250   Artículos

« Anterior     Página: 1 de 13     Siguiente »

 
en línea
Jonathan Lancelot, Bhaskar P. Rimal and Edward M. Dennis    
This paper is designed to explicate and analyze data acquired from experimental field tests of a Tesla Model 3 lane correction module within the vehicle?s Autopilot Suite, a component of Tesla OS. The initial problem was discovered during a nominal drive... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Shian-Ru Ke, Hoang Le Uyen Thuc, Yong-Jin Lee, Jenq-Neng Hwang, Jang-Hee Yoo and Kyoung-Ho Choi    
This review article surveys extensively the current progresses made toward video-based human activity recognition. Three aspects for human activity recognition are addressed including core technology, human activity recognition systems, and applications ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Kwesi Hughes-Lartey, Zhen Qin, Francis E. Botchey and Sarah Dsane-Nsor    
End-user devices and applications (data locations) are becoming more capable and user friendly and are used in various Health Information Systems (HIS) by employees of many health organizations to perform their day to day tasks. Data locations are connec... ver más
Revista: Information    Formato: Electrónico

 
en línea
Elyta Elyta,Warjio Warjio,Ahmad AzrinBin Adnan     Pág. 181 - 199
This article aims to develop the concept of human security through economic safeguards for Micro, Small, and Medium Enterprises (MSMEs) in the face of the Covid-19 pandemic. The analysis was carried out using a qualitative approach. This article has foun... ver más
Revista: Journal of Government and Civil Society    Formato: Electrónico

 
en línea
Oleh Zachko, Dmytro Kobylkin, Oleh Kovalchuk, Viacheslav Markov     Pág. 49 - 56
The subject of the study is the personnel management information system. Infrastructure design processes of the framework model of complex socio-technical systems for project management and human resource management programs, formation of a database of m... ver más

 
en línea
Fahad Alodhyani, George Theodorakopoulos and Philipp Reinecke    
A password is considered to be the first line of defence in protecting online accounts, but there are problems when people handle their own passwords, for example, password reuse and difficult to memorize. Password managers appear to be a promising solut... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Pedro Martínez-Santos, Miguel Martín-Loeches, Silvia Díaz-Alcaide and Kerstin Danert    
Water access remains a challenge in rural areas of low-income countries. Manual drilling technologies have the potential to enhance water access by providing a low cost drinking water alternative for communities in low and middle income countries. This p... ver más
Revista: Water    Formato: Electrónico

 
en línea
Dele Raheem    
Food and nutrition security builds resilience in a society when people have access to safe and nutritious foods. The Barents region, covering the Northern parts of Finland, Norway, and Sweden, and the North-western part of Russia, seeks common goals that... ver más
Revista: Urban Science    Formato: Electrónico

 
en línea
Yuan Shen, Huiming Cao, Mingfang Tang and Hongbing Deng    
Human disturbances impact river basins by reducing the quality of, and services provided by, aquatic ecosystems. Conducting quantitative assessments of ecological security at the watershed scale is important for enhancing the water quality of river basin... ver más
Revista: Water    Formato: Electrónico

 
en línea
Yuan Shen, Huiming Cao, Mingfang Tang, Hongbing Deng     Pág. 1 - 14
Human disturbances impact river basins by reducing the quality of, and services provided by, aquatic ecosystems. Conducting quantitative assessments of ecological security at the watershed scale is important for enhancing the water quality of river basin... ver más
Revista: Water    Formato: Electrónico

 
en línea
Gundars Kaupins,Susan Park     Pág. 82 - 93
Social networking such as Facebook and Twitter can help employees enhance a company's marketing, recruiting, security, and safety. However, employees' use of social networking sites and employers' access of those sites can result in illegal and unethical... ver más
Revista: Advances in Business Research    Formato: Electrónico

 
en línea
Gundars Kaupins,Susan Park     Pág. 82 - 93
Social networking such as Facebook and Twitter can help employees enhance a company's marketing, recruiting, security, and safety. However, employees' use of social networking sites and employers' access of those sites can result in illegal and unethical... ver más
Revista: Advances in Business Research    Formato: Electrónico

 
en línea
Ryosuke Kakiuchi, Dinh Tuan Tran and Joo-Ho Lee    
Revista: Drones    Formato: Electrónico

 
en línea
Kathleen Downer and Maumita Bhattacharya    
The prevalence and maturity of Bring Your Own Device (BYOD) security along with subsequent frameworks and security mechanisms in Australian organisations is a growing phenomenon somewhat similar to other developed nations. During the COVID-19 pandemic, e... ver más
Revista: Informatics    Formato: Electrónico

 
en línea
Thomas Richard McEvoy,Stewart James Kowalski     Pág. 47 - 64
Cyber security risks are socio-technical in nature. They result not just from technical vulnerabilities but also, more fundamentally, from the degradation of working practices over time ? which move an organization across the boundary of secure practice ... ver más
Revista: Complex Systems Informatics and Modeling Quarterly    Formato: Electrónico

 
en línea
Galyna Nazarova, Kateryna Demchenko     Pág. 98 - 105
The subject of research in the article is the theoretical foundations of the formation and development of the category of social security in the region. The purpose of the work is to analyze the preconditions for the formation of social security, to reve... ver más

 
en línea
Ahlam Fakieh and Aymen Akremi    
Social engineering (SE) attacks (also called social hacking) refer to various methods used by cybercriminals to exploit the weak nature of human beings rather than the logical and physical security measures used by organizations. This research paper stud... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Hussain Aldawood and Geoffrey Skinner    
The idea and perception of good cyber security protection remains at the forefront of many organizations? information and communication technology strategy and investment. However, delving deeper into the details of its implementation reveals that organi... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ujwal Sharma, Uma Shankar Medasetti, Taher Deemyad, Mustafa Mashal and Vaibhav Yadav    
This review paper addresses the escalating operation and maintenance costs of nuclear power plants, primarily attributed to rising labor costs and intensified competition from renewable energy sources. The paper proposes a paradigm shift towards a techno... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Sandra L. Gomez-Coronel, Ernesto Moya-Albor, Jorge Brieva and Andrés Romero-Arellano    
Currently, algorithms to embed watermarks into digital images are increasing exponentially, for example in image copyright protection. However, when a watermarking algorithm is applied, the preservation of the image?s quality is of utmost importance, for... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 13     Siguiente »