Results 41 to 50 of about 8,977 (50)

Concepto y fuentes para el estudio de la Information Warfare.

open access: yesAnales de Documentación, 1998
En este trabajo se aborda el concepto de Información Warfare, así como las principales definiciones que se han propuesto para el mismo. Se establecen los diferentes tipos de acciones que se inscriben en este ámbito, y se delinean algunas implicaciones ...
Jesús Tramullas Saz
doaj  

BSAGIoT: A Bayesian Security Aspect Graph for Internet of Things (IoT) [PDF]

open access: yesInternational Journal of Web Research
IoT is a dynamic network of interconnected things that communicate and exchange data, where security is a significant issue. Previous studies have mainly focused on attack classifications and open issues rather than presenting a comprehensive overview on
Zeinab Lashkaripour   +3 more
doaj   +1 more source

A Robust Opinion Spam Detection Method Against Malicious Attackers in Social Media [PDF]

open access: yesInternational Journal of Web Research
Online reviews are crucial in influencing consumer decisions and business practices. However, some individuals exploit this system by posting fake reviews, known as spam opinions, to manipulate perceptions.
Amir Jalaly Bidgoly   +2 more
doaj   +1 more source

Blockchain Technology and GDPR Compliance: A Comprehensive Applicability Model [PDF]

open access: yesInternational Journal of Web Research
This study investigates the potential of blockchain technology to support compliance with the General Data Protection Regulation (GDPR). By integrating blockchain's core features, such as transparency, immutability, and data encryption, with GDPR ...
Abouzar Arabsorkhi , Elham Khazaei
doaj   +1 more source

Designing a Model for "Business Process-Orientation" Using Interpretive Structural Modeling Approach (ISM) [PDF]

open access: yesJournal of Information Technology Management, 2009
ادبیات گسترده‌ای در زمینه تمرکز بر فرآیندهای کسب و کار یا جهت گیری فرآیند‌های کسب وکار (BPO) در سازمان ارائه شده است. هر یک از اندیشمندان این حوزه به یکی از ابعاد فرآیند محوری اشاره کرده‌اند، ولی تا کنون یک مدل فراگیر از ابعاد وشاخص‌های فرآیندمحوری ...
عادل آذر, کریم بیات
doaj  

Robust Corner Detection Using Local Extrema Differences [PDF]

open access: yesInternational Journal of Web Research
Corner detection, crucial for many computer vision tasks due to corner's distinct structural properties, often relies on traditional intensity-based detectors developed before 2000.
Reza Yazdi   +2 more
doaj   +1 more source

Internet of Things in Medicine: a Bibliometric Review [PDF]

open access: yesInternational Journal of Web Research
The Internet of Things (IoT) is a transformative technology that enhances various aspects of human life, significantly impacting fields such as healthcare, industry, transportation, agriculture, education, and commercial applications.
Meysam Alavi, Motahareh Dehghan
doaj   +1 more source

Evaluación y caracterización fisicoquímica, nutracéutica, microbiológica y sensorial de una bebida formulada a partir de subproductos agroindustriales

open access: yesTecnociencia Chihuahua
En la actualidad, la agroindustria del queso y juguera producen subproductos como el lactosuero y bagazo de naranja que son desechados y desperdiciados ocasionando contaminación ambiental.
Cynthia Torres Alvarez   +5 more
doaj   +1 more source

The Usability of Augmented Reality Applications for Visually Impaired Individuals: A Systematic Review

open access: yesInternational Journal of Web Research
This paper explores the usability of Augmented Reality (AR) applications specifically designed for visually impaired individuals, focusing on how these technologies can enhance their accessibility and daily living.
Nastaran Zanjani, Zahra Askarinejadamiri
doaj   +1 more source

Home - About - Disclaimer - Privacy