Total of 7 articles.


Go

Jan 12, 2023Open    AccessArticle

Trends in Workplace Wearable Technologies and Connected-Worker Solutions for Next-Generation Occupational Safety , Health , and Productivity

Vishal Patel, Austin Chesmore, Christopher M. Legner, Santosh Pandey
The workplace influences the safety, health, and productivity of workers at multiple levels. To protect and promote total worker health, smart hardware, and software tools have emerged for the identification, elimination, substitution, and control of occupational hazards. Wearable devices enable constant monitoring of individual workers and the environment, whereas connected worker solutions provide contextual information and decision support. Here, the recent trends in commercial workplace tech...

Information Technologies  Public Economics  Behavioral Economics  Automata  Computer and Network Security  Agricultural Engineering  Communication Protocols  Environmental Sciences  Environmental Sciences  Cloud Computing  Innovation Management  Artificial Intelligence  Big Data Search and Mining  Business Management  Information Management  Applications of Communication Systems  Chemical Engineering & Technology  Food Science & Technology  Marketing  Machine Learning  Diagnostics  Electric Engineering  Civil Engineering  Computer Engineering  Aquaculture, Fisheries & Fish Science  Information retrieval  Mechanical Engineering  Bioengineering  Mineral Engineering  Bioinformatics  Information and Communication: Security, Privacy, and Trust  Biophysics  Information and communication theory and algorithms  Distributed computing  Physical Education  Grid Computing  Business Communication  Consumer Behavior  Corporate Governance  Distance and Open Education  Engineering Management  Entrepreneurship  Software Engineering  Applied Physics  Opsearch  Information Science  Public Policy  E-Learning and Knowledge Management  Economics  Technology  Demography  Mobile and Portable Communications Systems  Mobile and Ubiquitous Networks  Mobile Computing Systems  Multimedia/Signal processing  Business Ethics and Corporate Social Responsibility  Socioeconomics  Business Finance and Investment  Business Analysis  Economic System  Business and Economics Education  Electronic Commerce  Information Economics  Advertising  Total Quality Management  Supply Chain Management  Drugs & Devices  Public Health  Sports Science  Sales Management  Marine Biology  Statistics  Risk Management  Project Management and Strategy  Dynamical System  Project Management  Public Administration  Materials Engineering 

Sep 23, 2022Open    AccessArticle

LIABILITY OF ONLINE PLATFORMS IN EUROPE FOR THE ILLEGAL UPLOADING AND HOSTING OF PROTECTED WORKS

Anastasiia Prigoda
At the beginning of the 18th century, the Institute of Copyright and Intellectual Property protection was established as a state regulation system of relations in the field of competition in the market and control of the distribution of legal, literary content in the form of physical media. After the spread of the IT products, including the popularization of the Internet, various online platforms appeared platforms through which authors and owners of intellectual property results can post their ...

Political Economy  Information and Communication: Security, Privacy, and Trust 

Sep 23, 2022Open    AccessArticle

COOT OPTIMIZATION ALGORITHM FOR PARAMETER ESTIMATION OF PHOTOVOLTAIC MODEL

Hussam K. Rushdi, Fawzi M. Al-Naima
Because of the technical and environmental advantages of many solar energy sources, their use has recently been rapidly rising. The extraction of the unknown parameters in photovoltaic models is one of the key challenges in the modeling and simulation of solar energy sources. To satisfy the behavior of the solar photovoltaic (SPV) cells, the Single-Diode Model (SDM) is recommended as a more dependable modeling method. In this study, we applied the recently introduced meta-heuristic optimization ...

Electric Engineering  Political Economy  Information and Communication: Security, Privacy, and Trust 

Mar 11, 2020Open    AccessArticle

The Necessity and Importance of Incorporating Media and Information Literacy into Holistic Metaliteracy

Alireza Salehi-Nejad
Digitalization and the emergence of the Internet have resulted in escalating access to information and communication. Given the circumstances that soaring access to information amounts to the intensification of misinformation and disinformation, a set of critical skills to navigate and critically assess the information is necessary. This paper outlines the significance of these skills, and provides a perspective on metaliteracy as a supplement to media and information literacy, and argues that t...

Sociology  Journalism and Communication  Information Science  Information and Communication: Security, Privacy, and Trust  Information and communication theory and algorithms 

Jul 28, 2017Open    AccessArticle

A Unique One-Time Password Table Sequence Pattern Authentication: Application to Bicol University Union of Federated Faculty Association, Inc. (BUUFFAI) eVoting System

Benedicto B. Balilo Jr., Bobby D. Gerardo, Ruji P. Medina, Yungcheol Byun
Purpose – Electronic Voting System (EVS) is a type of voting program that deals primarily with the selection, the casting of votes with embedded security mechanism that detects errors, and the tamper-proof election of results done through the use of an electronic system. It can include optical scan, specialized voting kiosks and Internet voting approach. Most organizations have difficulties when it comes to voting and the Bicol University Union of Federated Faculty Association Incorporated (BUUF...

Information and Communication: Security, Privacy, and Trust 

Aug 22, 2016Open    AccessArticle

Distributed And Typed Role-Based Access Control Mechanisms Driven By CRUD Expressions

Diogo Domingues Regateiro, Rui Luís Aguiar, óscar Mortágua Pereira
Business logics of relational databases applications are an important source of security violations, namely in respect to access control. The situation is particularly critical when access control policies are many and complex. In these cases, programmers of business logics can hardly master the established access control policies. Now we consider situations where business logics are built with tools such as JDBC and ODBC. These tools convey two sources of security threats: 1) the use of unautho...

Information and Communication: Security, Privacy, and Trust  Information and communication theory and algorithms 

Aug 18, 2016Open    AccessArticle

Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack

Mojtaba GhanaatPisheh Sanaei, Ismail Fauzi Isnin, Majid Bakhtiari
Today’s Mobile Ad hoc Networks (MANETs) became a popular issue for scientists, and diverse studies have been made to increase the performance of ad hoc networks. In MANET nodes compromise to forward packets for each other communicate beyond their transmission range. The mobile nodes communicate with each other without any infrastructure. As wireless ad-hoc networks lack an infrastructure, they are exposed to a lot of attacks. One of these attacks called Wormhole Attack that two adversary node co...

Simulation/Analytical Evaluation of Communication Systems  Optical Communications  Online social network computing  Computer and Network Security  Computational Robotics  Complex network models  Communication Protocols  Information and Communication: Security, Privacy, and Trust  Cloud Computing  Information and communication theory and algorithms  Artificial Intelligence  Cooperative Communications  Mobile and Portable Communications Systems  Mobile and Ubiquitous Networks  Green networking  Applications of Communication Systems  Grid Computing  Network Modeling and Simulation  Numerical Methods  Mobile Computing Systems 

Go