Search alternatives:
use » used (Expand Search)
Showing 1 - 20 results of 3,455 for search 'use authentication', query time: 0.13s Refine Results
  1. 1

    The use of authentic video materials in language teaching by Elena V. Revina

    Published 2015-11-01
    “…The article deals with using of authentic materials in the classroom which are necessitated by modern society. …”
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    THE AUTHENTICATION PROCESS USING GRAPHICAL PASSWORDS by Sergei N. Davydov, Michael Ya. Kleptsov, Larisa V. Lyubimova

    Published 2016-05-01
    “…In this article the authors review the using of graphical passwords for authentication. …”
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    THE USE OF LITERATURE IN DEVELOPING STUDENTS’ CHARACTERS THROUGH AUTHENTIC ASSESSMENT by Fadhillah Wiandari, Siti Habsari Pratiwi

    Published 2018-12-01
    “…The finding also reveals that the scores obtained by students have reached the minimum scores of passing after the use of authentic assessment. …”
    Get full text
    Article
  8. 8

    The Legal Protection in The Use of Authentic Deeds in The Patent License Agreements by Silvia Sofiatunnisa Mulyana, Ranti Fauza Mayana, Elisatris Gultom

    Published 2024-08-01
    “…To achieve optimal legal protection, the formulation of an authentic deed in a patent license agreement should encompass aspects such as license exclusivity, limitations on patent usage, annual patent fees, information disclosure clauses, the equilibrium of patent use, sanctions, and dispute resolution.…”
    Get full text
    Article
  9. 9

    Authentication of data hiding using co-occurrence matrix by Melad saeed, Ghada thanoon

    Published 2012-07-01
    “…This is done through utilizing the capabilities and features that the process of image texture analysis offers, using the co-occurrence matrix. The message authenticity is verified by comparing the co-occurrence matrices before sending and after receiving in order to assure non infiltration.             …”
    Get full text
    Article
  10. 10

    Authentication of vegetable oils using isotope mass spectrometry by A. L. Panasyuk, D. A. Sviridov, A. A. Shilkin

    Published 2023-01-01
    “…In this  regard, the  establishment of the  type of vegetable raw materials used for the production of vegetable oils is an important area of research in the identification of this product type. …”
    Get full text
    Article
  11. 11

    Portal authentication HTTP redirection using netfilter NFQUEUE by Huan-jie ZHANG, Yu-liang XIA

    Published 2014-10-01
    “…When using portal for user authentication,unauthorized user's HTTP access should be redirected to portal login page to help user do authentication.Using netfilter NFQUEUE target send unauthorized user TCP port 80 packets to user-space program redir_http.Redir_http will send IP reply packets to user do HTTP redirection with the help of raw socket.Using NFQUEUE can ensures high performance redirection,avoid troublesome development in the Linux kernel,simplify application development and improve system stability.…”
    Get full text
    Article
  12. 12
  13. 13

    Voice authentication module using mel-cepstral coefficients by D. A. Elizarov, P. A. Ashaeva, E. A. Stepanova

    Published 2024-07-01
    “…The authentication module was developed using Python languageConclusion. …”
    Get full text
    Article
  14. 14

    Cell line authentication using optical genome mapping by Alex Chialastri, Kevin Flowers, L Amarin Cogburn, Damien Fink, Jennifer L. Dashnau

    Published 2025-07-01
    “…Abstract Background Cell line authentication and karyotype assessment are two critical quality control tests that should be performed when using cell lines for biologic research and are expected measurements for cell therapy development. …”
    Get full text
    Article
  15. 15

    Using a Portfolio as an Alternative and Authentic Tool of Assessment by Saleh DERRADJI

    Published 2009-12-01
    “…This paper suggests to examine and understand how and why a portfolio can be used as an alternative and authentic tool of oral assessment .We believe that through this testing technique and with the investment and commitment of the pedagogical team, we will be able to develop genuine oral communication in the learners and promote a new vision of measurement…”
    Get full text
    Article
  16. 16
  17. 17

    Protection Against Internal Intruding using Host Identifier Authentication by Basil Alkhayaat, Abdulsattar khidhir, Omar Ibraheem

    Published 2009-03-01
    “…The first supplies an authenticated unique host-ID to each packet destined to leave the network, while the latter verifies these information, allowing the authenticated packet to pass into its destined while dropping and documenting the unauthorized one. …”
    Get full text
    Article
  18. 18
  19. 19

    Current Trends of DOVID Use as Security Features for Documents (Banknotes) and Their Authenticity Verification by A. V. Dumski, I. V. Duboiski

    Published 2025-01-01
    “…In addition, the devices are presented that help verify the authenticity of security features.…”
    Get full text
    Article
  20. 20

    Authentication Security of Combinatorial Watermarking for GNSS Signal Authentication by Jason Anderson, Sherman Lo, Todd Walter

    Published 2024-07-01
    “…Watermarking signal authentication is a technique in which a global navigation satellite system (GNSS) provider cryptographically perturbs the spreading code to allow for limited cryptographic authentication of a signal. …”
    Get full text
    Article