Results for 'Secure System Design'

998 found
Order:
  1.  17
    On Investigating the Effectiveness of Biometric Readers in Thwarting Network Attacks: A Secure Architecture Design Proposal.Mohammad M. Masud, Mohamed Al Hemairy & Zouheir Trabelsi - 2015 - Journal of Intelligent Systems 24 (2):199-213.
    Biometrics readers are deployed in many public sites and are used for user identification and verification. Nowadays, most biometrics readers can be connected to local area networks, and consequently, they are potential targets for network attacks. This article investigates the robustness of several fingerprint and iris readers against common denial of service attacks. This investigation has been conducted using a set of laboratory experiments and DoS attack generator tools. The experiments show clearly that the tested biometric readers are very vulnerable (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  23
    Design and Implementation of SeTiA: Secure Multi Auction System II: Architecture and Implementation Issues.V. S. Borkar, M. S. Dave & R. K. Shyamasundar - 2005 - Journal of Intelligent Systems 14 (1):69-93.
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  9
    Design and Implementation of SeTiA: Secure Multi Auction System I: Auction Mechanisms.V. S. Borkar, M. S. Dave & R. K. Shyamasundar - 2005 - Journal of Intelligent Systems 14 (1):45-68.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  67
    Dynamical Analysis, Synchronization, Circuit Design, and Secure Communication of a Novel Hyperchaotic System.Li Xiong, Zhenlai Liu & Xinguo Zhang - 2017 - Complexity:1-23.
    This paper is devoted to introduce a novel fourth-order hyperchaotic system. The hyperchaotic system is constructed by adding a linear feedback control level based on a modified Lorenz-like chaotic circuit with reduced number of amplifiers. The local dynamical entities, such as the basic dynamical behavior, the divergence, the eigenvalue, and the Lyapunov exponents of the new hyperchaotic system, are all investigated analytically and numerically. Then, an active control method is derived to achieve global chaotic synchronization of the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  5.  14
    A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing.Mohd Dilshad Ansari, Ashutosh Sharma, Mudassir Khan & Li Ting - 2022 - Journal of Intelligent Systems 31 (1):221-236.
    An intelligent climate and watering agriculture system is presented that is controlled with Android application for smart water consumption considering small and medium ruler agricultural fields. Data privacy and security as a big challenge in current Internet of Things (IoT) applications, as with the increase in number of connecting devices, these devices are now more vulnerable to security threats. An intelligent fuzzy logic and blockchain technology is implemented for timely analysis and securing the network. The proposed design consists (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  14
    Information systems for national security in Thailand: ethical issues and policy implications.Krisana Kitiyadisai - 2008 - Journal of Information, Communication and Ethics in Society 6 (2):141-160.
    PurposeThe purpose of this paper is to explicate the influence of US national security approach on the Thai Government's national security, the criticisms on the US and Thai intelligence communities and ethical debates on national databases, including the introduction of the concepts of “spiritual computing” and Buddhism to the ethical aspect of intelligence databases.Design/methodology/approachThe methodology of this paper is based on the interpretative approach which includes literature survey and interviews of the intelligence community in Thailand. The relevant literature survey (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  7.  7
    Good practices in designing a communication channel architecture for secure async flexible distributed collaboration.Rudolf Erdei, Daniela Delinschi, Oliviu Matei & Laura Andreica - 2024 - Logic Journal of the IGPL 32 (2):334-351.
    In this paper we present a set of good practices in the design of a security-centric architecture for a Communication Channel that can be used to secure a Loosely-Coupled distributed platform, over unreliable communication mediums. The proposed practices are derived from designing a complete architecture that is modular and designed to support principles of Service Oriented Architecture (SOA) and the common functional requirements of a wide range of applications, including cybersecurity, smart power grids and industrial Internet of Things (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  9
    Hybrid systems in electrical distribution design with genetic algorithm.Angel Nunez - 2020 - Minerva 1 (1):32-42.
    The incorporation of hybrid systems based on renewable sources for the optimization of electricity distribution systems and planning of power supply strategies using genetic algorithms is studied. A series of characteristics of electrical sub-stations was chosen and through simulations, data were obtained for the optimization of the existing infrastructure, which provides reliability, security, economic supply and quality of service. An algorithm was obtained with the optimal configuration of various components: photovoltaic panels, batteries, AC generator, fuel cell and inverter, which in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  9. An Evaluation Schema for the Ethical Use of Autonomous Robotic Systems in Security Applications.Markus Christen, Thomas Burri, Joseph O. Chapa, Raphael Salvi, Filippo Santoni de Sio & John P. Sullins - 2017 - University of Zurich Digital Society Initiative White Paper Series, No. 1.
    We propose a multi-step evaluation schema designed to help procurement agencies and others to examine the ethical dimensions of autonomous systems to be applied in the security sector, including autonomous weapons systems.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  7
    Implementation of network information security monitoring system based on adaptive deep detection.Lavish Kansal, Abdullah M. Baqasah, Roobaea Alroobaea & Jing Niu - 2022 - Journal of Intelligent Systems 31 (1):454-465.
    For a better detection in Network information security monitoring system, the author proposes a method based on adaptive depth detection. A deep belief network was designed and implemented, and the intrusion detection system model was combined with a support vector machine. The data set adopts the NSL-KDD network communication data set, and this data set is authoritative in the security field. Redundant cleaning, data type conversion, normalization, and other processing operations are performed on the data set. Using the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  11. A Novel Memductor-Based Chaotic System and Its Applications in Circuit Design and Experimental Validation.Li Xiong, Yanjun Lu, Yongfang Zhang & Xinguo Zhang - 2019 - Complexity 2019:1-17.
    This paper is expected to introduce a novel memductor-based chaotic system. The local dynamical entities, such as the basic dynamical behavior, the divergence, the stability of equilibrium set, and the Lyapunov exponent, are all investigated analytically and numerically to reveal the dynamic characteristics of the new memductor-based chaotic system as the system parameters and the initial state of memristor change. Subsequently, an active control method is derived to study the synchronous stability of the novel memductor-based chaotic (...) through making the synchronization error system asymptotically stable at the origin. Further to these, a memductor-based chaotic circuit is designed, realized, and applied to construct a new memductor-based secure communication circuit by employing the basic electronic components and memristor. Furthermore, the design principle of the memductor-based chaotic circuit is thoroughly analyzed and the concept of “the memductor-based chaotic circuit defect quantification index” is proposed for the first time to verify whether the chaotic output is consistent with the mathematical model. A good qualitative agreement is shown between the simulations and the experimental validation results. (shrink)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  12. Rule Based System for Diagnosing Wireless Connection Problems Using SL5 Object.Samy S. Abu Naser, Wadee W. Alamawi & Mostafa F. Alfarra - 2016 - International Journal of Information Technology and Electrical Engineering 5 (6):26-33.
    There is an increase in the use of in-door wireless networking solutions via Wi-Fi and this increase infiltrated and utilized Wi-Fi enable devices, as well as smart mobiles, games consoles, security systems, tablet PCs and smart TVs. Thus the demand on Wi-Fi connections increased rapidly. Rule Based System is an essential method in helping using the human expertise in many challenging fields. In this paper, a Rule Based System was designed and developed for diagnosing the wireless connection problems (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  13.  17
    Information security risks and sharing behavior on OSN: the impact of data collection awareness.Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai & Quynh-Chi Le - forthcoming - Journal of Information, Communication and Ethics in Society.
    Purpose This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites. Design/methodology/approach Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of 26.7% (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  25
    Social security reform: Lessons from private pensions.Karen C. Burke & Grayson M. P. McCouch - unknown
    Widespread concerns about the long-term fiscal gap in Social Security have prompted various proposals for structural reform, with individual accounts as the centerpiece. Carving out individual accounts from the existing system would shift significant risks and responsibilities to individual workers. A parallel development has already occurred in the area of private pensions. Experience with 401 plans indicates that many workers will have difficulty making prudent decisions concerning investment and withdrawal of funds. Moreover, in implementing any system of voluntary (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  15. Editorial: Coronavirus Disease (COVID-19): Socio-Economic Systems in the Post-Pandemic World: Design Thinking, Strategic Planning, Management, and Public Policy.Andrzej Klimczuk, Eva Berde, Delali Dovie, Magdalena Klimczuk-Kochańska & Gabriella Spinelli - 2022 - Frontiers in Communication 7:1–5.
    The declaration of the COVID-19 pandemic by the World Health Organization on March 11, 2020, led to unprecedented events. All regions of the world participated in implementing preventive health measures such as physical distancing, travel restrictions, self-isolation, quarantines, and facility closures. The pandemic started global disruption of socio-economic systems, covering the postponement or cancellation of public events, supply shortages, schools and universities’ closure, evacuation of foreign citizens, a rise in unemployment and inflation, misinformation, the anti-vaccine movement, and incidents of discrimination (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  3
    Securing recipiency in workplace meetings: Multimodal practices.Trini Stickle & Cecilia E. Ford - 2012 - Discourse Studies 14 (1):11-30.
    As multiparty interactions with single courses of coordinated action, workplace meetings place particular interactional demands on participants who are not primary speakers as they work to initiate turns and to interactively coordinate with displays of recipiency from co-participants. Drawing from a corpus of 26 hours of videotaped workplace meetings in a midsized US city, this article reports on multimodal practices – phonetic, prosodic, and bodily-visual – used for coordinating turn transition and for consolidating recipiency in these specialized speech exchange systems. (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  17.  86
    Online Security and the Protection of Civil Rights: A Legal Overview. [REVIEW]Ugo Pagallo - 2013 - Philosophy and Technology 26 (4):381-395.
    The paper examines the connection between online security and the protection of civil rights from a legal viewpoint, that is, considering the different types of rights and interests that are at stake in national and international law and whether, and to what extent, they concern matters of balancing. Over the past years, the purpose of several laws, and legislative drafts such as ACTA, has been to impose “zero-sum games”. In light of current statutes, such as HADOPI in France, or Digital (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  18.  13
    Designing in Ethics.Jeroen van den Hoven, Seumas Miller & Thomas Pogge (eds.) - 2017 - New York: Cambridge University Press.
    Many of our interactions in the twenty-first century - both good and bad - take place by means of institutions, technology, and artefacts. We inhabit a world of implements, instruments, devices, systems, gadgets, and infrastructures. Technology is not only something that we make, but is also something that in many ways makes us. The discipline of ethics must take this constitutive feature of institutions and technology into account; thus, ethics must in turn be embedded in our institutions and technology. The (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  19. The Semantics of Untrustworthiness.Giuseppe Primiero & Laszlo Kosolosky - 2016 - Topoi 35 (1):253-266.
    We offer a formal treatment of the semantics of both complete and incomplete mistrustful or distrustful information transmissions. The semantics of such relations is analysed in view of rules that define the behaviour of a receiving agent. We justify this approach in view of human agent communications and secure system design. We further specify some properties of such relations.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  20.  61
    Introduction: conceptual framework and research design for a comparative analysis of national eID Management Systems in selected European countries. [REVIEW]Herbert Kubicek - 2010 - Identity in the Information Society 3 (1):5-26.
    This paper introduces the objectives and basic approach of a collaborative comparative research project on the introduction of national electronic Identity Management Systems (eIDMS) in Member States of the European Union. Altogether eight country case studies have been produced in two waves by researchers in the respective countries, which will be presented in the following articles in this special issue. The studies adopt a common conceptual framework and use the same terminology, which will be presented in this introduction, just as (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  21.  21
    Designing databases that enhance people’s privacy without hindering organizations: Towards informational self-determination.Thomas B. Hodel-Widmer - 2006 - Ethics and Information Technology 8 (1):3-15.
    We argue that future database systems must provide autonomy for individuals for the privacy of data they manage. We propose a design for such a system, identify challenges and problems, and suggest some approaches to these. We enunciate the reasons for informational self-determination systems, which include legal, organizational and technical issues. Our main goal is to achieve a widely-accepted realistic and practical solution in order to ensure privacy for individuals in our future world, yet without hindering business and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  22.  31
    The development of guidelines for implementing information technology to promote food security.Stephen E. Gareau - 2004 - Agriculture and Human Values 21 (4):273-285.
    Food insecurity, and its extreme form, hunger, occur whenever the accessibility to an adequate supply of nutritional and safe foods becomes restricted or unpredictable. They are recurring problems in certain regions of the US, as well as in many parts of the world. According to nation-wide surveys conducted by the US Bureau of the Census, between 1996 and 1998 an estimated 9.7% of US households were classified as food insecure (6.2% being food insecure without evidence of hunger, and 3.5% being (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23.  7
    Application of data mining technology in detecting network intrusion and security maintenance.Mehedi Masud, Roobaea Alroobaea, Fahad M. Almansour, Gurjot Singh Gaba & Yongkuan Zhu - 2021 - Journal of Intelligent Systems 30 (1):664-676.
    In order to correct the deficiencies of intrusion detection technology, the entire computer and network security system are needed to be more perfect. This work proposes an improved k-means algorithm and an improved Apriori algorithm applied in data mining technology to detect network intrusion and security maintenance. The classical KDDCUP99 dataset has been utilized in this work for performing the experimentation with the improved algorithms. The algorithm’s detection rate and false alarm rate are compared with the experimental data before (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  18
    Design Issues in Ethical Agent Computing.L. Pretorius, A. Barnard & E. Cloete - 2004 - Acm Sigcas Computers and Society 34 (1):3.
    Agent computing, and in particular intelligent mobile agent computing, is at present awarded increasing prominence in the literature. This is partly due to the pervasive nature of available Internet technologies such as search engines and booking agents. It is within this context that the importance of investigating various characteristics demonstrated by mobile agent computing is becoming apparent. In order to perform specialized tasks on behalf of their owners, a certain amount of intelligence in mobile agents is often assumed or expected. (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  25.  3
    Well-Designed Food Governance as Psychological Mechanism of Consumer Perceptions in the Context of Tourism Poverty Alleviation.Guo-Qing Huang & Kuen-Lin Lin - 2021 - Frontiers in Psychology 11.
    Poverty is a challenge leading to food insecurity in people's minds. This article discusses food governance as a psychological mechanism to facilitate the sense of wellness in people's minds in the context of tourism poverty alleviation. Mainly, we argue that, when a government is implementing tourism poverty alleviation, not only are economic efforts, but also positive psychological feelings are required. We, thus, argue that sound food governance may increase the sense of wellness in the minds of people as food consumers (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  25
    Systems Approach to Comparative Criminological Studies: Conceptual Issues.Sergiy Nezhurbida - 2013 - Jurisprudencija: Mokslo darbu žurnalas 20 (1):267-282.
    The author has made the attempt to develop conceptual issues of systems approach to comparative criminological studies. The article deals with “bedrock” of criminology (and comparative criminology) as interdisciplinary science. In this article, the systems approach to comparative criminological studies has been defined. The author argues that practically all modern sciences are designed according to systems approach. Analysis of scientific literature enabled the author to state that systems approach was/is applied to the studies of political systems, legal systems, criminal legal (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  27.  6
    Intelligent terminal security technology of power grid sensing layer based upon information entropy data mining.Zhibin Yang, Gang Wang, Shuheng Xu, Yaodong Tao, Defeng Chen & Shuai Ren - 2022 - Journal of Intelligent Systems 31 (1):817-834.
    The power grid is an important connection between power sources and users, responsible for supplying and distributing electric energy to users. Modern power grids are widely distributed and large in scale, and their security faces new problems and challenges. Information entropy theory is an objective weighting method that compares the information order of each evaluation index to judge the weight value. With the wide application of entropy theory in various disciplines, the subject of introducing entropy into the power system (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  19
    Guidance systems: from autonomous directives to legal sensor-bilities.Simon M. Taylor & Marc De Leeuw - 2021 - AI and Society 36 (2):521-534.
    The design of collaborative robotics, such as driver-assisted operations, engineer a potential automation of decision-making predicated on unobtrusive data gathering of human users. This form of ‘somatic surveillance’ increasingly relies on behavioural biometrics and sensory algorithms to verify the physiology of bodies in cabin interiors. Such processes secure cyber-physical space, but also register user capabilities for control that yield data as insured risk. In this technical re-formation of human–machine interactions for control and communication ‘a dissonance of attribution’ :7684, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  29.  8
    Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication.Banghua Wu, Shah Nazir & Neelam Mukhtar - 2020 - Complexity 2020:1-12.
    Security has become one of the important factors for any network communication and transmission of data packets. An organization with an optimal security system can lead to a successful business and can earn huge profit on the business they are doing. Different network devices are linked to route, compute, monitor, and communicate various real-time developments. The hackers are trying to attack the network and want to draw the organization’s significant information for its own profits. During the communication, if an (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  6
    Developing a theory-based information security management framework for human service organizations.Sameera Mubarak - 2016 - Journal of Information, Communication and Ethics in Society 14 (3):254-271.
    Purpose This paper aims to identify organizations’ information security issues and to explore dynamic, organizational culture and contingency theories to develop an implementable framework for information security systems in human service organizations based soundly in theory and practice. Design/methodology/approach The paper includes a critical review of global information security management issues for HSOs and relevant multi-disciplinary organizational theories to address them. Findings Effective information security management can be particularly challenging to HSO because of their use of volunteer staff in (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  4
    Museum Display Showcase Furniture System Research Based on Internet of Things Technology in Intelligent Environment.Jiaojiao Hu, Zhihui Wu & Lei Jin - 2021 - Complexity 2021:1-14.
    The protection of cultural relics has always been an important issue in the field of museums and archaeology. With the development of Internet of Things technology, the security system of the museum is more intelligent and integrated. In order for the museum display system to keep up with the intelligent age, this article mainly studies the research and realization of the museum showcase system based on the Internet of Things technology in a smart environment. Before the start (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32. Management Information System of Public Secondary Schools in Sagbayan District: A Proposed Implementation.Fernando Enad & Nestor Balicoco - 2023 - Psychology and Education: A Multidisciplinary Journal 13 (1):1-7.
    This research tackled the challenges public secondary schools in Sagbayan District, Bohol, faced regarding records management. The study employed a mixed research design, combining both descriptive-qualitative and descriptive- quantitative methods. The qualitative phase involved conducting in-depth interviews and focus group discussions with relevant stakeholders involved in records management. On the other hand, the quantitative phase utilized survey questionnaires to gather data from relevant stakeholders to determine the acceptability of the proposed MIS among end-users. The first phase findings revealed various (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  14
    Improving Student Engagement in the Study of Professional Ethics: Concepts and an Example in Cyber Security.John D. Bustard - 2018 - Science and Engineering Ethics 24 (2):683-698.
    In spite of the acknowledged importance of professional ethics, technical students often show little enthusiasm for studying the subject. This paper considers how such engagement might be improved. Four guiding principles for promoting engagement are identified: aligning teaching content with student interests; taking a pragmatic rather than a philosophical approach to issue resolution; addressing the full complexity of real-world case studies; and covering content in a way that students find entertaining. The use of these principles is then discussed with respect (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  27
    Hybrid Real-Time Protection System for Online Social Networks.Muneer Bani Yassein, Shadi Aljawarneh & Yarub Wahsheh - 2020 - Foundations of Science 25 (4):1095-1124.
    The impact of Online Social Networks on human lives is foreseen to be very large with unprecedented amount of data and users. OSN users share their ideas, photos, daily life events, feelings and news. Since OSNs’ security and privacy challenges are more potential than ever before, it is necessary to enhance the protection and filtering approaches of OSNs contents. This paper explores OSNs’ threats and challenges, and categorize them into: account-based, URL-based and content-based threats. In addition, we analyze the existing (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  43
    Gender, livestock assets, resource management, and food security: Lessons from the SR-CRSP. [REVIEW]Corinne Valdivia - 2001 - Agriculture and Human Values 18 (1):27-39.
    North Sumatra and West Java in Indonesia, the Andes of Bolivia and Peru, Western Province, the Coast and Machakos in Kenya, were Small Ruminant Collaborative Research Support Program (SR-CRSP) sites in which the role of small ruminants was studied and where technological interventions were designed. In all cases the target groups were poor rural households that could maintain sheep, goats, or South American camelids. The objective was to increase the welfare of families through the use of small ruminant technologies. Access (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  36.  21
    Value Change in Energy Systems.Behnam Taebi & Ibo van de Poel - 2022 - Science, Technology, and Human Values 47 (3):371-379.
    The ongoing energy transition toward more sustainable energy systems implies a change in the values for which such systems are designed. The energy transition however is not just about sustainability but also about values like energy security and affordability, and we witness the emergence of new values like energy justice and energy democracy. How can we understand such value changes and how can or should they affect the design of future energy systems? This introduction to the special section on (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  37.  18
    Use of Official Data of State Institutions in the Scientific Research of the Population Security.Vidmantas Egidijus Kurapka & Viktoras Justickis - 2010 - Jurisprudencija: Mokslo darbu žurnalas 121 (3):283-294.
    The paper discusses the problems in the detection of security information in legal and other administrative data. The authors analyse the prospects of the use of datamining in the solution of two key problems: abundance and indirectness of these data. Security research uses two kinds of data. The first one is scientific data, designed and gathered specially for the verification of certain security theories. They are the data of criminological, sociological, psychological surveys, experimental data, etc. The second kind is data (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  38. Global Regulatory System of Human Resources Development.Sergii Sardak - 2014 - Dissertation, Київський Національний Економічний Університет Імені Вадима Гетьмана
    ANNOTATION Sardak S.E. Global Regulatory System of Human Resources Development. – Manuscript. Thesis for the Doctor of Economic Science academic degree with major in 08.00.02 – World Economy and international economic relations. – SHEE «Kyiv National Economic University named after Vadym Hetman», Kyiv, 2014. The preconditions and factors of the global economic system with the identified relevant subjects areas and mechanisms of regulation instruments have been investigated. The crucial role of humans in the global economic system as (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  30
    The Business of Research in Art and Design: Parallels Between Research Centres and Small Businesses.Seymour Roworth-Stokes - 2013 - Journal of Research Practice 9 (1):Article M3.
    This article provides a cross-case analysis of four art and design research centres operating within UK universities. Findings from autobiographical and semi-structured interviews with researchers, research managers, and research leaders indicate that they encounter similar issues in trying to establish internal legitimacy within the university alongside the need to gain external support and recognition. In dealing with these challenges, art and design research centres tend to pass through four broadly identifiable phases: (i) Origination (utilising credentials and leadership capacity), (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  40.  8
    Teaching Strategies and Psychological Effects of Entrepreneurship Education for College Students Majoring in Social Security Law Based on Deep Learning and Artificial Intelligence.Qinlei Zhu & Hao Zhang - 2022 - Frontiers in Psychology 13.
    This study aims to achieve the goal of cultivating and reserving emerging professional talents in social security law, improve the curriculum and mechanism of entrepreneurship education, and improve students’ entrepreneurial willingness and entrepreneurial ability. Deep learning technology is used to study the psychological effects of entrepreneurship education for college students majoring in social security law. Firstly, the concept of entrepreneurial psychology is elaborated and summarized. A related model is designed using the theory of proactive personality and planned behavior through questionnaire (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  5
    Optimization of the Enterprise Human Resource Management Information System Based on the Internet of Things.Haiqiu Li - 2021 - Complexity 2021:1-12.
    In this paper, the optimization of the enterprise HR information system is studied based on IoT first-off technology, the system demand phase is analysed, and the edge control system is designed and built. The hardware and software system and edge node management platform are implemented first, and then the communication scenarios between the edge layer of the system and the sensing layer, the edge layer, and the cloud layer are analysed, and the business type-driven link (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  7
    A New Chaotic System with Only Nonhyperbolic Equilibrium Points: Dynamics and Its Engineering Application.Maryam Zolfaghari-Nejad, Mostafa Charmi & Hossein Hassanpoor - 2022 - Complexity 2022:1-16.
    In this work, we introduce a new non-Shilnikov chaotic system with an infinite number of nonhyperbolic equilibrium points. The proposed system does not have any linear term, and it is worth noting that the new system has one equilibrium point with triple zero eigenvalues at the origin. Also, the novel system has an infinite number of equilibrium points with double zero eigenvalues that are located on the z -axis. Numerical analysis of the system reveals many (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  42
    Not just what, but how: Creating agricultural sustainability and food security by changing Canada's agricultural policy making process. [REVIEW]Rod MacRae - 1999 - Agriculture and Human Values 16 (2):187-202.
    Agriculture has been enormously productive in recent decades. The main problem is that fragmentation of issues, knowledge, and responsibilities has hidden the costs associated with this success. These are mainly environmental, social, and health costs, which have been assigned to other ministries, with their own histories unconnected to agriculture. Now that agricultural policy has achieved its success, its costs are becoming apparent. The current system is preoccupied with traditional views of competitiveness and efficiency. Policies, programs, and regulations are organized (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  44.  22
    Integrated Care Systems as an Arena for the Emergence of New Forms of Epistemic Injustice.Andrew Fletcher & Jeremy Clarke - 2020 - Ethical Theory and Moral Practice 23 (5):723-737.
    Epistemic injustice has rapidly become a powerful tool for analysis of otherwise hidden social harms. Yet empirical research into how resistance to knowing and understanding can be generated and replicated in social programmes is limited. We have identified a range of subtle and not-so-subtle inflections of epistemic injustice as they play out in an intervention for people with chronic depression in receipt of disability benefits. This article describes the different ‘species’ of epistemic injustice observed and reveals how these are unintentionally (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  6
    National Security System of the Republic of China.Oliver Bakreski - 2017 - Годишен зборник на Филозофскиот факултет/The Annual of the Faculty of Philosophy in Skopje 70:263-282.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  3
    National security system of Spain.Oliver Bakreski - 2021 - Годишен зборник на Филозофскиот факултет/The Annual of the Faculty of Philosophy in Skopje 74:345-357.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  5
    National Security System of Israel.Oliver Bakreski - 2022 - Годишен зборник на Филозофскиот факултет/The Annual of the Faculty of Philosophy in Skopje 75:223-233.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  35
    The Austrian case: multi-card concept and the relationship between citizen ID and social security cards. [REVIEW]Georg Aichholzer & Stefan Strauß - 2010 - Identity in the Information Society 3 (1):65-85.
    National electronic identity (e-ID) card schemes and electronic identity management systems (e-IDMS) in Europe are characterised by considerable diversity. This contribution analyses the creation of a national e-IDMS in Austria with the aim of improving our understanding of the reasons behind the genesis of particular designs of national e-IDMS. It seeks to explain how the system’s specific design evolved and which factors shaped its appearance. Being part of a comparative four country study, a common theoretical framework is employed (...)
    No categories
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  49.  10
    Resilience and Protection of Health Care and Research Laboratory Workers During the SARS-CoV-2 Pandemic: Analysis and Case Study From an Austrian High Security Laboratory.Martina Loibner, Paul Barach, Stella Wolfgruber, Christine Langner, Verena Stangl, Julia Rieger, Esther Föderl-Höbenreich, Melina Hardt, Eva Kicker, Silvia Groiss, Martin Zacharias, Philipp Wurm, Gregor Gorkiewicz, Peter Regitnig & Kurt Zatloukal - 2022 - Frontiers in Psychology 13.
    The SARS-CoV-2 pandemic has highlighted the interdependency of healthcare systems and research organizations on manufacturers and suppliers of personnel protective equipment and the need for well-trained personnel who can react quickly to changing working conditions. Reports on challenges faced by research laboratory workers are rare in contrast to the lived experience of hospital health care workers. We report on experiences gained by RLWs who significantly contributed to combating the pandemic under particularly challenging conditions due to increased workload, sickness and interrupted (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  18
    Pseudorandom Number Generator Based on Three Kinds of Four-Wing Memristive Hyperchaotic System and Its Application in Image Encryption.Xi Chen, Shuai Qian, Fei Yu, Zinan Zhang, Hui Shen, Yuanyuan Huang, Shuo Cai, Zelin Deng, Yi Li & Sichun Du - 2020 - Complexity 2020:1-17.
    In this paper, we propose a method to design the pseudorandom number generator using three kinds of four-wing memristive hyperchaotic systems with different dimensions as multientropy sources. The principle of this method is to obtain pseudorandom numbers with good randomness by coupling XOR operation on the three kinds of FWMHSs with different dimensions. In order to prove its potential application in secure communication, the security of PRNG based on this scheme is analyzed from the perspective of cryptography. In (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
1 — 50 / 998