2025-02-22T17:14:03-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: Query fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22open-sciencenbuvgovua-33013%22&qt=morelikethis&rows=5
2025-02-22T17:14:03-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: => GET http://localhost:8983/solr/biblio/select?fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22open-sciencenbuvgovua-33013%22&qt=morelikethis&rows=5
2025-02-22T17:14:03-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: <= 200 OK
2025-02-22T17:14:03-05:00 DEBUG: Deserialized SOLR response
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access
Saved in:
Main Authors: | B. V. Pavlenko, D. P. Prysiazhnyi, V. V. Karpinets, Ya. Yu. Yaremchuk |
---|---|
Format: | Article |
Language: | English |
Published: |
2018
|
Series: | Data recording, storage & processing |
Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001042828 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
2025-02-22T17:14:03-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: Query fl=%2A&rows=40&rows=5&wt=json&json.nl=arrarr&q=id%3A%22open-sciencenbuvgovua-33013%22&qt=morelikethis
2025-02-22T17:14:03-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: => GET http://localhost:8983/solr/biblio/select?fl=%2A&rows=40&rows=5&wt=json&json.nl=arrarr&q=id%3A%22open-sciencenbuvgovua-33013%22&qt=morelikethis
2025-02-22T17:14:03-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: <= 200 OK
2025-02-22T17:14:03-05:00 DEBUG: Deserialized SOLR response
Similar Items
-
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
by: Pavlenko, B. V., et al.
Published: (2019) -
Development of a device for protection against unauthorized access based on three-factor identification and user authentication
by: A. O. Azarova, et al.
Published: (2021) -
Development of a device for protection against unauthorized access based on three-factor identification and user authentication
by: Азарова, А. О., et al.
Published: (2021) -
Increase of Authenticity of Assessment of Expenditures
by: S. V. Vashchylin
Published: (2013) -
Information technology of software-controlled rasters for the image acquiring for computer vision systems
by: V. V. Hrytsyk, et al.
Published: (2014)