• No results found

back end

How to Choose Between Robotic Process Automation and Back-End System Automation?

How to Choose Between Robotic Process Automation and Back-End System Automation?

... and back-end system automation. We define back-end system automation as invasive automation, implemented by means of system development and/or data or application layer system ...with ...

14

A PERMIS based Authorization Solution between Portlets and Back end Web Services

A PERMIS based Authorization Solution between Portlets and Back end Web Services

... of back-end Web ...their back end Web services based on Privilege and Role Management Infrastructure Standards (PERMIS) which uses Web services security standards such as WS- Security and ...

10

Organizing for servitization : examining front  and back end configurations

Organizing for servitization : examining front and back end configurations

... The contributions of this study are twofold. Firstly, whilst previous research has suggested that there should be a front-/back-end split (Galbraith, 2005; Oliva and Kallenberg, 2003; Davies et al., 2006; ...

38

Using SVM as Back-End Classifier for Language Identification

Using SVM as Back-End Classifier for Language Identification

... a back-end radial basis function (RBF) kernel [13] SVM classifier is used to discriminate target languages based on the probability distribution in the discriminative vector space of language ...

6

MoL 2010 19: 
  A modern back end for a dependently typed language

MoL 2010 19: A modern back end for a dependently typed language

... Brady's (not actually implemented) compiler is, more than the new GRIN back end for Agda, established on a pipeline structure. This pipeline is based on transformations between a number of intermediate ...

75

Back-end-of-the-line MEMS switches for power management, ESD and security

Back-end-of-the-line MEMS switches for power management, ESD and security

... patterning techniques suitable for the back-end-of-the-line integration with CMOS. The resulting cross-bar switches can be used for electrostatic discharge protection, FPGA implementation, chip security ...

9

Back End Forwarding Scheme in Server Load Balancing using Client Virtualization

Back End Forwarding Scheme in Server Load Balancing using Client Virtualization

... The Back-End forwarding scheme [Figure 7] of the web servers can be vulnerable thus an encryption technique can be used with the back-end forwarding done by the daemon ...the ...

7

Quantification of Back-End Fuel Cycle Metrics Uncertainties Due to Cross Sections

Quantification of Back-End Fuel Cycle Metrics Uncertainties Due to Cross Sections

... This work examines uncertainties in the back end fuel cycle metrics of isotopic composition, decay heat, radioactivity, and radiotoxicity. Most advanced fuel cycle scenarios, including the ones represented ...

174

Front End and Back End Database Protection from Intruders in Distributed Web Application

Front End and Back End Database Protection from Intruders in Distributed Web Application

... In this paper we present dual protection to web server and database server. Systems which will be detect the attack in multitier web services. Our model differential user session which will web front end (HTTP) ...

7

Automatic Editing in a Back End Speech to Text System

Automatic Editing in a Back End Speech to Text System

... Large vocabulary speech recognition today achieves a level of accuracy that makes it useful in the produc- tion of written documents. Especially in the medical and legal domains large volumes of text are tradi- tionally ...

7

From front end to back end and everything in between: work practice in game development

From front end to back end and everything in between: work practice in game development

... So, one of the things outlined in the preceding articulation of the workflow was the arrival of a job as a package of, typically image-based, materials. These are then used to create, on the one hand an html layout that ...

10

Analysis Of Code Coverage Through Gui Test Automation And Back End Test Automation

Analysis Of Code Coverage Through Gui Test Automation And Back End Test Automation

... coverage measurement through GUI automation and back end automation testing of the software covers all aspects of testing, a particular website or a web application..The purpose of this project is to invent ...

5

Performance Improvement of Front End and Back End Converter
in Decoupled Control of AC Drive
C Prathyusha & G Siva Prasad

Performance Improvement of Front End and Back End Converter in Decoupled Control of AC Drive C Prathyusha & G Siva Prasad

... ISSN No 2348 4845 International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal C Prathyusha M Tech, (PE&ED), K O R M College o[.] ...

7

Comprehensive design and development of time efficiency speaker recognition model from front end to back end

Comprehensive design and development of time efficiency speaker recognition model from front end to back end

... mixture model based speaker identification on increasing speaker data from 10-50.. Thus, our implementation[r] ...

20

FRONT END TO BACK END VLSI DESIGN FOR RECURSIVE CONVOLUTION ENCODER

FRONT END TO BACK END VLSI DESIGN FOR RECURSIVE CONVOLUTION ENCODER

... The contribution of this paper is to provide a simulating tool that teaches efficiently the convolution encoding in digital communication, and wireless communication[r] ...

5

Study of Secured Full-Stack Web Development

Study of Secured Full-Stack Web Development

... As one of web application frameworks, ASP.NET Core can scaffold back-end services for web API, identity and database. It also supports security features such as authentication, authorization, data ...

8

Title: Intrusion Detection System for Multitier Web Based Application

Title: Intrusion Detection System for Multitier Web Based Application

... Attacks such as SQL injection do not require compromising the web server. Attackers can use existing vulnerabilities in the web server logic to inject the data or string content that contains the exploits and then use ...

9

Text to Speech Conversion Using Raspberry- Pi for Embedded System

Text to Speech Conversion Using Raspberry- Pi for Embedded System

... front end steps also involves parts of speech tagging, phrasing, pause insertion ...the back end step involves the tone modulation and the generation of speech based on some ...

5

An Implementation of Nine Level Cascaded H Bridge Inverter Using Switched Capacitor

An Implementation of Nine Level Cascaded H Bridge Inverter Using Switched Capacitor

... Abstract—The enhancement of transmission frequency deserves more than the low or medium frequency applications. High frequency is mostly preferred now-a-days because of to reduce the size and cost of the power electronic ...

8

DESIGN AND IMPLEMENTATION OF CMOS ANALOG-TO-DIGITAL CONVERTER USING VOLTAGE-TO- TIME AND DELAY LINE BASED TIME- TO-DIGITAL CONVERTION

DESIGN AND IMPLEMENTATION OF CMOS ANALOG-TO-DIGITAL CONVERTER USING VOLTAGE-TO- TIME AND DELAY LINE BASED TIME- TO-DIGITAL CONVERTION

... front end had a non-interleaving Voltage-to-Time Converter (VTC) and back-end of time interleaved delay cell based Time-to-Digital Converter (TDC) with differentially sense amplifier based flip-flops ...

10

Show all 10000 documents...

Related subjects