ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Computing
Computing
Technology
Industrial engineer
Pure sciences
Biology
Mechanical Engineering
Education
Mathematics
Architecture and Urbanism
all records (31)

Languages
English

Countries
Indonesia
USA
India
Iraq
Ukraine
Austria
Bosnia Herzegovina
Colombia
Turkey, Turkish Republic
Canada
all records (19)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (16)

Filter  
 
146  Articles
1 of 16 pages  |  10  records  |  more records»
The article is devoted to the analysis of the process of detecting and recognizing objects from the space monitoring data, while the military decryption technology is represented by four levels, which are caused with direct and inverse connections between... see more

Data protection is representing a huge trade in the modern era; the vast communication development gave this field increased attention from all sorts of parties (friends and foes); integral transforms have played a decent role in many methods that are pro... see more

AbstrakPerkembangan ilmu pengetahuan dan teknologi pada era digital berkembang dengan sangat pesat. Keamanan file dokumen adalah salah satu dampak tersendiri dari datangnya era digital. Tentunya perusahaan x perlu memiliki keunggulan manajemen keamanan fi... see more

Along with the times, the exchange of information is becoming faster. People now use chat applications as a form of communication. With this application, users can easily exchange messages, whether in the form of text, images, audio, or video, without bei... see more

Abstrak – Perlindungan data  saat dikirimkan sangat penting demi kemanan data untuk mengamankan informasi dari pihak-pihak yang tidak berkepentingan ataupun yang tidak bertanggung jawab, pada era modern seperti sekarang ini, kebutuhan akan informasi ... see more

Abstract – Cryptography is widely used as a way for secrets to be conveyed to someone safely. The message is encrypted so that strangers who do not have the right or permission to read the message will not be able to read it. However, the use of cryptogra... see more

Abstract – Technological developments in data security systems to ensure the confidentiality of data information has developed rapidly. To maintain the confidentiality of data information, there are sciences in development such as steganography and crypto... see more

Abstract - The exchange of information through the virtual world has various benefits as an example of fast time estimation, physical distance, and unlimited space limit. But in such activities can also pose a security risk in confidential information. Th... see more

In the article on the specific example the results of studies medical information systems databases files encryption/decryptiontime have been presented. The present studies are performed using the developed three fundamentally different algorithms, that i... see more

1 of 16 pages  |  10  records  |  more records»