Results 51 to 60 of about 165,246 (172)

REPLICATION OF COMPARATIVE METHODS FOR SINGLE DATABASE PERFORMANCE IN CENTOS OPERATION SYSTEM WITH MAXSCALE

open access: yesCyberspace, 2020
Processing data in an institution or organization has become an activity or routine for each meeting. In processing data, of course there are various kinds of problems, ranging from missing data, either because of an error in entering data or the result ...
Merinda Lestandy   +4 more
doaj   +1 more source

Dynamic group fuzzy extractor

open access: yesCybersecurity
The group fuzzy extractor allows group users to extract and reproduce group cryptographic keys from their individual non-uniform random sources. It can be easily used in group-oriented cryptographic applications.
Kaini Chen   +4 more
doaj   +1 more source

REPORTING THE LOCATION OF WASTE COLLECTION IN ANDROID BASES SYSTEM IN BANDA ACEH CITY

open access: yesCyberspace, 2020
Trash is a common problem in almost every city in Indonesia, including in Banda Aceh, although not as much as in other cities in the country. The trash's pile is increasing day by day resulting delays in handling by the management. Over time the piles of
Sarini Vita Dewi, Riky Yahdin
doaj   +1 more source

Cyber Warfare and the Crime of Aggression: The Need for Individual Accountability on Tomorrow’s Battlefield [PDF]

open access: yes, 2010
As cyberspace matures, the international system faces a new challenge in confronting the use of force. Non-State actors continue to grow in importance, gaining the skill and the expertise necessary to wage asymmetric warfare using non-traditional ...
Ophardt, Jonathan A.
core   +1 more source

Foucault in Cyberspace: Surveillance, Sovereignty, and Hardwired Censors [PDF]

open access: yes, 1997
This is an essay about law in cyberspace. I focus on three interdependent phenomena: a set of political and legal assumptions that I call the jurisprudence of digital libertarianism, a separate but related set of beliefs about the state\u27s supposed ...
Lundström, Niklas L.P.   +1 more
core   +2 more sources

Mf-net: multi-feature fusion network based on two-stream extraction and multi-scale enhancement for face forgery detection

open access: yesComplex & Intelligent Systems
Due to the increasing sophistication of face forgery techniques, the images generated are becoming more and more realistic and difficult for human eyes to distinguish.
Hanxian Duan   +7 more
doaj   +1 more source

ANALISA DAN PERANCANGAN GAME EDUKASI STUDENT ADVENTURE 2D PADA SMK NEGERI 1 AL-MUBARKEYA

open access: yesCyberspace, 2020
Penelitiant ini bertujuan merancang media belajar dalam bentuk game. penelitian ini menggunakan metode penelitian dan pengembangan ( Research and Dvelopment ). Dalam tahapan proses penelitian ini ada tahap analisis, desain, pengembangan, implementasi dan
Sulaiman Aula   +2 more
doaj   +1 more source

Open educational resources : conversations in cyberspace [PDF]

open access: yes, 2009
172 p. : ill. ; 25 cm.Libro ElectrónicoEducation systems today face two major challenges: expanding the reach of education and improving its quality.
D'Antoni, Susan, Savage, Catriona
core   +1 more source

Internet Characteristics and Online Alternative Dispute Resolution [PDF]

open access: yes, 2008
Electronic commerce is important, and perhaps, inevitable. Thus, to consider the legal implications of the growth and development of electronic commerce is essential.
Malkawi, Bashar H.
core  

Negotiating cultures in cyberspace [PDF]

open access: yes, 2004
In this paper we report findings of a multidisciplinary study of online participation by culturally diverse participants in a distance adult education course offered in Canada and examine in detail three of the study's findings.
Chase, Mackie   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy