• Nenhum resultado encontrado

[PDF] Top 20 Protection from crawler using .htaccess technique

Has 10000 "Protection from crawler using .htaccess technique" found on our website. Below are the top 20 most common "Protection from crawler using .htaccess technique".

Protection from crawler using .htaccess technique

Protection from crawler using .htaccess technique

... Web users do not normally notice crawlers and other programs that automatically download information over the Internet. Yet, in addition to the owners of commercial search engines, they are increasingly used by a ... See full document

8

An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection

An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection

... copyright protection, tamper proofing, video or audio ...detection from Gabor Filter method. In this paper we are using data hiding by the simple LSB substitution ...bits from the watermark ... See full document

18

RADIATION PROTECTION – AN ISSUE OF KNOWLEDGE AND TECHNIQUE IN DENTAL OFFICES

RADIATION PROTECTION – AN ISSUE OF KNOWLEDGE AND TECHNIQUE IN DENTAL OFFICES

... deriving from the fact that almost half of the respondents did not wish or did not know how to answer this ...question. Using a rectangular collimator restricts the X-ray beam to the receptor area and can ... See full document

6

A Novel Digital Watermarking Technique for Video Copyright Protection

A Novel Digital Watermarking Technique for Video Copyright Protection

... done using this algorithm other data such as various texts and ...protected from copying by embedding watermarks according to the algorithm described in this ... See full document

9

A DWT based Dual Image Watermarking Technique for Authenticity and Watermark Protection

A DWT based Dual Image Watermarking Technique for Authenticity and Watermark Protection

... watermarking technique wherein both blind and non-blind algorithms are used for the copyright protection of the cover/host image and the watermark ...modified using another smaller secondary binary ... See full document

13

PDD CRAWLER: A FOCUSED WEB CRAWLER USING LINK AND CONTENT ANALYSIS FOR RELEVENCE PREDICTION

PDD CRAWLER: A FOCUSED WEB CRAWLER USING LINK AND CONTENT ANALYSIS FOR RELEVENCE PREDICTION

... This technique ensures that similar pages get downloaded and hence the name Focused web ...Web crawler needs to search for information among web pages identified by ...our crawler will need traversal ... See full document

9

Rev. bras. ortop.  vol.51 número2

Rev. bras. ortop. vol.51 número2

... In the clinical evaluation one year after the operation, none of the patients said that they had any moderate or severe pain upon making medium effort involving the patellofemoral joint or the location of insertion of ... See full document

7

Artroplastia de excisão do trapézio e interposição tendinosa na rizartrose: estudo prospectivo

Artroplastia de excisão do trapézio e interposição tendinosa na rizartrose: estudo prospectivo

... radial and palmar abductions. The migration index for the first metacarpal was also determined on radiographs at rest and under stress. Results: The pain relief was considered to be good (p = 0.005), with functional ... See full document

8

Condenser and Deaerator Control using Fuzzy-Neural Technique

Condenser and Deaerator Control using Fuzzy-Neural Technique

... energy from the steam that is coming from the Low Pressure Cylinder (LPC) of the turbine to the condenser by convection and conduction through the tube ...increased from its initial value (t1) to a ... See full document

18

J. bras. pneumol.  vol.34 número10 en v34n10a07

J. bras. pneumol. vol.34 número10 en v34n10a07

... We concluded that, in the multivariate regression analysis, the relevant factors for the determination of the Rint value were height and weight. Gender and age, when considered as independent values (to the exclusion of ... See full document

8

Image Compression Using Fast 2-D DCT Technique

Image Compression Using Fast 2-D DCT Technique

... image from spatial domain to frequency component. It is a widely used technique in image ...compression technique for two-dimensional images are ...proposed technique for image compression ... See full document

5

Hiding Data in Images Using New Random Technique

Hiding Data in Images Using New Random Technique

... (LSB) technique which is the most common Steganographic technique is employed in this ...this technique is suggested by randomly inserting the bits of the message in the image to produce more secured ... See full document

5

A Novel Malicious Web Crawler Detector: Performance and Evaluation

A Novel Malicious Web Crawler Detector: Performance and Evaluation

... list from shared memory which runs in nginx, a web service module which analyzes and serves designated requests to differentiate bots from users, and a backend server to generate reports and make final ... See full document

6

Robust extraction of baseline signal of atmospheric trace species using local regression

Robust extraction of baseline signal of atmospheric trace species using local regression

... example, Novelli et al. (1998) fitted a second order polynomial plus the sum of four harmonics to daily carbon monoxide (CO) data from the NOAA/CMDL network and ap- plied two low-pass filters to the model ... See full document

24

Braz. J. Cardiovasc. Surg.  vol.23 número4 en v23n4a04

Braz. J. Cardiovasc. Surg. vol.23 número4 en v23n4a04

... the technique of surgical PVI included such lines of block, by cutting and suturing of the atrial ...PIV technique may block many of these nests, contributing to better ... See full document

6

Separable Watermarking Technique Using the Biological Color Model

Separable Watermarking Technique Using the Biological Color Model

... Our proposed technique was tested on several images, each of which differs in density and colors. In Fig. 6 and 7 we present a set of host images and watermarks on which we test our technique. Those images ... See full document

10

Treatment of Lane-Emden Type Equations via Second Derivative Backward Differentiation Formula using Boundary Value Technique

Treatment of Lane-Emden Type Equations via Second Derivative Backward Differentiation Formula using Boundary Value Technique

... We have been able to derive some mixed boundary value methods via the multistep collocation technique. The methods obtained have been represented as a boundary value methods using the representation of ... See full document

6

A defective mutant of Salmonella enterica Serovar Gallinarum in cobalamin biosynthesis is avirulent in chickens

A defective mutant of Salmonella enterica Serovar Gallinarum in cobalamin biosynthesis is avirulent in chickens

... serovar Gallinarum (SG) is the fowl typhoid agent in chickens, a very severe disease with worldwide economic impact and with which mortality may reach up to 80% (5, 9). It is one of a small group of serovars that ... See full document

10

USP – São Carlos Fevereiro de 2016

USP – São Carlos Fevereiro de 2016

... Mining the customer credit using hybrid support vector.. machine technique.[r] ... See full document

127

CFRP FIRE BEHAVIOUR – PASSIVE PROTECTION SYSTEM Débora Ferreira

CFRP FIRE BEHAVIOUR – PASSIVE PROTECTION SYSTEM Débora Ferreira

... passive protection systems on the burning behaviour of CFRP is analysed using different fire protection material, such as gypsum plasterboard (PB) and intumescent paint ... See full document

7

Show all 10000 documents...