Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Libor Mesicek"'
Publikováno v:
Mathematical Biosciences and Engineering, Vol 20, Iss 5, Pp 9041-9061 (2023)
Garlic is a major condiment vegetable grown in South Korea. The price of garlic has a great impact on Korean society and the economy, which requires price stabilization through preemptive supply and demand management. Therefore, the government attemp
Externí odkaz:
https://doaj.org/article/d7af35a3d3aa4c77a04f24f4fe4206d8
Publikováno v:
IEEE Access, Vol 7, Pp 40078-40084 (2019)
Although many security systems with biometric information have appeared, they only have been used the static bio-information, e.g., a fingerprint, ris, and so on. However, because these values are permanent, the attackers can modify and abuse that. T
Externí odkaz:
https://doaj.org/article/c1ab2f71aaf04c2a999ad99d6840bab6
Publikováno v:
IEEE Access, Vol 7, Pp 143693-143698 (2019)
There are many blogs that recommend places and foods and on the web. In addition, there are various fake news that provide false information. They both are written by a blogger; bloggers can write on any topic of their choice. Web visitors read these
Externí odkaz:
https://doaj.org/article/6b3c0d07910045c88f42388ab50e6534
Publikováno v:
Cognitive Systems Research. 55:77-81
Although the Internet provides a variety of news, it also can give confusion caused by personal subjective thoughts such as personal TV, blogs, and unproven news. The unproven news is written in a subjective direction with added personal opinions rat
Publikováno v:
IEEE Access, Vol 7, Pp 143693-143698 (2019)
There are many blogs that recommend places and foods and on the web. In addition, there are various fake news that provide false information. They both are written by a blogger; bloggers can write on any topic of their choice. Web visitors read these
Publikováno v:
IEEE Access, Vol 7, Pp 40078-40084 (2019)
Although many security systems with biometric information have appeared, they only have been used the static bio-information, e.g., a fingerprint, ris, and so on. However, because these values are permanent, the attackers can modify and abuse that. T
Publikováno v:
IEEE Access. 7:40078-40084
Although many security systems with biometric information have appeared, they only have been used the static bio-information, e.g., a fingerprint, ris, and so on. However, because these values are permanent, the attackers can modify and abuse that. T
Publikováno v:
Concurrency and Computation: Practice and Experience.
Publikováno v:
Concurrency and Computation: Practice and Experience. 33
Publikováno v:
SMA
This case study describes the evaluation of a portfolio of investments in IT projects in a manufacturing SME in the Czech Republic. The most important 13 of the 80 projects were assessed and evaluated, based on this procedure. These projects at a cos