-
1
Learnings From Implementation of Technology-Enabled Mental Health Interventions in India: Implementation Report
Published 2024-02-01“…EncHid=NDcxMTE=&Enc=&userName=CTRI/2022/02/040307…”
Get full text
Article -
2
Database security system with multi entrances
Published 2009“…The information may include user name's, date and time entrance. Microcontroller MC68HC1 lAl is used as its processor to control the whole system operation. …”
Get full text
Undergraduates Project Papers -
3
Vitamin K Insufficiency in the Indian Population: Pilot Observational Epidemiology Study
Published 2022-02-01“…mid1=32349&EncHid=&userName=018278…”
Get full text
Article -
4
An efficient and secured grid-enabler interface for large-scale systems
Published 2015“…Additionally, the interface provides single sign-on mechanism to allow users to access several Virtual Organizations (VO) with a single user name and a password. The experiment was conducted to evaluate the user interface overhead and the efficiency of the interface. …”
Conference or Workshop Item -
5
What Creates Listening Online? Exploring Reciprocity in Online Political Discussions with Relational Content Analysis
Published 2022-06-01“…Results of a relational quantitative content analysis indicate that in order to receive deliberative reciprocity users should ask questions, propose arguments, be humorous, have a critical attitude and use a male user name. Storytelling and expressions of emotions show no significant associations with deliberative reciprocity.…”
Get full text
Article -
6
Onomasticon Ottomanicum : identification administrative et désignation sociale dans l’État ottoman du xixe siècle
Published 2010-07-01“…The article then attempts to show that the official name given in the biographies is not always the same as the dignitary's social name, the name used in pursuit of his daily activities, or the name given at birth. The individual's user name was often changed (school, geographical relocation, professional or cultural environment). …”
Get full text
Article -
7
Cyber cafe management system
Published 2014“…This system can record all the user information for the Cyber Cafe computer usage such as user's name, date and time, and floor. This sytem will include the PC monitoring system. …”
Get full text
Undergraduates Project Papers -
8
Building a TIN-LDA Model for Mining Microblog Users’ Interest
Published 2019-01-01“…Interest attributes include contents, contents marked with special symbols, forwarding contents, along with the authentication user name and authentication information. Bringing the interest attributes into users' interest analysis so as to improve the accuracy of mining microblog users' interest keywords and topics. …”
Get full text
Article -
9
Comparison of ensemble simple feed forward neural network and deep learning neural network on Phishing Detection
Published 2020“…The attacker tries to pretend by sending email from an official organization or body to deceive the user in giving in their credential user name and password. The username and password are then used for malicious purpose. …”
Get full text
Conference or Workshop Item -
10
Verbal Self-Representation of German-Speaking Influencers in Instagram
Published 2019-09-01“…The author distinguishes four ways of verbal self-presentation in Instagram: self-nomination (user name and account name), self-description, caption for a photo or video, comment. …”
Get full text
Article -
11
Access to online databases at private colleges and universities in Malaysia
Published 2003“…The types of access given are: (a) the private universities provide access to online databases that they subscribe through their own funding and control usage through a mixture of user name/password and IP-based access; (b) the foreign universities with branch campuses in Malaysia provide access by three modes (online databases subscribed from branch campusâ��s own funding; online databases subscribed by foreign partner university; online databases subscribed by local branch campus own funding as well as those subscribed by the foreign partner university). …”
Article -
12
Use of Complex for Managing Organism Adaptive Reactions of Students in University Educational Environment
Published 2014-12-01Get full text
Article -
13
Co-space intelligent island
Published 2010“…Public messages would be sent to all the users in the same scene whereas private messages would be only be seen by the designated user name.…”
Get full text
Final Year Project (FYP) -
14
PEMBUATAN GAME RACING GRLWHEEL DENGAN PENGENDALIAN GERAK-ISYARAT
Published 2014“…How to play this game is to activate mysql, login with a user name that is listed, then played enough with the hands and other body objects. …”
Thesis -
15
Comparison of ensemble simple feedforward neural network and deep learning neural network on phishing detection
Published 2020“…The attacker tries to pretend by sending email from an official organization or body to deceive the user in giving in their credential user name and password. The username and password are then used for malicious purpose. …”
Get full text
Proceedings -
16
An empirical analysis of keystroke dynamics in passwords: A longitudinal study
Published 2023-01-01“…Multiple experiments have also used the participant's first and last name as the password; however, this is not realistic of a password system. Not only is the user's name considered a weak password, but their familiarity with typing the phrase minimises variation in acquired samples as they become more familiar with the new password. …”
Get full text
Article -
17
Rewriting the Web with Chickenfoot
Published 2021“…Techniques are developed through studying how users name Web page components and present a heuristic keyword-matching algorithm that identifies the desired component from the user's name. …”
Get full text
Article -
18
The Effects of Gender Signals and Performance in Online Product Reviews
Published 2022-01-01“…This work quantifies the effects of signaling gender through gender specific user names, on the success of reviews written on the popular amazon.com shopping platform. …”
Get full text
Article -
19
Potential benefits of oral administration of AMORPHOPHALLUS KONJAC glycosylceramides on skin health – a randomized clinical study
Published 2020-01-01“…Trial registration CTRI/2018/12/016661 dated 13/12/2018 retrospectively registered, http://ctri.nic.in/Clinicaltrials/showallp.php?mid1=19851&EncHid=&userName=SkinCera…”
Get full text
Article -
20
A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data
Published 2020-01-01“…The patient's biometrics information has been added as a parameter in addition to the user name and password. The authentication scheme is coined with the SHA-512 algorithm that ensures integrity. …”
Get full text
Article