• No results found

18 results with keyword: 'competitiveness social networking implications individuals security privacy concerns'

Competitiveness on Social Networking Sites and Its Implications on Individuals’ Security and Privacy Concerns

While individuals who enjoy competition may still view some social interactions as risky (thus not having an effect on risk beliefs), they are more likely to

Protected

N/A

9
0
0
2021
ANALYTICAL STUDY OF DATA MINING FOR INTERNET OF THINGS: A REVIEW

information acquired from the networks, and integrates the uncertain information into usable knowledge; the application service layer provides content services for various users. The

Protected

N/A

7
0
0
2020
RESULT PAPER ON A LIGHT AND RELIABLE AUTHENTICATION SCHEME   ON   CLOUD COMPUTING ENVIORNMENT

Cloud computing is an emerging technology that is still unclear to many security problems and user authentication, access control, and ensuring the security of stored data

Protected

N/A

7
0
0
2020
A REVIEW ON SOFTWARE TESTING AND QUALITY PROCESS IMPROVEMENT

The QA & Software Testing Guide describes the standardized model for Quality Assurance in product development and project work from the perspective of the

Protected

N/A

8
0
0
2020
How To Decide What To Do With The Type 5

(Sue Pistacchio): And the thing is, does anybody have any questions on what we’re doing tomorrow because I would rather talk about it here because I think we have a lot of spare

Protected

N/A

21
0
0
2021
Rodney Coe, MD, MS SUNY Downstate Medical Center December 3, 2009

Multifocal choroiditis with panuveitis: Incidence of ocular complications and loss of visual acuity.. Intravitreal injection of

Protected

N/A

37
0
0
2021
On Irresolute Topological Vector Spaces

In this paper, our focus is to investigate the notion of irresolute topological vector spaces. Irreso- lute topological vector spaces are defined by using semi open sets and

Protected

N/A

8
0
0
2020
Improving AOR Method for a Class of Two by Two Linear System

Naturally, it is necessary that we make the use of iterative methods in- stead of direct methods to solve the large sparse linear systems.. Meanwhile, iterative methods are easier

Protected

N/A

5
0
0
2020
Services Briefing 3 November, 2009 London. Copyright Telefon AB LM Ericsson All rights reserved

~154-158 ~59-61 ~20-22 Current addressable market 2007 ~150-154 ~53-55 ~19 Systems integration Education Network rollout Support services Consulting Managed services Higher

Protected

N/A

32
0
0
2021
Preparing to Serve: Online Training Modules

Tutors can help ease students’ frustration by guiding them through example problems related to the holes in their learning.?.

Protected

N/A

17
0
0
2021
Open access and Scopus: a new approach to scientific visibility from the standpoint of access

Hence, Figure 12 presents the distribution of journals according to the economic model in the three major thematic areas of SCOPUS: Life Sciences, Health

Protected

N/A

42
0
0
2021
Study on Effect of Crack Inclination and Location on Natural Frequency for Inclined Edge Cracked Beam using Free Vibration

Figure 4 and Figure 5 shows that natural frequencies of the cantilever beam with inclined edge crack at location L=l/2, angle of inclination is 15 0 and depth 0.1 and

Protected

N/A

6
0
0
2020
DATA MANAGEMENT TECHNIQUES FOR WORLDWIDE SENSOR NETWORK

Currently, many wireless sensor networks (WSNs) are working as isolated islands, and most of the sensed valuable data is not shared yet. Without sharing sensor data

Protected

N/A

7
0
0
2020
Recertification in New York State:

Data sharing among state and federal agencies capitalizes on resources already available to the state and can help consumers automatically enroll and recertify in a range of

Protected

N/A

10
0
0
2021
Douglas Edward Smith. Focus Areas. Overview. Professional and Community Affiliations

• Member, Class Action and Derivative Suits Committee, American Bar Association • Advisor, Subcommittee on Revisions to Rule 23, American Bar Association • Chair, Employment

Protected

N/A

8
0
0
2021
Semi-blind adaptive beamforming for high-throughput quadrature amplitude modulation systems

In the present semi- blind beamforming application, owing to the initial infor- mation provided by the training pilots, the algorithm con- verges much faster than the pure

Protected

N/A

6
0
0
2021
Operation of the Euratom Safeguards Office 1999-2000. COM (2001) 436 final, 26 July 2001

The Euratom Safeguards Office assisted the Russian authorities in developing and implementing computerised nuclear material accountancy and control systems, preparing and

Protected

N/A

21
0
0
2019
Psychometric Properties of the Learning Approach Inventory: A Confirmatory Factor Analysis

Objective : To determine the internal consistency and construct validity of the Learning Approach Inventory (LA-i) among first year medical students in a Malaysian medical

Protected

N/A

11
0
0
2020

Upload more documents and download any material studies right away!