Suggested Topics within your search.
Suggested Topics within your search.
-
1
The use of authentic video materials in language teaching
Published 2015-11-01“…The article deals with using of authentic materials in the classroom which are necessitated by modern society. …”
Get full text
Article -
2
-
3
-
4
THE AUTHENTICATION PROCESS USING GRAPHICAL PASSWORDS
Published 2016-05-01“…In this article the authors review the using of graphical passwords for authentication. …”
Get full text
Article -
5
-
6
-
7
THE USE OF LITERATURE IN DEVELOPING STUDENTS’ CHARACTERS THROUGH AUTHENTIC ASSESSMENT
Published 2018-12-01“…The finding also reveals that the scores obtained by students have reached the minimum scores of passing after the use of authentic assessment. …”
Get full text
Article -
8
The Legal Protection in The Use of Authentic Deeds in The Patent License Agreements
Published 2024-08-01“…To achieve optimal legal protection, the formulation of an authentic deed in a patent license agreement should encompass aspects such as license exclusivity, limitations on patent usage, annual patent fees, information disclosure clauses, the equilibrium of patent use, sanctions, and dispute resolution.…”
Get full text
Article -
9
Authentication of data hiding using co-occurrence matrix
Published 2012-07-01“…This is done through utilizing the capabilities and features that the process of image texture analysis offers, using the co-occurrence matrix. The message authenticity is verified by comparing the co-occurrence matrices before sending and after receiving in order to assure non infiltration. …”
Get full text
Article -
10
Authentication of vegetable oils using isotope mass spectrometry
Published 2023-01-01“…In this regard, the establishment of the type of vegetable raw materials used for the production of vegetable oils is an important area of research in the identification of this product type. …”
Get full text
Article -
11
Portal authentication HTTP redirection using netfilter NFQUEUE
Published 2014-10-01“…When using portal for user authentication,unauthorized user's HTTP access should be redirected to portal login page to help user do authentication.Using netfilter NFQUEUE target send unauthorized user TCP port 80 packets to user-space program redir_http.Redir_http will send IP reply packets to user do HTTP redirection with the help of raw socket.Using NFQUEUE can ensures high performance redirection,avoid troublesome development in the Linux kernel,simplify application development and improve system stability.…”
Get full text
Article -
12
Application of Chaotic Neural Network for Authentication using the Database
Published 2014-07-01Get full text
Article -
13
Voice authentication module using mel-cepstral coefficients
Published 2024-07-01“…The authentication module was developed using Python languageConclusion. …”
Get full text
Article -
14
Cell line authentication using optical genome mapping
Published 2025-07-01“…Abstract Background Cell line authentication and karyotype assessment are two critical quality control tests that should be performed when using cell lines for biologic research and are expected measurements for cell therapy development. …”
Get full text
Article -
15
Using a Portfolio as an Alternative and Authentic Tool of Assessment
Published 2009-12-01“…This paper suggests to examine and understand how and why a portfolio can be used as an alternative and authentic tool of oral assessment .We believe that through this testing technique and with the investment and commitment of the pedagogical team, we will be able to develop genuine oral communication in the learners and promote a new vision of measurement…”
Get full text
Article -
16
Meat species authentication using portable hyperspectral imaging
Published 2025-04-01Get full text
Article -
17
Protection Against Internal Intruding using Host Identifier Authentication
Published 2009-03-01“…The first supplies an authenticated unique host-ID to each packet destined to leave the network, while the latter verifies these information, allowing the authenticated packet to pass into its destined while dropping and documenting the unauthorized one. …”
Get full text
Article -
18
-
19
Current Trends of DOVID Use as Security Features for Documents (Banknotes) and Their Authenticity Verification
Published 2025-01-01“…In addition, the devices are presented that help verify the authenticity of security features.…”
Get full text
Article -
20
Authentication Security of Combinatorial Watermarking for GNSS Signal Authentication
Published 2024-07-01“…Watermarking signal authentication is a technique in which a global navigation satellite system (GNSS) provider cryptographically perturbs the spreading code to allow for limited cryptographic authentication of a signal. …”
Get full text
Article