This article discusses the relevant task of analyzing user data in the process of managing various web projects. The results of this analysis will help to improve the management of …
M Alnfiai - International Journal of Communication Networks and …, 2020 - researchgate.net
CAPTCHAs are widely used by web applications for the purpose of security and privacy. However, traditional text-based CAPTCHAs are not suitable for sighted users much less …
S Zybin, Y Bielozorova - International Journal of Information …, 2021 - researchgate.net
The article is dedicated to using the methodology of building a decision support system under threats and risks. This method has been developed by modifying the methods of …
We present the materials of analytical review of modern scientific literature, which deals with the interaction of polarized radiation with phase-inhomogeneous and optically anisotropic …
Random numbers have many uses, but finding true randomness is incredibly difficult. Therefore, quantum mechanics is used, using the essentially unpredictable behavior of a …
Industrial objects constructed between the XIX century and the first half of the XX century were scattered outside the historical city center. However, they are currently located within …
Generating secure secret keys remains essential in the realm of biometric authentication systems. Traditional methods have often suffered from inefficiency, insecurity, or the …
The Internet of Things (IoT) has become an integral part of our daily life as it is growing in many fields, such as engineering, e-health, smart homes, smart buildings, agriculture …
E Almaraz Luengo, J Román Villaizán - Mathematics, 2023 - mdpi.com
There are several areas of knowledge in which (pseudo-) random numbers are necessary, for example, in statistical–mathematical simulation or in cryptography and system security …