Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Information security practice tests.

Artykuły w czasopismach na temat „Information security practice tests”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Information security practice tests”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Li, Chengcheng. "Penetration Testing Curriculum Development in Practice". Journal of Information Technology Education: Innovations in Practice 14 (2015): 085–99. http://dx.doi.org/10.28945/2189.

Pełny tekst źródła
Streszczenie:
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity professionals nationwide throughout the next decade. To fill this job shortage we need a workforce with strong hands-on experience in the latest technologies and software tools to catch up with the rapid evolution of network technologies. It is vital that the IT professionals possess up-to-date technical skills and think and act one step ahead of the cyber criminals who are constantly probing and exploring system vulnerabilities. There is no perfect security mechanism that can defeat all the cyber-attacks; the traditional defensive security mechanism will eventually fail to the pervasive zero-day attacks. However, there are steps to follow to reduce an organization’s vulnerability to cyber-attacks and to mitigate damages. Active security tests of the network from a cyber-criminal’s perspective can identify system vulnerabilities that may lead to future breaches. “If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. But if you know the enemy and know yourself, you need not fear the result of hundred battles” (Sun, 2013). Penetration testing is a discipline within cybersecurity that focuses on identifying and exploiting the vulnerabilities of a network, eventually obtaining access to the critical business information. The pentesters, the security professionals who perform penetration testing, or ethical hackers, break the triad of information security - Confidentiality, Integrity, and Accountability (CIA) - as if they were a cyber-criminal. The purpose of ethical hacking or penetration testing is to know what the “enemy” can do and then generate a report for the management team to aid in strengthening the system, never to cause any real damages. This paper introduces the development of a penetration testing curriculum as a core class in an undergraduate cybersecurity track in Information Technology. The teaching modules are developed based on the professional penetration testing life cycle. The concepts taught in the class are enforced by hands-on lab exercises. This paper also shares the resources that are available to institutions looking for teaching materials and grant opportunities to support efforts when creating a similar curriculum in cybersecurity.
Style APA, Harvard, Vancouver, ISO itp.
2

Samios, Michael, Christos P. Evangelidis i Emmanouil Serrelis. "Assessment of Information Security Vulnerabilities in Common Seismological Equipment". Seismological Research Letters 92, nr 2A (10.02.2021): 933–40. http://dx.doi.org/10.1785/0220200151.

Pełny tekst źródła
Streszczenie:
Abstract Modern seismic and Global Navigation Satellite Systems stations are nowadays equipped with Internet of Things devices that acquire, process, and transmit various geophysical parameters in near-real time. This technological advance has introduced a new threat paradigm for common seismological devices. Such threats can be assessed with standard information security methods and practices. This article aims to identify security weaknesses, describe weak security points and potential attacks on such environments, and anticipate the countermeasures needed. Real tests and attacks have been applied to demonstrate the lack of data encryption and user authentication processes, the risks posed by unencrypted communication protocols, unsafe practices regarding settings and passwords, and poor design implementations. All these factors may impact and possibly disrupt the daily operation of seismic observatories because they can lead to falsifying data, altering configurations, or producing malicious false alarms. These in turn may cause unnecessary public concern or distrust, financial losses, or even national security issues. For all these reasons, several countermeasures and solutions are also proposed and evaluated to address each of the identified vulnerabilities.
Style APA, Harvard, Vancouver, ISO itp.
3

Rohn, Eli, Gilad Sabari i Guy Leshem. "Explaining small business InfoSec posture using social theories". Information & Computer Security 24, nr 5 (14.11.2016): 534–56. http://dx.doi.org/10.1108/ics-09-2015-0041.

Pełny tekst źródła
Streszczenie:
Purpose This study aims to investigate information technology security practices of very small enterprises. Design/methodology/approach The authors perform a formal information security field study using a representative sample. Using the Control Objectives for IT (COBIT) framework, the authors evaluate 67 information security controls and perform 206 related tests. The authors state six hypotheses about the findings and accept or reject those using inferential statistics. The authors explain findings using the social comparison theory and the rare events bias theory. Findings Only one-third of all the controls examined were designed properly and operated as expected. About half of the controls were either ill-designed or did not operate as intended. The social comparison theory and the rare events bias theory explain managers’s reliance on small experience samples which in turn leads to erroneous comprehension of their business environment, which relates to information security. Practical implications This information is valuable to executive branch policy makers striving to reduce information security vulnerability on local and national levels and small business organizations providing information and advice to their members. Originality/value Information security surveys are usually over-optimistic and avoid self-incrimination, yielding results that are less accurate than field work. To obtain grounded facts, the authors used the field research approach to gather qualitative and quantitative data by physically visiting active organizations, interviewing managers and staff, observing processes and reviewing written materials such as policies, procedure and logs, in accordance to common practices of security audits.
Style APA, Harvard, Vancouver, ISO itp.
4

Ikhalia, Ehinome, Alan Serrano, David Bell i Panos Louvieris. "Online social network security awareness: mass interpersonal persuasion using a Facebook app". Information Technology & People 32, nr 5 (7.10.2019): 1276–300. http://dx.doi.org/10.1108/itp-06-2018-0278.

Pełny tekst źródła
Streszczenie:
Purpose Online social network (OSN) users have a high propensity to malware threats due to the trust and persuasive factors that underpin OSN models. The escalation of social engineering malware encourages a growing demand for end-user security awareness measures. The purpose of this paper is to take the theoretical cybersecurity awareness model TTAT-MIP and test its feasibility via a Facebook app, namely social network criminal (SNC). Design/methodology/approach The research employs a mixed-methods approach to evaluate the SNC app. A system usability scale measures the usability of SNC. Paired samples t-tests were administered to 40 participants to measure security awareness – before and after the intervention. Finally, 20 semi-structured interviews were deployed to obtain qualitative data about the usefulness of the App itself. Findings Results validate the effectiveness of OSN apps utilising a TTAT-MIP model – specifically the mass interpersonal persuasion (MIP) attributes. Using TTAT-MIP as a guidance, practitioners can develop security awareness systems that better leverage the intra-relationship model of OSNs. Research limitations/implications The primary limitation of this study is the experimental settings. Although the results testing the TTAT-MIP Facebook app are promising, these were set under experimental conditions. Practical implications SNC enable persuasive security behaviour amongst employees and avoid potential malware threats. SNC support consistent security awareness practices by the regular identification of new threats which may inspire the creation of new security awareness videos. Social implications The structure of OSNs is making it easier for malicious users to carry out their activities without the possibility of detection. By building a security awareness programme using the TTAT-MIP model, organisations can proactively manage security awareness. Originality/value Many security systems are cumbersome, inconsistent and non-specific. The outcome of this research provides organisations and security practitioners with a framework for designing and developing proactive and tailored security awareness systems.
Style APA, Harvard, Vancouver, ISO itp.
5

Yang, Wei, i Anni Jia. "Side-Channel Leakage Detection with One-Way Analysis of Variance". Security and Communication Networks 2021 (5.03.2021): 1–13. http://dx.doi.org/10.1155/2021/6614702.

Pełny tekst źródła
Streszczenie:
Side-channel analysis (SCA) is usually used for security evaluation to test the side-channel vulnerability of a cryptographic device. However, in practice, an analyser may need to cope with enormous amounts of side-channel measurement data to extract valuable information for SCA. Under the circumstances, side-channel leakage detection can be used to identify leakage points which contain secret information and therefore improve the efficiency of security assessment. This investigation proposes a new black-box leakage detection approach on the basis of the one-way analysis of variance (ANOVA). In accordance with the relevance between leakage points and inputs of a cryptographic algorithm, the proposed method divides side-channel samples into multiple classes and tests the difference among these classes by taking advantage of the one-way ANOVA. Afterwards, leakage points and nonleakage points can be distinguished by determining whether the null hypothesis is accepted. Further, we extend our proposed method to multichannel leakage detection. In particular, a new SCA attack with a F -statistic-based distinguisher is capable of developing if the input of the leakage detection approach is replaced by a sensitive intermediate variable. Practical experiments show the effectiveness of the proposed methods.
Style APA, Harvard, Vancouver, ISO itp.
6

Kubiak, Ireneusz, i Artur Przybysz. "Fourier and Chirp-Z Transforms in the Estimation Values Process of Horizontal and Vertical Synchronization Frequencies of Graphic Displays". Applied Sciences 12, nr 10 (23.05.2022): 5281. http://dx.doi.org/10.3390/app12105281.

Pełny tekst źródła
Streszczenie:
The electromagnetic protection of IT devices includes a number of organizational and technical measures aimed at ensuring control over radiated and conducted revealing emissions. This is of particular importance for ensuring information security in wireless communication and the processing of data presented in graphic form. In each of these cases, the occurring electromagnetic emissions pose the risk of a lack of electromagnetic immunity to the so-called eavesdropping process based on forming revealing emissions. Included in the elements of the security chain preventing electromagnetic eavesdropping on wireless communication and the devices building such systems are activities related to the determination of the Technical Device Security Level (TDSL) or its class. The above is related to the performance of electromagnetic emissions tests and identifying which of them must be treated as revealing emissions, which are only disturbances and do not threaten the security of the processed information. It is intuitively understandable that it is particularly important to ensure the security of interfaces that process video data. The nature of the electromagnetic emission signals generated by these interfaces means that the related information can be intercepted with the use of relatively simple methods, and under favorable circumstances even with the use of a receiving device not very technologically advanced. In the case of the electromagnetic safety assessment of video devices, common practice is therefore activities aimed at reconstructing information related to the video signal. This requires the parameters of the reconstructed image appropriate for the eavesdropped device operation mode and the conditions of recording the revealing emission signals to be determined. The article presents the results of works related to the analysis of the possibility of using spectral analysis methods (Fast Fourier FFT transform and Chirp-Z transform) to automate the process of determining the above-mentioned parameters in the case of reproducing images from emission signals recorded by using the ADC analog-to-digital converter.
Style APA, Harvard, Vancouver, ISO itp.
7

Ricciardi, Carlo, Adelmo Gubitosi, Donatella Vecchione, Giuseppe Cesarelli, Francesco De Nola, Roberto Ruggiero, Ludovico Docimo i Giovanni Improta. "Comparing Two Approaches for Thyroidectomy: A Health Technology Assessment through DMAIC Cycle". Healthcare 10, nr 1 (8.01.2022): 124. http://dx.doi.org/10.3390/healthcare10010124.

Pełny tekst źródła
Streszczenie:
Total thyroidectomy is very common in endocrine surgery and the haemostasis can be obtained in different ways across surgery; recently, some devices have been developed to support this surgical phase. In this paper, a health technology assessment is conducted through the define, measure, analyse, improve, and control cycle of the Six Sigma methodology to compare traditional total thyroidectomy with the surgical operation performed through a new device in an overall population of 104 patients. Length of hospital stay, drain output, and time for surgery were considered the critical to qualities in order to compare the surgical approaches which can be considered equal regarding the organizational, ethical, and security impact. Statistical tests (Kolmogorov–Smirnov, t test, ANOVA, Mann–Whitney, and Kruskal–Wallis tests) and visual management diagrams were employed to compare the approaches, but no statistically significant difference was found between them. Considering these results, this study shows that the introduction of the device to perform total thyroidectomy does not guarantee appreciable clinical advantages. A cost analysis to quantify the economic impact of the device into the practice could be a future development. Healthy policy leaders and clinicians who are requested to make decisions regarding the supply of biomedical technologies could benefit from this research.
Style APA, Harvard, Vancouver, ISO itp.
8

Mundt, Christopher C. "Pyramiding for Resistance Durability: Theory and Practice". Phytopathology® 108, nr 7 (lipiec 2018): 792–802. http://dx.doi.org/10.1094/phyto-12-17-0426-rvw.

Pełny tekst źródła
Streszczenie:
Durable disease resistance is a key component of global food security, and combining resistance genes into “pyramids” is an important way to increase durability of resistance. The mechanisms by which pyramids impart durability are not well known. The traditional view of resistance pyramids considers the use of major resistance gene (R-gene) combinations deployed against pathogens that are primarily asexual. Interestingly, published examples of the successful use of pyramids in the traditional sense are rare. In contrast, most published descriptions of durable pyramids in practice are for cereal rusts, and tend to indicate an association between durability and cultivars combining major R-genes with incompletely expressed, adult plant resistance genes. Pyramids have been investigated experimentally for a diversity of pathogens, and many reduce disease levels below that of the single best gene. Resistance gene combinations have been identified through phenotypic reactions, molecular markers, and challenge against effector genes. As resistance genes do not express equally in all genetic backgrounds, however, a combination of genetic information and phenotypic analyses provide the ideal scenario for testing of putative pyramids. Not all resistance genes contribute equally to pyramids, and approaches have been suggested to identify the best genes and combinations of genes for inclusion. Combining multiple resistance genes into a single plant genotype quickly is a challenge that is being addressed through alternative breeding approaches, as well as through genomics tools such as resistance gene cassettes and gene editing. Experimental and modeling tests of pyramid durability are in their infancy, but have promise to help direct future studies of pyramids. Several areas for further work on resistance gene pyramids are suggested.
Style APA, Harvard, Vancouver, ISO itp.
9

Akashi, Nozomi, Kohei Nakajima, Mitsuru Shibayama i Yasuo Kuniyoshi. "A mechanical true random number generator". New Journal of Physics 24, nr 1 (1.01.2022): 013019. http://dx.doi.org/10.1088/1367-2630/ac45ca.

Pełny tekst źródła
Streszczenie:
Abstract Random number generation has become an indispensable part of information processing: it is essential for many numerical algorithms, security applications, and in securing fairness in everyday life. Random number generators (RNGs) find application in many devices, ranging from dice and roulette wheels, via computer algorithms, lasers to quantum systems, which inevitably capitalize on their physical dynamics at respective spatio-temporal scales. Herein, to the best of our knowledge, we propose the first mathematically proven true RNG (TRNG) based on a mechanical system, particularly the triple linkage of Thurston and Weeks. By using certain parameters, its free motion has been proven to be an Anosov flow, from which we can show that it has an exponential mixing property and structural stability. We contend that this mechanical Anosov flow can be used as a TRNG, which requires that the random number should be unpredictable, irreproducible, robust against the inevitable noise seen in physical implementations, and the resulting distribution’s controllability (an important consideration in practice). We investigate the proposed system’s properties both theoretically and numerically based on the above four perspectives. Further, we confirm that the random bits numerically generated pass the standard statistical tests for random bits.
Style APA, Harvard, Vancouver, ISO itp.
10

Meira, Jessica Vieira de Souza, Murat Hancer, Sara Joana Gadotti dos Anjos i Anita Eves. "Human resources practices and employee motivation in the hospitality industry: A cross-cultural research". Tourism and hospitality management 29, nr 2 (2023): 157–67. http://dx.doi.org/10.20867/thm.29.2.1.

Pełny tekst źródła
Streszczenie:
Purpose –This study conducted a comparative analysis between hotels located in Brazil and England on human resource practices and employee motivation, using the cultural dimensions developed by Hofstede (1980) and the conservation of resources theory. Design/Methodology/Approach – Questionnaires were completed by 154 hotels, 96 and 58 dyads of human resources managers and frontline employees from Brazil and England, respectively, corresponding to a total of 308 respondents. Importance-performance analysis was used to examine the data collected through independent t-tests. Findings – The results showed that Brazilian managers considered training as the most important human resources practice, while information sharing had the best performance in their hotels. English managers ranked employment security with the highest importance and performance ratings. Brazilian frontline employees ranked intrinsic motivation with the highest importance and performance ratings, while English frontline employees ranked extrinsic motivation with the highest importance and performance ratings. Originality of the research – This research extended previous studies using the conservation of resources theory and also developed competitive strategies targeted to specific cultures. Another contribution was the comparative study between hotel employees (managers and frontline) from two countries (Brazil and England), applying the importance-performance analysis.
Style APA, Harvard, Vancouver, ISO itp.
11

Nagaraj, Kalyan, Biplab Bhattacharjee, Amulyashree Sridhar i Sharvani GS. "Detection of phishing websites using a novel twofold ensemble model". Journal of Systems and Information Technology 20, nr 3 (13.08.2018): 321–57. http://dx.doi.org/10.1108/jsit-09-2017-0074.

Pełny tekst źródła
Streszczenie:
Purpose Phishing is one of the major threats affecting businesses worldwide in current times. Organizations and customers face the hazards arising out of phishing attacks because of anonymous access to vulnerable details. Such attacks often result in substantial financial losses. Thus, there is a need for effective intrusion detection techniques to identify and possibly nullify the effects of phishing. Classifying phishing and non-phishing web content is a critical task in information security protocols, and full-proof mechanisms have yet to be implemented in practice. The purpose of the current study is to present an ensemble machine learning model for classifying phishing websites. Design/methodology/approach A publicly available data set comprising 10,068 instances of phishing and legitimate websites was used to build the classifier model. Feature extraction was performed by deploying a group of methods, and relevant features extracted were used for building the model. A twofold ensemble learner was developed by integrating results from random forest (RF) classifier, fed into a feedforward neural network (NN). Performance of the ensemble classifier was validated using k-fold cross-validation. The twofold ensemble learner was implemented as a user-friendly, interactive decision support system for classifying websites as phishing or legitimate ones. Findings Experimental simulations were performed to access and compare the performance of the ensemble classifiers. The statistical tests estimated that RF_NN model gave superior performance with an accuracy of 93.41 per cent and minimal mean squared error of 0.000026. Research limitations/implications The research data set used in this study is publically available and easy to analyze. Comparative analysis with other real-time data sets of recent origin must be performed to ensure generalization of the model against various security breaches. Different variants of phishing threats must be detected rather than focusing particularly toward phishing website detection. Originality/value The twofold ensemble model is not applied for classification of phishing websites in any previous studies as per the knowledge of authors.
Style APA, Harvard, Vancouver, ISO itp.
12

Fiačan, Jakub, Jozef Jenis, Damián Čechmánek, Slavomír Hrček i Pavol Michal. "Structural Design and Safety Verification of a Service Hatch Used at Airports by FEM Analysis". Infrastructures 8, nr 4 (6.04.2023): 73. http://dx.doi.org/10.3390/infrastructures8040073.

Pełny tekst źródła
Streszczenie:
This paper examines the design of a maintenance shaft hatch cover at an airport service road which will be utilized at airports in the European Union. The shaft has a particular application: it will be used for information networks and airport security. The hatch is also subject to extremely stringent safety criteria. For instance, in a catastrophic case, a wheel from an aircraft could strike the hatch cover. Based on all the input information and after a thorough analysis of the European standards concerning the safety of transport, after performing numerous FEM static evaluations, a hatch cover that can be utilized in airport infrastructure was created. As a result of the FEM analyses, the elements with the greatest impact on static safety were identified. Finally, a simulation of stress tests based on the traffic areas for which the hatch cover was designed, in terms of traffic safety, was carried out. The test led to a positive result, showing that it is possible to apply the hatch directly in practice.
Style APA, Harvard, Vancouver, ISO itp.
13

LIN, ANNIE W., FRANK A. GRANATA, ABIGAIL K. TRIPPEL, LESLIE TELLO, TAMMY K. STUMP, MANDY WONG, MERCEDES R. CARNETHON, KIARRI N. KERSHAW, JENNIFER MAKELARSKI i DANIEL WELLER. "Food Handling Concerns and Practices at Home during the COVID-19 Pandemic by Food Security Status". Journal of Food Protection 85, nr 3 (9.12.2021): 518–26. http://dx.doi.org/10.4315/jfp-21-216.

Pełny tekst źródła
Streszczenie:
ABSTRACT There is limited examination about coronavirus disease 19 (COVID-19)–related food handling concerns and practices that cause chemical or microbial contamination and illness, particularly among those with food insecurity. We investigated consumer food handling concerns and practices during the COVID-19 pandemic and whether they differed by food insecurity status. An online survey was distributed among Chicago, IL, residents between 15 July and 21 August 2020 (n = 437). Independent t tests and Fisher's exact tests were used to identify differences in food handling concerns and practices between those with and without food insecurity (alpha = 0.05). Survey items included questions about food handling practices that were considered safe or neutral (i.e., washing hands and produce with water, sanitizing food packaging) and unsafe (i.e., using cleaning agents to wash foods, leaving perishable foods outside) by using 5-point Likert-style scales or categorical responses (i.e., yes, no). Participant responses fell between “slightly” and “somewhat” concerned about contracting COVID-19 from food and food packaging (mean ± standard error [SE]: 2.7 ± 0.1). Although participants reported washing their hands before eating and before preparing foods at least “most of the time” (mean ± SE: 4.4 ± 0.0 and 4.5 ± 0.0, respectively), only one-third engaged in unsafe practices. The majority of participants (68%) indicated that they altered food handling practices due to the COVID-19 pandemic and received information about food safety from social media (61%). When investigating differences in concerns and practices by food insecurity status, food insecure participants were more concerned about COVID-19 foodborne transmission for all food items (all P < 0.001) and more frequently performed unsafe food handling practices than those with food security (all P < 0.001). Results from this study suggest more investigation is needed to understand barriers to safe food handling knowledge and practices, particularly among those with food insecurity. HIGHLIGHTS
Style APA, Harvard, Vancouver, ISO itp.
14

Abeer Salim Jamil, Raghad Abdulaali Azeez i Nidaa Flaih Hassan. "An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments". International Journal of Online and Biomedical Engineering (iJOE) 19, nr 01 (17.01.2023): 93–106. http://dx.doi.org/10.3991/ijoe.v19i01.36901.

Pełny tekst źródła
Streszczenie:
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
Style APA, Harvard, Vancouver, ISO itp.
15

Baizat, Faisal, Zainab Rahma i Sumaia Abusaid. "The Dark Side of IT: The Negative Aspects of Information Technology". International Journal of Technology and Systems 7, nr 2 (22.11.2022): 95–115. http://dx.doi.org/10.47604/ijts.1709.

Pełny tekst źródła
Streszczenie:
Purpose: The development of information technology (IT) has drastically helped and improved our lives. However, it also has several negative aspects that we discuss in this paper. The purpose of this research is to understand the negative impacts of information technology. Methodology: We conducted a literature review using data from previous researchers, journals, and websites. The nature of this paper is casual and analytical to focus on cause and effect and using a quantitative approach for the data collection method. We used Microsoft Excel and SPSS to record and analyze the data using both regression and correlation tests. Findings: Firstly, we found that there is a significant impact of social media on cybercrime. Secondly, we found that there is a positive relationship between user impact and distraction levels. Lastly, the results showed that there is no correlation between the overuse of technology and health issues which rejected our third hypothesis and our findings in the literature review. Despite this, we find that amount of media and technology consumption can influence the side effects of IT. We recommend that excessive usage of social media and other forms of technology should be avoided. Unique Contribution to Theory, Practice and Policy: We presented wide range of negative issues (i.e. health, cybercrime and cyberbullying) surrounding IT and social media consumption. The results of our research underscored the need to develop policies for organizations that produce or manufacture different IT products consumed by most people and operate social media platforms, in order to ensure that safety and security features are prioritized and implemented. The government and parents also play fundamental roles in minimizing the negative impacts of IT.
Style APA, Harvard, Vancouver, ISO itp.
16

Sosa-Martínez, María de Jesús, Isaac Jair León-Lozano, Yuliana García-Jiménez, Brenda Garduño-Orbe, Alfredo Josimar Lagarza-Moreno i Guillermina Juanico-Morales. "Frequency of Dyslipidemias and Cardiovascular Risk Determination in Patients with Systemic Arterial Hypertension". Atención Familiar 24, nr 4 (29.09.2023): 239–44. http://dx.doi.org/10.22201/fm.14058871p.2023.486535.

Pełny tekst źródła
Streszczenie:
Objective: to determine the frequency of dyslipidemia and cardiovascular risk (CVR) in patients with systemic arterial hypertension (SAH) in a family medicine unit. Methods: analytical cross-sectional study conducted at the Family Medicine Unit No. 26 of the Mexican Institute of Social Security (IMSS) in Acapulco, Mexico, which included 150 patients with a confirmed diagnosis of systemic arterial hypertension in the electronic clinical record, obtained by non-probabilistic sampling by convenience, from November 2020 to May 2021. It was applied a questionnaire to obtain sociodemographic information, somatometry, laboratory tests, and the cardiovascular risk was assessed with the Globorisk estimation table. Descriptive statistics, bivariate and multivariate analysis were performed with the obtained data. Results: the frequency of dyslipidemia was 56.7% (n= 85), with a greater distribution in women 67% (n= 57), female to male ratio 2:1, 22.7% (n= 34) had mixed hyperlipidemia. 48% (72/150) presented moderate cardiovascular risk. Being a man and having a glomerular filtration rate <60 ml/min/1.27m2sc increased the possibility of presenting high cardiovascular risk. Conclusion: moderate cardiovascular risk was observed in almost half of the patients. Being male and having a gfr <60 ml/min/1.27m2sc increased the risk of presenting high cvr.
Style APA, Harvard, Vancouver, ISO itp.
17

G, Anahita, Krishnapriya KPM, Shiva Prasad R i Mohan Kumar N. "HD-Sign: Hardware Based Digital Signature Generation Using True Random Number Generator". International Journal of Engineering & Technology 7, nr 3.8 (7.07.2018): 147. http://dx.doi.org/10.14419/ijet.v7i3.8.16850.

Pełny tekst źródła
Streszczenie:
With the recent advancements in the field of computing, a fair share of easier and safer practices to exchange and share information between multiple parties have propped up. While some of these are improvisations, a few such as the Digital Signatures, have fast replaced conventional signing practices. It’s wide use and acceptance in the industry as well as officially, has necessitated higher security to protect data integrity and privacy. These digital Signatures are generated on the basis of various schemes that are designed to accommodate efficiency, crypto security and algorithmic complexity. This paper proposes an alternate method named HD-SIGN for generating these digital signatures in accordance with Secure Hash Function and 512-bit SRNN cryptographic algorithm. With the aid of a TRNG module, a modification to produce a large number with two prime factors and a set of natural numbers in a pair of public and private keys has been incorporated. The LSFR based TRNG module which helps maintain the ‘True Randomness’ of any generated number has been used for this purpose. Further, the random nature of the generated sequence to be used in the digital signature, has been tested with the help of standard NIST tests. The Hamming distance has also been analyzed as a security metric for the proposal, implying the degree of unpredictability of the generated true random sequences.
Style APA, Harvard, Vancouver, ISO itp.
18

Maksymenko, M. I. "CURRENT ISSUES OF VIOLENT CRIMES IN PENAL INSTITUTIONS PREVENTION". Scientific Herald of Sivershchyna. Series: Law 2022, nr 1 (31.03.2022): 94–102. http://dx.doi.org/10.32755/sjlaw.2022.01.094.

Pełny tekst źródła
Streszczenie:
The author notes in the article that security in penal institutions consists of three components: physical, procedural and dynamic security. All three components play an important role in preventing violence in penal institutions. The author points out the main directions of improving the security components in penal institutions and identifies the main problems that arise in the activities of law enforcement officers and which are related to the prevention of violent criminal offenses. The author notes that today in the world there are so-called “synthetic drugs”, which must be included to a special list. The practice of combating drug addiction indicates that the procedure for amending this list is quite bureaucratic and does not keep up with the development of new substances. An expert, in turn, conducting an expert research, can’t recognize a substance that is not in this list of drugs. This fact makes it impossible to bring a perpetrator to justice. The article states that another problematic issue in the activities related to the prevention of violent crimes in penal institutions is the fact that convicts possess assault weapons. Bringing them to justice under Art. 263 of the Criminal Code of Ukraine (Illegal handling of the weapon, ammunition or explosives) for carrying, manufacturing, repair or sale of daggers, Finnish knives, knuckles or other cold-arms without the permission provided by the law is possible only after the conclusion of an expert. Such a conclusion must contain the information that the assault weapon seized from a convict is a cold-arms. Very often, items used by convicts as weapons in order to attack, although outwardly meet the requirements for cold-arms, but do not pass these rather severe static and dynamic tests. Key words: criminal offenses, violent crime, penal institution, prohibited items, convict.
Style APA, Harvard, Vancouver, ISO itp.
19

Gokul G L, Lakshmi T i Don K R. "Biocompatibility of Dental Materials - A Review". International Journal of Research in Pharmaceutical Sciences 11, SPL3 (21.10.2020): 1634–37. http://dx.doi.org/10.26452/ijrps.v11ispl3.3487.

Pełny tekst źródła
Streszczenie:
Biocompatibility helps in guaranteeing the soundness of patients and experts. Issues identified with it very well may be connected to the lawful obligation of dental specialists. Information with respect to the biocompatibility of generally utilized dental materials is significant so to fundamentally pass judgment on promoting claims by the producer. Poisonousness of material upon a situation in a patient's oral cavity triggers the resistant framework to clarify a fitting reaction. Along these lines, one of the numerous key obligations presented on the dental specialist is to shield patients from any untoward response. A plenty of dental materials are as of now accessible in the market. The material needs to propel a few tests so as to be securely presented for clinical practice. This survey features the range of tests routinely rehearsed for assessment of biocompatibility.
Style APA, Harvard, Vancouver, ISO itp.
20

Cho, Dong-Hyun, Si-Hyun Kim i Je-Ho Hwang. "Container Terminal-Inland Transportation Linkage Platform Model Factor Analysis". Korea International Trade Research Institute 19, nr 3 (30.06.2023): 131–44. http://dx.doi.org/10.16980/jitc.19.3.202306.131.

Pełny tekst źródła
Streszczenie:
Purpose – This research aims to derive factors when developing a data platform for container terminalinland transportation and provide implications for platform quality improvement to cope with supply chain security issues such as COVID-19. Design/methodology/approach – In this study, an extensive literature review and interviews with related business practitioners were performed to obtain detailed survey results. Independent sample T-tests were conducted to verify differences between container terminal groups and inland-carrier groups, including forwarders. Then, exploratory factor analysis and importance-performance analysis were performed using SPSS26.0. Findings – The results showed that system accessibility, quality, and diversity of information should be considered preferentially, suggesting that the efficient management of fixed capital could be possible through the strengthening of practice-oriented container terminal-inland transportation linkages. Research implications – This study proposed the introduction of a modular container terminal-inland transportation platform considering the characteristics of relatively small-scale inland-carriers and forwarders. In addition, it is possible to create competitive edge that connects maritime and inland transportation in a balanced way from the perspective of a port-based logistics cluster if the range of platform availability related to container terminals and background logistics connectivity is expanded in phases.
Style APA, Harvard, Vancouver, ISO itp.
21

Agudina, V. A. "SPECIFIC USE OF SCREENING IMMUNOCHROMATOGRAPHIC TESTS FOR THE PRIMARY DETECTION OF FACTS OF PSYCHOACTIVE SUBSTANCE USE IN URINE AND SALIVA". Marine Medicine 5, nr 2 (1.07.2019): 83–94. http://dx.doi.org/10.22328/2413-5747-2019-5-2-83-94.

Pełny tekst źródła
Streszczenie:
The use of narcotic substances is a serious social problem, a threat to the health of an individual and to the security of the country as a whole. The use of narcotic substances affects the safety of the overall productivity of labor, which, ultimately, creates a rather large burden on the economy of the country as a whole. In the framework of federal programs for the prevention of drug addiction, the practice of testing for the use of narcotic drugs at work and study places is being increasingly used. And here the question naturally arises of the significant cost, laboriousness and time-consuming test systems for the use of narcotic substances produced by Russian companies. All this, of course, complicates the process of introducing a testing procedure. In this situation, the importance of developing, improving and introducing new methods for the detection of narcotic substances and their metabolites in human biological fluids increases. The article provides a general overview of world experience in using immunochromatographic tests for identifying psychoactive substances as a screening test, with particular attention being paid to analyzing the specifics of using screening immunochromatographic tests for the initial identification of psychoactive substances in urine and saliva from the standpoint of the contextual feasibility of their applicability in a number of specific cases related to the specifics of the professional activities of the test. Along with this, the author, on the basis of the available statistical information and original research materials, provides an analysis of the Russian market of test systems for the detection of psychoactive substances in saliva and examines the feasibility of expanding its capabilities through wider use of screening psychoactive substances for saliva.
Style APA, Harvard, Vancouver, ISO itp.
22

Kosari, Sam, Kwang Choon Yee, Stephanie Mulhall, Jackson Thomas, Shane L. Jackson, Gregory M. Peterson, Ayla Rudgley, Iain Walker i Mark Naunton. "Pharmacists’ Perspectives on the Use of My Health Record". Pharmacy 8, nr 4 (14.10.2020): 190. http://dx.doi.org/10.3390/pharmacy8040190.

Pełny tekst źródła
Streszczenie:
(1) Background: My Health Record (MHR) is a relatively new nationwide Australian digital health record system accessible by patients and a range of healthcare professionals. Pharmacists will be key contributors and users of the MHR system, yet little is known about the perceived barriers and benefits of use. (2) Objective: To explore pharmacists’ perspectives related to potential benefits and barriers associated with use of MHR. (3) Methods: An online survey was developed and face-validated. The survey was advertised to Australian pharmacists on pharmacy professional bodies’ websites. This was a cross-sectional study using an anonymous questionnaire. Descriptive statistics were used to describe the distribution of the data. Chi-square, Kendall’s tau coefficient (tau-c) and Kruskal–Wallis tests were used to examine the relationships where appropriate. (4) Results: A total of 63 pharmacists completed the survey. The majority of respondents worked in a metropolitan area (74%), and the most common workplace setting was community pharmacy (65%). Perceived benefits identified by responders include that the use of MHR would help with continuity of care (90%), and that it would improve the safety (71%) and quality (75%) of care they provided. Importantly, more than half of pharmacists surveyed agreed that MHR could reduce medication errors during dispensing (57%) and could improve professional relationships with patients (57%) and general practitioners (59%). Potential barriers identified by pharmacists included patients’ concerns about privacy (81%), pharmacists’ own concern about privacy (46%), lack of training, access to and confidence in using the system. Sixty six percent of respondents had concerns about the accuracy of information contained within MHR, particularly among hospital and general practice pharmacists (p = 0.016) and almost half (44%) had concerns about the security of information in the system, mainly pharmacists working at general practice and providing medication review services (p = 0.007). Overall satisfaction with MHR varied, with 48% satisfied, 33% neither satisfied nor dissatisfied, and 19% dissatisfied, with a higher satisfaction rate among younger pharmacists (p = 0.032). (5) Conclusions: Pharmacists considered that the MHR offered key potential benefits, notably improving the safety and quality of care provided. To optimize the use of MHR, there is a need to improve privacy and data security measures, and to ensure adequate provision of user support and education surrounding the ability to integrate use of MHR with existing workflows and software.
Style APA, Harvard, Vancouver, ISO itp.
23

Yurev, Artemiy Sergeevich. "Fuzzing of Polymorphic Systems within Microsevice Structures". Proceedings of the Institute for System Programming of the RAS 36, nr 1 (2024): 45–60. http://dx.doi.org/10.15514/ispras-2024-36(1)-4.

Pełny tekst źródła
Streszczenie:
Today fuzzing (fuzzing-testing) is the main technique for testing software, systems and code functions. Fuzzing allows identify vulnerabilities or software failures. However, this practice may require the large resources involvement and network performance in large organizations where the number of systems may be large. Developers and information security specialists are simultaneously required to comply with time-to-market deadlines, requirements of various regulators and recommendations of standards. In current paper is proposed new fuzzing method, which is designed to solve the problem above. In current aproach is proposed use fuzzing testing for whole computing network at ones in large organizations if them operate with microservices. Polymorphic systems in this paper are understood like systems that consist of various API (Application Programming Interface) functions that operate with various types of data, not within single software, but inside subsystems with a set of several microservices. In this case, a lot of various network protocols, data types and formats can be used. With such a variety of features, there is a problem of detecting errors or vulnerabilities inside systems, beacause debugging or trace interfaces are not always developed in the microservice softwares. So, in this paper it is proposed to use also the method of collecting and analyzing statistics of time intervals of processing mutated data by microservices. For fuzzing tests, it is proposed to use mutated lists of exploit payloads. Time analyzing between client-server requests and the responses helps to identify patterns that showed the presence of potentially dangerous vulnerabilities. This paper discribes fuzzing of API functions only in the HTTP protocol (Hypertext Transfer Protocol). Current approach does not have a negative impact on the effectiveness of development or deadlines. Methods and solution described in the paper are recommended to be used in large organizations as an additional or basic information security solution in order to prevent critical infrastructure failures and financial losses.
Style APA, Harvard, Vancouver, ISO itp.
24

Hulea, Mihai, Radu Miron i Vlad Muresan. "Digital Product Passport Implementation Based on Multi-Blockchain Approach with Decentralized Identifier Provider". Applied Sciences 14, nr 11 (4.06.2024): 4874. http://dx.doi.org/10.3390/app14114874.

Pełny tekst źródła
Streszczenie:
This paper examines the implementation of a digital product passport (DPP) using Hyperledger Fabric technology to enhance product lifecycle management within the European Union’s circular economy action plan. This study addresses the need for detailed product information on materials, origin, usage, and end-of-life instructions to improve recycling practices and promote sustainable consumption. The approach integrates decentralized identifier (DID) technology for unique product identification using the cheqd.io platform with an enterprise tailored Hyperledger Fabric blockchain network for DPP data management, leveraging their strengths to enhance security and efficiency. This paper details the data model for the DPP, including entities like Product, Manufacturer, Supplier, and Material. Performance tests on the Hyperledger Fabric network demonstrate the system’s efficacy, focusing on CRUD operations and scalability. Future work will extend to the development of client applications and more comprehensive performance evaluations considering scalability and network expansion.
Style APA, Harvard, Vancouver, ISO itp.
25

Kot, Edyta. "Development of a technologically advanced IT system enabling automated processing of information collected in forensic biometric databases in order to combat crime or identify people". Issues of Forensic Science 308 (2020): 69–74. http://dx.doi.org/10.34836/pk.2020.308.5.

Pełny tekst źródła
Streszczenie:
Forensic biometric databases are an out of court tool to support the work of law enforcement agencies. They are used to detect the perpetrators of crimes, indicate the connections of a person with previously committed crimes, and allow the identification of living persons and corpses with unknown identity or individuals trying to hide their identity. In police practice, among the methods of identification of living persons and corpses, fingerprint and DNA tests are mainly used. These two forensic areas are supported by such tools such as AFIS (Automatic Fingerprint Identification System) and CODIS (Combined DNA Index System). These are the main police systems operating within two datasets, namely the dactyloscopic dataset and the DNA dataset. The systems are operating in two different locations of the Central Forensic Laboratory of the Police (CFLP). This results in the processing of individual biometric data independently of each other at different times and locations (Fingerprint Examination Department and Biology Department). Currently, there is no comprehensive approach to the collection and processing of biometric data such as fingerprints, DNA or facial images. To improve the exchange of information between police authorities, in July 2019, the Central Forensic Laboratory of the Police submitted a project application, and on 25 November 2019 signed with the National Center for Research and Development the grant agreement no. DOB – BIO10/09/01/2019 for the implementation and financing of the project in the area of state defense and security (competition no. 10/2019) entitled “Development of a technologically advanced information system enabling automated processing of information collected in forensic biometric databases for the purpose of combating crime or identifying people – acronym “BIOMETRIA”.
Style APA, Harvard, Vancouver, ISO itp.
26

Aleksandrowicz, Tomasz. "Forecasting Threats to State Security in Theory and in Practice. Toolbox for the Analyst". Internal Security 15, nr 1 (26.10.2023): 7–21. http://dx.doi.org/10.5604/01.3001.0053.9579.

Pełny tekst źródła
Streszczenie:
The article is devoted to the issue of forecasting threats to state security. The starting point for the author’s considerations is the thesis on the development of forecasting methodology because of close links between scientific methods developed by theoreticians and their development in practice in institutionsresponsible for state security, primarily in secret services. The author emphasises the importance of the methodological aspects of forecasting, recalling Richard Pipes’ statement that science is the method, not the content. Pointing to the American school of intelligence analysis as an example, the author pays particular attention to the need for close links between the development of scientific methodology and forecasting as the subject of practical activity. Such a relationship is the basis for both the development of science and the strengthening of state security by improving the processes of recognising and forecasting threats, which must be based on scientific methods. Thisis particularly important in view of the dynamic development of information processing technology, especially in the context of the use of artificial intelligence (AI) in practice. The result of the author’s considerations is a proposal to create a specific toolbox for analysts dealing with forecasting threats to state security, the content of which must be consistently developed and improved.In the research which resulted in the presented article, systems analysis was usedStreszczenieArtykuł poświęcony jest zagadnieniu prognozowania zagrożeń dla bezpieczeństwa państwa. Punktem wyjścia do rozważań autora jest teza o rozwoju metodologii prognozowania ze względu na ścisłe powiązania metod naukowych wypracowanych przez teoretyków z ich rozwojem w praktyce w instytucjach odpowiedzialnych za bezpieczeństwo państwa, przede wszystkim w służbach specjalnych. Autor podkreśla znaczenie metodologicznych aspektów prognozowania, przywołując stwierdzenie Richarda Pipesa, że nauka jest metodą, a nie treścią. Wskazując jako przykład na amerykańską szkołę analizy wywiadowczej, autor zwraca szczególną uwagę na potrzebę ścisłego powiązania rozwoju metodologii naukowej z prognozowaniem jako przedmiotem praktycznej działalności. Taka zależność jest podstawą zarówno rozwoju nauki, jak i wzmacniania bezpieczeństwa państwa poprzez doskonalenie procesów rozpoznawania i prognozowania zagrożeń, które muszą być oparte na metodach naukowych. Jest to szczególnie istotne w obliczu dynamicznego rozwoju technologii przetwarzania informacji, zwłaszcza w kontekście wykorzystania sztucznej inteligencji (AI) w praktyce. Efektem rozważań autora jest propozycja stworzenia swoistego zestawu narzędzi dla analityków zajmujących się prognozowaniem zagrożeń dla bezpieczeństwa państwa, którego zawartość musi być konsekwentnie rozwijana i ulepszana. W badaniach, których efektem jest prezentowany artykuł, wykorzystano analizę systemowąResumenEl artículo aborda el problema de la previsión de las amenazas a la seguridad del Estado. El punto de partida de las reflexiones del autor es la tesis del desarrollo de la metodología de la previsión debido a los estrechos vínculos existentes entre los métodos científicos elaborados por los teóricos y su desarrollo en la práctica en las instituciones responsables de la seguridad del Estado, principalmente en las fuerzas especiales. El autor subraya la importancia de los aspectos metodológicos de la prospectiva, aludiendo a la afirmación de Richard Pipes según la cual la ciencia es método, no contenido. Al señalar como ejemplo la escuela estadounidense de análisis de inteligencia, el autor presta especial atención a la necesidad de una estrecha relación entre el desarrollo de la metodología científica y la previsión como objeto de actividad práctica. Dicha relación es la base tanto del desarrollo de la ciencia como del fortalecimiento de la seguridad del Estado a través de la mejora de los procesos de identificación y previsión de amenazas, que deben basarse en métodos científicos. Esto es particularmente importante en vista del desarrollo dinámico de las tecnologías de procesamiento de la información, especialmente en el contexto del uso de la inteligencia artificial (IA) en la práctica. Como resultado de las consideraciones del autor se propone la creación de una especie de conjunto de herramientas para los analistas involucrados en la previsión de amenazas a la seguridad del Estado, cuyo contenido debe desarrollarse y mejorarse de forma sistemática. En la investigación que dio lugar al artículo presentado se utilizó el análisis sistémiZusammenfassungDer Artikel ist der Frage der Prognose von Bedrohungen der Staatssicherheit gewidmet. Den Ausgangspunkt der Überlegungen des Autors bildet die These von der Entwicklung der Prognosemethodik aufgrund des engen Zusammenhangs zwischen den von Theoretikern entwickelten wissenschaftlichen Methoden und ihrer Entwicklung in der Praxis in den für die staatliche Sicherheit zuständigen Institutionen, vor allem in den Geheimdiensten. Der Autor unterstreicht die Bedeutung der methodischen Aspekte der Prognose und zitiert Richard Pipes’ Aussage, dass Wissenschaft Methode und nicht Inhalt sei. Am Beispiel der amerikanischen Schule der nachrichtendienstlichen Analyse verweist der Autor auf die Notwendigkeit einer engen Verbindung zwischen der Entwicklung der wissenschaftlichen Methodik und der Prognose als Gegenstand der praktischen Tätigkeit. Eine solche Beziehung ist die Grundlage sowohl für die Entwicklung der Wissenschaft als auch für die Stärkung der staatlichen Sicherheit durch die Verbesserung der Prozesse der Bedrohungserkennung und -vorhersage, die auf wissenschaftlichen Methoden beruhen müssen. Dies ist besonders wichtig angesichts der dynamischen Entwicklung der Informationsverarbeitungstechnologien, insbesondere im Zusammenhang mit dem Einsatz von Künstlicher Intelligenz (KI) in der Praxis. Das Ergebnis der Überlegungen des Autors ist ein Vorschlag zur Schaffung einer Art von Hilfsmitteln für Analysten, die sich mit der Vorhersage von Bedrohungen der Staatssicherheit befassen und deren Inhalt ständig weiterentwickelt und verbessert werden muss. In den Untersuchungen, die zu der Entstehung des vorliegenden Artikels beigetragen haben, wurde die Systemanalyse eingesetztРезюмеВ статье рассматривается вопрос о прогнозировании угроз государственной безопасности. Исходной точкой рассуждений автора является тезис о развитии методологии прогнозирования в силу тесной связи между научными теоретически разработанными методами и их применением на практике в учреждениях, отвечающих за безопасность государства, прежде всего в спецслужбах. Автор подчеркивает важность методологических аспек- тов прогнозирования, ссылаясь на высказывание Ричарда Пайпса о том, что наука — это метод, а не содержание. Приводя в качестве примера американскую школу разведывательного анализа, автор обращает особое внимание на необходимость обеспечения тесной связи между развитием научной методологии и прогнозированием как объектом конкретной практической деятельности. Такая связь является основой как для развития науки, так и для укрепления безопасности государства путем совершенствования процессов выявления и прогнозирования угроз, которые должны основываться на научных методах. Это особенно важно в связи с динамичным развитием техноло- гий обработки информации, особенно в контексте использования искусственного интеллекта (ИИ) в практической деятельности. Результатом рассуждений автора является предложение о создании своеобразного инструментария для аналитиков, занимающихся прогнозированием угроз для безопасности государства, содержание которого должно постоянно развиваться и совершенствоваться. В исследовании, результатом которого является данная статья, был использован системный анализnull
Style APA, Harvard, Vancouver, ISO itp.
27

Rosas, Lisa G., Catherine Nasrallah, Van Ta Park, Jan J. Vasquez, Ysabel Duron, Owen Garrick, Riccesha Hattin i in. "Perspectives on Precision Health Among Racial/Ethnic Minority Communities and the Physicians That Serve Them". Ethnicity & Disease 30, Suppl 1 (2.04.2020): 137–48. http://dx.doi.org/10.18865/ed.30.s1.137.

Pełny tekst źródła
Streszczenie:
Background: In order for precision health to address health disparities, engagement of diverse racial/ethnic minority communi­ties and the physicians that serve them is critical.Methods: A community-based participatory research approach with mixed methods was employed to gain a deeper understanding of precision health research and practice among American Indian, African American, Latino, Chinese, and Vietnamese groups and physicians that serve these communi­ties. A survey assessed demographics and opinions of precision health, genetic testing, and precision health research. Focus groups (n=12) with each racial/ethnic minority group and physicians further explored at­titudes about these topics.Results: One hundred community mem­bers (American Indian [n=17], African American [n=13], Chinese [n=17], Latino [n=27], and Vietnamese [n=26]) and 14 physicians completed the survey and participated in the focus groups. Familiarity with precision health was low among com­munity members and high among physi­cians. Most groups were enthusiastic about the approach, especially if it considered influences on health in addition to genes (eg, environmental, behavioral, social fac­tors). Significant concerns were expressed by African American and American Indian participants about precision health practice and research based on past abuses in bio­medical research. In addition, physician and community members shared concerns such as security and confidentiality of genetic information, cost and affordability of genetic tests and precision medicine, discrimina­tion and disparities, distrust of medical and research and pharmaceutical institutions, language barriers, and physician’s specialty.Conclusions: Engagement of racial/ethnic minority communities and the providers who serve them is important for advancing a precision health approach to addressing health disparities.Ethn Dis. 2020;30(Suppl 1):137-148; doi:10.18865/ed.30.S1.137
Style APA, Harvard, Vancouver, ISO itp.
28

Grachev, Ya L., i V. G. Sidorenko. "Steganalysis of the methods of concealing information in graphic containers". Dependability 21, nr 3 (21.09.2021): 39–46. http://dx.doi.org/10.21683/1729-2646-2021-21-3-39-46.

Pełny tekst źródła
Streszczenie:
Aim. Today, there is a pressing matter of protection against steganography-based attacks against information systems. These attacks present a danger as they use the most common data files – especially graphics files – as containers that deliver malicious code to a system or cause a leak of sensitive information. Developing methods of detecting such hidden information is the responsibility of a special subsection of steganography, the steganalysis. Such methods should be extensively used in computer forensics as part of security incident investigation, as well as in automated security systems with integrated modules for analyzing data files for malicious or dangerous information. An important feature of such activities is the need to examine a wide variety of elements and containing files. In particular, it is required to verify not only the colour values of the pixels in images, but their frequency characteristics as well. This raises a number of important questions associated with the best practices of applying steganalysis algorithms and making correct conclusions based on the outputs. The paper aims to briefly analyse the most important and relevant methods of steganalysis, both spatial and frequency, as well as to make conclusions regarding their performance and ways to analyse the outputs based on the test results of the software that implements such methods. Methods. The steganalysis of concealment within the least significant bits of an image’s pixels uses Pearson’s Chi-square statistical analysis, as well as the Regular-Singular method that involves signature analysis of pixel groups and analytical geometry tools for estimating the relative volume of the hidden message. The Koch-Zhao method of steganalysis is used for the purpose of detecting information embedded in the frequency-domain image representation. It also allows identifying the parameters required for extracting the hidden message. Results. A software suite was created that includes the software implementations of the analysed methods. The suite was submitted to a number of tests in order to evaluate the outputs of the examined methods. For the purpose of testing, a sample of images of various formats was compiled, in which information was embedded using a number of methods. Based on the results of the sample file analysis, conclusions were made regarding the efficiency of the analysed methods and interpretation of the outputs. Conclusion. Based on the test results, conclusions were made on the accuracy of the steganalysis methods in cases of varied size of the embedded message and methods of its concealment. The patterns identified with the help of the analysis outputs allowed defining a number of rules for translating the outputs into conclusions on the identification of the fact of detection of hidden information and estimation of its size.
Style APA, Harvard, Vancouver, ISO itp.
29

Podoynitsyn, V. M., A. O. Yafonkin, O. V. Manzhai i O. M. Verlamov. "Legal basis of defense standardization of the European Union". Analytical and Comparative Jurisprudence, nr 2 (11.05.2024): 766–72. http://dx.doi.org/10.24144/2788-6018.2024.02.126.

Pełny tekst źródła
Streszczenie:
The article defines the problems and tasks of the European Defense Agency, the historical development of the agency, as well as the national system of military standardization of Ukraine and the construction of bringing it into line with the European model, in particular, the creation of organizational forms of activity in the field of standardization in accordance with international and European practice. Also formulated is the question of the legal basis of defense standardization, which has a direct impact on the protection of sovereignty, territorial integrity and security of states that are members of international and regional defense organizations. It is noted that in order for Ukraine to join the European community, it is necessary to create and implement a national defense standardization system. Standardization in the context of Ukraine's association with the European Union becomes a tool for ensuring national security and defense capability. National security is considered as a factor that guarantees the protection of constitutional rights, freedoms, a decent standard of living of citizens, the protection of sovereignty, territorial integrity and sustainable development of Ukraine, the defense and security of the state, the protection of individuals, society and the state from internal and external threats. Harmonization of administrative and legal legislation on standardization in the field of defense of the European Union states is a key factor in ensuring the compatibility of weapons and other means used by the armed forces of European countries. It was established that for the development of the standardization system of weapons and military equipment, in particular with regard to conducting tests, it is recommended to use NATO standards as an information base, taking into account the domestic experience of the standardization system in the field of developing requirements for reliability and resistance to the influence of external factors. Implementation of NATO standards is recommended to be carried out by the method of reissue (rework, translation) with the involvement of domestic specialists in military standardization. It was concluded that in order to implement the experience of the developed countries of the West in the Ukrainian legal field, there is a need to perform a thorough analysis of the administrative and legal legislation on standardization in the field of defense of the USA and some European NATO member countries.
Style APA, Harvard, Vancouver, ISO itp.
30

Zhao, Wenbo, i Caochuan Ma. "Modification of Intertwining Logistic Map and a Novel Pseudo Random Number Generator". Symmetry 16, nr 2 (31.01.2024): 169. http://dx.doi.org/10.3390/sym16020169.

Pełny tekst źródła
Streszczenie:
Chaotic maps have been widely studied in the field of cryptography for their complex dynamics. However, chaos-based cryptosystems have not been widely used in practice. One important reason is that the following requirements of practical engineering applications are not taken into account: computational complexity and difficulty of hardware implementation. In this paper, based on the demand for information security applications, we modify the local structure of the three-dimensional Intertwining Logistic chaotic map to improve the efficiency of software calculation and reduce the cost of hardware implementation while maintaining the complex dynamic behavior of the original map. To achieve the goal by reducing the number of floating point operations, we design a mechanism that can be decomposed into two processes. One process is that the input parameters value of the original system is fixed to 2k by Scale index analysis. The other process is that the transcendental function of the original system is replaced by a nonlinear polynomial. We named the new map as “Simple intertwining logistic”. The basic chaotic dynamic behavior of the new system for controlling parameter is qualitatively analyzed by bifurcation diagram and Lyapunov exponent; the non-periodicity of the sequence generated by the new system is quantitatively evaluated by using Scale index technique based on continuous wavelet change. Fuzzy entropy (FuzzyEn) is used to evaluate the randomness of the new system in different finite precision digital systems. The analysis and evaluation results show that the optimized map could achieve the designed target. Then, a novel scheme for generating pseudo-random numbers is proposed based on new map. To ensure its usability in cryptographic applications, a series of analysis are carried out. They mainly include key space analysis, recurrence plots analysis, correlation analysis, information entropy, statistical complexity measure, and performance speed. The statistical properties of the proposed pseudo random number generator (PRNG) are tested with NIST SP800-22 and DIEHARD. The obtained results of analyzing and statistical software testing shows that, the proposed PRNG passed all these tests and have good randomness. In particular, the speed of generating random numbers is extremely rapid compared with existing chaotic PRNGs. Compared to the original chaotic map (using the same scheme of random number generation), the speed is increased by 1.5 times. Thus, the proposed PRNG can be used in the information security.
Style APA, Harvard, Vancouver, ISO itp.
31

Sawka, Maciej, i Marcin Niemiec. "A Sponge-Based Key Expansion Scheme for Modern Block Ciphers". Energies 15, nr 19 (20.09.2022): 6864. http://dx.doi.org/10.3390/en15196864.

Pełny tekst źródła
Streszczenie:
Many systems in use today require strong cryptographic primitives to ensure confidentiality and integrity of data. This is especially true for energy systems, such as smart grids, as their proper operation is crucial for the existence of a functioning society. Because of this, we observe new developments in the field of cryptography every year. Among the developed primitives, one of the most important and widely used are iterated block ciphers. From AES (Advanced Encryption Standard) to LEA (Lightweight Encryption Algorithm), these ciphers are omnipresent in our world. While security of the encryption process of these ciphers is often meticulously tested and verified, an important part of them is neglected—the key expansion. Many modern ciphers use key expansion algorithms which produce reversible sub-key sequences. This means that, if the attacker finds out a large-enough part of this sequence, he/she will be able to either calculate the rest of the sequence, or even the original key. This could completely compromise the cipher. This is especially concerning due to research done into side-channel attacks, which attempt to leak secret information from memory. In this paper, we propose a novel scheme which can be used to create key expansion algorithms for modern ciphers. We define two important properties that a sequence produced by such algorithm should have and ensure that our construction fulfills them, based on the research on hashing functions. In order to explain the scheme, we describe an example algorithm constructed this way, as well as a cipher called IJON which utilizes it. In addition to this, we provide results of statistical tests which show the unpredictability of the sub-key sequence produced this way. The tests were performed using a test suite standardized by NIST (National Institute for Standards and Technology). The methodology of our tests is also explained. Finally, the reference implementation of the IJON cipher is published, ready to be used in software. Based on the results of tests, we conclude that, while more research and more testing of the algorithm is advised, the proposed key expansion scheme provides a very good generation of unpredictable bits and could possibly be used in practice.
Style APA, Harvard, Vancouver, ISO itp.
32

Liu, Chaojie, Timothy Bartram i Sandra G. Leggat. "Link of Patient Care Outcome to Occupational Differences in Response to Human Resource Management: A Cross-Sectional Comparative Study on Hospital Doctors and Nurses in China". International Journal of Environmental Research and Public Health 17, nr 12 (18.06.2020): 4379. http://dx.doi.org/10.3390/ijerph17124379.

Pełny tekst źródła
Streszczenie:
This study assessed the link of patient care outcome to occupational differences in response to human resource management. A cross-sectional survey was conducted in three large regional hospitals in China. A total of 700 questionnaires were distributed to doctors, nurses, allied health workers, and managers and 499 (71%) were completed. Data were analyzed using a final sample of 193 doctors and 180 nurses. Quality of patient care was rated by the participants using a modified version of the Victorian Patient Satisfaction Questionnaire. Human resource management was measured on seven aspects: job security, recruitment, training, transformational leadership, information sharing, job quality, and teams. The differences between doctors and nurses in response to the human resource management practices and their associations with quality of care were compared through independent samples t-tests, correlational analyses, and moderator regressions. Doctors gave a higher rating on quality of patient care than their nurse counterparts. ‘Training’, ‘transformational leadership’, and ‘information sharing’ were more likely to be associated with higher ratings on quality of patient care in nurses. By contrast, a greater association between ‘teams’ and quality of patient care was found in doctors. Although doctors and nurses in China are exposed to the same hospital management environment, professional differences may have led them to respond to management practices in different ways.
Style APA, Harvard, Vancouver, ISO itp.
33

Haggenmüller, Sarah, Eva Krieghoff-Henning, Tanja Jutzi, Nicole Trapp, Lennard Kiehl, Jochen Sven Utikal, Sascha Fabian i Titus Josef Brinker. "Digital Natives’ Preferences on Mobile Artificial Intelligence Apps for Skin Cancer Diagnostics: Survey Study". JMIR mHealth and uHealth 9, nr 8 (27.08.2021): e22909. http://dx.doi.org/10.2196/22909.

Pełny tekst źródła
Streszczenie:
Background Artificial intelligence (AI) has shown potential to improve diagnostics of various diseases, especially for early detection of skin cancer. Studies have yet to investigate the clear application of AI technology in clinical practice or determine the added value for younger user groups. Translation of AI-based diagnostic tools can only be successful if they are accepted by potential users. Young adults as digital natives may offer the greatest potential for successful implementation of AI into clinical practice, while at the same time, representing the future generation of skin cancer screening participants. Objective We conducted an anonymous online survey to examine how and to what extent individuals are willing to accept AI-based mobile apps for skin cancer diagnostics. We evaluated preferences and relative influences of concerns, with a focus on younger age groups. Methods We recruited participants below 35 years of age using three social media channels—Facebook, LinkedIn, and Xing. Descriptive analysis and statistical tests were performed to evaluate participants’ attitudes toward mobile apps for skin examination. We integrated an adaptive choice-based conjoint to assess participants’ preferences. We evaluated potential concerns using maximum difference scaling. Results We included 728 participants in the analysis. The majority of participants (66.5%, 484/728; 95% CI 0.631-0.699) expressed a positive attitude toward the use of AI-based apps. In particular, participants residing in big cities or small towns (P=.02) and individuals that were familiar with the use of health or fitness apps (P=.02) were significantly more open to mobile diagnostic systems. Hierarchical Bayes estimation of the preferences of participants with a positive attitude (n=484) revealed that the use of mobile apps as an assistance system was preferred. Participants ruled out app versions with an accuracy of ≤65%, apps using data storage without encryption, and systems that did not provide background information about the decision-making process. However, participants did not mind their data being used anonymously for research purposes, nor did they object to the inclusion of clinical patient information in the decision-making process. Maximum difference scaling analysis for the negative-minded participant group (n=244) showed that data security, insufficient trust in the app, and lack of personal interaction represented the dominant concerns with respect to app use. Conclusions The majority of potential future users below 35 years of age were ready to accept AI-based diagnostic solutions for early detection of skin cancer. However, for translation into clinical practice, the participants’ demands for increased transparency and explainability of AI-based tools seem to be critical. Altogether, digital natives between 18 and 24 years and between 25 and 34 years of age expressed similar preferences and concerns when compared both to each other and to results obtained by previous studies that included other age groups.
Style APA, Harvard, Vancouver, ISO itp.
34

Gizaw, Abraham Tamirat, Pradeep Sopory i Morankar Sudhakar. "Determinants of knowledge, attitude and self-efficacy towards complementary feeding among rural mothers: Baseline data of a cluster-randomized control trial in South West Ethiopia". PLOS ONE 18, nr 11 (28.11.2023): e0293267. http://dx.doi.org/10.1371/journal.pone.0293267.

Pełny tekst źródła
Streszczenie:
Background Complementary feeding (CF) is the period when exclusive breastfeeding ends and the introduction of a wide range of foods while breastfeeding should continue until the child is at least 24 months of age. Sub-optimal complementary feeding practices of infants and young children persist due to different factors, which include knowledge, attitude, and self-efficacy of index mothers. Therefore, this study aimed to assess determinants of knowledge, attitude, and self-efficacy towards complementary feeding among rural mothers with index child in rural Ethiopia. Methods A community-based, cross-sectional study was conducted using multistage sampling techniques followed by systematic random sampling techniques. A structured interviewer-administered questionnaire was used. The Chi-square and Fisher’s exact probability tests were used to assess the baseline differences in the CF knowledge, attitude, self-efficacy and socio-demographic characteristics of the intervention and control groups. An independent sample t-test was used to determine the mean differences. Multiple linear regression models were fitted to assess the predictors of complementary feeding knowledge, attitude, and self-efficacy. All tests were two-tailed, and a statistically significant association was considered at a p-value ≤ 0.05. Results Overall, 516 mothers were interviewed. 52.5% of the mothers had high complementary feeding (CF) knowledge, whereas only 47.7% and 38.9% had favorable attitude and high self-efficacy, respectively. The socio-demographic characteristics of the intervention and control groups were overall similar. However, there was a significant difference in the child’s sex (p = 0.021) and age (p = 0.002). Independent t-tests found no significant difference between the two groups in terms of the mean score of CF knowledge, attitude, and self-efficacy at baseline. Maternal educational status (p = 0.0001), number of ANC visits (p = 0.025), and CF information received (p = 0.011) were significant predictors of CF knowledge. Child sex (p = 0.021) and the number of ANC visits (p = 0.01) were significant predictors of CF attitude. Family size (p = 0.008) and household food security status (p = 0.005) were significant predictors of maternal CF self-efficacy. Conclusion Overall, half of the mothers had high knowledge. Whereas maternal attitudes and self-efficacy toward CF were low. Maternal educational status, the number of ANC visits, and the CF information received were predictors of CF knowledge. Likewise, child sex and the number of ANC visits were predictors of CF attitude. Family size and household food security status were predictors of CF self-efficacy. These findings imply that nutrition intervention strategies are mandatory, particularly to enhance maternal knowledge, attitude, and self-efficacy towards optimum complementary feeding.
Style APA, Harvard, Vancouver, ISO itp.
35

Obura, M., G. Oballim, J. O. Ochuodho, F. N. W. Maina i V. E. Anjichi. "Seed Management and Quality of Farmer Saved Seeds of Bambara groundnut from North Western, Northern and Eastern Uganda". Ghana Journal of Agricultural Science 56, nr 1 (30.06.2021): 1–15. http://dx.doi.org/10.4314/gjas.v56i1.1.

Pełny tekst źródła
Streszczenie:
Bambara groundnut (BG) is a protein and energy-rich legume crop of African origin with the potential to contribute to food and nutrition security. There is limited information on seed man­agement and quality of farmer saved seed of BG in Uganda. This study was conducted to inves­tigate seed management practices and evaluate the quality of farmer saved seed from Uganda. Four hundred BG farmers were chosen using purposive sampling and information gathered on their seed management. A semi-structured questionnaire was used to interview the farm­ers. Seed colour and size determination, standard germination and electrical conductivity tests were done on seed samples collected from farmers. Results from survey revealed that farmers recycled seeds for more than 4 years (39.2%) and maintained mostly single landraces (52.5%). Seed was sun-dried on the ground (81%), stored in gunny bags (93.5%), and threshed mostly by hand (52.0%). Collected landraces had varied seed coat colours and significantly differed at p = 0.05 in their seed sizes, final germination percentage (FGP), electrical conductivity (EC), germination velocity index and seedling vigour index II (SVI-II). Local Bam landrace recorded highest SVI-II (485.3) and EC (0.52MSg-1) while TVSU 688 landrace recorded the highest FGP (96.0%) and lowest EC (0.06MSg-1).
Style APA, Harvard, Vancouver, ISO itp.
36

Khare, Ms Prachi. "CARRER PATH". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 05 (31.05.2024): 1–5. http://dx.doi.org/10.55041/ijsrem35160.

Pełny tekst źródła
Streszczenie:
The "Career Road Map Path" app is a cutting-edge platform designed to revolutionize the way individuals navigate their professional journeys. With a strong emphasis on user security and personalized guidance, the app offers a seamless experience through its intuitive login system, allowing users to access their profiles with email or phone number authentication. Catering to the diverse needs of users, the app divides them into two distinct categories: "Career Path Seekers" and "Job Seekers." The former category empowers individuals to embark on a well-defined path by selecting their study level and specifying their fields of interest. Leveraging this information, the app generates a customized roadmap that outlines crucial educational milestones, suggests relevant courses and internships, and even recommends skill-building activities tailored to their chosen career trajectory. Meanwhile, the Job Seekers segment provides an immersive dual-pathway approach: Government and Private jobs. Each pathway offers an extensive array of job listings complete with comprehensive descriptions, explicit qualification requirements, and clear application procedures. For government job aspirants, the app furnishes details about upcoming job opportunities, including vital information about job roles, eligibility criteria, application deadlines, and exam schedules. On the other hand, those seeking private sector employment can seamlessly explore openings across various industries, locations, and job types. Recognizing the significance of exam preparation in achieving career goals, the app goes beyond job listings and incorporates a dedicated exam preparation component. This feature equips users with study materials, practice tests, and real-time notifications about exam dates, ensuring they are well-prepared and confident when facing competitive assessments. Furthermore, the app encourages user interaction, enabling individuals to engage with the platform through feedback, reviews, and ratings for courses, resources, and job listings. This dynamic community interaction fosters a collaborative environment where users can benefit from shared experiences, insights, and advice. The power of technology truly comes to the fore as the app employs advanced machine learning algorithms. These algorithms continuously analyse user behaviours, preferences, and success stories to fine-tune its recommendations, ensuring that the guidance provided becomes increasingly tailored and effective over time. In Summary the "Career Road Map Path" app represents a holistic solution that seamlessly blends data security, personalized career guidance, comprehensive job listings, exam preparation resources, and a thriving user community. By converging these essential elements, the app aspires to redefine the way individuals approach their career aspirations and set them on a trajectory toward success with confidence and clarity. Keywords Career navigation, Personalized guidance, User security, Intuitive login system, Career Path Seekers, Job Seekers, Dual-pathway approach, Government jobs, Private sector employment, Exam preparation, Community interaction, Machine learning algorithms, Data-driven recommendations, Holistic career solution, Confidence and clarity.
Style APA, Harvard, Vancouver, ISO itp.
37

Ravenda, Diego, Maika Melina Valencia-Silva, Josep Maria Argiles-Bosch i Josep García-Blandón. "Measuring labour tax avoidance and undeclared work: evidence from tax-avoidant offending firms". Journal of Applied Accounting Research 21, nr 3 (6.06.2020): 477–96. http://dx.doi.org/10.1108/jaar-01-2019-0016.

Pełny tekst źródła
Streszczenie:
PurposeThis paper develops novel proxies for labour tax avoidance (LTAV) and tests their validity within a sample of 189 labour tax-avoidant offending firms (LTAOFs) accused of evading social security contributions (SOCs) by public authorities.Design/methodology/approachLTAV proxies are based on abnormal values of SOCs paid, reported in the income statements of a sample of 857,790 Spanish firm-years for the period 2001–2015, estimated through two-stage least square panel data regressions with firm fixed effects.FindingsThe results reveal that proxies specifically built to signal both conforming and non-conforming LTAV can provide evidence of abnormally low SOCs as expenses within the sample of LTAOFs. Furthermore, firm-specific financial variables as well as macroeconomic variables significantly influence LTAV.Research limitations/implicationsThis study could foster further research on the efficacy of the LTAV proxies and on the drivers and sustainability implications of LTAV for firms and their stakeholders in different socio-economic and institutional contexts.Practical implicationsThese LTAV proxies could integrate other methods applied to estimate the undeclared work and its trends. Furthermore, they may assist tax authorities to direct their inspections, detect labour tax evasion and then strengthen the social protection of the employees from employers' illegal exploitation practices, as well as reducing tax revenue shortfalls and related sustainability concerns in the social security systems.Originality/valueThis study proposes a novel methodology to examine LTAV and its determinants through accounting information. This methodology may support researchers to provide a more comprehensive picture of tax planning strategies pursued by companies, that include LTAV, and in this way integrate the extant mature literature on income tax avoidance.
Style APA, Harvard, Vancouver, ISO itp.
38

Li, Jianzhong, Qiang Wan, Wenjuan Ma, Xiaoting Fang, Chuyi Yin i Jun Cui. "Analysis DevOps efficiency and digital transformation of digital economy, cross-border e-commerce, and brand building:". Transactions on Computer Science and Intelligent Systems Research 4 (20.06.2024): 38–47. http://dx.doi.org/10.62051/gc7xf329.

Pełny tekst źródła
Streszczenie:
As IT-based DevOps Abilities and Automation testing theory, this study examines factors that encourage and discourage DevOps abilities and automation technology have become a major trend in the development of internet or IT enterprises, The main aim of this paper is to investigate how the use of DevOps has affected the quality of software. Another main aim is to explore and identify ways to continuously increase software quality. One way of finding information on this study is to conduct a literature review. This article uses the ICTAM and TAM theoretical model for analysis. A literature review was developed to gather quantitative data while DevOps Abilities and Quality Assurance experts' interviews were used to determine how DevOps and automation testing can enhance software quality and improve software development efficiency. Interview reviews, Sampling questionaries, hypothesis testing, and regression tests are recommendations. Five semi-structured interviews were conducted with experts and analyzed through the lens of the Interactive Communication Technology Adoption Model (ICTAM) as a guiding framework. Moreover, through a series of data investigation and analysis, DevOps Abilities and Automation testing can help many companies quickly and accurately improve software development efficiency and quality. The results demonstrated that China internet company's DevOps and automation technology helps enterprise’s continuous integration and continuous delivery, automation testing and monitor etc. DevOps and CI/CD is one of the best practices for devops teams to implement. The findings is also an agile methodology best practice, as it enables software development teams to focus on meeting business requirements, code quality, and security because deployment steps are automated. Based on DevOps Abilities, Automation testing, CI, CD concepts, many companies can continuously improve their software R&D efficiency and software quality. The research of this paper mainly uses the mixed method of qualitative analysis and quantitative analysis to conduct research and analysis, and uses excel or SPSS 23 software to perform ANOVA analysis on the sample data, Finally, this study contributions concludes the importance of DevOps and Automation testing to China Software company.
Style APA, Harvard, Vancouver, ISO itp.
39

Zhang, Li-li, Qi Zhao, Li Wang i Ling-yu Zhang. "Research on Urban Traffic Signal Control Systems Based on Cyber Physical Systems". Journal of Advanced Transportation 2020 (20.10.2020): 1–16. http://dx.doi.org/10.1155/2020/8894812.

Pełny tekst źródła
Streszczenie:
In this paper, we present a traffic cyber physical system for urban road traffic signal control, which is referred to as UTSC-CPS. With this proposed system, managers and researchers can realize the construction and simulation of various types of traffic scenarios, the rapid development, and optimization of new control strategies and can apply effective control strategies to actual traffic management. The advantages of this new system include the following. Firstly, the fusion architecture of private cloud computing and edge computing is proposed for the first time, which effectively improves the performance of software and hardware of the urban road traffic signal control system and realizes information security perception and protection in cloud and equipment, respectively, within the fusion framework; secondly, using the concept of parallel system, the depth of real-time traffic control subsystem and real-time simulation subsystem is realized. Thirdly, the idea of virtual scene basic engine and strategy agent engine is put forward in the system design, which separates data from control strategy by designing a general control strategy API and helps researchers focus on control algorithm itself without paying attention to detection data and basic data. Finally, considering China, the system designs a general control strategy API to separate data from control strategy. Most of the popular communication protocols between signal controllers and detectors are private protocols. The standard protocol conversion middleware is skillfully designed, which decouples the field equipment from the system software and achieves the universality and reliability of the control strategy. To further demonstrate the advantages of the new system, we have carried out a one-year practical test in Weifang City, Shandong Province, China. The system has been proved in terms of stability, security, scalability, practicability and rapid practice, and verification of the new control strategy. At the same time, it proves the superiority of the simulation subsystem in the performance and simulation scale by comparing the different-scale road networks of Shunyi District in Beijing and Weifang City in Shandong Province. Further tests were conducted using real intersections, and the results were equally valid.
Style APA, Harvard, Vancouver, ISO itp.
40

Olawuyi, Seyi, i Abbyssinia Mushunje. "Social Capital and Adoption of Alternative Conservation Agricultural Practices in South-Western Nigeria". Sustainability 11, nr 3 (30.01.2019): 716. http://dx.doi.org/10.3390/su11030716.

Pełny tekst źródła
Streszczenie:
The major concern of most African countries, including Nigeria, in recent times is how to increase food production because of food insecurity issues, which by extension, is a major contributing factor to the prevalence of poverty. Therefore, adoption of conservation agricultural practices is regarded as a pathway to drive the achievement of food and nutrition security, as well as the needed optimal performance in the agri-food sector. Reportedly, scaling up of the limited adoption of these practices could be facilitated through kinship ties, peer influence, and social networks that govern mutual interactions among individuals; therefore, this motivated the study. Using cross-sectional data obtained from 350 sample units selected from South-Western Nigeria through a multistage sampling technique, this study applied descriptive statistical tools and cross-tabulation techniques to profile the sampled subjects while count outcome models were used to investigate the factors driving counts of conservative agriculture (CA) adoption. Similarly, a marginal treatment effects (MTEs) model (parametric approach) using local IV estimator was applied to examine the effects of CA adoption on the outcome (log of farmers’ farm income). Additionally, appropriate measures of fit tests statistics were used to test the reliabilities of the fitted models. Findings revealed that farmers’ years of farming experience (p < 0.1), frequency of extension visits (p < 0.05), and social capital viz-a-viz density of social group memberships (p < 0.05) significantly determined the count of CA practices adopted with varying degrees by smallholder farmers. Although, social capital expressed in terms of membership of occupational group and diversity of social group members also had a positive influence on the count of CA practices adopted but not significant owing largely to the “information gaps” about agricultural technologies in the study area. However, the statistical tests of the MTEs indicated that the treatment effects differed significantly across the covariates and it also varied significantly with unobserved heterogeneity. The policy relevant treatment effect estimates also revealed that different policy scenarios could increase or decrease CA adoption, depending on which individuals it induces to attract the expected spread and exposure.
Style APA, Harvard, Vancouver, ISO itp.
41

Legeais, Dominique. "Integrated purchasing and banking data protection in the context of Directive (EU) 2015/2366: new payment service providers". Law, State and Telecommunications Review 11, nr 1 (20.05.2019): 173–98. http://dx.doi.org/10.26512/lstr.v11i1.24856.

Pełny tekst źródła
Streszczenie:
Purpose – The article analyses the limits of protection of bank users´ data in France, framing them as personal data. Its legal analysis is made amidst a context of radical changes in the European and French personal data protection law as well in the banking regulation, which is being transformed by the new payment services regulation. Methodology/approach/design – The article brings an interlacement of some new legal sources from the European and French law to appraise the limits of banking data protection. It tests the application of some legal norms in order to evaluate the potential protection in two areas: the security of the banking data on a new environment of payment services (fintechs and other new firms); the possibility of protection against the unauthorized data commercial usage. Findings – The article concludes that the European and French banking and payment services law have not the desired level of protection against bad commercial practices in a context, which is marked by both the retailers and payment services integration as well the presence of the big techs. The data protection law must complement the banking and payment services regulation in order to provide the desired level of protection. Practical implications – The article demonstrates the possibility of testing new kinds of legal regulation – data protection – to archive social and economic security in a different sector, like baking and commerce. Originality/value – The article departs from a new concept of banking data, built from the meshing of the concepts of banking information and sensible personal data. From this conceptual frame, it can evaluate the level of protection granted by the European and French law in order to sketch a possible protective regime.
Style APA, Harvard, Vancouver, ISO itp.
42

Patel, Ashish, Richa .. i Aditi Sharma. "Maize Plant Leaf Disease Classification Using Supervised Machine Learning Algorithms". Fusion: Practice and Applications 13, nr 2 (2023): 08–21. http://dx.doi.org/10.54216/fpa.130201.

Pełny tekst źródła
Streszczenie:
Maize is an important staple crop all over the world, and its health is very important for food security. It is important for crop management and yield to find diseases that affect maize plants as soon as possible. In this study, we suggest a new way to classify diseases on maize plant leaves by using supervised machine learning algorithms. Our method uses the power of texture analysis with Gray-Level Co-occurrence Matrix (GLCM) and Gabor feature extraction techniques on the Plant-Village dataset, which has images of both healthy and unhealthy maize leaves. This method uses four supervised machine learning algorithms, called Decision Tree, Gradient Boosting, Support Vector Machine (SVM), and K-Nearest Neighbors (KNN), to sort the extracted features into healthy and diseased groups. By doing a lot of tests, we show that our way of finding maize leaf diseases works well. The results show that these techniques have the potential to quickly and non-invasively diagnose diseases, giving farmers important information for acting quickly. We talk about the pros and cons of each algorithm and suggest ways to make them even better. This research contributes to the advancement of automated plant disease detection systems, fostering sustainable agriculture practices and aiding in crop management decisions. The proposed approach holds promise for real-world application, enabling farmers to mitigate disease-related losses and secure global food supplies.
Style APA, Harvard, Vancouver, ISO itp.
43

Lim, Joo S., Sean B. Maynard, Atif Ahmad i Shanton Chang. "Information Security Culture". International Journal of Cyber Warfare and Terrorism 5, nr 2 (kwiecień 2015): 31–52. http://dx.doi.org/10.4018/ijcwt.2015040103.

Pełny tekst źródła
Streszczenie:
There is considerable literature in the area of information security management (ISM). However, from an organizational viewpoint, the collective body of literature does not present a coherent, unified view of recommended security management practices. In particular, despite the existence of ‘best-practice' standards on information security management, organizations have no way of evaluating the reliability or objectivity of the recommended practices as they do not provide any underlying reasoning or justification. This paper is a first step towards the development of rigorous and formal instruments of measurement by which organizations can assess their security management practices. The paper identifies nine security practice constructs from the literature and develops measurement items for organizations to assess the adequacy of their security management practices. The study uses a multiple case study approach followed by interviews with a panel of four security experts to validate and refine these security practice constructs and their associated measures.
Style APA, Harvard, Vancouver, ISO itp.
44

Barrett, Lisa Feldman, Ralph Adolphs, Stacy Marsella, Aleix M. Martinez i Seth D. Pollak. "Emotional Expressions Reconsidered: Challenges to Inferring Emotion From Human Facial Movements". Psychological Science in the Public Interest 20, nr 1 (lipiec 2019): 1–68. http://dx.doi.org/10.1177/1529100619832930.

Pełny tekst źródła
Streszczenie:
It is commonly assumed that a person’s emotional state can be readily inferred from his or her facial movements, typically called emotional expressions or facial expressions. This assumption influences legal judgments, policy decisions, national security protocols, and educational practices; guides the diagnosis and treatment of psychiatric illness, as well as the development of commercial applications; and pervades everyday social interactions as well as research in other scientific fields such as artificial intelligence, neuroscience, and computer vision. In this article, we survey examples of this widespread assumption, which we refer to as the common view, and we then examine the scientific evidence that tests this view, focusing on the six most popular emotion categories used by consumers of emotion research: anger, disgust, fear, happiness, sadness, and surprise. The available scientific evidence suggests that people do sometimes smile when happy, frown when sad, scowl when angry, and so on, as proposed by the common view, more than what would be expected by chance. Yet how people communicate anger, disgust, fear, happiness, sadness, and surprise varies substantially across cultures, situations, and even across people within a single situation. Furthermore, similar configurations of facial movements variably express instances of more than one emotion category. In fact, a given configuration of facial movements, such as a scowl, often communicates something other than an emotional state. Scientists agree that facial movements convey a range of information and are important for social communication, emotional or otherwise. But our review suggests an urgent need for research that examines how people actually move their faces to express emotions and other social information in the variety of contexts that make up everyday life, as well as careful study of the mechanisms by which people perceive instances of emotion in one another. We make specific research recommendations that will yield a more valid picture of how people move their faces to express emotions and how they infer emotional meaning from facial movements in situations of everyday life. This research is crucial to provide consumers of emotion research with the translational information they require.
Style APA, Harvard, Vancouver, ISO itp.
45

Pleshakov, Vitaly Vladimirovich, i Denis Yurievich Grigoriev. "Approaches to document quality assessment on standardization". Technology of technosphere safety, nr 101 (2023): 138–48. http://dx.doi.org/10.25257/tts.2023.3.101.138-148.

Pełny tekst źródła
Streszczenie:
Introduction. Every year the number of documents on standardization in the field of fire safety increases. Such an increase suggests that the level of safety increases by excluding the occurrence of adverse events by establishing a regulatory requirement. However, the practice of applying standardization documents shows that a large number of standardization documents is not a guarantee of safety from harm to legally protected values. There are regulatory conflicts, duplications, excessive requirements. It seems that the issue of security is not related to the number of standardization documents, but to their quality. Assessing the quality of standardization documents requires serious theoretical work. Therefore, in order to ensure the effectiveness of regulatory and technical activities, it is necessary to develop an approach to assessing the quality of standardization documents. Goals and objectives. The purpose of the analysis is to establish approaches to assessing the quality of standardization documents. The objectives of the study are to determine the quality indicator of documents on standardization in the field of fire safety. Research methods. The scientific basis of the research was the theory of system analysis and methods of information synthesis. Results and their discussion. In regulatory and technical activities, as in any industry, a quality indicator should be installed, tracking which, it will be possible evaluate the effectiveness of standardization documents. Monitoring of the quality indicator on an ongoing basis will reduce the time and financial costs for the development and updating of standardization documents. Conclusions. The necessity of developing indicators of the results of standardization work in the national standardization system is determined. The evaluation of the results of standardization work is proposed based on the comparison of the indicator with the base parameter. An indicator for assessing the quality of documents on standardization in the field of fire safety is proposed based on a comparison of the real temperature regime of a fire and the standard temperature regime of certification tests. Keywords: technical regulation; standardization; quality assessment.
Style APA, Harvard, Vancouver, ISO itp.
46

Boychenko, O. V., i D. V. Ivanyuta. "INFORMATION SECURITY MODELS". Construction economic and environmental management 80, nr 3 (2022): 33–39. http://dx.doi.org/10.37279/2519-4453-2021-3-33-39.

Pełny tekst źródła
Streszczenie:
This article considers the problem of ensuring information security in modern conditions. The analysis of a possible solution to this problem is carried out by constructing information security models: conceptual, mathematical and functional. Taking into account the improvement of strategic information security management and new technologies in the computer sphere, an attempt is made to consider in detail the conceptual model of information security, the importance and necessity of which is associated with an increase in the volume of transmitted, used and stored data, as well as the implementation in practice of protecting the information rights of users using the proposed mechanisms.
Style APA, Harvard, Vancouver, ISO itp.
47

Bonci, Eduard-Alexandru, Orit Kaidar-Person, Marilia Antunes, Oriana Ciani, Helena Cruz, Rosa Di Micco, Oreste Davide Gentilini i in. "CINDERELLA clinical trial: Using artificial intelligence–driven healthcare to enhance breast cancer locoregional treatment decisions." Journal of Clinical Oncology 42, nr 16_suppl (1.06.2024): TPS621. http://dx.doi.org/10.1200/jco.2024.42.16_suppl.tps621.

Pełny tekst źródła
Streszczenie:
TPS621 Background: Breast cancer treatments often pose challenges in balancing efficacy with quality of life. The CINDERELLA Project pioneers an artificial intelligence (AI)-driven approach (CINDERELLA APP) for shared decision-making process, aiming to harmonise locoregional therapeutic interventions with breast cancer patients' expectations about aesthetic outcomes. The CINDERELLA clinical trial aims to establish a new standard in patient-centred care by bridging the gap between clinical treatment options and patient expectations through innovative technology. The trial focuses on evaluating the effectiveness of the CINDERELLA APP in improving patient satisfaction regarding locoregional treatment aesthetic outcomes, aligning patient expectations with real-world results, and assessing its impact on overall quality of life and psychological well-being. Methods: Trial design and statistical methods: This international multicentric interventional randomised controlled open-label clinical trial will recruit and randomise patients into two groups: one receiving standard treatment information and the other using the AI-powered CINDERELLA APP. The primary objective is to assess the levels of agreement among patients' expectations regarding the aesthetic outcome before and 12 months after locoregional treatment. The trial will also evaluate the aesthetic outcome level of agreement between the AI evaluation tool and self-evaluation. The impact of the intervention on aligning expectations with outcomes will be evaluated using the Wilcoxon signed-rank test. The improvement in classification of aesthetic results post-intervention will be measured by calculating the Weighted Cohen's kappa. Outcomes across different groups will be compared using statistical tests and bootstrap methods. CANKADO functions as the base system, allowing doctors to supervise APP content for patients and handle data gathering, while upholding principles of privacy, data security, and ethical AI practices. Intervention planned: Using the CINDERELLA APP, the patient will have access to supervised medical information approved by breast cancer experts, and the AI system will match patient's information to pictures showing the potential aesthetic outcome (spectrum of good-poor) according to different locoregional approach. Major eligibility criteria: Non-metastatic breast cancer patients eligible for either breast-conserving surgery or mastectomy with immediate reconstruction. Current enrollment: Recruitment is currently open at six study sites. The recruitment started on 8 August 2023, aiming to enroll at least 515 patients/arm. As of January 26, 2024, clinical study sites have successfully randomised 177 patients. Clinical trial information: NCT05196269 .
Style APA, Harvard, Vancouver, ISO itp.
48

Albarrak, Abdullah M. "Determining a Trustworthy Application for Medical Data Visualizations through a Knowledge-Based Fuzzy Expert System". Diagnostics 13, nr 11 (30.05.2023): 1916. http://dx.doi.org/10.3390/diagnostics13111916.

Pełny tekst źródła
Streszczenie:
Medical data, such as electronic health records, are a repository for a patient’s medical records for use in the diagnosis of different diseases. Using medical data for individual patient care raises a number of concerns, including trustworthiness in data management, privacy, and patient data security. The introduction of visual analytics, a computing system that integrates analytics approaches with interactive visualizations, can potentially deal with information overload concerns in medical data. The practice of assessing the trustworthiness of visual analytics tools or applications using factors that affect medical data analysis is known as trustworthiness evaluation for medical data. It has a variety of major issues, such as a lack of important evaluation of medical data, the need to process much of medical data for diagnosis, the need to make trustworthy relationships clear, and the expectation that it will be automated. Decision-making strategies have been utilized in this evaluation process to avoid these concerns and intelligently and automatically analyze the trustworthiness of the visual analytics tool. The literature study found no hybrid decision support system for visual analytics tool trustworthiness in medical data diagnosis. Thus, this research develops a hybrid decision support system to assess and improve the trustworthiness of medical data for visual analytics tools using fuzzy decision systems. This study examined the trustworthiness of decision systems using visual analytics tools for medical data for the diagnosis of diseases. The hybrid multi-criteria decision-making-based decision support model, based on the analytic hierarchy process and sorting preferences by similarity to ideal solutions in a fuzzy environment, was employed in this study. The results were compared to highly correlated accuracy tests. In conclusion, we highlight the benefits of our proposed study, which includes performing a comparison analysis on the recommended models and some existing models in order to demonstrate the applicability of an optimal decision in real-world environments. In addition, we present a graphical interpretation of the proposed endeavor in order to demonstrate the coherence and effectiveness of our methodology. This research will also help medical experts select, evaluate, and rank the best visual analytics tools for medical data.
Style APA, Harvard, Vancouver, ISO itp.
49

Zwiefka, Antoni, Andrzej Wyrzykowski i Krzysztof Waszkiewicz. "Integration of processes related to the implementation of the mediGOAT platform in diabetic patient care." International Journal of Integrated Care 23, S1 (28.12.2023): 319. http://dx.doi.org/10.5334/ijic.icic23453.

Pełny tekst źródła
Streszczenie:
Diabetes has always been viewed through the prism of the fact that any expenditure in this area is a threat to the budget of the entire health care system. Most often it is the progress of science that forces integration activities. An example may be the integration processes related to the implementation and creation of the mediGOAT platform, which are focused on its multi-functionality, i.e. the ability to connect many different measuring devices (Glucometer, CGM, SmartPen, Insulin Pump, GlucoActive) from many manufacturers. They are made up of smaller particles with their own rules and goals, such as engaging and evaluating activities. We meet with this, among others by implementing good practices. As a result, such activities give the user more choice and independence from many native applications (manufacturers), and it enables cooperation with Google Health and iHealth (Apple). This makes it possible to use additional information provided by External Applications (meals, exercise, pressure, weight, ...) in the treatment process. In addition, it allows you to collect and store your medical records (including the results of medical tests). The indicated/selected medical/health data (in the future on-line measurements) can be provided to the doctor via the Portal, ensuring security (login via Apple and Google, Backup) and ease of use. Additional knowledge is written at various levels of detail, scattered in different places, its origin is sometimes uncertain, which makes it unreliable. It is often oversized where it is not necessary, and various sources can contradict each other. Therefore, it is important to use trusted sources. Controlling blood glucose levels is important, as are the circumstances surrounding such a measurement, what you do and where you are. Mobile Continuous Glucose Monitoring, using CGM, enables up to 288 readings per day, giving you insight into information that fingerstick tests cannot match. CGM provides real-time glucose readings every five minutes throughout the day and night, notifying you of high and low values. The sensor continuously measures the glucose level just below the skin and transmits the data wirelessly to the display device via the transmitter. This enables an immediate reaction. A discreet sensor placed just under the skin (the automatic applicator introduces the sensor just under the skin with one press) measures the glucose level for the time specified by the manufacturer. Glucose data is sent wirelessly to the analysing and smart device via Bluetooth® or NFC technology. Such a device can be a compatible smartphone or other optional receiver that displays and archives glucose data in real time.
Style APA, Harvard, Vancouver, ISO itp.
50

Agyei-Mensah, Ben Kwame. "Does the corruption perception level of a country affect listed firms’ IFRS 7 risk disclosure compliance?" Corporate Governance: The International Journal of Business in Society 17, nr 4 (7.08.2017): 727–47. http://dx.doi.org/10.1108/cg-10-2016-0195.

Pełny tekst źródła
Streszczenie:
Purpose This paper aims to examine the relationship between corporate governance, corruption and compliance with International Financial Reporting Standard (IFRS 7) risk disclosure requirements in listed firms in two Sub-Saharan Africa countries: Botswana and Ghana. This study tries to test whether the transparency level of a country has any impact on the transparency level of its firms. Design/methodology/approach The study uses 174 firm-year observations between the period 2013-2015 for listed firms in the two countries. Each annual report was individually examined and coded to obtain the disclosure of corporate risk disclosure index. Descriptive analysis was performed to provide the background statistics of the variables examined. This was followed by regression analysis, which forms the main data analysis. Findings The results suggest that the extent of risk disclosure compliance over the three-year period is, on average, 63 and 53 per cent for Botswana and Ghana, respectively. The differences in the disclosure levels in the two countries can be attributed to the different levels of corruption in the two countries. One way of hiding corrupt practices is for companies to disclose scanty information. Originality/value This is one of the few studies in Sub-Saharan Africa that tests the transparency levels of listed firms in the two countries by considering the impact of corporate governance factors on IFRS 7 risk disclosure compliance. The findings of this study will help market regulators in Ghana, Botswana, the Sub-Saharan Africa Security and Exchange Commission (SEC) and the Sub-Saharan Africa exchanges in evaluating the adequacy of the current disclosure regulations in their countries.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii