Total of 7 articles.
|
Go
Jan 12, 2023Open AccessArticle
The workplace influences the safety, health, and productivity of workers at multiple levels. To protect and promote total worker health, smart hardware, and software tools have emerged for the identification, elimination, substitution, and control of occupational hazards. Wearable devices enable constant monitoring of individual workers and the environment, whereas connected worker solutions provide contextual information and decision support. Here, the recent trends in commercial workplace tech...
Information Technologies
Public Economics
Behavioral Economics
Automata
Computer and Network Security
Agricultural Engineering
Communication Protocols
Environmental Sciences
Environmental Sciences
Cloud Computing
Innovation Management
Artificial Intelligence
Big Data Search and Mining
Business Management
Information Management
Applications of Communication Systems
Chemical Engineering & Technology
Food Science & Technology
Marketing
Machine Learning
Diagnostics
Electric Engineering
Civil Engineering
Computer Engineering
Aquaculture, Fisheries & Fish Science
Information retrieval
Mechanical Engineering
Bioengineering
Mineral Engineering
Bioinformatics
Information and Communication: Security, Privacy, and Trust
Biophysics
Information and communication theory and algorithms
Distributed computing
Physical Education
Grid Computing
Business Communication
Consumer Behavior
Corporate Governance
Distance and Open Education
Engineering Management
Entrepreneurship
Software Engineering
Applied Physics
Opsearch
Information Science
Public Policy
E-Learning and Knowledge Management
Economics
Technology
Demography
Mobile and Portable Communications Systems
Mobile and Ubiquitous Networks
Mobile Computing Systems
Multimedia/Signal processing
Business Ethics and Corporate Social Responsibility
Socioeconomics
Business Finance and Investment
Business Analysis
Economic System
Business and Economics Education
Electronic Commerce
Information Economics
Advertising
Total Quality Management
Supply Chain Management
Drugs & Devices
Public Health
Sports Science
Sales Management
Marine Biology
Statistics
Risk Management
Project Management and Strategy
Dynamical System
Project Management
Public Administration
Materials Engineering
Sep 23, 2022Open AccessArticle
At the beginning of the 18th century, the Institute of Copyright and Intellectual Property protection was established as a state regulation system of relations in the field of competition in the market and control of the distribution of legal, literary content in the form of physical media. After the spread of the IT products, including the popularization of the Internet, various online platforms appeared platforms through which authors and owners of intellectual property results can post their ...
Political Economy
Information and Communication: Security, Privacy, and Trust
Sep 23, 2022Open AccessArticle
Because of the technical and environmental advantages of many solar energy sources, their use has recently been rapidly rising. The extraction of the unknown parameters in photovoltaic models is one of the key challenges in the modeling and simulation of solar energy sources. To satisfy the behavior of the solar photovoltaic (SPV) cells, the Single-Diode Model (SDM) is recommended as a more dependable modeling method. In this study, we applied the recently introduced meta-heuristic optimization ...
Electric Engineering
Political Economy
Information and Communication: Security, Privacy, and Trust
Mar 11, 2020Open AccessArticle
Digitalization and the emergence of the Internet have resulted in escalating access to information and communication. Given the circumstances that soaring access to information amounts to the intensification of misinformation and disinformation, a set of critical skills to navigate and critically assess the information is necessary. This paper outlines the significance of these skills, and provides a perspective on metaliteracy as a supplement to media and information literacy, and argues that t...
Sociology
Journalism and Communication
Information Science
Information and Communication: Security, Privacy, and Trust
Information and communication theory and algorithms
Jul 28, 2017Open AccessArticle
Purpose – Electronic Voting System (EVS) is a type of voting program that deals primarily with the selection, the casting of votes with embedded security mechanism that detects errors, and the tamper-proof election of results done through the use of an electronic system. It can include optical scan, specialized voting kiosks and Internet voting approach. Most organizations have difficulties when it comes to voting and the Bicol University Union of Federated Faculty Association Incorporated (BUUF...
Information and Communication: Security, Privacy, and Trust
Aug 22, 2016Open AccessArticle
Business logics of relational databases applications are an important source of security violations, namely in respect to access control. The situation is particularly critical when access control policies are many and complex. In these cases, programmers of business logics can hardly master the established access control policies. Now we consider situations where business logics are built with tools such as JDBC and ODBC. These tools convey two sources of security threats: 1) the use of unautho...
Information and Communication: Security, Privacy, and Trust
Information and communication theory and algorithms
Aug 18, 2016Open AccessArticle
Today’s Mobile Ad hoc Networks (MANETs) became a popular issue for scientists, and diverse studies have been made to increase the performance of ad hoc networks. In MANET nodes compromise to forward packets for each other communicate beyond their transmission range. The mobile nodes communicate with each other without any infrastructure. As wireless ad-hoc networks lack an infrastructure, they are exposed to a lot of attacks. One of these attacks called Wormhole Attack that two adversary node co...
Simulation/Analytical Evaluation of Communication Systems
Optical Communications
Online social network computing
Computer and Network Security
Computational Robotics
Complex network models
Communication Protocols
Information and Communication: Security, Privacy, and Trust
Cloud Computing
Information and communication theory and algorithms
Artificial Intelligence
Cooperative Communications
Mobile and Portable Communications Systems
Mobile and Ubiquitous Networks
Green networking
Applications of Communication Systems
Grid Computing
Network Modeling and Simulation
Numerical Methods
Mobile Computing Systems
Go
|
|
|