Showing 1 - 20 results of 160 for search '"user name"', query time: 0.47s Refine Results
  1. 1
  2. 2

    Database security system with multi entrances by Mohd Nurfajren, Mat Isa

    Published 2009
    “…The information may include user name's, date and time entrance. Microcontroller MC68HC1 lAl is used as its processor to control the whole system operation. …”
    Get full text
    Undergraduates Project Papers
  3. 3
  4. 4

    An efficient and secured grid-enabler interface for large-scale systems by Bashir, M. B., Latiff, M. S. A., Yousif, A.

    Published 2015
    “…Additionally, the interface provides single sign-on mechanism to allow users to access several Virtual Organizations (VO) with a single user name and a password. The experiment was conducted to evaluate the user interface overhead and the efficiency of the interface. …”
    Conference or Workshop Item
  5. 5

    What Creates Listening Online? Exploring Reciprocity in Online Political Discussions with Relational Content Analysis by Dennis Friess, Katharina Esau

    Published 2022-06-01
    “…Results of a relational quantitative content analysis indicate that in order to receive deliberative reciprocity users should ask questions, propose arguments, be humorous, have a critical attitude and use a male user name. Storytelling and expressions of emotions show no significant associations with deliberative reciprocity.…”
    Get full text
    Article
  6. 6

    Onomasticon Ottomanicum : identification administrative et désignation sociale dans l’État ottoman du xixe siècle by Olivier Bouquet

    Published 2010-07-01
    “…The article then attempts to show that the official name given in the biographies is not always the same as the dignitary's social name, the name used in pursuit of his daily activities, or the name given at birth. The individual's user name was often changed (school, geographical relocation, professional or cultural environment). …”
    Get full text
    Article
  7. 7

    Cyber cafe management system by Mohammad Nur Taufiq, Ibrahim

    Published 2014
    “…This system can record all the user information for the Cyber Cafe computer usage such as user's name, date and time, and floor. This sytem will include the PC monitoring system. …”
    Get full text
    Undergraduates Project Papers
  8. 8

    Building a TIN-LDA Model for Mining Microblog Users’ Interest by Wei Zheng, Bin Ge, Chishe Wang

    Published 2019-01-01
    “…Interest attributes include contents, contents marked with special symbols, forwarding contents, along with the authentication user name and authentication information. Bringing the interest attributes into users' interest analysis so as to improve the accuracy of mining microblog users' interest keywords and topics. …”
    Get full text
    Article
  9. 9

    Comparison of ensemble simple feed forward neural network and deep learning neural network on Phishing Detection by Gan, Kim Soon, Liew, Chean Chiang, Chin, Kim On, Tan, Soo Fun

    Published 2020
    “…The attacker tries to pretend by sending email from an official organization or body to deceive the user in giving in their credential user name and password. The username and password are then used for malicious purpose. …”
    Get full text
    Conference or Workshop Item
  10. 10

    Verbal Self-Representation of German-Speaking Influencers in Instagram by V. V. Kaziaba

    Published 2019-09-01
    “…The author distinguishes four ways of verbal self-presentation in Instagram: self-nomination (user name and account name), self-description, caption for a photo or video, comment. …”
    Get full text
    Article
  11. 11

    Access to online databases at private colleges and universities in Malaysia by Teow, P.L., Zainab, A.N.

    Published 2003
    “…The types of access given are: (a) the private universities provide access to online databases that they subscribe through their own funding and control usage through a mixture of user name/password and IP-based access; (b) the foreign universities with branch campuses in Malaysia provide access by three modes (online databases subscribed from branch campusâ��s own funding; online databases subscribed by foreign partner university; online databases subscribed by local branch campus own funding as well as those subscribed by the foreign partner university). …”
    Article
  12. 12
  13. 13

    Co-space intelligent island by Wong, Wai Lun.

    Published 2010
    “…Public messages would be sent to all the users in the same scene whereas private messages would be only be seen by the designated user name.…”
    Get full text
    Final Year Project (FYP)
  14. 14

    PEMBUATAN GAME RACING GRLWHEEL DENGAN PENGENDALIAN GERAK-ISYARAT by , Y TEGUH CAHYA, , Lukman Heryawan, ST., MT.

    Published 2014
    “…How to play this game is to activate mysql, login with a user name that is listed, then played enough with the hands and other body objects. …”
    Thesis
  15. 15

    Comparison of ensemble simple feedforward neural network and deep learning neural network on phishing detection by Gan Kim Soon, Chiang L.C., Chin Kim On, Nordaliela Mohd Rusli, Tan Soo Fun

    Published 2020
    “…The attacker tries to pretend by sending email from an official organization or body to deceive the user in giving in their credential user name and password. The username and password are then used for malicious purpose. …”
    Get full text
    Proceedings
  16. 16

    An empirical analysis of keystroke dynamics in passwords: A longitudinal study by Simon Parkinson, Saad Khan, Alexandru‐Mihai Badea, Andrew Crampton, Na Liu, Qing Xu

    Published 2023-01-01
    “…Multiple experiments have also used the participant's first and last name as the password; however, this is not realistic of a password system. Not only is the user's name considered a weak password, but their familiarity with typing the phrase minimises variation in acquired samples as they become more familiar with the new password. …”
    Get full text
    Article
  17. 17

    Rewriting the Web with Chickenfoot by Miller, Robert C., Bolin, Michael T, Chilton, Lydia B, Little, Danny Greg, Webber, Matthew, Yu, Chen-Hsiang

    Published 2021
    “…Techniques are developed through studying how users name Web page components and present a heuristic keyword-matching algorithm that identifies the desired component from the user's name. …”
    Get full text
    Article
  18. 18

    The Effects of Gender Signals and Performance in Online Product Reviews by Sandipan Sikdar, Rachneet Sachdeva, Johannes Wachs, Johannes Wachs, Florian Lemmerich, Markus Strohmaier, Markus Strohmaier, Markus Strohmaier

    Published 2022-01-01
    “…This work quantifies the effects of signaling gender through gender specific user names, on the success of reviews written on the popular amazon.com shopping platform. …”
    Get full text
    Article
  19. 19

    Potential benefits of oral administration of AMORPHOPHALLUS KONJAC glycosylceramides on skin health – a randomized clinical study by Sudeep Heggar Venkataramana, Naveen Puttaswamy, Shyamprasad Kodimule

    Published 2020-01-01
    “…Trial registration CTRI/2018/12/016661 dated 13/12/2018 retrospectively registered, http://ctri.nic.in/Clinicaltrials/showallp.php?mid1=19851&EncHid=&userName=SkinCera…”
    Get full text
    Article
  20. 20

    A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data by Mohammad Ayoub Khan, Mohammad Tabrez Quasim, Norah Saleh Alghamdi, Mohammad Yahiya Khan

    Published 2020-01-01
    “…The patient's biometrics information has been added as a parameter in addition to the user name and password. The authentication scheme is coined with the SHA-512 algorithm that ensures integrity. …”
    Get full text
    Article