Showing 3,781 - 3,800 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 3781

    Establishing A Personal Data Protection Agency for E-Commerce in Indonesia by Bilqis Laila Nuzul Sa'adah, Sukarmi Sukarmi, Reka Dewantara

    Published 2024-12-01
    “… The rapid growth of e-commerce in Indonesia has led to a significant increase in the collection and processing of personal data, raising concerns regarding data security and privacy rights. This study analyzes the urgency of establishing a Personal Data Protection Agency (LPDP) specifically for e-commerce users in Indonesia, considering the increasing risks to personal data in the digital marketplace. …”
    Get full text
    Article
  2. 3782

    Gray-Related Support Vector Machine Optimization Strategy and Its Implementation in Forecasting Photovoltaic Output Power by Bo Xiao, Hai Zhu, Sujun Zhang, Zi OuYang, Tandong Wang, Saeed Sarvazizi

    Published 2022-01-01
    “…Reliable and accurate photovoltaic (PV) output power projection is critical for power grid security, stability, and economic operation. However, because of the indirectness, unpredictability, and solar energy volatility, predicting precise and reliable photovoltaic output power is a complicated subject. …”
    Get full text
    Article
  3. 3783

    UAV Path Planning Based on Improved A∗ and DWA Algorithms by Xiong Bai, Haikun Jiang, Junjie Cui, Kuan Lu, Pengyun Chen, Ming Zhang

    Published 2021-01-01
    “…This work proposes a path planning algorithm based on A∗ and DWA to achieve global path optimization while satisfying security and speed requirements for unmanned aerial vehicles (UAV). …”
    Get full text
    Article
  4. 3784

    Investigating key elements of digital resilience among nursing undergraduates: a qualitative study by Fanfan Li, Qiuping Ma, Chunxiao Yang, Mingyang Zhong

    Published 2025-01-01
    “…ObjectiveTo explore key elements of digital resilience in nursing undergraduates, providing a foundation for comprehensive assessment and training during medical colleges’ digital transformation.MethodsConducted semi-structured interviews with 20 nursing undergraduates experienced in online learning or digital resource use from March–May 2024, utilizing descriptive qualitative research and directed content analysis.ResultsIdentified five themes with nineteen sub-themes: understanding digital threats (information overload, decreased learning engagement, impaired social interaction, digital technology failures, digital security risks), knowing coping strategies (seeking teacher support, seeking peer support, seeking social support), learning knowledge and skills (nursing expertise, autonomous learning ability, digital technology application skills, digital learning skills, digital communication skills), overcoming digital threats stress (psychological resilience, learning perseverance), and adapt to digital environment (self-regulation and motivational efficacy, online learning self-efficacy, digital skills self-efficacy, social interaction self-efficacy).ConclusionNursing undergraduates’ digital resilience is multifaceted. …”
    Get full text
    Article
  5. 3785

    Privacy Protection for Personal Health Device Communication and Healthcare Building Applications by Soon Seok Kim, Yong Hee Lee, Jong Mo Kim, Deok Seok Seo, Gwang Hee Kim, Yoon Seok Shin

    Published 2014-01-01
    “…We believe it will be a highly valuable resource for dealing with basic data because it suggests an additional standard for security with the Continua Health Alliance or related international groups in the future.…”
    Get full text
    Article
  6. 3786

    Reducing Postharvest Loss of Stored Grains Using Plant-Based Biopesticides: A Review of Past Research Efforts by Getachew Bezabih, Neela Satheesh, Solomon Workneh Fanta, Melaku Wale, Minaleshewa Atlabachew

    Published 2022-01-01
    “…One of the main challenges regarding food security is postharvest loss due to insect pests. The overall postharvest grain losses for sub-Saharan Africa could be as high as US$4 billion/year. …”
    Get full text
    Article
  7. 3787

    Exploring Professional Support Offered by Midwives during Labour: An Observation and Interview Study by Stina Thorstensson, Anette Ekström, Ingela Lundgren, Elisabeth Hertfelt Wahn

    Published 2012-01-01
    “…The results are presented with three themes. (1) Support as a professional task seems unclear and less well defined than medical controls. (2) Midwives and parents express somewhat different supportive ideas about how to create a sense of security. (3) Partner and midwife interact in support of the childbearing woman. …”
    Get full text
    Article
  8. 3788

    Carlos Castillo-Chavez: A century ahead by James Schatz

    Published 2013-07-01
    “…Sixteen years ago, I travelled to Cornell University with my colleague at the National Security Agency (NSA) Barbara Deuink to meet Carlos and hear about his vision to expand the talent pool of mathematicians in our country. …”
    Get full text
    Article
  9. 3789

    Border governance through local community empowerment: insights from Indonesia-Papua New Guinea borderline by Usman Pakasi, Muhammad Faridz, Hasbi Majid, Susilawati Susilawati

    Published 2024-12-01
    “…The research aims at strategies to improve community livelihoods through the development of agricultural infrastructure, increased productivity, food security, and community participation in decision-making. …”
    Get full text
    Article
  10. 3790

    Towards understanding the character of quality sampling in deep learning face recognition by Iurii Medvedev, João Tremoço, Beatriz Mano, Luís Espírito Santo, Nuno Gonçalves

    Published 2022-09-01
    “…Such choice of the data is related to its public availability when existing document compliant face image collections are hardly accessible due to security and privacy issues. Such inconsistency between the training data and deploy scenario may lead to a leak in performance in biometric systems, which are developed specifically for dealing with ID document compliant images. …”
    Get full text
    Article
  11. 3791

    Constructing competing discourses on the Russo-Ukrainian war: journalistic translation in wartime by Angela Kamyanets

    Published 2024-12-01
    “…The findings reveal that the former article portrays the war as Ukraine’s fight for independence and a battle to uphold international law, whereas the latter predominantly depicts it as territorial aggression that threatens global nuclear security. The former article employs a wide range of evaluative devices to underscore Russia’s brutality and condemn the delayed provision of Western weapons to Ukraine. …”
    Get full text
    Article
  12. 3792

    Guest editorial: Advanced signal processing for integration of radar and communication (IRC) by Bin Liao, Wei Liu, Ziyang Cheng, Tianyao Huang

    Published 2022-09-01
    “…Besides the military field, radar has been widely employed in daily life including weather service, air traffic control, autonomous driving and security monitoring. Meanwhile, these applications rely Largely on information transmission through wireless communications. …”
    Get full text
    Article
  13. 3793

    Agent Based Simulation of Group Emotions Evolution and Strategy Intervention in Extreme Events by Bo Li, Duoyong Sun, Shuquan Guo, Zihan Lin

    Published 2014-01-01
    “…This paper also provides an effective method of how to use agent-based simulation for the study of complex collective behavior evolution problem in extreme incidents, emergency, and security study domains.…”
    Get full text
    Article
  14. 3794

    Reforming Tax Law Enforcement: The Role of Core Tax Administration System Digitalization and the Ultimum Remedium Principle by Bambang Djinarto, Slamet Suhartono, Syofyan Hadi, Sri Setyadji, Juan Nickalus

    Published 2024-12-01
    “…However, this digitalization also presents challenges, including data security risks, privacy concerns, and compliance with applicable regulations. …”
    Get full text
    Article
  15. 3795

    REGIONS IN INTERNATIONAL POLITICS: A FRAMEWORK FOR INTEGRATING SYSTEMIC, REGIONAL, DYADIC, AND MONADIC APPROACHES by T. J. Volgy, J. P. Rhamey, Jr.

    Published 2018-11-01
    “…Regional powers objective try to create security and stability in their regional areas which increases the overall stability. …”
    Get full text
    Article
  16. 3796

    Analisis Penerimaan Hulu Talent Yayasan Hasnur Centre Menggunakan TAM by Arif Muhammad Iqbal, Brina Miftahurrohmah

    Published 2024-08-01
    “…TAM (Technology Acceptance Model) digunakan dalam pengujian setiap faktor yang memberikan pengaruh penerimaan Hulu Talent dengan 4 variabel utama, yaitu PU (Perceived Usefulness), PE (Perceived Ease of Use), BI (Behavioral Intention to Use), dan AU (Actual System Usage) kemudian menambahkan variabel SC (Security) untuk keamanan privasi dalam menjaga kepercayaan karyawan menggunakan sistem. …”
    Get full text
    Article
  17. 3797

    PROFILES AND PREFERENCES OF ON-LINE MILLENIAL SHOPPERS IN BULGARIA by Patricia R. Loubeau, Robert Jantzen, Elitsa Alexander

    Published 2014-05-01
    “…Like other regions of the world, concern about financial transactions security is a major barrier limiting the willingness to shop on-line in Bulgaria. …”
    Get full text
    Article
  18. 3798

    Transit Station Congestion Index Research Based on Pedestrian Simulation and Gray Clustering Evaluation by Shu-wei Wang, Li-shan Sun, Jian Rong, Zi-fan Yang

    Published 2013-01-01
    “…Firstly, platform, stair, transfer tunnel, auto fare collection (AFC) machine, and security check machine were chosen as key traffic facilities through large amounts of field investigation. …”
    Get full text
    Article
  19. 3799
  20. 3800

    Status of GPU capabilities within the Shift Monte Carlo radiation transport code* by Biondo Elliott, Davidson Gregory, Evans Thomas, Hamilton Steven, Johnson Seth, Pandya Tara, Royston Katherine, Salcedo-Pérez José

    Published 2025-01-01
    “…Shift is a general-purpose Monte Carlo (MC) radiation transport code for fission, fusion, and national security applications. Shift has been adapted to efficiently run on GPUs in order to leverage leadership-class supercomputers. …”
    Get full text
    Article