نتایج جستجو برای: surfing
تعداد نتایج: 1495 فیلتر نتایج به سال:
Review of Domenico Quaranta, Surfing with Satoshi: Art, Blockchain and NFTs. Translated by Anna Carruthers (Ljubljana: Aksioma Institute for Contemporary 2022).
Graphical passwords are believed to be more secure than traditional textual passwords, but the authentications are usually complex and boring for users. Furthermore, most of the existing graphical password schemes are vulnerable to spyware and shoulder surfing. A novel graphical password scheme ColorLogin is proposed in this paper. ColorLogin is implemented in an interesting game way to weaken ...
24 The purpose of this study was to assess the effectiveness of an eight-week surfing intervention 25 for 16 children with disabilities. The assessment procedure consisted of pre and post physical 26 fitness measures to determine the benefits of this intervention. Our results showed an overall 27 improvement in upper body strength (right: P = 0.024, left: P = 0.022), core strength (P = 0.002) 2...
A wide variety of anomalies may occur as a result of the vitellointestinal duct (VID) failing to obliterate completely. Most reports on symptomatic VID focus on Meckel's diverticulum, while other anomalies are given little attention. We report a case of a baby of five months who had an intestinal loop inverted through a patent VID. The inverted loop was reduced and ileostomy was done which was ...
Web browsers have become the most popular interactive interfaces ever developed and widely deployed in the computing history. Through links embedded in a web page, a user can browse virtually any digital resources in the world. Although these links are naturally interconnected and hierarchical, the browsing model is typically in linear and at any point of time only one-level of information can ...
This paper describes the efforts made in order to distribute an access language resources including the tagger generation tools, the lexicon from which the tagger is generated and the tagger itself. It also describes the evolution from a centralized, hardly portabel system to an open and widely accessible one.
To provide the security mainly authentication and authorisation is given to the system. For that purpose mostly textual passwords are being used. Now a day’s graphical password are also available. The password schemes those are being used by now Days are mostly textual password and the graphical password (pattern matching), textual passwords are vulnerable to eves dropping, dictionary attacks, ...
Behavioral theory in geography attempts to describe and explain the spatial activities of individuals in terms of fundamental perceptual and cognitive processes. As applied to surfing, behavioral theory can give us greater insight into localism (territoriality) and provides a context for understanding the complex cognitive processes involved in choosing where to surf and in choosing where to pa...
This paper presents “surfing,” a novel variation of wave pipelining. In previous wave pipelined designs, timing uncertainty grows monotonically as data propagates through gates and other logic elements. Our designs propagate a timing pulse along with the data values, and our logic elements have delays that decrease in the presence of the pulse. This produces a “surfing” effect wherein events ar...
A two-dimensional (2D) shock-rest-frame model for particle simulations is developed. Then full kinetic dynamics of a perpendicular collisionless shock is examined by means of a 2D full particle simulation. We found that in the 2D simulation there is less non-thermal electrons due to surfing acceleration which was seen in the previous 1D simulations of a high-Mach-number perpendicular shock in a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید