ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Architecture and Urbanism
Social Sciences
Education
Environment
Construction engineering
Technology
Economy
Research
Biology
Law
all records (72)

Languages
Spanish
English
German
Portuguese
French

Countries
Indonesia
Chile
Spain
USA
Argentina
Brazil
Colombia
Mexico
Ecuador
Cuba
all records (49)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
6.499  Articles
1 of 651 pages  |  10  records  |  more records»
The purpose of multimedia devices development is controlling through voice. Nowdays voice that can be recognized only in English. To overcome the issue, then recognition using Indonesian language model and accousticc model and dictionary. Automatic Speech... see more

Berdasarkan data Pusat Statistik Indonesia, tingkat kemiskinan pada bulan September 2018 adalah 25,95 juta, berdasrkan data tingkat kemiskinan masyarakat  tersebut  pemeritnah menyalurkan dana bantuan mengatasi tingkat kemiskinan masyarakat mela... see more

In recent years, the development of communication technology has advanced at an accelerated rate. Communication technologies such as 4G, 5G, Wi-Fi 5 (802.11ac), and Wi-Fi 6 (802.11ax) are extensively used today due to their excellent system quality and ex... see more

Nowadays, DDoS attacks are often aimed at cloud computing environments, as more people use virtualization servers. With so many Nodes and distributed services, it will be challenging to rely solely on conventional networks to control and monitor intrusion... see more

Drone technology is considered the most effective solution for the improvement of various industrial fields. As a delivery service, drones need a secure communication system that is also able to manage all of the information data in real-time.  Howev... see more

One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic scheme that requires the distribution of shared secret keys. To reduce attacks on key distribution, physical layer-based key formation schemes that utilize t... see more

1 of 651 pages  |  10  records  |  more records»