ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Technology
Computing
Public health
Computing
Biology
Pure sciences
Research
Electrical and electronic
Architecture and Urbanism
Industrial engineer
all records (69)

Languages
English
Spanish
German
Portuguese

Countries
Indonesia
USA
Ukraine
Brazil
Italy
Switzerland
India
Austria
Romania
Canada
all records (69)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
3.114  Articles
1 of 312 pages  |  10  records  |  more records»
Violation of privacy as a security tool in the stage of crime detection is an issue that needs to be identified and evaluated in the criminal justice system of Afghanistan and Islamic jurisprudence, in the light of international human rights documents and... see more

In a visual-based real detection system using computer vision, the most important thing that must be considered is the computation time. In general, a detection system has a heavy algorithm that puts a strain on the performance of a computer system, espec... see more

Nowadays, privately owned vehicles still holds the position as the staple of transportation used by the majority of people, especially in Indonesia. Along with the increasing number of vehicles, its necessary to develop infrastructure that can support its... see more

In December 2019, there was a pandemic caused by a new type of coronavirus, namely SARS-CoV-2 (Severe Acute Respiratory Syndrome Corona Virus 2) spread almost throughout the world. The World Health Organization (WHO) named it COVID-19 (Coronavirus Disease... see more

Telemonitoring of human physiological data helps detect emergency occurrences for subsequent medical diagnosis in daily living environments. One of the fatal emergencies in falling incidents. The goal of this paper is to detect significant incidents such ... see more

In a visual-based real detection system using computer vision, the most important thing that must be considered is the computation time. In general, a detection system has a heavy algorithm that puts a strain on the performance of a computer system, espec... see more

Lightning detection data is a kind of distributed information with high real-timeliness. After the lightning events are detected by the lightning detection network, the original detection data need to be collected and concentrated rapidly and timely for u... see more

The number of computers connecting to the internet is getting increased day by day, while the number of computers connected is increasing then it is obvious that the amount of network-based attacks will also increase. In this way, we use a honeypot that i... see more

1 of 312 pages  |  10  records  |  more records»