-
181
-
182
FAIR data – the photon and neutron communities move together towards open science
Published 2025-01-01“…FAIR data also affect the carbon footprint related to large amounts of data and raise questions related to user authentication, rights of access and cyber security. The RIs alone cannot achieve such a transformational process. …”
Get full text
Article -
183
-
184
Hybrid Prophet-NAR Model for Short-Term Electricity Load Forecasting
Published 2025-01-01Get full text
Article -
185
Presenting the Model of Effective Factors on Smart Governance in the Country
Published 2024-06-01“…The contextual factor of needs assessment in this research included equipment and infrastructure, required resources, information and communication technology, cyber security, statistics and intelligent information. …”
Get full text
Article -
186
Developing a Transparent Anaemia Prediction Model Empowered With Explainable Artificial Intelligence
Published 2025-01-01Get full text
Article -
187
Discrete convolution generation of the stirling curve and its evaluation algorithm(斯特林曲线的离散卷积生成及其求值算法)
Published 2025-01-01Get full text
Article -
188
Quantum machine learning with Adaptive Boson Sampling via post-selection
Published 2025-01-01Get full text
Article -
189
Optimalisasi Strategi Intelijen dalam Menghadapi Ancaman TPPO Jaringan Kamboja dan Implikasinya bagi Keamanan Nasional
Published 2024-12-01“…The intelligence strategy to combat the Cambodian network's human trafficking threats involves cross-sectoral cooperation through early detection and early warning as preventive measures against threats, conducted through investigations and security efforts in collaboration with Ministries, Agencies, and international cooperation with Cambodian authorities to produce memorandums of understanding for prevention, enforcement, protection, and policy harmonization. The cyber security intelligence strategy includes data collection, data analysis, and covert operations, such as wiretapping, cyber patrols, and situational control operations. …”
Get full text
Article -
190
Curtailing the spread of COVID-19 in Nigeria using digital framework and data driven approaches
Published 2024-09-01Get full text
Article -
191
How prepared is Nigeria digital payment for health workers? A landscape analysis
Published 2025-02-01“…Challenges of digital payments included: delayed resolution of problems associated with digital payment such as failed transactions, cyber security, double payments, and unfriendly bank policies. …”
Get full text
Article -
192
-
193
-
194
DEVELOPING INFORMATION AND TECHNOLOGICAL COMPETENCE OF PROSPECTIVE MILITARY SAILORS
Published 2024-06-01“…In the framework of our research we understand this competence as an integral quality of a person which combines motivation, knowledge, skills, experience in the use of modern information technologies during professional activities related to the performance of duties of future officers of the Ukrainian Navy of the Armed Forces of Ukraine (including management of combat modules, unmanned aerial vehicles, digital weapons, the possibility of using artificial intelligence in combat systems, ensuring cyber security of weapons and military equipment, etc.). …”
Get full text
Article -
195
Designing a cyber insurance implementation model using foundational data theory
Published 2024-05-01“…Soleymani Rouzbahani & Hoseini (2016) in their research entitled "Study of crime and security insurance in cyberspace" referring to the rapid growth of technology, the introduction of computers and the use of the Internet and the resulting changes in human life, paid attention to Internet insurance as a tool to deal with the emergence of virtual crimes such as information theft in the world of internet communication. wang (2019) in his research entitled "Integrated framework for information security investment and cyber insurance" presented an analytical model for optimizing company cyber security and cyber insurance costs based on the effectiveness of costs and with the aim of reducing threats Cyber, vulnerability and effects. …”
Get full text
Article