Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Recent years have seen the swift development and deployment of Internet-of-Things (IoT) applications in a variety of application domains. In this scenario, people worldwide are now ready to delight the benefits of the Internet of Things... more
    • by 
    •   20  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Nhiều mẹ bầu chủ quan khi bị rỉ ối vì chưa biết tầm quan trọng của nước ối với thai nhi,. Vậy bà bầu bị rỉ ối có sao không, có nguy hiểm không?
    • by 
    •   5  
      Bà BầuCẩm Nang Bà BầuChăm Sóc Sức KhỏeThực Phẩm Cho Bà Bầu
    • by 
    •   3  
      PhilosophyInformal LogicHacker
Việc thiếu nước ối ảnh hưởng nghiêm trọng đến thai nhi. Vì vậy, nhiều mẹ bầu thiếu ối rất quan tâm việc uống gì để tăng nước ối nhanh?
    • by 
    •   5  
      Bà BầuCẩm Nang Bà BầuChăm Sóc Sức KhỏeThực Phẩm Cho Bà Bầu
The development of computer technology in today's rapidly increasing, a lot of aspects in the world of computers that can be developed starting from the hardware ( hardware ) , software ( software ) as well as its operating system .... more
    • by 
    •   5  
      Computer ScienceIndonesiaHackerSoftware
    • by 
    •   10  
      Computer ScienceDistributed ComputingUbiquitous ComputingMetal Forming
    • by 
    •   9  
      Computer ScienceDistributed ComputingUbiquitous ComputingPervasive Computing
    • by 
    •   10  
      Computer ScienceDistributed ComputingUbiquitous ComputingMetal Forming
Trứng vịt là thực phẩm quen thuộc trong mâm cơm của người Việt. Tuy nhiên, sau sinh mổ, chế độ ăn cần chú ý khắt khe hơn nên nhiều chị em quan tâm sau sinh mổ 1 tháng ăn trứng vịt được không để đảm bảo an toàn nhất.
    • by 
    • Chăm Sóc Sức Khỏe
    • by 
    •   3  
      SociologyHackerMilitary Technical Science
This research is motivated by the questions from the community around the mosque about the Qibla direction's accuracy and the early history of purchasing the Qibla direction. This study examines the historical and astronomical aspects... more
    • by 
    •   3  
      DocumentationIlmu FalakNormative
    • by 
    •   8  
      BusinessComputer ScienceInformation TechnologyRisk Management
Cybercrimes in various forms are on the raise daily; these crimes pose a potential threat to our moral society as well as economy and nation building at large. They are namely: social engineering, malvertising, ransom ware, Spamming,... more
    • by 
    •   8  
      Political ScienceHackerCybercrimeRansom
On a Faraday generator-related note, many folk use the commercially available Genecon hand-cranked dc generator (a small dc motor in a plastic gearing package usually purchased for about $50 from scientific supply houses—see... more
    • by 
    •   5  
      PhysicsHackerCurriculum and PedagogyPyrotechnics
    • by 
    •   12  
      Computer ScienceInformation SecurityComputer SecurityEncryption
Hacking is a typical method for breaching personal and confidential information. As a result, hacking is also known as infiltration. Intrusions, on the other hand, were not always recognized as theft and were employed for productive... more
    • by 
    •   4  
      Computer SecurityHackerConfidentialityInternet privacy
    • by 
    •   20  
      Information SystemsEconomicsGame TheoryInformation Security
The 2023 presidential election in Nigeria presented a contest that differed from previous elections as it presented four leading candidates that all had huge potentials to win, thus making prediction of the outcomes by mere speculations... more
    • by 
    •   2  
      Natural Language ProcessingMachine Learning
    • by 
    •   7  
      EngineeringInformation TechnologyComputer SecurityBusiness Information Systems
    • by 
    •   7  
      EngineeringInformation TechnologyComputer SecurityBusiness Information Systems
An important aspect of security requirements is a firm understanding of the threats to systems so that specific defense mechanisms can be implemented. Globally scattered network systems and on-demand access to systems such as cloud... more
    • by 
    •   6  
      Computer ScienceComputer SecurityCloud ComputingHacker
The advancement of information and communication technology (ICT)has resulted in dynamic changes in the operations of various business sectors all over the world, while causing inconvenience to users and making stakeholders' lives... more
    • by 
    •   6  
      BusinessHackerCybercrimeInformation and Communications Technology
The integration of Information and Communication Technology (ICT) tools into mechanical devices in routine use within the aviation industry has heightened cyber-security concerns. The extent of the inherent vulnerabilities in the software... more
    • by 
    •   7  
      Computer ScienceAviationComputer SecurityHacker
The twenty-first century can be said to be the time where digitisation is at its peak, with many programmers tapping into the desire of humans to remain connected without time and space limitations. The number of social media sites have... more
    • by 
    •   7  
      PsychologyComputer SciencePublic RelationsSocial Media
Smart phone usage and various computer applications has become part and parcel of daily life of millions of individuals in India and across the globe.These apps help in doing day to day tasks in an efficient manner,it saves time and they... more
    • by 
    •   8  
      Computer SciencePerceptionInformation SecurityComputer Security
El objetivo de la investigación es analizar el marketing experiencial para las cadenas independientes en la ciudad de Cuenca. Se fundamentó metodológicamente desde una perspectiva cuantitativa mediante un tipo descriptiva con diseño no... more
    • by 
    •   3  
      SociologyHumanitiesPolitical Science
Presentazione degli ultimi due volumi di “Le radici dell’Hacktivism in Italia” https://www.accademia.firenze.it/it/component/k2/342-eventi/presentazione-degli-ultimi-due-volumi-di-le-radici-dell-hacktivism-in-italia Lunedì 27 maggio,... more
    • by 
    •   10  
      Art HistoryCyberpunkHacktivismHacker
Gợi ý thực đơn healthy cho bà bầu trong 1 tuần giúp các mẹ có thêm lựa chọn thay đổi món ăn khoa học, cung cấp đầy đủ và cân bằng dưỡng chất.
    • by 
    •   5  
      Bà BầuCẩm Nang Bà BầuChăm Sóc Sức KhỏeThực Phẩm Cho Bà Bầu
    • by 
    •   8  
      EngineeringComputer ScienceInformation TechnologyComputer Security
    • by 
    • by 
    •   6  
      BusinessComputer SecurityCyberspaceThe Internet
    • by 
    •   7  
      BusinessComputer SecurityCloud ComputingHacker
Background The high rise in electronic devices in modern-day society has resulted in crimes in cyber-related crimes as criminals resort to hacking, illegal use of these devices. This is primarily due to perceived high rewards and low... more
    • by 
    •   8  
      Computer ScienceComputer SecurityNetwork ForensicsCloud Computing
Mẹ tìm hiểu thực đơn bữa sáng cho bà bầu bị tiểu đường. Bữa sáng khoa học, lành mạnh sẽ giúp mẹ kiểm soát chỉ số đường huyết ở mức ổn định.
    • by 
    •   5  
      Bà BầuCẩm Nang Bà BầuChăm Sóc Sức KhỏeThực Phẩm Cho Bà Bầu
    • by 
    •   8  
      CriminologyTerrorismPolitical SciencePolitical Violence and Terrorism
    • by 
    •   7  
      BusinessCriminologyPolitical SciencePolitical Violence and Terrorism
Cyberattacks can trigger power outages, military equipment problems, and breaches of confidential information, i.e., medical records could be stolen if they get into the wrong hands. Due to the great monetary worth of the data it holds,... more
    • by 
    •   10  
      Computer ScienceArtificial IntelligenceMachine LearningComputer Security
    • by 
    •   5  
      Computer ScienceChinaComputer SecurityHacker
The article identifies the main risks and threats related to national and international psychological security (PS) in BRICS countries (particularly China, India, and Russia) and posed by the malicious use of artificial intelligence (AI).... more
    • by 
    •   5  
      Computer ScienceChinaComputer SecurityHacker
    • by 
    •   6  
      BusinessInternet of ThingsThe InternetHacker
Using passwords, pin-codes, facial recognition, voice recognition, and the OTP (One Time Password) two-way verification protocol, work fine but are subject to easy access due to human errors. Thus, it is very easy for a hacker to gain... more
    • by 
    •   5  
      Computer ScienceGestureHackerPassword
The purpose of our study was to examine how hacking – as discussed and displayed by participants of Monthly Music Hackathon NYC – could inform making music education practices more accessible and inclusive, if at all, for people with... more
    • by 
    •   8  
      PsychologyMusicMusic EducationMusic Technology
This dissertation is concerned with the processes, principles and techniques that are involved in deception-operations for computer-security defense. In this work, computer security deception-operations are defined as the planned actions... more
    • by 
    • Computer Security
Bà bầu gầy ăn gì để tăng cân? Cách tăng cân cho bà bầu gầy luôn là vấn đề được nhiều bà mẹ đang mang thai nhưng thân hình gầy gò quan tâm.
    • by 
    •   5  
      Bà BầuCẩm Nang Bà BầuChăm Sóc Sức KhỏeThực Phẩm Cho Bà Bầu
    • by 
    •   8  
      Computer ScienceComputer SecurityCryptographyEncryption
    • by 
    •   10  
      Computer ScienceComputer SecurityThe InternetHacker
Giai đoạn cuối thai kỳ, khi bụng mẹ lớn hơn, tình trạng chèn ép tử cung diễn ra rõ rệt hơn khiến rất nhiều mẹ bầu bị són tiểu. Vậy són tiểu khi mang thai tháng cuối có sao không và mẹ nên làm gì để cải thiện?
    • by 
    •   5  
      Bà BầuCẩm Nang Bà BầuChăm Sóc Sức KhỏeThực Phẩm Cho Bà Bầu
    • by 
    •   5  
      HackerInternet privacyPhonePandemic
In the report of this, the World Economic Forum (WEF) highlighted that hacking and phishing is the new norm. Even after the virus have been destroyed. All process and tricks are significantly more viable now during the pandemic as most... more
    • by 
    •   5  
      HackerInternet privacyPhonePandemic
    • by 
    •   5  
      BusinessComputer SecurityCyberspaceHacker