Academic literature on the topic 'Cyber Extension'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber Extension.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cyber Extension"
Padmaningrum, Dwiningtyas, La Mani, Triya Ayu Retnaningtyas, Tri Sujatmiko, Subejo Subejo, and Emi Widiyanti. "A PERSPECTIVE OF TECHNOLOGY ACCEPTANCE MODEL ON THE AGRICULTURE EXTENSION STAFFS USING CYBER EXTENSION." Agrisocionomics: Jurnal Sosial Ekonomi Pertanian 8, no. 3 (2024): 637–56. http://dx.doi.org/10.14710/agrisocionomics.v8i3.23820.
Full textOsad Imron Rosadi, Hepi Hapsari, and Lucyana Trimo. "Agricultural extension workers' perception of cyber extension." International Journal of Frontiers in Life Science Research 8, no. 1 (2025): 005–19. https://doi.org/10.53294/ijflsr.2025.8.1.0043.
Full textSabir, Sabir, Sugiyanto Sugiyanto, Keppi Sukesi, and Yayuk Yuliati. "The Performance of Agricultural Extension Workers in Utilizing Cyber Extension in Malang Raya Region." Journal of Socioeconomics and Development 1, no. 2 (2018): 113. http://dx.doi.org/10.31328/jsed.v1i2.772.
Full textAdriyani, Fauziah Yulia. "Pemanfaatan Cyber Extension sebagai Media Diseminasi Inovasi Pertanian oleh Penyuluh Pertanian di Provinsi Lampung." Suluh Pembangunan : Journal of Extension and Development 1, no. 1 (2019): 1–7. http://dx.doi.org/10.23960/jsp.v1i1.5.
Full textManaganta, Andri Amaliel, Rinaldi Wengkau, and Meitry Tambingsila. "Efektivitas Website Cyber Extension Sebagai Media Komunikasi dan Informasi Penyuluh." Jurnal Penyuluhan Pertanian 19, no. 1 (2024): 53–62. http://dx.doi.org/10.51852/jpp.v19i1.771.
Full textUlin Nihayah, Niha. "EFEKTIFITAS CYBER EXTENSION PADA PENYULUH AGAMA DI KOTA SEMARANG." Jurnal Bimas Islam 13, no. 2 (2020): 404–34. http://dx.doi.org/10.37302/jbi.v13i2.256.
Full textFadillah, Nurul, Dwiningtyas Padmaningrum, and Eksa Rusdiyana. "Faktor-Faktor yang Memengaruhi Pemanfaatan Cyber Extension oleh Penyuluh Pertanian Lapangan (PPL) di Kabupaten Bima." AGRITEXTS: Journal of Agricultural Extension 47, no. 1 (2024): 37. http://dx.doi.org/10.20961/agritexts.v47i1.86723.
Full textPakpahan, Tience E., Amelia Zuliyanti Siregar, and Theresia Inova Sitanggang. "Pemanfaatan Cyber Extension oleh Penyuluh Pertanian dalam Meningkatkan Kinerja Penyuluh Pertanian di Kabupaten Deli Serdang." Paradigma Agribisnis 5, no. 2 (2023): 138. http://dx.doi.org/10.33603/jpa.v5i2.7485.
Full textLatarus, Fangohoi, Sugiyanto, Sukesi Keppi, and Dwi Cahyono Edi. "THE ROLE OF CYBER EXTENSION AS MEDIA INFORMATION OF PLANTATION GENETIC RESOURCES IN THE INSURANCE OF COCOA RESULTS IN SOUTH MANOKWARI REGENCY WEST PAPUA." International Journal of Research - Granthaalayah 5, no. 11 (2017): 343–50. https://doi.org/10.5281/zenodo.1117179.
Full textAmin, Muh. "EFEKTIVITAS DAN PERILAKU PETANI DALAM MEMANFAATKAN TEKNOLOGI INFORMASI BERBASIS CYBER EXTENSION." Informatika Pertanian 23, no. 2 (2016): 211. http://dx.doi.org/10.21082/ip.v23n2.2014.p211-219.
Full textDissertations / Theses on the topic "Cyber Extension"
Maines, C. L. "A framework for the extension and visualisation of cyber security requirements in modelling languages." Thesis, Liverpool John Moores University, 2018. http://researchonline.ljmu.ac.uk/8393/.
Full textTurgeman, Yaniv Jacob. "Microbial mediations : cyber-biological extensions of human sensitivity to natural and made ecologies." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/99304.
Full textOliveira, Ahmina Raiara Solsona. "O comprometimento asiático com o desenvolvimento cibernético da região e a utilização sínica do ciberespaço como extensão de sua estratégia tradicional." Universidade Estadual da Paraíba, 2015. http://tede.bc.uepb.edu.br/tede/jspui/handle/tede/2572.
Full textChen, Yi-Hong, and 陳奕宏. "Utilizing Random Forest and Extension Neural Network to Improve Yield and Fault Diagnosis in Cyber Physical System: Two Empirical Studies." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/b7sh45.
Full textBooks on the topic "Cyber Extension"
Sumardjo. Cyber extension: Peluang dan tantangannya dalam revitalisasi penyuluhan pertanian. IPB Press, 2010.
Find full textJena, Dr Anshuman, and Dr Subhaprada Dash, eds. Current Trends in Cyber Extension. AkiNik Publications, 2022. http://dx.doi.org/10.22271/ed.book.1801.
Full textCheng, Dean. Cyber Dragon. ABC-CLIO, LLC, 2016. http://dx.doi.org/10.5040/9798400636431.
Full textFalco, Gregory J., and Eric Rosenbach. Confronting Cyber Risk. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197526545.001.0001.
Full textWEBB, Smart. Updated Cyber Security for Beginners: An Extensive Beginner to Expert Guide to Learning and Mastering How to Protect Your System Against Threats, Hacks and Cyber Attacks. Independently Published, 2022.
Find full textDieter, Fleck, ed. The Handbook of International Humanitarian Law. 4th ed. Oxford University Press, 2021. http://dx.doi.org/10.1093/law/9780198847960.001.0001.
Full textMockaitis, Thomas R. Violent Extremists. ABC-CLIO, LLC, 2019. http://dx.doi.org/10.5040/9798216032472.
Full textRoscini, Marco. International Law and the Principle of Non-Intervention. Oxford University PressOxford, 2024. http://dx.doi.org/10.1093/oso/9780198786894.001.0001.
Full textBook chapters on the topic "Cyber Extension"
Yan, Chuyi, Haixia Xu, Yongheng Mu, and Jiong Ding. "Pitch in: A Secure Extension Signature Based on SM9." In Science of Cyber Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17551-0_6.
Full textHamidi, Amirreza, and Hossein Ghodosi. "Verifiable DOPE from Somewhat Homomorphic Encryption, and the Extension to DOT." In Science of Cyber Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17551-0_7.
Full textRen, Mengxia, Joshua Josey, and Chuan Yue. "WebMea: A Google Chrome Extension for Web Security and Privacy Measurement Studies." In Science of Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-45933-7_18.
Full textKrumnow, Arne, Swantje Plambeck, and Goerschwin Fey. "Using Forest Structures for Passive Automata Learning." In Machine Learning for Cyber-Physical Systems. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-47062-2_7.
Full textSingh, Manpreet Pal, Sumati Sidharth, and Shobhanam Krishna. "Process Mapping Military Aircraft Life Extension and Cyber Security Issues." In Attacks on Artificial Intelligence. Apple Academic Press, 2025. https://doi.org/10.1201/9781003498827-9.
Full textLee, Wonseok, Jaehwan Jeong, Seonghyeon Park, and Chang-Gun Lee. "Practical Multicore Extension of Functionally and Temporally Correct Real-Time Simulation for Automotive Systems." In Cyber Physical Systems. Model-Based Design. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41131-2_7.
Full textUtkin, Lev, and Andrei Konstantinov. "An Extension of the Neural Additive Model for Uncertainty Explanation of Machine Learning Survival Models." In Cyber-Physical Systems: Intelligent Models and Algorithms. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95116-0_1.
Full textWu, Jun, and Shibo Luo. "Novel Lifetime Extension Technology for Cyber-Physical Systems Using SDN and NFV." In Energy Conservation in Residential, Commercial, and Industrial Facilities. John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119422099.ch10.
Full textChergui, Mohamed El Amine, and Sidi Mohamed Benslimane. "A Valid BPMN Extension for Supporting Security Requirements Based on Cyber Security Ontology." In Model and Data Engineering. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00856-7_14.
Full textSirajuddin, Arief, Tuti Bahfiarti, Andi Alimuddin Unde, and Sudirman Karnay. "Developing Farmer Capacity and Performance Through Cyber Extension: A Review of Digital Governance." In Atlantis Highlights in Social Sciences, Education and Humanities. Atlantis Press International BV, 2025. https://doi.org/10.2991/978-94-6463-680-2_18.
Full textConference papers on the topic "Cyber Extension"
Sindhu, K. S. V., M. Maheswari, and D. Ramalakshmi. "CYBER WEB: An Extension for Scanning Websites." In 2023 2nd International Conference on Vision Towards Emerging Trends in Communication and Networking Technologies (ViTECoN). IEEE, 2023. http://dx.doi.org/10.1109/vitecon58111.2023.10157088.
Full textMa, Xiongtao, Chongming Bao, Lei Li, Lihua Zhou, and Bing Kong. "An Extension to Hub Algorithm Based on Triangular Loop." In 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2014. http://dx.doi.org/10.1109/cyberc.2014.60.
Full textYunus, U., M. Rizkiansyah, and A. Ariestyani. "Cyber extension as the sustainable communication for farmers." In 1ST INTERNATIONAL CONFERENCE ON ACHIEVING THE SUSTAINABLE DEVELOPMENT GOALS. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0110070.
Full textGraja, Imen, Slim Kallel, Nawal Guermouche, and Ahmed Hadj Kacem. "BPMN4CPS: A BPMN Extension for Modeling Cyber-Physical Systems." In 2016 IEEE 25th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE). IEEE, 2016. http://dx.doi.org/10.1109/wetice.2016.41.
Full textFalcon, Pablo, Antonio Barreiro, Miguel D. Cacho, and Emma Delgado. "Passive teleoperation of mobile robot with input-output linearization and dynamic extension." In 2014 IEEE 4th Annual International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2014. http://dx.doi.org/10.1109/cyber.2014.6917517.
Full textXiong, Wenjun, and Robert Lagerstrom. "Threat Modeling of Connected Vehicles: A privacy analysis and extension of vehicleLang." In 2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE, 2019. http://dx.doi.org/10.1109/cybersa.2019.8899615.
Full textZhang, Junsong, Yang Wang, Yiran Wang, and Bingrui Zhao. "Human behavior data extension method for mine scene." In 2023 International Conference on Cyber-Physical Social Intelligence (ICCSI). IEEE, 2023. http://dx.doi.org/10.1109/iccsi58851.2023.10303787.
Full textYuxia, Sun, and Yang Pengying. "An algorithm of compiling instruction list into the ladder diagram base on the block extension." In 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2012. http://dx.doi.org/10.1109/cyber.2012.6320079.
Full textAgbaje, Micheal, Oludele Awodele, and Chibueze Ogbonna. "Applications of Digital Watermarking to Cyber Security (Cyber Watermarking)." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2138.
Full textRentschler, Markus, Henning Trsek, and Lars Durkop. "OPC UA extension for IP auto-configuration in cyber-physical systems." In 2016 IEEE 14th International Conference on Industrial Informatics (INDIN). IEEE, 2016. http://dx.doi.org/10.1109/indin.2016.7819128.
Full textReports on the topic "Cyber Extension"
Yilmaz, Ihsan, and Kenes Bulent. Digital Authoritarianism in Turkish Cyberspace: A Study of Deception and Disinformation by the AKP Regime’s AKtrolls and AKbots. Populism & Politics (P&P), 2023. http://dx.doi.org/10.55271/pp0026.
Full text