Journal articles on the topic 'All-digital protection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'All-digital protection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Jiang, Kai, and Chanan Singh. "Reliability Modeling of All-Digital Protection Systems Including Impact of Repair." IEEE Transactions on Power Delivery 25, no. 2 (April 2010): 579–87. http://dx.doi.org/10.1109/tpwrd.2009.2034783.
Full textEgorov, E. A., Zh A. Shadrina, G. A. Kochyan, M. E. Podgornaya, and A. V. Vasilchenko. "The role of digital technologies in the management of production and technological processes in fruit growing (protection of fruit plantations and yield) on the example of the Krasnodar Region." Horticulture and viticulture, no. 6 (December 20, 2019): 42–49. http://dx.doi.org/10.31676/0235-2591-2019-6-42-49.
Full textZaveri, Parul. "Digital disaster management in libraries in India." Library Hi Tech 33, no. 2 (June 15, 2015): 230–44. http://dx.doi.org/10.1108/lht-09-2014-0090.
Full textAgibalova, Elena, Igor Ilovaysky, Yanina Kayl, and Viktoria Usanova. "Consumer protection in the digital environment." SHS Web of Conferences 109 (2021): 01002. http://dx.doi.org/10.1051/shsconf/202110901002.
Full textOsintsev, Anatoly A., Aleksandra I. Naumova, and Elena I. Gracheva. "Analysis of distance protection’s operation in cases of deep saturation of current transformers." E3S Web of Conferences 288 (2021): 01095. http://dx.doi.org/10.1051/e3sconf/202128801095.
Full textمحمود, محمود. ""الحماية المدنية لحق المؤلف في اطار البيئة الرقمية "دراسة تحليلية في القانون العراقي." Al-Kitab Journal for Human Sciences 1, no. 2 (October 4, 2020): 213–33. http://dx.doi.org/10.32441/kjhs.01.02.p17.
Full textEgorova, M. A., O. V. Kozhevina, and A. Yu Kinev. "Legal Protection of Competition in the Emerging Digital Markets." Lex Russica 74, no. 2 (February 25, 2021): 40–49. http://dx.doi.org/10.17803/1729-5920.2021.171.2.040-049.
Full textLee, Nam-Yong, Jinhong Yang, and Chul-Soo Kim. "Blockchain-Based Smart Propertization of Digital Content for Intellectual Rights Protection." Electronics 10, no. 12 (June 9, 2021): 1387. http://dx.doi.org/10.3390/electronics10121387.
Full text(CIPIT), Centre for Intellectual Property and Information Technology. "Privacy and Data Protection Practices of Digital Lending Apps in Kenya." Journal of Intellectual Property and Information Technology Law (JIPIT) 1, no. 1 (June 4, 2021): 131–69. http://dx.doi.org/10.52907/jipit.v1i1.68.
Full textMacedo, Alexandre Cordeiro. "Some thoughts about the Intersection between Data Protection and Competition Law: A View from Brazil." Journal of Antitrust Enforcement 9, no. 2 (July 1, 2021): 197–202. http://dx.doi.org/10.1093/jaenfo/jnab007.
Full textVolkova, K. M. "CONDUCTING A SYNTHESIS OF A DIGITAL AUTOMATON FOR AN AUTOMATED FIREFIGHTING SYSTEM." Bulletin of the South Ural State University. Ser. Computer Technologies, Automatic Control & Radioelectronics 21, no. 1 (February 2021): 49–58. http://dx.doi.org/10.14529/ctcr210105.
Full textBeduschi, Ana. "Digital identity: Contemporary challenges for data protection, privacy and non-discrimination rights." Big Data & Society 6, no. 2 (June 13, 2019): 205395171985509. http://dx.doi.org/10.1177/2053951719855091.
Full textLin, Hui, Pei Liu, Wei Li, Lian Peng Zhang, and Ya Zhou Ji. "Construction of Digital Mine and Key Technologies." Advanced Materials Research 524-527 (May 2012): 413–20. http://dx.doi.org/10.4028/www.scientific.net/amr.524-527.413.
Full textIsmagilova, Olga, and Karine Khadzhi. "Global Experience in Regulating Data Protection, Transfer and Storage." Economic Policy 15, no. 3 (June 2020): 152–75. http://dx.doi.org/10.18288/1994-5124-2020-3-152-175.
Full textZiccardi, Giovanni. "Wearable Technologies and Smart Clothes in the Fashion Business: Some Issues Concerning Cybersecurity and Data Protection." Laws 9, no. 2 (May 29, 2020): 12. http://dx.doi.org/10.3390/laws9020012.
Full textJaroszek, Agata. "European Online Marketplace – New Measures for Consumer Protection against “Old Conflict of Laws Rules”." Masaryk University Journal of Law and Technology 9, no. 1 (June 30, 2015): 21–41. http://dx.doi.org/10.5817/mujlt2015-1-3.
Full textAndreev, Mikhail, Aleksey Suvorov, and Vladimir Rudnik. "Identification of measuring part elements of numerical relay protection by its response time." Proceedings of Irkutsk State Technical University 24, no. 5 (October 2020): 1030–40. http://dx.doi.org/10.21285/1814-3520-2020-5-1030-1040.
Full textBernard Akindade Adaramola and Daniel Danjuma Chirpyen. "Experimental investigation of insulation resistance for turbo generator digital protection." Global Journal of Engineering and Technology Advances 5, no. 2 (November 30, 2020): 030–37. http://dx.doi.org/10.30574/gjeta.2020.5.2.0096.
Full textCorne, Thania Christy. "LEGAL PROTECTION OF PRIVACY DATA THROUGH ENCRYPTION TECHNOLOGY." Lampung Journal of International Law 1, no. 2 (August 13, 2020): 61. http://dx.doi.org/10.25041/lajil.v1i2.2027.
Full textMelman, Anna, Oleg Evsutin, and Alexander Shelupanov. "An Authorship Protection Technology for Electronic Documents Based on Image Watermarking." Technologies 8, no. 4 (December 20, 2020): 79. http://dx.doi.org/10.3390/technologies8040079.
Full textIbiricu, Bernice, and Marja Leena van der Made. "Ethics by design: a code of ethics for the digital age." Records Management Journal 30, no. 3 (June 10, 2020): 395–414. http://dx.doi.org/10.1108/rmj-08-2019-0044.
Full textDoletskaya, Larisa I., Vladislav I. Ziryukin, and Roman V. Solopov. "An electric power system object model creating experience for researching the operation of digital means of relay protection and automation." Journal Of Applied Informatics 16, no. 4 (August 31, 2021): 83–95. http://dx.doi.org/10.37791/2687-0649-2021-16-4-83-95.
Full textSullivan, Clare. "Digital Citizenship and the Right to Identity in Australia." Federal Law Review 41, no. 3 (September 2013): 557–84. http://dx.doi.org/10.22145/flr.41.3.7.
Full textKodynets, Anatolii, and Arsen Murashko. "Video game in the system of intellectual property: the concept and features of legal protection." Theory and Practice of Intellectual Property, no. 3 (September 7, 2021): 57–66. http://dx.doi.org/10.33731/32021.239584.
Full textVybornova, Yuliya, and Vladislav Sergeev. "Method for Protection of Copyright on Vector Data." Informatics and Automation 20, no. 1 (January 20, 2021): 181–212. http://dx.doi.org/10.15622/ia.2021.20.1.7.
Full textYushchenko, Natalya, Rustem Magizov, and Elmira Gumerova. "3D Printing as an Object of Legal Protection." SHS Web of Conferences 93 (2021): 02019. http://dx.doi.org/10.1051/shsconf/20219302019.
Full textRomaniuk, F. A., Yu V. Rumiantsev, V. Yu Rumiantsev, and I. V. Novash. "Improvement of Algorithm for Formation of Orthogonal Components of Input Quantities in Microprocessor Protection." ENERGETIKA. Proceedings of CIS higher education institutions and power engineering associations 64, no. 2 (April 9, 2021): 95–108. http://dx.doi.org/10.21122/1029-7448-2021-64-2-95-108.
Full textkhan, Asif, and Ximei Wu. "Impact of Digital Economy on Intellectual Property Law." Journal of Politics and Law 13, no. 4 (October 13, 2020): 117. http://dx.doi.org/10.5539/jpl.v13n4p117.
Full textWisesa, I. Kadek Candra, Desak Gde Dwi Arini, and Luh Putu Suryani. "Perlindungan Hukum terhadap Karya Cipta Fotografi." Jurnal Preferensi Hukum 1, no. 1 (July 27, 2020): 33–38. http://dx.doi.org/10.22225/jph.1.1.2162.33-38.
Full textSujadmiko, Bayu, Intan Fitri Meutia, Didik Kurniawan, and A. Negra Mardenitami. "The urgency of digital right management on personal data protection." International Journal of Research in Business and Social Science (2147- 4478) 10, no. 1 (February 13, 2021): 253–58. http://dx.doi.org/10.20525/ijrbs.v10i1.990.
Full textKrainiuk, O., Yu Buts, V. Barbachin, and N. Didenko. "PROSPECTS OF DIGITALIZATION IN THE FIELD OF OCCUPATIONAL HEALTH AND SAFETY." Municipal economy of cities 6, no. 159 (November 27, 2020): 130–38. http://dx.doi.org/10.33042/2522-1809-2020-6-159-130-138.
Full textBudimir, Vjekoslav, and Eberhard Gröner. "Protection against falling rocks on roads in a mountainous area - Experiences from Switzerland." Put i saobraćaj 67, no. 1 (March 22, 2021): 43–46. http://dx.doi.org/10.31075/pis.67.01.06.
Full textZheng, Y. "Digital Technology in the protection of cultural heritage Bao Fan Temple mural digital mapping survey." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XL-5/W7 (August 13, 2015): 495–501. http://dx.doi.org/10.5194/isprsarchives-xl-5-w7-495-2015.
Full textBegishev, Ildar. "Semantic Analysis of the Term «Digital Security»." Legal Linguistics, no. 20(31) (July 1, 2021): 24–38. http://dx.doi.org/10.14258/leglin(2021)2005.
Full textPanchenko, Oleg, and Irina Serdyuk. "Information state policy on the path of Digitization." Public administration aspects 8, no. 1 SI (July 5, 2020): 107–9. http://dx.doi.org/10.15421/152053.
Full textČelik, Petar. "Institutional Measures for Increasing the Cyber Security for Business in the European Union." Economic Themes 57, no. 3 (September 1, 2019): 351–64. http://dx.doi.org/10.2478/ethemes-2019-0020.
Full textAxworthy, Lloyd, and A. Walter Dorn. "New Technology for Peace & Protection: Expanding the r2p Toolbox." Daedalus 145, no. 4 (September 2016): 88–100. http://dx.doi.org/10.1162/daed_a_00414.
Full textLee, Hae Kook. "Prerequisites for stakeholder framework: Consumer advocacy and health protection in the digital industry. •." Journal of Behavioral Addictions 9, no. 4 (January 15, 2021): 898–902. http://dx.doi.org/10.1556/2006.2020.00095.
Full textLunev, Andrey. "Safe manufacturing: four directions of video technology development." Okhrana truda i tekhnika bezopasnosti na promyshlennykh predpriyatiyakh (Labor protection and safety procedure at the industrial enterprises), no. 2 (February 26, 2021): 13–16. http://dx.doi.org/10.33920/pro-4-2102-02.
Full textYu, Xiaoyan, Chengyou Wang, and Xiao Zhou. "A Survey on Robust Video Watermarking Algorithms for Copyright Protection." Applied Sciences 8, no. 10 (October 11, 2018): 1891. http://dx.doi.org/10.3390/app8101891.
Full textPurcaru, Anca, Dorina Mioara Purcaru, and Ioan Mircea Gordan. "Data Acquisition and Processing Method Adequate for High Speed Transient Electrical Events." Applied Mechanics and Materials 772 (July 2015): 541–45. http://dx.doi.org/10.4028/www.scientific.net/amm.772.541.
Full textSekhar, Savarapu Chandra, G. Ravi Kumar, and S. V. N. L. Lalitha. "Renewable energy integrated multi-terminal transmission system using wavelet based protection scheme." International Journal of Power Electronics and Drive Systems (IJPEDS) 10, no. 2 (June 1, 2019): 995. http://dx.doi.org/10.11591/ijpeds.v10.i2.pp995-1002.
Full textJudit, Feith Helga. "Where Law and Digital Health Care Meet…" Bulletin of Medical Sciences 92, no. 2 (December 1, 2019): 79–88. http://dx.doi.org/10.2478/orvtudert-2019-0017.
Full textKhan, Muhammad Asif, Umar Ajaib Khan, Asim Ali, Fawad Hussain, and Wasif Nisar. "A Robust Color Image Watermarking Scheme using Chaos for Copyright Protection." Mehran University Research Journal of Engineering and Technology 38, no. 2 (April 1, 2019): 361–78. http://dx.doi.org/10.22581/muet1982.1902.11.
Full textKrainiuk, O., Yu Buts, and V. Barbachyn. "SWOT ANALYSIS OF THE IMPLEMENTATION OF DIGITAL TECHNOLOGIES TO ENSURE OCCUPATIONAL SAFETY." Municipal economy of cities 3, no. 163 (June 29, 2021): 234–38. http://dx.doi.org/10.33042/2522-1809-2021-3-163-234-238.
Full textAli, Jabir, and Satya Prakash Ghrera. "A novel method for copyright protection of digital videos using SWEA and ZPA technique." International Journal of Engineering & Technology 7, no. 2.9 (June 1, 2018): 90. http://dx.doi.org/10.14419/ijet.v7i2.9.10547.
Full textAbdul Wahab, Hala, and Sura Sarab. "Partial Encryption in Digital Image Based On Plasma Encoding Techniques." Iraqi Journal for Computers and Informatics 41, no. 1 (December 31, 2014): 26–31. http://dx.doi.org/10.25195/ijci.v41i1.94.
Full textRusakova, Ekaterina P. "Integration of “smart” technologies in the civil proceedings of the People’s Republic of China." RUDN Journal of Law 25, no. 3 (August 23, 2021): 622–33. http://dx.doi.org/10.22363/2313-2337-2021-25-3-622-633.
Full textGrin, E. S., and A. G. Koroleva. "FORMATION OF BASIC MODELS OF PROTECTION OF TECHNOLOGIES OF VIRTUAL AND AUGMENTED REALITY IN THE CONTEXT OF INTELLECTUAL PROPERTY RIGHTS28." Actual Problems of Russian Law, no. 6 (July 18, 2019): 90–97. http://dx.doi.org/10.17803/1994-1471.2019.103.6.090-097.
Full textIvanov, Sergey O., Aleksandr A. Lariukhin, Maxim V. Nikandrov, and Leonid A. Slavutskii. "ACCURACY ESTIMATION FOR OPERATING CHARACTERISTICS NEUROMODELING OF THE OVERCURRENT PROTECTION IN A THREE PHASE MAINS." Vestnik Chuvashskogo universiteta, no. 1 (March 25, 2021): 68–77. http://dx.doi.org/10.47026/1810-1909-2021-1-68-77.
Full text