-
1
Pharmalens Augmented Reality Application For The Dangers of Illegal Drugs
Published 2024-12-01“…Field observations reveal a critical gap in public education and awareness regarding illegal drugs, exacerbated by ineffective traditional information dissemination methods such as printed media and direct outreach programs. …”
Get full text
Article -
2
Exploit detection based on illegal control flow transfers identification
Published 2014-09-01“…In order to deal with exploit attacks such as APT,an approach was proposed to detect exploits based on illegal control flow transfers identification.Both static and dynamic analysis methods were performed to construct the CFSO (control flow safety outline),which was used to restrict the targets of control flow transfers occurred during the target program's running.When a call/ret/jmp was about to execute,the target was checked according to the CFSO.The illegal control flow transfer is considered as an exploit attack and all the following attacking steps could be captured.The ex-periment also showed that proposed method had decent overhead and could be applied to detect exploits online.…”
Get full text
Article -
3
-
4
Illegal levies in education funding in Indonesia: an analysis of experiences from Jambi Province
Published 2025-12-01“…The central and regional governments set aside at least 20% of their revenue and expenditure budgets for various programs to improve the country’s educational quality each year. …”
Get full text
Article -
5
PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMES
Published 2024-05-01“…The adoption, in 2001, in Budapest, of the Council of Europe Convention on Cybercrime brought an important step forward in the prevention and combatting cyber-related crimes, through the creation of a special indictment (art. 6) against the production, sale, procurement for use, import, distribution, import or making available of devices, computer programs, passwords or any other such data with the scope to further illegal access to a computer system, interception without right of a computer data transmission, an illegal data interference or an illegal system interference, offences comprised in the art. 2 to 5 of the Convention. …”
Get full text
Article -
6
Prion forensics: a multidisciplinary approach to investigate CWD at an illegal deer carcass disposal site
Published 2024-12-01Get full text
Article -
7
-
8
-
9
-
10
Indonesian Consulate General in Davao in Protecting the Rights of the Indonesian Citizens in Mindanao
Published 2024-07-01Get full text
Article -
11
Legal protection of community members in the Complete Systematic Land Registration Program
Published 2024-12-01“…Regulatory adjustments are needed, including the determination of fair fees based on geographical difficulties and land contours, as well as continuous evaluation and supervision to prevent corrupt acts and illegal levies in this program. This is important to ensure transparency, accountability and a focus on social justice for all segments of society.…”
Get full text
Article -
12
International and domestic experience of intellectual property legal protection on the Internet and separate methods of police crimes detection in this area
Published 2022-09-01“…Forms of illegal distribution of media content are defined. …”
Get full text
Article -
13
La gestion de la transhumance dans la zone d’influence du parc régional du W par le programme Ecopas
Published 2008-05-01“…Since its creation in 1954, the park has always been used by the herders to face the lack of pastoral resources in the dry season. The conservation program implemented an approach to manage this illegal grazing inside the park, by a multi-level concentration with all stakeholders (from herders to ministers). …”
Get full text
Article -
14
An Analysis of Destructive Fishing as an Anthropogenic Disaster in Coastal Areas
Published 2025-01-01Get full text
Article -
15
-
16
DOMINANT FACTORS CAUSES OF DRUG ABUSE IN ADOLESCENTS AT THE LAMONGAN DISTRICT PENITENTIARY
Published 2020-05-01Get full text
Article -
17
Implementasi Teknik Enkripsi dan Dekripsi dI File Video Menggunakan Algoritma Blowfish
Published 2019-12-01“…Being a user need to avoid 'third parties' who can change, retrieve or delete data physically or run program functions that interfere with the system. …”
Get full text
Article -
18
Real time database system data security collection scheme
Published 2016-10-01“…With application status of the China Petroleum Refining and Chemicals run system MES(manufacturing execution system)in subordinate enterprises as well as the data acquisition interface program in real-time database module, the security risks such as virus, attacks and illegal invasions in production unit automatic control system (DCS, PLC)because of the “two-network integration”were analyzed. …”
Get full text
Article -
19
Directions for the implementation of foreign experience in operative and investigative counteraction to intentional murders by criminal police units (on the example of Canada and t...
Published 2022-09-01“…The choice of an appropriate strategy by a particular state and the formation of an appropriate preventive program or a program to combat criminal wrongdoing is determined not only by the current criminogenic situation in this country and in the world in general, but also by the relevant historical, cultural and religious traditions. …”
Get full text
Article -
20
Active games for increasing social and emotional competencies of young adults in probation system: a one-sample trial study in Izmir city in Turkiye
Published 2024-12-01“…Methods This study presents the results of a pilot program held in Turkiye under an Erasmus + Key Action 3 project entitled Active Games for Change (AG4C), which includes a range of innovative face-to-face active games that were specifically created and designed to support the development of identified social emotional competencies in a probation directorate that serves young adult offenders. …”
Get full text
Article