ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Computing
Technology
Computing
Education
Social Sciences
Architecture and Urbanism
Research
Pure sciences
Industrial engineer
Economy
all records (69)

Languages
English
Spanish
German
Portuguese

Countries
Indonesia
USA
Denmark
South Africa
Canada
India
Brazil
Ukraine
United Kingdom
Switzerland
all records (70)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
3.138  Articles
1 of 315 pages  |  10  records  |  more records»
Along with the times, the exchange of information is becoming faster. People now use chat applications as a form of communication. With this application, users can easily exchange messages, whether in the form of text, images, audio, or video, without bei... see more

Attendance for staff is one of data collection in the institution as a part of reporting and recording activity. Blockchain technology or distributed ledger has become registration system used in the network. Blockchain technology is one of the technologi... see more

From technological developments that are so increasingly competitive and increasingly needed in people's lives for their daily needs on social media as is often used by the community, namely Twitter, Facebook, Instagram, Youtube, WhatsApp and other social... see more

Drone technology is considered the most effective solution for the improvement of various industrial fields. As a delivery service, drones need a secure communication system that is also able to manage all of the information data in real-time.  Howev... see more

Implementation of Accounting Information System in educational institutions like school is important to do. With information system, delivery information accounting at school goes well on reach goals that determined before. School cash receipts with infor... see more

Mobile ad hoc Networks (MANET), being infrastructureless and dynamic in nature, are predominantly susceptible to attacks such as black hole, worm hole, cunning gray hole attack at source or destination. Various solutions have been put forth so far in lite... see more

This study aims to develop software by building a secure message application based on a smartphone or android. This application was developed using a prototyping model. The prototyping model consists of several stages: the first stage, namely the gatherin... see more

While the technical issues of securing unicast communications for client-server computingare fairly well-understood, the technical issues of securing group communications are not. Theexisting approach to improve the scalability is to decompose a large gro... see more

The object of research is the process of consolidating business information. The paper considers the creation and use of a powerful component of the business analytics system – a consolidated information resource that improves the understanding of the bus... see more

1 of 315 pages  |  10  records  |  more records»