environmental Design of Smart Cities Based on Big Data Analysis". Scientific Programming 2022 (20 de abril de 2022): 1–12. http://dx.doi.org/10.1155/2022/2955283.
Texto completo da fonteMankar, Ishan. "Smart Surveillance System Using RESNET-50 and MTCNN". International Journal for Research in Applied Science and Engineering Technology 12, n.º 5 (31 de maio de 2024): 4380–86. http://dx.doi.org/10.22214/ijraset.2024.62554.
Texto completo da fonteHorvath, Kaleb, Mohamed Riduan Abid, Thomas Merino, Ryan Zimmerman, Yesem Peker e Shamim Khan. "Cloud-Based Infrastructure and DevOps for Energy Fault Detection in Smart Buildings". Computers 13, n.º 1 (16 de janeiro de 2024): 23. http://dx.doi.org/10.3390/computers13010023.
Texto completo da fonteYang, Ting, Guanghua Zhang, Yin Li, Yiyu Yang, He Wang e Yuqing Zhang. "Detecting Privacy Leakage of Smart Home Devices through Traffic Analysis". Security and Communication Networks 2022 (15 de julho de 2022): 1–10. http://dx.doi.org/10.1155/2022/5655314.
Texto completo da fonteDurner, Dominik, Badrish Chandramouli e Yinan Li. "Crystal". Proceedings of the VLDB Endowment 14, n.º 11 (julho de 2021): 2432–44. http://dx.doi.org/10.14778/3476249.3476292.
Texto completo da fonteDheyaa Ismael, Khansaa, e Stanciu Irina. "Face recognition using viola-jones depending on python". Indonesian Journal of Electrical Engineering and Computer Science 20, n.º 3 (1 de dezembro de 2020): 1513. http://dx.doi.org/10.11591/ijeecs.v20.i3.pp1513-1521.
Texto completo da fonteTanveer Baig, Z., e Chandrasekar Shastry. "Smart Hybridized Routing Protocol for Animal Monitoring and Tracking Applications". Scalable Computing: Practice and Experience 23, n.º 4 (23 de dezembro de 2022): 339–49. http://dx.doi.org/10.12694/scpe.v23i4.2040.
Texto completo da fonteSchwarz, Franziska, Klaus Schwarz, Daniel Fuchs, Reiner Creutzburg e David Akopian. "Firmware Vulnerability Analysis of Widely Used Low-Budget TP-Link Routers". Electronic Imaging 2021, n.º 3 (18 de junho de 2021): 135–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-135.
Texto completo da fonteAlhaddad, Mohammed J., Monagi H. Alkinani, Mohammed Salem Atoum e Alaa Abdulsalm Alarood. "Evolutionary Detection Accuracy of Secret Data in Audio Steganography for Securing 5G-Enabled Internet of Things". Symmetry 12, n.º 12 (14 de dezembro de 2020): 2071. http://dx.doi.org/10.3390/sym12122071.
Texto completo da fontePatil, Anand N., e Sujata V. Mallapur. "Novel machine learning based authentication technique in VANET system for secure data transmission". Journal of Autonomous Intelligence 6, n.º 2 (8 de agosto de 2023): 828. http://dx.doi.org/10.32629/jai.v6i2.828.
Texto completo da fonteDozias, Anne, Cristian Camilo Otalora-Leguizamón, Marco Bianchetti e Maria Susana Avila-Garcia. "Smart pens to assist fibre optic sensors research: Evaluating OCR tools". Avances en Interacción Humano-Computadora, n.º 1 (31 de outubro de 2018): 41. http://dx.doi.org/10.47756/aihc.y3i1.42.
Texto completo da fontePinheiro, Alexandre, Edna Dias Canedo, Rafael Timoteo De Sousa e Robson De Oliveira Albuquerque. "Monitoring File Integrity Using Blockchain and Smart Contracts". IEEE Access 8 (2020): 198548–79. http://dx.doi.org/10.1109/access.2020.3035271.
Texto completo da fonteCiorap, Mariana, Dogan Gures e Cătălin Gabriel Dumitraş. "A Computer Aided Design Software Comparative Study with Applications in Industry 4.0 – Smart Manufacturing". Bulletin of the Polytechnic Institute of Iași. Machine constructions Section 68, n.º 1 (1 de março de 2022): 47–68. http://dx.doi.org/10.2478/bipcm-2022-0004.
Texto completo da fonteIacobescu, Ciprian, Gabriel Oltean, Camelia Florea e Bogdan Burtea. "Unified InterPlanetary Smart Parking Network for Maximum End-User Flexibility". Sensors 22, n.º 1 (29 de dezembro de 2021): 221. http://dx.doi.org/10.3390/s22010221.
Texto completo da fonteS. Jadhav, Vilas, Somnath A Wankhede, Priyanka B. Nikam e Anil L. Tidar. "Greenhouse Monitoring and Controlling Using LabVIEW Automation". Journal of Control System and Control Instrumentation 9, n.º 3 (2023): 27–33. http://dx.doi.org/10.46610/jocsaci.2023.v09i03.005.
Texto completo da fonteMohammed, Marwa Sami, e Asaad Noori Hashim. "Protect medical records by using blockchain technology". Indonesian Journal of Electrical Engineering and Computer Science 32, n.º 1 (1 de outubro de 2023): 342. http://dx.doi.org/10.11591/ijeecs.v32.i1.pp342-352.
Texto completo da fontePalaiokrassas, Georgios, Petros Skoufis, Orfefs Voutyras, Takafumi Kawasaki, Mathieu Gallissot, Radhouene Azzabi, Akira Tsuge et al. "Combining Blockchains, Smart Contracts, and Complex Sensors Management Platform for Hyper-Connected SmartCities: An IoT Data Marketplace Use Case". Computers 10, n.º 10 (16 de outubro de 2021): 133. http://dx.doi.org/10.3390/computers10100133.
Texto completo da fontePatel, Ochchhav, e Hiren Patel. "Enhancing Data Security in Healthcare IoT: An Innovative Blockchain-based Solution". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 10s (7 de outubro de 2023): 69–80. http://dx.doi.org/10.17762/ijritcc.v11i10s.7597.
Texto completo da fonteKaneriya, Jayana, e Hiren Patel. "A Secure and Privacy-Preserving Student Credential Verification System Using Blockchain Technology". International Journal of Information and Education Technology 13, n.º 8 (2023): 1251–60. http://dx.doi.org/10.18178/ijiet.2023.13.8.1927.
Texto completo da fonteRahaman, Major Muhammad Masudur. "Recent Advancement of Cyber Security: Challenges and Future Trends in Bangladesh". Saudi Journal of Engineering and Technology 7, n.º 6 (6 de julho de 2022): 278–89. http://dx.doi.org/10.36348/sjet.2022.v07i06.002.
Texto completo da fonteWang, Lixin, Wenlei Sun, Jintao Zhao, Xuedong Zhang, Cheng Lu e Hao Luo. "A Non-Fungible Token and Blockchain-Based Cotton Lint Traceability Solution". Applied Sciences 14, n.º 4 (17 de fevereiro de 2024): 1610. http://dx.doi.org/10.3390/app14041610.
Texto completo da fonteWen, Shengwei. "A study on the big data scientific research model and the key mechanism based on blockchain". Open Computer Science 12, n.º 1 (1 de janeiro de 2022): 357–63. http://dx.doi.org/10.1515/comp-2022-0258.
Texto completo da fonteSung, Huang-Chih. "Prospects and challenges posed by blockchain technology on the copyright legal system". Queen Mary Journal of Intellectual Property 9, n.º 4 (dezembro de 2019): 430–51. http://dx.doi.org/10.4337/qmjip.2019.04.04.
Texto completo da fonteLyon, Warrick, e Peter De Joux. "A Tracking System for Sharks in Shallow Water". Marine Technology Society Journal 48, n.º 6 (1 de novembro de 2014): 14–20. http://dx.doi.org/10.4031/mtsj.48.6.2.
Texto completo da fonteTayeb, Shahab, Neha Raste, Matin Pirouz e Shahram Latifi. "A Cognitive Framework to Secure Smart Cities". MATEC Web of Conferences 208 (2018): 05001. http://dx.doi.org/10.1051/matecconf/201820805001.
Texto completo da fonteBrunner, Kilian, Stephen Dominiak e Martin Ostertag. "Application of G.hn Broadband Powerline Communication for Industrial Control Using COTS Components". Technologies 11, n.º 6 (10 de novembro de 2023): 160. http://dx.doi.org/10.3390/technologies11060160.
Texto completo da fonteMonteiro, Carlos, e José Leal. "Managing experiments on cognitive processes in writing with HandSpy". Computer Science and Information Systems 10, n.º 4 (2013): 1747–73. http://dx.doi.org/10.2298/csis121130061m.
Texto completo da fonteVásquez-Ramírez, Raquel, Maritza Bustos-Lopez, Giner Alor-Hernández, Cuauhtémoc Sanchez-Ramírez e Jorge García-Alcaraz. "AthenaCloud: A cloud-based platform for multi-device educational software generation". Computer Science and Information Systems 13, n.º 3 (2016): 957–81. http://dx.doi.org/10.2298/csis160807037v.
Texto completo da fonteNaeem, Muhammad Rashid, Mansoor Khan, Ako Muhammad Abdullah, Fazal Noor, Muhammad Ijaz Khan, Muhammad Asghar Khan, Insaf Ullah e Shah Room. "A Malware Detection Scheme via Smart Memory Forensics for Windows Devices". Mobile Information Systems 2022 (3 de outubro de 2022): 1–16. http://dx.doi.org/10.1155/2022/9156514.
Texto completo da fonteTusa, Francesco, Massimo Villari e Antonio Puliafito. "Credential Management Enforcement and Secure Data Storage in gLite". International Journal of Distributed Systems and Technologies 1, n.º 1 (janeiro de 2010): 76–97. http://dx.doi.org/10.4018/jdst.2010090805.
Texto completo da fonteGómez-Marín, Ernesto, Davide Martintoni, Valerio Senni, Encarnación Castillo e Luis Parrilla. "Fine-Grained Access Control with User Revocation in Smart Manufacturing". Electronics 12, n.º 13 (27 de junho de 2023): 2843. http://dx.doi.org/10.3390/electronics12132843.
Texto completo da fonte